Monday, January 21, 2008

The Virantix Trojan Removal Process

The Virantix Trojan is a nasty Trojan that targets P2P websites or video codecs, which is a form of fake malicious code engineered by Internet hackers. The Virantix Trojan will degrade the performance of your PC, and The Virantix Trojan generates false and misleading system error messages...

read more | digg story

Five Quick Fixes for Internet Connection Hang-Ups

Dead Net connection? Use the power of the Windows command prompt to get back online fast.

read more | digg story

CompUSA Refuses To Accept Cash

A CompUSA cashier summoned her manager and a security guard when Bud tried to pay for his purchases with cash. The promise of 40% discounts drew Bud to the Boisie, Idaho store, but he settled for a 10% discount on an iMac and several accessories.

read more | digg story

Sunday, January 20, 2008

Pentagon: Our new robot army will be controlled by malware

Hopefully it will use an O/S created by Microsoft...

read more | digg story

Remove Trojan-Proxy.Win32 Virus

The Trojan-Proxy.Win32 virus is a malware affecting computers running Microsoft Windows. These Trojans function as a proxy server and provide anonymous access to the Internet from victim machines.

read more | digg story

Getting started with Microsoft ISA Server 2006

This is the tutorial teach step-by-step (with illustrations) of how to install and configure Microsoft ISA Server 2006 starting from installing and then configuring your network topology, creating a rule on ISA Server and also configuring on client to access ISA Server. The tutorials are separate into parts for ease of reading.

read more | digg story

Microsoft brings forward release date of Windows 7

Industry sources are indicating that Microsoft plans to release Windows 7 (the follow up to Visa) in 2009, one year earlier than anticipated. Microsoft might be anxious to roll out a new update to its OS after the lukewarm reception had by Vista.

read more | digg story

Computer security expert told NH Legislature vote riggable

This article by one computer security expert and vote fraud activist explains how another expert specifically demonstrated to the NH legislators their system insecurity. They used it anyway (Diebold's "worst" model) AND chose not to hand count a subsample - a simple task that would quickly identify any fraud.

read more | digg story

Linux_on_Your_Laptop

Maybe you're a Linux user, or someone who wants to make the jump to Linux. But whenever you're out, you see people working away on their Windows laptops or their MacBooks. And you might think to yourself "I wish I could take Linux mobile like that!

read more | digg story

Spinning a Fedora Linux Live CD

The Fedora project has added a powerful tool to its Linux distribution to build your own live CD. With a single livecd-creator command and a kickstart file listing the software you want, you can create a desktop, gaming, or Web server to run live on most PCs. This article gives details of how to do that.

read more | digg story

Saturday, January 19, 2008

DNS tools play key role in Hollywood thriller 'Untraceable'

When the FBI agents in Sony Pictures ’ upcoming "Untraceable" movie need to catch a killer, they turn to network technologies IT pros have been using for years, such as whois domain name lookup, traceroute and ping, via products developed by DNS tools vendor DNSstuff.

read more | digg story

Data theft has porn sites and customers worried

Freehold-based Too Much Media, which sells accounting software for adult Web sites, told its customers last month that a security breach on its computers allowed hackers to access various adult Web sites' subscriber lists and has the potential to embarrass.

read more | digg story

Most home routers 'vulnerable to remote take-over'

Security mavens have uncovered a design flaw in most home routers that allows attackers to remotely control the devices by luring an attached computer to a booby-trapped website. The weakness could allow attackers to redirect victims to fraudulent destinations that masquerade as trusted sites belonging to banks, ecommerce companies or health care

read more | digg story

Storm Worm Stalkers Share Research

Storm worm – two words that continue to brew up agita among IT professionals -- continues to stalk vulnerable computers across the Internet. Now, officials at Secure Computing have created a special section on their Web-based research portal dedicated to providing the public with up-to-date information on it.

read more | digg story

How to Install a Free Firewall

Installing a firewall is a simple step that can keep your computer safe. There are many security suites and pay programs for firewalls, but there are also trusted free programs that perform equally well. Read on to learn How to Install a Free Firewall.

read more | digg story

Warnings over Valentine's Day storm worm.

Security firms PC Tools and Sophos today warned computer users about an upcoming storm worm set to take advantage of Valentine's Day on 14 February.

read more | digg story

Common PC Security problems

Most common problem and ways to prevent your computer from no-go.

read more | digg story

China has penetrated key U.S. databases: SANS director

Information from leading U.S. security organization about Chinese infiltration of U.S. computer systems

read more | digg story

Security Choices: The Software Firewall

This article focuses on software firewalls which, along with anti-virus software, is considered an essential part of computer security.

read more | digg story

AntiSpyBoss - Misleading Application

AntiSpyBoss - Misleading ApplicationIt creates random files on the computer. It then detects these files as false or exaggerated system security threats during a system scan.The user is then prompted to pay for a full license of the application in order to remove the errors.

read more | digg story

The Hacker's Nightmare Review on Squidoo

An excellent computer security tutorial eBook suitable for users of Windows based computers.

read more | digg story

Does Firefox Pose A Security Threat?

Firefox, heralded as the web browser to end Microsoft's monopoly on web surfing, may have a problem. According to MS' own AntiSpyware program, Firefox poses a high level of risk to security, on account of not being updated regularly. Is that a fair assessment, coming from the company that left critical flaws in Internet Explorer for 9 months?

read more | digg story

Thursday, January 17, 2008

A New Security Hole in Excel - A warning from Microsoft

Tuesday Microsoft warned that hackers are exploiting a vulnerability in numerous versions of Excel. Opening a malicious Excel document compromises the user's machine and allows hackers to execute remote code.

read more | digg story

Windows' Genuine Disadvantage -- Vista kill switch removed

When you install Vista, you consent to being spied upon by Microsoft, through the "Windows Genuine Advantage" system. This system tries to identify instances of copying that Microsoft thinks are illegitimate. This system included a "kill switch" which allows Microsoft to remotely deactivate your copy of Vista.

read more | digg story

How To Display the Menu Bar in Internet Explorer 7 IE7

Microsoft has changed the design of IE7, and some people are having a hard time getting used to it. You can display the menu bar or file menu quite easily.

read more | digg story

How To Find Your Windows Vista CD Key

If you've ever lost your CD Key for your Microsoft software, you can use this tool to help you find it.

read more | digg story

SaveXP.com Come sign the petition to keep XP alive

Microsoft plans to end most sales of Windows XP on June 30, despite a deep reluctance by many business and individuals about moving to Vista. InfoWorld believes such an expensive, time-consuming shift with problematic benefits should not be forced on Windows users, so we have decided to rally XP users to demand that XP be kept available.

read more | digg story

Will Hyper-V Make VMware This Decade's Netscape?

Will Microsoft's Hyper-V virtualization environment bring down VMware and dominate the still largely untapped pool of data centers that have yet to commit to the technology?

read more | digg story

Top Microsoft Execs Are Leaving Like Rats on a Sinking Ship

It all started in the second week of January with Microsoft confirming the departure of Bruce Jaffe, Corporate Vice President, Corporate Development. But Jaffe signaled only the beginning of what was to come. It is hard not to look at Jaffe as a trend setter, but the fact of the matter is that lately Microsoft top executives have illustrated an...

read more | digg story

Forget Vista - Windows 7 Is Here

Well Windows 7, the replacement for Windows Vista is here. Don’t bother with vista service pack 1 or with service pack 3 for windows xp, Microsoft has currently has already started distributing early copies of its new system to partners.

read more | digg story

Tuesday, January 15, 2008

Turn Your $60 Router into a Super-Router with Tomato

Since last year there's been a lot of development of open source firmwares, and today we're taking a look at my new favorite, a firmware called Tomato. It does almost everything you expect, from Wi-Fi signal boosting to Quality of Service bandwidth allocation, in addition to offering a simplified interface chock full of fancy charts and graphs

read more | digg story

America's Most Wired Cities

What's America's most wired city? You might guess someplace in Silicon Valley, Los Angeles or San Diego. East Coast fans might bet on New York or even Chicago. But you've got to head south.

read more | digg story

Future conceptual computer

We have already seen many conceptual computers. Some of them were nearer to reality, others not very much. This conceptual computer relates to the second category that makes it more interesting.

read more | digg story

eSATA to shed the power plug

eSATA is an external version of the Serial ATA technology used to hook up internal PCs, but today external eSATA drives need their own power supply. But recently, the Serial ATA International Organization (SATA-IO) announced it's working on a version that will let external drives draw power over the cable that connects the drive to a computer.

read more | digg story

MediaDefender Hacker Speaks Out

In September 2007, anti-piracy company MediaDefender's emails went public after a hacker gained access to their systems. The attacks cost the company a huge amount of money, not to mention acute embarrassment. Now the person behind the attacks speaks.

read more | digg story

Why Linux Users Should Be Furious At BBC

Recently the BBC had a bit of a wake up call regarding numbers and how many Linux users were really out there. Why does any of this matter? It has to do with something the BBC provides called the iPlayer. Seriously, relying on ActiveX is so "1990's" that it's painful, and as luck would have it, the Linux users who wish to use this BBC player...

read more | digg story

Linux PC Models Multiply As Vista Struggles

Demand for Linux systems is such that some retailers are selling out. Last year, for instance, Wal-Mart for a time couldn't fulfill orders for Everex's $199 gPC.

read more | digg story

Thursday, January 10, 2008

Give XP the performance tools of Vista

Windows Vista has an all-in-one window for monitoring the health of your system and tweaking its performance — but what if you use XP, not Vista?With just a couple of downloads and a few drags and drops, you can add a Vista-like performance center to Windows XP.

read more | digg story

Windows Server 2008 Behind 'Slow' Microsoft.com

The company is stress testing "Longhorn" but Web research firm Alexa said Microsoft's main page lags behind 75% of sites on the Internet in terms of page load times.

read more | digg story

USB 3.0 in the flesh [

Get ready, speed freaks. USB 3.0, the oft-rumored, much-discussed, rarely seen new standard heading our way has been spotted, sliced, chopped, and diced at CES 2008.

read more | digg story

AT&T openly says it may filter Internet content

According to Brad Stone over at The New York Times, AT&T openly stated at CES that they may start filtering Internet content. This is a very big announcement because most ISPs (even Comcast) have up until this point claimed to be net neutral. So much for being a wide-open pathway to the Information Superhighway

read more | digg story

AT&T: We May Not Stay Net Neutral

AT&T executive James Cicconi, senior vice president of external & legal affairs must not read the news before opening their mouths. The New York Times Bits Blog is reporting this morning that representatives at CES have openly stated today “that they may start filtering Internet content.”

read more | digg story

Sysadmin tries, fails at being l337 hax0r, gets jail time

A 51-year-old sysadmin has gotten a record jail sentence after attempting (and failing) to write code that would have destroyed everything on one of his company's servers.

read more | digg story

Wednesday, January 9, 2008

Tuesday, January 8, 2008

The top 10 computer security threats for 2008

The 2008 Olympics is likely to spur a flurry of hacker activity, says Websense Inc, which specializes in web filtering and security software, releasing the top ten computer security threats for 2008.

read more | digg story

New Year's Resolutions For Your Computer Security

A set of tips for securing your digital data and securing your computer

read more | digg story

Army uses Macs to beef up security

In 2008, the US Army will being using Macs to improve its computer security.

read more | digg story