Just goes to prove that no system is immune to infection.
Read full article at Iran admits uranium enrichment centrifuges hit by malware
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Monday, November 29, 2010
Thursday, November 25, 2010
Sunday, November 21, 2010
Happy 25th Birthday to Windows 1.0: The Bland Bust that Started it All
Many who will read this aren't old enough to remember 1985. 1985 was the year of "Back To The Future", I saw it in theaters..with my wife. That was the year I bought my first computer. No it did not have Windows on it. We went to this computer store in Fayetteville, NC. I remember the salesman showing us an IBM PC, you know, they had the clickity-clack keyboard and green screen? Instead we bought a Kaypro computer. It used CP/M. I'm not gonna attempt to tell you much about it, here's a link to it KAYPRO.
Read full article at Happy 25th Birthday to Windows 1.0: The Bland Bust that Started it All
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Read full article at Happy 25th Birthday to Windows 1.0: The Bland Bust that Started it All
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Friday, November 12, 2010
What is Layered Security?
Read full article at What is Layered Security?
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Monday, November 8, 2010
Protect Yourself from Programs Hackers use to Read Your Wireless Emails
The article doesn't go far enough. With this freely available tool, and almost no knowledge, a hacker can not only read your email and post to your accounts, they can literally take control of your computer and use it to commit any number of computer crimes. All without the knowledge of the user, all audit trails will lead to the user.
For the ethical hackers in the audience, here's the link to Firesheep. Contrary to the article, it is not a Firefox add-on, at least it's not available at Mozilla.org.
Read full article at Protect Yourself from Programs Hackers use to Read Your Wireless Emails
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
For the ethical hackers in the audience, here's the link to Firesheep. Contrary to the article, it is not a Firefox add-on, at least it's not available at Mozilla.org.
Read full article at Protect Yourself from Programs Hackers use to Read Your Wireless Emails
Regards
John Crawford
AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews
Add to Technorati Favorites
Monday, November 1, 2010
Subscribe to:
Posts (Atom)