Monday, November 29, 2010

Iran admits uranium enrichment centrifuges hit by malware - Yahoo! Singapore Finance

Just goes to prove that no system is immune to infection.

Read full article at Iran admits uranium enrichment centrifuges hit by malware

Regards
John Crawford

AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews


AddThis Social Bookmark Button
Add to Technorati Favorites

Sunday, November 21, 2010

Happy 25th Birthday to Windows 1.0: The Bland Bust that Started it All

Many who will read this aren't old enough to remember 1985. 1985 was the year of "Back To The Future", I saw it in theaters..with my wife. That was the year I bought my first computer. No it did not have Windows on it. We went to this computer store in Fayetteville, NC. I remember the salesman showing us an IBM PC, you know, they had the clickity-clack keyboard and green screen? Instead we bought a Kaypro computer. It used CP/M. I'm not gonna attempt to tell you much about it, here's a link to it KAYPRO.

Read full article at Happy 25th Birthday to Windows 1.0: The Bland Bust that Started it All

Regards
John Crawford

AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews


AddThis Social Bookmark Button
Add to Technorati Favorites

Friday, November 12, 2010

What is Layered Security?

Read full article at What is Layered Security?

Regards
John Crawford

AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews


AddThis Social Bookmark Button
Add to Technorati Favorites

Learn about Malware's Evolution to Crimeware

Read full article at Learn about Malware's Evolution to Crimeware

Regards
John Crawford

AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews


AddThis Social Bookmark Button
Add to Technorati Favorites

Monday, November 8, 2010

Protect Yourself from Programs Hackers use to Read Your Wireless Emails

The article doesn't go far enough. With this freely available tool, and almost no knowledge, a hacker can not only read your email and post to your accounts, they can literally take control of your computer and use it to commit any number of computer crimes. All without the knowledge of the user, all audit trails will lead to the user.

For the ethical hackers in the audience, here's the link to Firesheep. Contrary to the article, it is not a Firefox add-on, at least it's not available at Mozilla.org.

Read full article at Protect Yourself from Programs Hackers use to Read Your Wireless Emails

Regards
John Crawford

AutismZone
Accokeek Computers
Mamas Best Recipes
The Cartouche - Science Fiction Reviews


AddThis Social Bookmark Button
Add to Technorati Favorites