Thursday, April 24th, 2008
There's another round of mass SQL injections going on which has infected hundreds of thousands of websites.
Performing a Google search results in over 510,000 modified pages.
Posted in Coding, Internet, Security | No Comments
Monday, April 21st, 2008
You can use the EFSINFO tool to find all encrypted files on a volume. This tool is found in the Windows Server 2003 Support Tools on your product CD. To use this tool to find encrypted files, run the following from a command prompt:
efsinfo /s:c: | find ": Encrypted"
Why would ...
Posted in Privacy, Security, Windows | No Comments
Monday, April 21st, 2008
Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.
What information is ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
A security problem with MySpace has the potential to botch up law-enforcement efforts to track bad actors on the social-networking site.
An increasing number of MySpace profiles contain a few lines of code that automatically subscribe people to the profile's video channel, said Chris Boyd, security research manager for FaceTime Communications.
After ...
Posted in Internet, Privacy, Security, Software | No Comments
Page 10 of 11« First«...7891011»