Wednesday, February 11th, 2009
This is it! After many months of effort from the Remote Exploit Dev team, BackTrack 4 Beta is ready and available. I thought I'd post up some "getting started" notes, to help people out with the first surge of questions.
Default password to BackTrack 4 hasn't changed, still root / toor.
KDE ...
Posted in Coding, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Thursday, January 29th, 2009
The odds are pretty good that this will never happen to you, but should a floating head of U.S. President Barack Obama pop up on your desktop Monday morning, know this: You've been hit with the Obama worm.
The worm was spotted this past Monday after it infected PCs at a ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, January 21st, 2009
Drives such as USB sticks infected with the virus trick users into installing the worm, according to researchers.
The "Autoplay" function in Vista and early versions of Windows 7 automatically searches for programs on removable drives.
However, the virus hijacks this process, masquerading as a folder to be opened. When clicked, the ...
Posted in Coding, Hardware, Networking, Privacy, Security, Windows | No Comments
Wednesday, January 7th, 2009
USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay to execute themselves either when the stick is inserted, or more commonly, when the user double-clicks on the USB drive icon from My Computer. Such malicious AUTORUN.INF ...
Posted in Coding, Hardware, Security, Software, Windows | 1 Comment
Thursday, October 9th, 2008
The Japanese division of Taiwanese computer and component manufacturer Asus is warning customers that shipping versions of its Eee Box B202 desktop computer are infected with a virus. According to Asus, the virus is located on the D drive in a file called recycled.exe. When the user opens the D ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Page 5 of 11« First«...34567...10...»Last »