Monday, April 14th, 2008
The first thing is to isolate the computer (no more trading floppies until you're done) and then begin to disinfect it.
One of my favorite tools is Knoppix. The great thing about this Linux distribution is that you don't have to know anything about Linux in order to be able to ...
Posted in Internet, Security | No Comments
Saturday, April 12th, 2008
If you're running Windows Vista, you're familiar with User Access Control (UAC). It's the security subsystem that pops up those irritating dialog boxes asking whether you really want to install software, or modify system files, or write to the Registry.
UAC may be Vista's most-hated feature, but as it turns out, ...
Posted in Internet, Security, Windows | No Comments
Saturday, April 12th, 2008
Threats against browsers are getting more sophisticated and branching out into such exotic areas as gaming, experts told attendees at the recent RSA Conference 2008.
New attacks from games and virtual-world Web sites can deliver bot-like control of browsers to attackers, said Ed Skoudis, a security consultant with Intelguardians, speaking at ...
Posted in Coding, Internet, Privacy, Security | No Comments
Saturday, April 12th, 2008
User Account Control (UAC) is a new security feature in Windows Vista that requires all users to log on and run in standard user privileges mode instead of as administrator with full administrative rights, thus prevent unauthorized or accidental changes that could destabilize the computers or allows virus and malware ...
Posted in Internet, Software, Windows | 1 Comment
Friday, April 11th, 2008
Up to 80% of Web sites flagged as malicious by antivirus and search engine indexes are legitimate businesses, according to security experts.
Experts said while the security industry is on top of conventional spam and phishing attacks, more effort needs to be put into preventing and eliminating so-called drive-by-downloads.
The attacks allow ...
Posted in Internet, Security | No Comments