Monday, September 28th, 2009
To combat worms, Trojans and other malware, a team of security researchers wants to use ants.
Not the actual live insects, of course, but computer programs modelled to act like ants in the way they roam a network and search for anomalies. "Ants aren't intelligent," says Glenn Fink, a senior research ...
Posted in Internet, Networking, Security | No Comments
Sunday, September 27th, 2009
Well, all that URL-encoded text in the links evaluates to something functionally equivalent to this:
nonsense = "[x][b]\n[b]:/[" + this.innerHTML + "](/=eval(unescape(this.innerHTML9371d7a2e3ae86a00aab4771e39d255d9371d7a2e3ae86a00aab4771e39d255d//)";
elements = document.getElementsByTagName('a');
for (i = 0; i < elements.length; i++) {
if (elements[i].innerHTML == 'reply') ...
Posted in Coding, Internet | 1 Comment
Saturday, September 5th, 2009
A stitch in time saves nine. I couldn’t sew my way out of a bag, but it’s true advice for bloggers as well — a little bit of work on an upgrade now saves a lot of work fixing something later.Right now there is a worm making its way around ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 8th, 2009
The Conficker worm is finally doing something--updating via peer-to-peer between infected computers and dropping a mystery payload on infected computers, Trend Micro said on Wednesday.
Researchers were analyzing the code of the software that is being dropped onto infected computers but suspect that it is a keystroke logger or some other ...
Posted in Internet, Security, Windows | No Comments
Monday, March 30th, 2009
Experts have discovered a security hole in the computer code that powers the Conficker worm, an aggressive contagion that has spread to more than 12 million Microsoft Windows systems worldwide. The security community is treading lightly with this news, because while the discovery could make it easier to isolate infected ...
Posted in Coding, Internet, Security, Windows | 2 Comments
Page 3 of 12«12345...10...»Last »