Wednesday, June 18th, 2008
Web traffic volumes will almost double every two years from 2007 to 2012, driven by video and web 2.0 applications, according to a report from Cisco Systems.
Increased use of video and social networking has created what Cisco calls 'visual networking', which is raising traffic volumes at a compound annual growth ...
Posted in Hardware, Internet, Networking | No Comments
Tuesday, June 17th, 2008
An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak.
Craig Wright, a risk advisory services manager at professional services firm BDO, found several security holes, including ...
Posted in General BS, Hardware, Internet, Networking, Security | No Comments
Tuesday, June 17th, 2008
Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first.
A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments
Monday, June 9th, 2008
The OSWA-Assistant is a no-Operating-System-required standalone toolkit which is solely focused on wireless auditing. As a result, in addition to the usual WiFi (802.11) auditing tools, it also covers Bluetooth and RFID auditing. Using the toolkit is as easy as popping it into your computer’s CDROM and making your computer ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Wednesday, June 4th, 2008
If you're a quasi-sophisticated Mac user and have been looking for advice on how to better safeguard your machine from hackers or local prying eyes, look no further: Apple has released a massive, 240-page guide that describes various methods for securing the operating system.
According to SecurityFocus.com, the manual includes an ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments