Saturday, May 10th, 2008
Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products.
Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, May 6th, 2008
Security in IT is everywhere: firewalls, proxies, anti-[spam|virus], IDS and more! But what about physical security to your IT infrastructure? Read the following story: Peter Gabriel’s web site was off the web due to a server theft! I would like to know how the thieves performed!
Why spend money to protect ...
Posted in Hardware, Security | No Comments
Tuesday, May 6th, 2008
You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?
A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they ...
Posted in Hardware, Privacy, Security | No Comments
Monday, May 5th, 2008
If you think of flash memory, people typically think of USB memory sticks or memory cards for digital cameras and camcorders. But the potential applications for flash have expanded tremendously. The media started off as non-volatile memory for firmware on PCs and consumer electronics devices. It then became an ultra-portable ...
Posted in Hardware, Privacy, Security | No Comments
Monday, May 5th, 2008
The question of how much RAM you really need is discussed roughly once every two years, and with every launch of a new Windows version. While there are so-called sweet spots at any given time, factors such as the operating system and popular applications have an influence on the ideal ...
Posted in Hardware | No Comments