Thursday, September 10th, 2009
VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
Sun today released VirtualBox 3.0.6, a maintenance release of VirtualBox 3.0 which improves stability and performance. See the ChangeLog for ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, September 8th, 2009
We've known we would run out of IPv4 addresses since 1981, when the Internet Protocol was standardized. The numbers dictate that there will never be more than 4,294,967,296 different IPv4 addresses. (4 billion and change being the number of combinations that can be made with IPv4's 32 address bits). Before ...
Posted in Internet, Networking | No Comments
Tuesday, September 8th, 2009
A vulnerability in Microsoft's implementation of the SMB2 protocol can be exploited via the net to crash or reboot Windows Vista and Windows 7 systems. The root of the problem is an error in how the srv2.sys driver handles client requests when the header of the "Process Id High" field ...
Posted in Internet, Networking, Security, Windows | No Comments
Thursday, August 27th, 2009
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute.
The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Tuesday, August 25th, 2009
Sub7, or SubSeven or Sub7Server, is the name of a popular backdoor program. It is mainly used for causing mischief, such as hiding the computer cursor, changing system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing passwords and ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments