Sunday, January 25th, 2009
Here is a great list of the world's most famous hackers to date. This page includes information about what each hacker is famous for and also includes a photo of them. Very interesting read:
http://zed.m6.net/dyne/hackers.php
Posted in General BS, Security | No Comments
Saturday, January 24th, 2009
We should all be using cable locks to secure our laptops when we have to leave them in a static location for an extended period of time, but do you always take the cable lock with you when you throw your laptop in your bag and leave? Or does the ...
Posted in Hardware, Security | No Comments
Friday, January 23rd, 2009
Yes, Microsoft's Malicious Software Removal Tool (MSRT) really does have a GUI and can be run on-demand.
On Windows XP, click Start >Run and type mrt and press Enter. In Vista, click Start and type mrt into the Search box and press Enter. This launches the GUI for the tool:
Press Next ...
Posted in Privacy, Security, Windows | No Comments
Wednesday, January 21st, 2009
Drives such as USB sticks infected with the virus trick users into installing the worm, according to researchers.
The "Autoplay" function in Vista and early versions of Windows 7 automatically searches for programs on removable drives.
However, the virus hijacks this process, masquerading as a folder to be opened. When clicked, the ...
Posted in Coding, Hardware, Networking, Privacy, Security, Windows | No Comments
Wednesday, January 21st, 2009
Although the two most-recent builds of Firefox 2.0, labeled 2.0.0.19 and 2.0.0.20, have omitted the defense, earlier editions of the browser were still able to query Google for a list of sites suspected of hosting identity theft scams. But Google is now shutting down the blacklist, said Mike Beltzner , ...
Posted in Internet, Privacy, Security | No Comments