Saturday, March 8th, 2008
Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does.
The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, March 8th, 2008
I now have even greater sympathy for people suffering a spyware infection than ever before. I spent the better part of Tuesday night fighting off the worst spyware infection I have ever seen or heard of.
Someone was kind enough to donate a copy of VMWare for me to use ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
Users have a lot to worry about when downloading and playing media files. Are the files legal? Can their computers play the required file formats? Now there's yet another problem to add to the list: Will a media file try to install spyware?
When Windows Media Player encounters a file ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
The steady rise in phishing attacks in the last year, coupled with increasingly sophisticated scams such as "pharming" attacks, is driving interest in technology to lock down critical components such as e-mail and Domain Name System.
But bigger changes to the underlying Internet infrastructure may be needed, according to interviews with ...
Posted in Internet, Security | No Comments