Saturday, March 8th, 2008
Cisco's Linksys WRT54G Wireless-G Broadband Router has a flaw that could allow an attacker to gain administrative privileges on vulnerable devices. Even if the remote administration feature on the device is turned off, the router serves the administration web page on ports 80 and 443, protected only by a weak ...
Posted in Security | No Comments
Saturday, March 8th, 2008
What I am about to suggest may not be the most correct method to remove a BHO from your system. In fact, there is no guarantee that instructions below will resolve your issue. What I can tell you, however, is that I have used the following methods to safely remove ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
Security in all mainstream operating systems is non-existent; however, things are especially bad for Windows. Windows happens to be the favourite target of worm and virus writers. Conventional wisdom suggests that the huge installed base of Windows helps spread the worms and viruses, and also makes it a highly attractive ...
Posted in Security, Windows | No Comments
Saturday, March 8th, 2008
Mike Healan
March 23, 2004
If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
A new worm has been discovered exploiting the ISS/PAM ICQ module vulnerability. The worm payload is contained in a single 1025-byte UDP packet with a fixed source port of 4000 and a random destination port. Only the first 470 bytes of the payload are the working code of the worm; ...
Posted in Security | No Comments