Thursday, June 19th, 2008
Twitter is a fun Web 2.0 communications tool that allows users to deliver quick messages of 140 characters or less. The hastiness and ephemeral nature of these messages means that Twitter has become more than a communication tool — it's a source of angry, funny and awkward messages that would ...
Posted in General BS, Internet, Privacy, Software | No Comments
Wednesday, June 18th, 2008
Less than one day after its launch, Firefox 3 has a vulnerability.
According to Tipping Point's Zero Day Initiative, the vulnerability, which it rates as critical, was reported within the first five hours of Firefox 3's release.
"Once the vulnerability was verified in TippingPoint's DVLabs and acquired from the researcher, the vulnerability ...
Posted in Internet, Security, Software | No Comments
Tuesday, June 17th, 2008
Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first.
A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments
Tuesday, June 17th, 2008
There are few job titles as misleading as that of the "Penetration Tester." Sure, saying professional computer hacker would be more direct, but have you ever noticed how hackers seem to have a dirty mind? Why else would they want to go phreaking through backdoors?
Anyway, in order for hackers to ...
Posted in Internet, Linux, Networking, Privacy, Security, Software | No Comments
Monday, June 16th, 2008
The vulnerability known as the Safari carpet bomb has still not been fixed, despite Microsoft releasing a security update for Internet Explorer last Tuesday evening. The consensus is that Microsoft's browser is the main cause of the problem, which can create a security hole in combination with Apple's Safari.
When Internet ...
Posted in Coding, Internet, Privacy, Security, Software, Windows | No Comments