If your senior management keep demanding to know the ROI on new security gear when you bring them quotes to have your wireless infrastructure upgraded, just show them this story. I’m sure it will help you convince them that a small investment in wireless security would indeed be worth the measly cost of a few […]
-LifeHacker Top 10: Home networking tricks “By now you’ve probably got several connected computers at home, sharing an internet connection, maybe a printer and files between them. But are you getting the most out of your home network?” -Four Ways to Surf Safely at Starbucks PC Magazine offers four tips on keeping your PC safe […]
Last week, US IT security corporation TippingPoint offered $10000 to the first person who would be able to hack into one of their Macbook Pro located at the CanSecWest conference. People interested in participating only had to present themselves at the conference and bust into one of the two designated laptops. Both machines, which were […]
In this episode of “The Real Hustle”, Hustler Jess is planning to go to a computer store and steal all the software using a portable hard drive. Will she be successful? Watch the video to find out!
-How to Reduce Firefox’s Memory Usage? We all know it, Firefox is a memory hog. Here’s a good article listing simple steps you can take to bring down the amount of RAM FF takes. -Test Driving the $100 Laptop’s Interface (Slideshow) As the One Laptop Per Child project works toward a release this year of what […]
They’re evil; they’re nasty; we hate them; and we’re still pissed at Sony for bringing them into the limelight. Rootkits. Ugly bits of malware code that dig deep into your OS kernel, there to hide and do their nefarious business beneath the radar of your average AV program. Sony’s ill-thought out rootkit served to ‘protect’ […]
By Matt Pearson Contributing Writer, [GAS] A lovely new zero-day vulnerability in Microsoft Windows has hit the public scene. At the end of March, exploitation of a previously (publicly) unknown vulnerability in Windows’ animated cursor (ANI) processing was detected in the wild. This new vulnerability is now being widely exploited to install Trojan malware into […]
-How to Understand More of What you Read Do you want to understand more of what you read, even when the material seems to be too complex for you? No problem! Just follow Ann McNeal’s four-step guide for reading a research paper. -Office Ergonomics – Make Your Work Hours at the Computer More Comfortable A […]
Tim Wilson, Site Editor for DarkReading.com, has just posted a simple, no-nonsense article explaining how to develop an effective computer security intrusion response policy. A must read for all of you who are managing a network with no security policies in place. Well, it’s finally happened. Despite all your efforts to stop both internal and external […]
Yesterday, a federal court judge struck down the Child Online Protection Act (COPA) declaring that the law is “impermissibly broad and over-vague” and that it violates the principles of the First and Fifth Amendments. The judge also said that if parents wanted to protect their children against pornography, they would be better off using content […]
The Mozilla Foundation has announced yesterday that starting April 24th, they would stop supporting all versions of Firefox prior to version 2.0. Still running on version 1.5? Hurry up and upgrade before it’s too late! Here’s a link to the latest version of Firefox bundled with the Google toolbar.
Talk about a bad day at the office: a computer technician working for the Alaskan government accidentally wipes out nine months’ worth of critical data, only to find later that his backup plan isn’t working. Ouch! If you’ve used a computer for long, you’ve experienced the chilling moment when you realize you’ve mistakenly deleted something […]