Monday Morning Links Serving: The April 30th Edition

–LifeHacker Top 10: Home networking tricks “By now you’ve probably got several connected computers at home, sharing an internet connection, maybe a printer and files between them. But are you getting the most out of your home network?” –Four Ways to Surf Safely at Starbucks PC Magazine offers four tips on keeping your PC safe […]

Advertisements

PWN to OWN: Hack a Mac, Win a Macbook Pro and $10000

Last week, US IT security corporation TippingPoint offered $10000 to the first person who would be able to hack into one of their Macbook Pro located at the CanSecWest conference. People interested in participating only had to present themselves at the conference and bust into one of the two designated laptops. Both machines, which were […]

The Real Hustle: The Software Steal

In this episode of “The Real Hustle”, Hustler Jess is planning to go to a computer store and steal all the software using a portable hard drive. Will she be successful? Watch the video to find out!

Monday Morning Links Serving: The April 16th Edition

–How to Reduce Firefox’s Memory Usage? We all know it, Firefox is a memory hog. Here’s a good article listing simple steps you can take to bring down the amount of RAM FF takes. –Test Driving the $100 Laptop’s Interface (Slideshow) As the One Laptop Per Child project works toward a release this year of what […]

AVG Does Freebie RootKit Detector

They’re evil; they’re nasty; we hate them; and we’re still pissed at Sony for bringing them into the limelight. Rootkits. Ugly bits of malware code that dig deep into your OS kernel, there to hide and do their nefarious business beneath the radar of your average AV program. Sony’s ill-thought out rootkit served to ‘protect’ […]

Windows Zero-day “Animated Cursor” Vulnerability

By Matt Pearson Contributing Writer, [GAS]  A lovely new zero-day vulnerability in Microsoft Windows has hit the public scene. At the end of March, exploitation of a previously (publicly) unknown vulnerability in Windows’ animated cursor (ANI) processing was detected in the wild. This new vulnerability is now being widely exploited to install Trojan malware into […]

Monday Morning Links Serving: The April 2nd Edition

–How to Understand More of What you Read Do you want to understand more of what you read, even when the material seems to be too complex for you? No problem! Just follow Ann McNeal’s four-step guide for reading a research paper. –Office Ergonomics – Make Your Work Hours at the Computer More Comfortable A […]

What to Do When Your Security is Breached

Tim Wilson, Site Editor for DarkReading.com, has just posted a simple, no-nonsense article explaining how to develop an effective computer security intrusion response policy. A must read for all of you who are managing a network with no security policies in place. Well, it’s finally happened. Despite all your efforts to stop both internal and external […]