If your senior management keep demanding to know the ROI on new security gear when you bring them quotes to have your wireless infrastructure upgraded, just show them this story. I’m sure it will help you convince them that a small investment in wireless security would indeed be worth the measly cost of a few […]
–LifeHacker Top 10: Home networking tricks “By now you’ve probably got several connected computers at home, sharing an internet connection, maybe a printer and files between them. But are you getting the most out of your home network?” –Four Ways to Surf Safely at Starbucks PC Magazine offers four tips on keeping your PC safe […]
Last week, US IT security corporation TippingPoint offered $10000 to the first person who would be able to hack into one of their Macbook Pro located at the CanSecWest conference. People interested in participating only had to present themselves at the conference and bust into one of the two designated laptops. Both machines, which were […]
In this episode of “The Real Hustle”, Hustler Jess is planning to go to a computer store and steal all the software using a portable hard drive. Will she be successful? Watch the video to find out!
–How to Reduce Firefox’s Memory Usage? We all know it, Firefox is a memory hog. Here’s a good article listing simple steps you can take to bring down the amount of RAM FF takes. –Test Driving the $100 Laptop’s Interface (Slideshow) As the One Laptop Per Child project works toward a release this year of what […]
They’re evil; they’re nasty; we hate them; and we’re still pissed at Sony for bringing them into the limelight. Rootkits. Ugly bits of malware code that dig deep into your OS kernel, there to hide and do their nefarious business beneath the radar of your average AV program. Sony’s ill-thought out rootkit served to ‘protect’ […]
By Matt Pearson Contributing Writer, [GAS] A lovely new zero-day vulnerability in Microsoft Windows has hit the public scene. At the end of March, exploitation of a previously (publicly) unknown vulnerability in Windows’ animated cursor (ANI) processing was detected in the wild. This new vulnerability is now being widely exploited to install Trojan malware into […]
–How to Understand More of What you Read Do you want to understand more of what you read, even when the material seems to be too complex for you? No problem! Just follow Ann McNeal’s four-step guide for reading a research paper. –Office Ergonomics – Make Your Work Hours at the Computer More Comfortable A […]