access

Mon
24
Jan
Dennis Faas's picture

Hacker Offers Fire Sale On Military, Gov't Websites

A hacker recently made a post stating he'll give anyone willing to pay $499 behind-the-scenes access to confidential network files, including those of the US Army. The hacker posted a price list for access to a range of sites on an underground ... digital forum, along with offers for other illicit services. While there's no way to be certain the offer is legitimate, at least one security expert says he's seen evidence which suggests that offer is in fact genuine. (Source: krebsonsecurity.com ) US Military Intelligence Website Vulnerable Among the most high profile web sites said to be vulnerable ... (view more)

Mon
17
Jan
Dennis Faas's picture

Facebook Hacker Spreads Nasty Photos of Victims

A recently-arrested hacker reportedly used personal information found on Facebook to access women's email accounts. He then used the access to acquire and distribute bare photos of his victims to everyone in their contact lists. George Bronk, a ... 23-year-old Sacramento, California man, pleaded guilty to hacking dozens of email accounts, almost all of which were owned by females. According to reports from the Associated Press, Bronk was able to access the accounts by perusing Facebook for those who had posted a) their email addresses and b) lots of personal information, including their favorite ... (view more)

Thu
07
Oct
Dennis Faas's picture

Microsoft Security: Infected PCs Should be Banned

Viruses get their name because, like human diseases, they can spread and multiply quickly. Now, Microsoft believes some of the tactics used to protect public health should be applied to the world of technology. Computer Virus Prevention is Key to ... Deterring Further Infections The idea comes from Scott Charney, a senior figure in Microsoft's security team. He's just published a paper named "Collective Defense: Applying Public Health Models to the Internet." In Charney's paper, he argues that while preventing individual machines from getting infected -- for example through security software -- ... (view more)

Thu
22
Jul
Dennis Faas's picture

Sandboxing

In computer security, "sandboxing" is a security term used to describe the separation of running programs on an operating system. A sandbox, as it is also referred to, is often used to execute untested computer programs to ensure that they do not ... overstep their boundaries and cause harm to the system. The sandbox typically provides a tightly-controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access and the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. In this sense, sandboxes ... (view more)

Wed
16
Jun
Dennis Faas's picture

Google Operating System to Run Windows Apps

Google's forthcoming Chrome operating system (OS) will be able to run applications from other operating systems, such as Microsoft Windows. The procedure is a relatively simple technical solution, though one which has practical limitations. The ... Chrome operating system, which has been released in a form developers can experiment with works in a different way than most web browsers. It's designed to run when the computer is online and is, to a major extent, a souped-up version of Google's Chrome web browser. Chrome OS Goes Easy on Old PCs Instead of standalone applications on the computer, most ... (view more)

Thu
22
Apr
Dennis Faas's picture

Government Considers New Approach Over Net Neutrality

A former presidential advisor has called for the US government to reclassify the legal status of the Internet. It follows concerns that the Federal Communications Commission (FCC) may not have the statutory authority to enforce "net neutrality" ... principles or to go ahead with proposed plans to expand Internet access. The FCC has historically sought to uphold the idea of net neutrality. This is the principle that, with the exception of illegal material, all Internet traffic should be treated equally by carriers. This would mean, for example, that an Internet service provider couldn't charge ... (view more)

Fri
18
Dec
Dennis Faas's picture

Free WiFi Coming to Your Local McDonald's

Got to get your fix for a Big Mac but can't stop writing that report? Then you'll be happy to know that fast food goliath McDonald's will soon be unveiling free WiFi Internet access at about 80 per cent of its U.S. locations. Thanks to a new pact ... signed with AT ... (view more)

Tue
08
Dec
Dennis Faas's picture

Windows 7 Hidden Bonus: Ad-Hoc Networking

A Windows blogger has discovered that a feature supposedly removed from the starter edition of Windows 7 is in fact simply hidden. Thus, users of the new operating system (OS) can easily access the ability to run so-called ad-hoc networks. An ad-hoc ... network, also sometimes known as a computer-to-computer network, is a way of wirelessly connecting two computers directly rather than through a router. For example, you might use this when the main computer in a home is connected to the Internet through a cable modem rather than a router, with the ad-hoc network then allowing laptops to share data ... (view more)

Tue
08
Dec
Dennis Faas's picture

Migrating to Win7: How to Mount Your XP Drive Image

I've decided to put together step-by-step instructions on how to use Acronis True Image 2010 to migrate from Windows XP to Windows 7. I'm doing this for two reasons: 1. We currently have a sale on Acronis True Image on our website at 25% off . The ... proceeds will go directly to support our site. 2. Most folks will have time during the holidays to perform the Windows XP to Windows 7 upgrade . It will take a few days to do because it will require you to do a fresh install of Windows. But before that you need to backup what you have and then be able to access the data later after Windows 7 is ... (view more)

Thu
19
Nov
Dennis Faas's picture

'Create Private Torrents', and 'Access Linux Files From Windows'

Create Private Torrents This article explains how to share large files with either your friends privately or with anyone publicly using Bittorrent and uTorrent. Creating Torrents and sharing files can be a risky business, so it's important you're ... prepared. http://www.bootstrike.com Access Linux Files From Windows Want to know how to get safe and quick access to alternative file systems? DiskInternals Linux Reader is a new easy way to do this. This program plays the role of a bridge between your Windows and Ext2/Ext3 Linux file systems. This easy-to-use tool runs under Windows and allows you ... (view more)

Pages

Subscribe to RSS - access