computers

Tue
19
May
Dennis Faas's picture

Botnet

Botnet is a jargon term for a collection of software robots, or "bots," that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing ... software. Zombie Computers and Botnets While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. How it ... (view more)

Wed
29
Apr
Dennis Faas's picture

Cybercrime

Cybercrime (or "computer crime") consists of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computers and technology infrastructure. (Source: gc.ca ) Although the ... terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. Types of ... (view more)

Fri
03
Apr
Dennis Faas's picture

Conficker Stats: Vietnam Worst, Worm Still Dormant

Security experts have put together some intriguing statistics about the Conficker virus, including the total spread of the worm and the worst-hit country. It seems Vietnam has seen the most serious invasion, while four per cent of all computer ... infections are related to Conficker. The figures come from OpenDNS, a firm which offers DNS (Domain Name System) resolution services. This is the process of mapping a website name (such as www.infopackets.com ) to the actual IP address where the website physically exists. Because Conficker interferes with this process, the firm has plenty of data to ... (view more)

Tue
17
Feb
Dennis Faas's picture

MS Offers $250K Bounty for Head of Conficker Worm

A reward of $250,000 has reportedly been offered by Microsoft to find who is behind the Downadup/Conficker virus. Since its inception last October, the Conficker worm has infected millions of computers worldwide. Microsoft is offering a cash reward ... because they view the Conficker as a criminal attack and believe the people responsible for writing it have to be held accountable. As noted by Sophos, Microsoft's reputation is badly shaken whenever a computer virus causes widespread problems for its users, so it's not surprising that they would offer a reward. (Source: sophos.co.uk ) George ... (view more)

Fri
16
Jan
Dennis Faas's picture

Are Bush Admin Computers a Crime Scene?

David Gewirtz, author of 'Where Have All the Emails Gone?' reportedly wrote an open letter to President-elect Obama asking that his administration please treat the White House computers like crime scene evidence. By failing to preserve official ... emails, the Bush White House has technically committed a federal crime by violating the Presidential Records Act and The Federal Records Act. The first few weeks of the Obama Administration taking office are going to be critical in preserving that information. Forensic evidence needs to be gathered before it's lost in the flurry of incoming activity. ( ... (view more)

Tue
16
Dec
Dennis Faas's picture

Internet Security Is Losing The Online War

Despite the efforts of the computer security industry, malicious software is reportedly spreading faster than ever and security researchers have acknowledged that they cannot seem to get ahead of the onslaught. Internet security is broken and it ... appears that nobody knows quite how to fix it. This so-called malware surreptitiously takes over a PC then uses it to spread more malware to other machines exponentially. (Source: informationweek.com ) A conservative estimate by the Organization for Security and Cooperation in Europe says that as more businesses and people move onto the Web, criminals ... (view more)

Mon
27
Oct
Dennis Faas's picture

New Virus Makes YOU a Spammer!

No matter how protected we think our computers are, no matter how much money we invest in acquiring the latest antivirus software, hackers still find a way to target our computers. While computer viruses are almost as old as computers themselves, a ... new type of spam has surfaced that not only victimizes computers, but shames the good name of the innocent end-user. If you have experienced "undeliverable" email messages that bounce back into your inbox, or if you notice this happening in the near future, it may be the result of "backscatter". The latest rave in the field of spamming is the ... (view more)

Fri
17
Oct
Dennis Faas's picture

Apple Unveils Metal MacBook; Remains Unfazed By Downturn

The crowd of about one hundred reporters didn't know what to expect as they clamored inside of the small auditorium for a Tuesday afternoon Apple unveiling. Many were excited to finally make sense of the recent terms such as "solid" and "brick" that ... the company was throwing around prior to the scheduled demonstration. While almost everyone in attendance anticipated a new line of computers to be rolled out with one of these likenesses, they soon discovered that the terms referred not to the interior of the "new" computers, but rather, the exterior. Apple CEO Steve Jobs not only announced that ... (view more)

Wed
30
Jul
Dennis Faas's picture

Study Shows Greatest Threats to Business Networks

Businesses' internal networks are becoming increasingly less secure, a new study shows. A scan of 100,000 corporate PCs and servers found that every single organisation was facing some form of security threat. The industries studied included ... healthcare, insurance, finance and manufacturing, with Promises Inc warning that the risk might extend outside the networks and out into the public domain among customers and clients. Security firm Promises Inc carried out the study between January and June this year. The research found even the most secure networks had at least three threats: the two ... (view more)

Wed
30
Jul
Dennis Faas's picture

'How Computers Boot Up', and 'Easy Net Monitor'

Today's fresh software picks were provided courtesy of Bob Helmer at Shell Extension City. Please note that the below software descriptions are provided solely from the developer and are absent from any guarantee or warranty. You are encouraged to ... review the Shell Extension Software Policy for more details. How Computers Boot Up Booting is an involved, complicated, even 'hacky', multi-stage affair -- hard to understand, but once you learn the basics it can be fun stuff. Here's an outline of the process to help you figure out what's going on 'under the hood'. http://duartes.org EasyNetMonitor ... (view more)

Pages

Subscribe to RSS - computers