hacker

Wed
24
Sep
Dennis Faas's picture

Palin Email Hacker Caught Red Handed

In a stunning turn of events, hackers have broken into vice-presidential candidate Sarah Palin's Yahoo email account, brazenly publishing several critical messages. The chaos isn't just limited to the Republican party, however; according to reports, ... the son of a prominent Democrat is under suspicion following an FBI raid. Serious questions are being raised this morning about the security of Palin's account, and whether the Alaskan senator should admit some responsibility for using Yahoo Mail for official business. The hacker, from a group calling itself Anonymous, published some of the stolen ... (view more)

Wed
31
Oct
Dennis Faas's picture

Beware the Russian Bear: He's a Hacker

Tucked away behind that Iron Curtain, for a long time we didn't hear much from Eastern Europe. With the fall of the Soviet Union less than twenty years ago, travelers began to uncover more than just the area's brooding discontent. Unfortunately for ... the web's security companies Russia remains a bit wild; in fact, some might consider it a hacker haven. That's certainly the impression after the discovery of a new website that uses an impressive botnet to infect vulnerable PCs -- on demand. Although the website itself hasn't been bookmarked for immediately filling a visitor's system with malware ... (view more)

Wed
11
Oct
Dennis Faas's picture

'Folder Marker', and 'Hd Hacker'

Folder Marker Change folder icon or color by one mouse click. One mouse-click and it becomes clear at once, which documents have a high priority, and which of them have normal or low priority. Folder Marker adds an item "Mark Folder" in the folder ... popup menu. Changing a folder icon or color is now a piece of cake. http://www.foldermarker.com/ Hd Hacker HDHacker is a stand-alone micro-utility that saves, visualizes, and restores the MBR (from a physical drive), the BootSector (from a logical drive) or any specified sector from any disk (even removable disks). HDHacker can be used, for example ... (view more)

Wed
31
May
Dennis Faas's picture

'Cool Ringer', and 'Hd Hacker'

Cool Ringer Cool Ringer lets you convert any of your MP3s to Mobile and VOIP ringtones in an instant. http://www.coolringer.com/ Hd Hacker HDHacker is a stand-alone micro-utility that saves, visualizes, restores the Master Boot Record (MBR) from a ... physical drive, the BootSector (from a logical drive) or any sector from a disk too. It can be used, for example, to save and restore a particular boot manager (such as LILO, for example) in case of a Windows new setup that accidentally overwrites it. An MBR and BootSector backup can also be useful for simple precautionary purposes, too; in fact, ... (view more)

Thu
17
Feb
Dennis Faas's picture

Different types of Hackers?

Commenting on yesterday's article concerning How to track down and report a Hacker , Infopackets Reader Robert M. writes: " I read yesterday's article with great interest; however, I noticed that you did not really define the different types of ... Hackers that are out there. I'd like to briefly comment on that, with some definitions I've come across. Hacker: While there are *many* different definitions of the term 'Hacker', Google's #1 answer reads, "[Hacker]: a slang term for a computer enthusiast. Among professional programmers, the term hacker implies an amateur or a programmer who ... (view more)

Thu
11
Dec
Dennis Faas's picture

Surveillance Software: record chat logs and more?, Part 2

Infopackets Reader Kevin C. writes: " Dear Dennis, I just read your article on Guardian Monitor 8.0 . I checked the Washington Post article that you included in your review and read the comparison of Guardian Monitor versus the other surveillance ... programs ... but none mentioned the possibility that an outsider (hacker) could access your PC and obtain the data captured by the surveillance software -- and possibly obtaining passwords, account numbers, etc. Should this be a concern? " My response: Excellent question. As I previously discussed, Guardian Monitor records key strokes ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Tue
08
Oct
Dennis Faas's picture

Can I track down a hacker?

Infopackets Reader Merle A. writes: " Dear Dennis, I want to know if there is a way to find out who is trying to hack into your computer. I have the "remote address, local address, and remote computer address." Someone tried twice, but my Norton ... Antivirus stopped them (this time). " My Response: Trying to hunt down a hacker may prove to be fruitless, especially if: There is more than one 'hacker' attack The hacker spoofs his IP address Chances are that most hackers will do everything possible to cover his/her tracks in an effort to thwart "being caught". Even *if ... (view more)

Pages

Subscribe to RSS - hacker