security

Thu
28
Sep
Dennis Faas's picture

'Windows Power Shell', and 'Active Security Monitor'

Windows Power Shell Windows PowerShell is a new task-based command line shell and intuitive scripting language for system administration that provides comprehensive control and automation for Windows administrators. Windows PowerShell allows ... administrators to be more productive by improving the manageability of the Windows operating system and applications that run on Windows. Free from Microsoft. http://www.microsoft.com Active Security Monitor Active Security Monitor scans your computer and provides you with a consolidated overview of your PC security based on the existence of common ... (view more)

Wed
27
Sep
Dennis Faas's picture

Study Suggests Firefox More Vulnerable Than IE

In the tech world, conventional sentiment has always been that Mozilla's Firefox browser is safer and more secure than Microsoft Internet Explorer (IE). Now, antivirus and security company Symantec (Norton) is strongly challenging that notion. A ... recent study by Symantec indicates that 25 confirmed security holes were discovered in Firefox during the first half of 2005 -- "the most of any browser studied," according to the authors of the research. Out of those 25 security defects, 18 were identified as high-risk. Internet Explorer, on the other hand, contained 8 high-level security risks out ... (view more)

Thu
24
Aug
Dennis Faas's picture

Microsoft Hires Former McAfee VP

It's been some time since yours truly or anyone at Infopackets reported on Microsoft security. After a typhoon of activity earlier this summer with the release of OneCare Live and then the controversial Windows Genuine Advantage (WGA), the ... Redmond-based company has remained relatively hush on its plans for protecting itself and its paying customers. However, Microsoft again enters the spotlight with a recent announcement regarding former McAfee veteran, Vincent Gullotto. (Source: hackinthebox.org ) Once dubbed by CNET News to be the industry's "Virus Hunter", Gullotto has in recent years been ... (view more)

Fri
11
Aug
Dennis Faas's picture

Web 2.0: The Next Generation of Thrills and Threats

As might be expected, new horizons bring new threats. As the browser and website world expands, so too do security risks that offer anything from Spyware annoyances and popups to viruses that damn the functionality of the average PC. Recently, ... insiders have revealed that this new generation of Internet technology is growing so fast that it is outpacing the safety of security updates. Web 2.0 is the common term used for websites that offer increased functionality and interactivity beyond simple HTML (no-flash) text. Undoubtedly, many of the pages who proudly describe themselves as proponents ... (view more)

Wed
19
Jul
Dennis Faas's picture

Firewalls: Definition

A firewall is a barrier to keep destructive forces away from your computer. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Firewalls use one or more ... of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved through the firewall and then ... (view more)

Thu
13
Jul
Dennis Faas's picture

MS Excel Security Leaks Becoming Flood

Users of Excel's immensely popular spreadsheets are increasingly having to look over their shoulder. Insiders are today reporting that a new security leak -- for the third this month -- has been discovered within the program. Excel 2000, 2002, 2003 ... and Office 2000, XP and 2003 are all affected, and the fallout is driving accountants into the fetal position. The most recently reported flaw allows attackers to carry out their own commands by convincing a user that a repair is needed on a specific file. Once that file is opened, hackers can do what they wish to an affected users' system. Caught ... (view more)

Thu
06
Jul
Dennis Faas's picture

Kill WGA with the BigFix

I've been hearing a lot of hype about this Windows Genuine Advantage program. I especially liked Brandon Dimmels articles about it here at Infopackets (see "Windows Genuine Advantage (WGA) Under Fire"). I don't like programs that needlessly contact ... their home websites to report on me. Many people call that "Spyware" and I also agree that WGA fits the description. It's taken a little while for me to figure out what to do about WGA. The funny thing to me is that I've had the "Fix" on my PC for a long time. Here's what I've done ... Install BigFix Turn off automatic downloading of Windows ... (view more)

Tue
30
May
Dennis Faas's picture

Remove SpySheriff (Removal Instructions): Simplified

SpySheriff is a mock antispyware application that uses fake security alerts to dupe users into purchasing the program. SpySheriff is typically installed through a security hole in MS Windows that automatically downloads a Trojan to your PC. The ... Trojan then issues bogus security alerts in the Windows taskbar. When you click on a fake security warning, SpySheriff is downloaded and installed to the system. SpySheriff also locks the Windows desktop to a black background with a warning message stating that "your computer is at risk." How to Remove SpySheriff (Removal Instructions) Below ... (view more)

Tue
02
May
Dennis Faas's picture

A Simple Tip to Secure Email

In many ways, e-mail is the perfect marriage between technology and the human personality. Where else can we express ourselves in such a personal way online? Though some would argue that instant messaging is a more convenient communication ... technology, e-mail would still get my vote, all things considered (instant messaging is still a bit too disruptive for my taste). By all accounts, e-mail has literally revolutionized the way people communicate with one another. And as much as I love e-mail, it needs to be secured just like any other application. In fact, e-mail is often the attack vector ... (view more)

Wed
19
Apr
Dennis Faas's picture

Password Security: Are You at Risk?

There's no doubt about it, security is a hard problem to solve. The rich functionality and connectivity we enjoy in today's Internet culture does not come without a price. Admittedly, there are so many variables that affect the overall security ... posture of a computer, that it sometimes seems like an overwhelming task to stay ahead of the curve. But with all the intricacies and technical dependencies that go along with securing our machines, it's still the basic steps that we need to be most concerned about doing. The Most Exploited Weakness in Computer Security The SANS Institute maintains a ... (view more)

Pages

Subscribe to RSS - security