security

Wed
19
Apr
Dennis Faas's picture

Password Security: Are You at Risk?

There's no doubt about it, security is a hard problem to solve. The rich functionality and connectivity we enjoy in today's Internet culture does not come without a price. Admittedly, there are so many variables that affect the overall security ... posture of a computer, that it sometimes seems like an overwhelming task to stay ahead of the curve. But with all the intricacies and technical dependencies that go along with securing our machines, it's still the basic steps that we need to be most concerned about doing. The Most Exploited Weakness in Computer Security The SANS Institute maintains a ... (view more)

Tue
11
Apr
Dennis Faas's picture

'Icolorfolder', and 'Fajo Xp File Security Extension'

Icolorfolder Customize the color of each Windows XP folder. http://icolorfolder.sourceforge.net/ Fajo Xp File Security Extension Allows a user of Windows XP Home to view and change the access rights on file system objects of NTFS file systems. The ... extension provides the security tab known from Windows NT4, Windows 2000 and Windows XP Pro at the property page of file system objects. For faster access it adds an additional menu item to the context menu of such objects (optional). http://www.fajo.de/portal/index.php (view more)

Fri
31
Mar
Dennis Faas's picture

What is a Blended Threat?

" What the heck is a blended threat? " I'm glad you asked ;-) According to searchSecurity.com a blended threat is "a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using ... characteristics of both viruses and worms, while also taking advantage of vulnerabilities in computers, networks, or other physical systems." (Source: searchSecurity.com ) Now that's a mouthful! In more simpler terms, a blended threat is an attack that combines two or more vulnerabilities or attack methods on a remote machine. Blended threats are ... (view more)

Wed
15
Mar
Dennis Faas's picture

Keeping Spies Out, Part 2

This entry is the second part of a three part series on spyware prevention tips. In the first article , I overviewed an excellent (and free!) tool called SpywareBlaster whose sole purpose is to prevent the installation of spyware on your computer. ... SpywareBlaster is lightweight, easy-to-use, and continually updated. Today I'm going to share a second spyware prevention tip. Are you ready? Spyware Prevention Tip #2 - Stop Using Internet Explorer Fact: Some popular forms of spyware specifically target vulnerabilities associated with Microsoft Internet Explorer. Fact: Internet Explorer has a ... (view more)

Tue
10
Jan
Dennis Faas's picture

Remove SpywareStrike (Removal Instructions)

SpywareStrike is the latest rogue anti-spyware application to hit the 'net. As early as last week, users began reporting popups, homepage redirects, and annoying taskbar popup security warnings indicating that there was "an intrusion" on their PC. ... SunbeltBlog reports that infected machines are being redirected to fake "online security" websites, including (among others): securitycaution.com, dnserror404.com, todaywarnings.com, updatesystempage.com, and yoursecuritysystem.com. [Sample screenshot here]. All of these sites are designed to dupe unsuspecting users into ... (view more)

Tue
10
Jan
Dennis Faas's picture

SpywareStrike Removal Instructions

SpywareStrike is the latest rogue anti-spyware application to hit the 'net. As early as last week, users began reporting popups, homepage redirects, and annoying taskbar popup security warnings indicating that there was "an intrusion" on their PC. ... SunbeltBlog reports that infected machines are being redirected to fake "online security" websites, including (among others): securitycaution.com, dnserror404.com, todaywarnings.com, updatesystempage.com, and yoursecuritysystem.com. [Sample screenshot here]. All of these sites are designed to dupe unsuspecting users into ... (view more)

Thu
29
Dec
Dennis Faas's picture

SpyAxe: This Year's Nastiest, Most Pervasive Rogue Anti-Spyware Application

Many security forums and security blogs are buzzing around the 'net with much talk about SpyAxe. Fact: Computer Associates Security Advisor page suggests that SpyAxe gets onto susceptible Windows machines through a vulnerability in Internet ... Explorer. Web sites with the hidden 'Trojan-Downloader.Win32.Zlob' pass on SpyAxe as its "payload." Fact: Anti-virus firm F-Secure reports that up to twenty-five hundred (2500!) new machines per hour are infected with SpyAxe. Fact: Lavasoft quickly discovered as many as five new SpyAxe variants per week are installed onto users' machines. (A ... (view more)

Mon
14
Nov
Dennis Faas's picture

Wi Fi Cautions

So many people have become enamored with home wireless internet access, and with good reason. It's simple, relatively cheap, and very convenient. Now you can watch TV in the family room while playing poker online. Yeah! It's so easy in fact, that ... all you have to do is run out and buy a wireless router, a wireless card, plug them up and then by basically using the default configuration for both, start surfing! Unfortunately, that is exactly what most people who don't know better do. What many people don't realize is, as easy as it is for you connect to your new wireless connection, it's ... (view more)

Fri
11
Nov
Dennis Faas's picture

AntiSpyware: First Time Basics

You've just come home with your new computer. How delightful! Now you're ready to surf the web and download some music -- legally of course -- and send out a few emails to family and friends. As you're about to plug in the networking cable you ... remember something the sales associate mentioned. "Be sure and get some anti-spyware and security stuff". "Bah," you figure. The guy is just trying to sell you more that you don't want or need, right? Onward you go, dismissing the comment and salivating as Google pulls up page after page of amazing information about things you never knew ... (view more)

Fri
23
Sep
Dennis Faas's picture

'Folder Iconizer', and '6 Dumbest Ideas In Computer Security'

Folder Iconizer An easy three steps wizard to change the computer folders identity, by adding icons or de-iconizing them according to the user's desire. http://users.spark.net.gr/~stamatb/freesoft/index.htm 6 Dumbest Ideas In Computer Security What ... are they? They're the anti-good ideas. They're the brain damage that makes your $100,000 ASIC-based turbo-stateful packet-mulching firewall transparent to hackers. Where do anti-good ideas come from? They come from misguided attempts to do the impossible -- which is another way of saying "trying to ignore reality." Frequently those misguided ... (view more)

Pages

Subscribe to RSS - security