Saturday, January 21st, 2006
This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At […]
Posted in Computers, Linux, Security, Tech Support | No Comments »
Friday, January 6th, 2006
Our “good friend” spyaxe, which is one of the “wolves in sheeps clothing” that masquerade as security software, but in actuality are delivered WITH spyware, has a new clone. Apparently SpywareStrike is making the rounds, and has a website which is identical to the SpyAxe site and it looks to be the same program. The […]
Posted in Computers, Security, Spyware | No Comments »
Monday, January 2nd, 2006
For starters, I hooked the D-link DWL-800AP+ up and connected it through a crossover cable to my usb network card. That way I could access it exclusively on one adapter and look online for information with the other adapter, which came in quite handy. The first thing I found was that by default the dwl-800ap+ […]
Posted in Computers, Hardware, Networking | No Comments »
Wednesday, December 28th, 2005
The Hawking Technology Print Server (HPS1P) is a nice little parallel port to ethernet print server that can be configured to make a single printer available to multiple machines on a LAN (local area network). It supports a number of different protocols and can be configured through a web interface, or with a Windows based […]
Posted in Computers, Hardware, Networking | No Comments »
Saturday, December 24th, 2005
Nobody wants to be tied to their job over the holidays, but what if someone has hacked your servers and is using your machine to scam thousands of people a day? Does that keep for two weeks? Does someone monitor the abuse address? Incidents.org has a post on messages they’ve got from some reporting to […]
Posted in Computers, Security | No Comments »
Friday, December 16th, 2005
This is under the security tab because DRM software protection has proven to be a computer security issue… Spyware Confidential is reporting on artists revolting against the Sony DRM. According to the story… My Morning Jacket, the artists who recorded the copy protected CD “Z” I mentioned here, are doing more than protesting Sony BMG’s […]
Posted in Computers, General Web/Tech, Security | No Comments »
Wednesday, December 14th, 2005
Sunbelt has this warning about yet another fake security site. This one is laid out a bit different than the others we’ve seen in recent days. It’s not quite the same spoof of the Windows Security Center, but it makes use of Microsoft’s security logo. (And it does say Security Center at the top of […]
Posted in Computers, Security, Spyware, Viruses | No Comments »
Tuesday, December 13th, 2005
This is another “wolf in sheeps clothing” alert. The Sunbelt blog has information and tips on a number of other sites that are posing as either the Windows security center page, or a page not found error. The windows security center spoof once again claims the following “Attention! Your system is under control of remote […]
Posted in Computers, Security | 1 Comment »
Tuesday, December 6th, 2005
The Register has an opinion piece today on the EFF, claiming that they’ll lose their case against Sony. They go back through the history of the EFF and it’s “successes?” or not… in the realm of attempted protection against IP overprotection. Send article as PDF
Posted in Computers, General Web/Tech | No Comments »
Monday, December 5th, 2005
Most of the time when I need to do a Dig or whois or traceroute I’m at a machine that I can use a good command line version of these essential network utilities. However, there are always times when you’re at a PC or situation that is either missing some of those, or you’d rather […]
Posted in Computers, Networking | No Comments »