Spyware infiltrates blogs... so switch to Firefox advice an expert of Webroot Software
Thursday, February 24, 2005
Posted by Darheel on Thu, 02/24/2005 - 21:16 :: Spreading Firefox
Hackers are using blogs to infect computers with spyware, exposing serious security flaws in self-publishing tools used by millions of people on the Web.
"It is one more link in the commerce chain of illicit adware," said Richard Stiennon, chief of technology at Webroot Software, a maker of anti-spyware technology.
"If auto-generated Web sites such as blog sites allow the inclusion of ActiveX and JavaScript, they are a great place for spyware writers to try to induce the blogger or Web page owner into including some active code," he said.
Webroot's Stiennon advises people to switch to the Mozilla Foundation's Firefox Web browser for reading blogs. Either do that, or change IE security settings to deactivate ActiveX or JavaScript in the Web browser, he said.
Full article in TechRepublic
"It is one more link in the commerce chain of illicit adware," said Richard Stiennon, chief of technology at Webroot Software, a maker of anti-spyware technology.
"If auto-generated Web sites such as blog sites allow the inclusion of ActiveX and JavaScript, they are a great place for spyware writers to try to induce the blogger or Web page owner into including some active code," he said.
Webroot's Stiennon advises people to switch to the Mozilla Foundation's Firefox Web browser for reading blogs. Either do that, or change IE security settings to deactivate ActiveX or JavaScript in the Web browser, he said.
Full article in TechRepublic
Finally my wait is over!!!!
Ok, it's happened everyone!! I was fortunate enough to recieve an intivation to start a GMail account while it's still in Beta. As most of you well know, Google wanted to compete w/the likes of Yahoo, MSN when it came to providing a stable email account. Both Yahoo and MSN increased their storage capacity from 4MB storage to a whopping 250MB (ohhhhhhhhh) when they found out that GMail would be offering up to 1GB of storage space for each account. Anyway, I received my invite to test out the service earlier today......about friggin time. I only submitted my name last year, oh well, better late than never I suppose. There's lots of great features to have w/the GMail service. I'll keep you all up to speed as we approach the final release date.
A Google approach to email.
Gmail is an experiment in a new kind of webmail, built on the idea that you should never have to delete mail and you should always be able to find the message you want. The key features are:
*Search, don't sort.
Use Google search to find the exact message you want, no matter when it was sent or received.
*Don't throw anything away.
1000 megabytes of free storage so you'll never need to delete another message.
*Keep it all in context.
Each message is grouped with all its replies and displayed as a conversation.
*No pop-up ads. No untargeted banners.
You see only relevant text ads and links to related web pages of interest
For an overview of what GMail has to offer check out this link.
A Google approach to email.
Gmail is an experiment in a new kind of webmail, built on the idea that you should never have to delete mail and you should always be able to find the message you want. The key features are:
*Search, don't sort.
Use Google search to find the exact message you want, no matter when it was sent or received.
*Don't throw anything away.
1000 megabytes of free storage so you'll never need to delete another message.
*Keep it all in context.
Each message is grouped with all its replies and displayed as a conversation.
*No pop-up ads. No untargeted banners.
You see only relevant text ads and links to related web pages of interest
For an overview of what GMail has to offer check out this link.
Why get off your ass while playing games, order your pizza while playing!
"Sony Puts Pizza Ordering in Videogames"
Type the command "/pizza" while playing Everquest II, a fantasy game with 330,000 active players, and get the Pizza Hut Web site, where you can place orders for delivery.
Read more here.
Type the command "/pizza" while playing Everquest II, a fantasy game with 330,000 active players, and get the Pizza Hut Web site, where you can place orders for delivery.
Read more here.
FBI Warns about new computer virus
"The e-mails appear to come from an fbi.gov address. They tell recipients that they have accessed illegal Web sites and that their Internet use has been monitored by the FBI's "Internet Fraud Complaint Center,""
The virus is in the attached file, read more here.
The virus is in the attached file, read more here.
Keep Anonymous
Wednesday, February 23, 2005
What a great tip for "Dark Tech". Ok, in a previous post I stated that there was "almost" no way to keep annonymous. Well this particular company Steganos has a product to hide your tracks while you surf online and download, I mean "acquire" music files for you enjoyment. What a lot of people don't know or realize is that when at work you're often monitored by the IT dept, or regular users are trying to be tracked by the MPAA and RIAA. When you're connected to the internet you're given an IP addresses which are allotted to Internet service providers (ISPs) and distributed to your PC each time you connect to the Internet. It's how you communicate online, and it's also how you are tracked. What you should try (when at work) is to use a proxy. By using a proxy, you can keep your manager from busting you if you're looking at sites during working hours (sports, news, anything non-work related). A proxy is a server that requests a webpage on your behalf and then deliveries it to your machine. You basically need to use an encrypted proxy. An encrypted proxy makes network data indecipherable to packet-capturing software.
You can either try Anonymizer.com (which are encrypted proxies on the net, it's a free service). Anonymizer.com then encrypts the webpage you request and sends it back to your computer, which decrypts it in real time. Any packet-capturing software trying to catch all of the data which is already encrypted, none of it is legible. Or, just download and use the Steganos program. You'll bounce around (time can be set by the user) to anonymous proxies all over the world, and even use IP Locators such as
- NEW: Now with Steganos Update Wizard: stay automatically up-to-date!
- NEW: With Proxy Server optimization function. Automatically adapt the server list to your personal location: for highest possible connection speed!
- NEW: The new Steganos ProxyScout: Now significantly faster than previous versions
- Anonymous on the Net at the click of a button: You change identity every second
- Surf safely and in comfort: Stops pop-ups, ActiveX dialers and more
- Map of the world with location display: You can track how your camouflage server changes. Live!
- Direct access from Internet Explorer: Simple to use thanks to the Plug-In
- Password-protected list of Favorites: Your favorite Web sites can remain private
Another powerful tool to use in the fight against spyware!
I wouldn't post anything that was not worth having. This particular product, kicks arse! It's called SpySubtract and it works very well when detecting/deleting spyware. It goes even deeper than the combination of ad-aware and spybot. I use all three at the same time when sniffing for spyware. Ck it out, it's well worth it.
Or download it directly from the InterMute website
Or download it directly from the InterMute website
RIAA Wants to Hack Your PC
Believe it or not, but the RIAA tried to glue this hacking-authorization amendment onto a mammoth anti-terrorism bill that Congress approved last week. This was an attempt to cut back on internet piracy.
Read more here.
Read more here.
New Sober Worm Spreading Quickly
" W32.Sober-K-mm spreads itself as an e-mail attachment and creates random subject lines and body texts in either English or German, depending on the e-mail addresses it gathers. Subject lines observed so far include "Alert! New Sober worm," "Paris Hilton Sex Videos," "You visit illegal websites," and "Your new Password," according to MessageLabs, in Gloucester, England."
read more here.
read more here.
Kazaagate......
I suppose there is no such thing as anonymity online read here.
"your IP can be logged and that means “RIAA [could] collect the IP addresse s of everyone who has searched for or downloaded that file.” And lo and behold...Kazaagate.
There are two networks because they designed two networks to avoid the potential problems arising from having just one. Legal and illegal files arise from the same search query, and are served from servers controlled by both Altnet and Sharman. Both companies know what is downloaded and by whom and when, as well as where they need to be redirected to give them the files they asked for.
It is an elegant client server network that gives you what you want for free, and reports your behaviour to people paying to know it. But as elegant as it is, it's hardly cutting edge and hardly seems like a revolution."
"your IP can be logged and that means “RIAA [could] collect the IP addresse s of everyone who has searched for or downloaded that file.” And lo and behold...Kazaagate.
There are two networks because they designed two networks to avoid the potential problems arising from having just one. Legal and illegal files arise from the same search query, and are served from servers controlled by both Altnet and Sharman. Both companies know what is downloaded and by whom and when, as well as where they need to be redirected to give them the files they asked for.
It is an elegant client server network that gives you what you want for free, and reports your behaviour to people paying to know it. But as elegant as it is, it's hardly cutting edge and hardly seems like a revolution."
File undelete utility
Tuesday, February 22, 2005
Ok, it's 3AM, your term paper is due in about 5 hours, you decide to unload quite a few files you feel are starting to clutter your pc. You begin to delete at random not paying attention as to which files you send to the recycle bin. On after do you realize you sent your term paper along w/the rest of the unwanted files. But, fear not, this handy little tool will help you recover that paper for grading.
Restoration will undelete files that were removed from the recycle bin or directly deleted from within Windows. You can also limit the search results by entering a term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. Normally, when you delete files, they're not immediately removed, just the ability to write over them, which means there exists the possibility to recover them.
Get Restoration here.
Restoration will undelete files that were removed from the recycle bin or directly deleted from within Windows. You can also limit the search results by entering a term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. Normally, when you delete files, they're not immediately removed, just the ability to write over them, which means there exists the possibility to recover them.
Get Restoration here.
Securely delete files from disks w/o the worry of unwanted file recovery
Check out my Jan.29, 05 post for another program very similar to Jetico's BCWipe program.
When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. The contents of all deleted files remain on the disk and can easily be restored using any recovery utility (using the correct combination of 0 and 1).
Wiping is a term used to describe the process of shredding the contents of a file or disk space. It is impossible to restore any data that has been properly wiped.
BCWipeis designed to securely delete files from disks and other media. Standard file deletion leaves the contents of the "deleted" file on your disk. Unless it has been overwritten by files saved afterwards, it can be recovered easily using standard disk utilities. BCWipe is fully integrated into the Windows Shell and efficiently shreds file data so that recovery by any means is impossible.
When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. The contents of all deleted files remain on the disk and can easily be restored using any recovery utility (using the correct combination of 0 and 1).
Wiping is a term used to describe the process of shredding the contents of a file or disk space. It is impossible to restore any data that has been properly wiped.
BCWipeis designed to securely delete files from disks and other media. Standard file deletion leaves the contents of the "deleted" file on your disk. Unless it has been overwritten by files saved afterwards, it can be recovered easily using standard disk utilities. BCWipe is fully integrated into the Windows Shell and efficiently shreds file data so that recovery by any means is impossible.
Slower pc?
Every time you load programs and then close them the memory which was set aside to run those programs is not returned so other programs can use it. This in turn can lead to slower behavior from your pc, even a shutdown. You can either reboot or just do a simple download , yes it's a freefile....lol.
Fast Defrag let's you know how hard your processor is working by right clicking on the icon you can free up the memory that was not being used (pulling it back in for later use) and speeding up your performance.
You can even download different skins for a different look for your program. Get the skins here.
Fast Defrag let's you know how hard your processor is working by right clicking on the icon you can free up the memory that was not being used (pulling it back in for later use) and speeding up your performance.
You can even download different skins for a different look for your program. Get the skins here.
How To Crack A Master Lock Combination
Sunday, February 20, 2005
Become a lock picker w/the aid of this......and I thought that I had a lot of time on my hands......lmao
Lock picking widget
Lock picking widget
Hacking goes mobile
Monday, February 14, 2005
It was only a matter of time.......
" Virus makers will push into the virgin territories of cell phones, handhelds, and embedded computers, perhaps even those used in cars, IBM's annual security report said this week."
"Users are becoming a lot more aware of dangers to their PCs, but they're not nearly as cognitive of those dangers for mobile systems and embedded computers."
Read the entire article here.
" Virus makers will push into the virgin territories of cell phones, handhelds, and embedded computers, perhaps even those used in cars, IBM's annual security report said this week."
"Users are becoming a lot more aware of dangers to their PCs, but they're not nearly as cognitive of those dangers for mobile systems and embedded computers."
Read the entire article here.
Speeding up Firefox the right way.........
Thursday, February 10, 2005
This will just about cover every situation where you can speed up Firefox pending on which category you fall under.....
enjoy.
enjoy.