public marks

PUBLIC MARKS from alamat with tags security & tech

2010

Tech Travel Tip: Assume Your Devices Will Be Compromised

(via)
The international reach of the Internet may have distributed cyber threats to every corner of the world, but some countries remain more dangerous than others. Whether traveling abroad for business or pleasure, a few simple steps can help prevent your information from being stolen and your devices from being confiscated.

2006

Protecting content with .htaccess files

.htaccess files are very versatile, and can easily become very complex. This document contains enough information to set simple access restrictions/limits on a directory in your web space. Remember to upload .htaccess files, and .htpasswd files using ASCII mode. This is an option is available in most FTP clients.

Building a Linux supercomputer using SSH and PVM

If you have a couple of old Linux boxes sitting around, then you've got the makings of a supercomputer. Dust them off, install Secure Shell (SSH) and Parallel Virtual Machine (PVM), and start your complex algorithms.

Apple offers QuickTime, Front Row, Security updates

Apple said the 49.1MB QuickTime 7.1 update is an important release that delivers numerous bug fixes, support for iLife ’06, and H.264 performance improvements. This update is highly recommended for all QuickTime 7 users.

Top 8 OS X Safety Tips

There was a little speculation recently that McAfee had unnecessarily worried people into buying its products with the news that, from 2003 to 2005, the amount of vulnerabilities discovered on the OS X platform had increased by 228%, whereas Windows vulnerabilities discovered in the same time period had increased by only 73%. To the blind-sighted or Mac newcomers out there, this is a worrying fact, but rest assured the truth is being bent—quite a bit.

Fight spammers - Sign up at Blue Frog

by 1 other
Blue Security’s Blue Frog has an interesting defense against spammers. If you constantly receive spam from a specific merchant, Blue Frog will bombard that spammer with email asking him to desist.

Arcane Denial: AMUST Software announces the release of AMUST 1-Login

AMUST Software today announced the release of AMUST 1-Login™ 1.0 - the next generation Internet Password Manager. 1-Login offers Single Sign On (SSO) to Internet users, the same functionality that has long been available to enterprise users who login into multiple systems and applications. 1-Login allows a user to securely login into multiple web sites by signing to 1-Login only once.

Zombies attack Seattle hospital

A California hacker has pleaded guilty to disrupting computer systems - including the network of a hospital - through a malware-fueled attack designed to install adware on infected PCs.

ATMs linked to IP networks vulnerable

A continuing trend by banks to take ATM machines off proprietary networks and put them on the banks' own TCP/IP networks is introducing new vulnerabilities in the ATM transaction environment.

Arcane Denial: Laptop weilding car thieves steals two of David Beckham's beemers

High-tech thieves are becoming increasingly savvy when it comes to stealing automobiles equipped with keyless entry and ignition systems. While many computer-based security systems on automobiles require some type of key — mechanical or otherwise — to start the engine, so-called ‘keyless’ setups require only the presence of a key fob to start the engine.

Mac Vulnerability Tops List of Security Flaws

The institute said in a statement that in light of recent attacks on Apple's Safari browser, SANS experts agree that Apple's operating system, OS X , still remains safer than Windows, but its reputation for offering a bullet-proof alternative to the Microsoft OS is in tatters.

Most Web Users Unable to Spot Spyware

McAfee SiteAdvisor , which is pioneering Web safety by testing and rating nearly every trafficked site on the Internet has news for Internet users who think Web sites with clean, appealing graphics and national advertisers on the home page are always safe: “Think again.”

Password overload hitting firms' IT security

LONDON (Reuters)- Security breaches from computer viruses, spyware, hacker attacks and theft of equipment are costing British business an estimated 10 billion pounds (US$18 billion) a year, according to a survey.

Oracle Unveils Oracle Database Vault

Oracle today introduced Oracle Database Vault, an advanced security product to protect and limit access to sensitive data and applications. Oracle Database Vault enforces preventive controls to help meet compliance requirements by restricting powerful users, such as database administrators (DBAs), from unauthorized access to specific information.

Fixing Wi-Fi Security Problems: Hire Wardrivers

On April 20, Westchester County in New York approved a law that will slap local business owners with a warning or a fine for not securing their Wi-Fi networks. The legislation takes effect in 180 days.

Security Myths and Passwords

In the practice of security we have accumulated a number of “rules of thumb” that many people accept without careful consideration.

alamat's TAGS related to tag security

address book +   android +   antivirus +   apple +   Arrested +   attack +   attacks +   Australian +   battle +   behind +   blackberry +   blog +   bug +   bypass +   call +   china +   computer +   criminal +   crooks +   cv +   cyber +   data +   database +   dd-wrt +   delphi +   devices +   dnssec +   domain +   down +   dralnux +   email +   experts +   extortion +   facebook +   failure +   fake +   firewall +   firm +   firmware +   fix +   forensics +   free +   hack +   hacker +   hackers +   hacking +   hit +   hole +   hosting +   insurance +   internet +   iphone +   itunes +   job +   jobsearch +   kit +   laptop +   linux +   login +   mac +   malware +   microsoft +   network +   networking +   news +   online +   passwords +   phone +   plugin +   problem +   protect +   reality +   reports +   scam +   scammers +   sites +   solution +   spam +   spread +   spyware +   suffers +   system +   target +   tech +   tip +   tips +   tricks +   trojan +   tutorial +   unix +   update +   usb +   video +   virus +   warn +   web +   windows +   wordpress +   worm +   wtf +