public marks

PUBLIC MARKS from alamat with tags blog & security

2010

WordPress blogs hit with mass malware attack

(via)
Hundreds of WordPress blogs, particularly those hosted by Network Solutions, have been hit with an attack that cripples the blogs and redirects visitors to a URL that loads malware.

2006

Protecting content with .htaccess files

.htaccess files are very versatile, and can easily become very complex. This document contains enough information to set simple access restrictions/limits on a directory in your web space. Remember to upload .htaccess files, and .htpasswd files using ASCII mode. This is an option is available in most FTP clients.

Building a Linux supercomputer using SSH and PVM

If you have a couple of old Linux boxes sitting around, then you've got the makings of a supercomputer. Dust them off, install Secure Shell (SSH) and Parallel Virtual Machine (PVM), and start your complex algorithms.

Apple offers QuickTime, Front Row, Security updates

Apple said the 49.1MB QuickTime 7.1 update is an important release that delivers numerous bug fixes, support for iLife ’06, and H.264 performance improvements. This update is highly recommended for all QuickTime 7 users.

Top 8 OS X Safety Tips

There was a little speculation recently that McAfee had unnecessarily worried people into buying its products with the news that, from 2003 to 2005, the amount of vulnerabilities discovered on the OS X platform had increased by 228%, whereas Windows vulnerabilities discovered in the same time period had increased by only 73%. To the blind-sighted or Mac newcomers out there, this is a worrying fact, but rest assured the truth is being bent—quite a bit.

Experts Trash Mac Security Warnings

NewsFactor has a story today that puts to the test the claims of a recent white paper (PDF link) from McAfee that warned Mac OS X could be the next Windows.

Fight spammers - Sign up at Blue Frog

by 1 other
Blue Security’s Blue Frog has an interesting defense against spammers. If you constantly receive spam from a specific merchant, Blue Frog will bombard that spammer with email asking him to desist.

The Inquirer hacks iTunes

PURELY IN the name of investigative journalism, the INQ followed up on a posting on the Motomoders.net site. It claimed to have found a way of raising the number of iTunes tracks stored on a Motorola handset from 100 to 1,000. And it definitely works.

Arcane Denial: AMUST Software announces the release of AMUST 1-Login

AMUST Software today announced the release of AMUST 1-Login™ 1.0 - the next generation Internet Password Manager. 1-Login offers Single Sign On (SSO) to Internet users, the same functionality that has long been available to enterprise users who login into multiple systems and applications. 1-Login allows a user to securely login into multiple web sites by signing to 1-Login only once.

Linux kernel 'getting buggier,' leader says

Andrew Morton, the lead maintainer of the Linux production kernel, is worried that an increasing number of defects are appearing in the 2.6 version and is considering drastic action to resolve it.

Zombies attack Seattle hospital

A California hacker has pleaded guilty to disrupting computer systems - including the network of a hospital - through a malware-fueled attack designed to install adware on infected PCs.

ATMs linked to IP networks vulnerable

A continuing trend by banks to take ATM machines off proprietary networks and put them on the banks' own TCP/IP networks is introducing new vulnerabilities in the ATM transaction environment.

Arcane Denial: Laptop weilding car thieves steals two of David Beckham's beemers

High-tech thieves are becoming increasingly savvy when it comes to stealing automobiles equipped with keyless entry and ignition systems. While many computer-based security systems on automobiles require some type of key — mechanical or otherwise — to start the engine, so-called ‘keyless’ setups require only the presence of a key fob to start the engine.

Most Web Users Unable to Spot Spyware

McAfee SiteAdvisor , which is pioneering Web safety by testing and rating nearly every trafficked site on the Internet has news for Internet users who think Web sites with clean, appealing graphics and national advertisers on the home page are always safe: “Think again.”

Password overload hitting firms' IT security

LONDON (Reuters)- Security breaches from computer viruses, spyware, hacker attacks and theft of equipment are costing British business an estimated 10 billion pounds (US$18 billion) a year, according to a survey.

Oracle Unveils Oracle Database Vault

Oracle today introduced Oracle Database Vault, an advanced security product to protect and limit access to sensitive data and applications. Oracle Database Vault enforces preventive controls to help meet compliance requirements by restricting powerful users, such as database administrators (DBAs), from unauthorized access to specific information.

Fixing Wi-Fi Security Problems: Hire Wardrivers

On April 20, Westchester County in New York approved a law that will slap local business owners with a warning or a fine for not securing their Wi-Fi networks. The legislation takes effect in 180 days.

Beware wireless hacking

SECURITY experts are warning internet users of a new threat to their computer systems, with thieves gaining access to other people's broadband from unsecured wireless networks in homes and businesses.

SSL/TSL and SSH Not So Secure Anymore

Polish scientists from Wroclaw University of Technology have found a vulnerability in security technologies used across the Internet that may allow kleptographic attacks resulting in silent theft of information without user's awareness.

Hackers News: Rootkits to mask most malware by 2008

Rootkits that hide malicious software from anti-virus and anti-spyware tools are growing in number and sophistication, and will pose an unprecedented risk to users by 2008, security company McAfee said this week.

Doubts, fears and the Australian ID card

Concerns about the privacy of individuals are as important as ever and ought not be compromised. Whenever the Federal Government discusses its plans for a "smartcard" - which would allow citizens to electronically access Medicare and other government services - speculation inevitably strays to the possibility that a compulsory national ID card will also be introduced.

Security Myths and Passwords

In the practice of security we have accumulated a number of “rules of thumb” that many people accept without careful consideration.

alamat's TAGS related to tag blog

3d +   action +   addict +   aliens +   anito +   apache +   apple +   cinema +   comedy +   comics +   computer +   cult +   database +   distro +   download +   dralnux +   email +   entertainment +   explorer +   files +   firewall +   freeagent +   freebsd +   from +   fun +   gadget +   game +   games +   google +   guides +   hacking +   hacks +   hardware +   Hatton +   help +   image +   improve +   inspirational +   ip +   ipod +   itunes +   linux +   mac +   maker +   malware +   marvel +   microsoft +   mobile +   monster +   movie +   movies +   mysql +   myths +   N97 +   network +   networking +   news +   nokia +   pacquiao +   passwords +   photo +   picture +   pinoy +   pro +   religion +   replication +   review +   reviews +   roach +   rootkit +   scenery +   seagate +   security +   shell +   shop +   signs +   software +   spam +   spammers +   spyware +   stories +   system +   tech +   techy +   theater +   tips +   traffic +   tricks +   trojan +   tutorial +   tv +   tweET +   tweeter +   unix +   update +   want +   watch +   windows +   wireless +   wordpress +