Category: Security/Firewalls

Hackers Reveal How to Hack into a Car & Do Nasty Things 0

Hackers Reveal How to Hack into a Car & Do Nasty Things

I just blogged about how hackers have revealed one can hack into an iPhone or an iPad in less than 60 seconds. Now here is another type of hacking that you should be thinking...

How to Hack iPhones and iPads in Less Than 60 Seconds 0

How to Hack iPhones and iPads in Less Than 60 Seconds

At the Black Hat USA 2013 conference, three Georgia Tech hackers showed everyone how to hack iPhones and iPads with malware imitating ordinary apps in less than 60 seconds using a “malicious charger.” Here...

Use AVG AntiVirus App to Locate, Lock, Unlock, or Wipe Your Android Device Remotely 49

Use AVG AntiVirus App to Locate, Lock, Unlock, or Wipe Your Android Device Remotely

AVG AntiVirus is a free and popular antivirus application that people have been using on their desktop computers for years to protect their desktop operating system, such as Windows XP or Windows 7. Download...

How to Disable Java in All Your Browsers 0

How to Disable Java in All Your Browsers

By now you may have heard of all the warnings and bad things that can happen if you have Java installed on your computer, like having your credit card or other personal data stolen,...

How To Change Windows 8 or Windows 8.1 Network Location 0

How To Change Windows 8 or Windows 8.1 Network Location

When you install Windows 8 or Windows 8.1 and connect to a network, you are prompted to select a location for the network. You can choose from Home, Work or Public. Because Home and...

What’s the Difference Between Unified Access Gateway (UAG) and Threat Management Gateway (TMG)? 0

What’s the Difference Between Unified Access Gateway (UAG) and Threat Management Gateway (TMG)?

There are some major differences between Microsoft Threat Management Gateway (TMG) and Microsoft Unified Access Gateway (UAG). The two products are completely distinct and do not share any code. However, if you install UAG,...

Facebook Faces Yet Another Class Action Lawsuit 0

Facebook Faces Yet Another Class Action Lawsuit

Facebook is facing yet another class action lawsuit for tracking people even when they have completely logged out of their Facebook account. This new lawsuit alleges that Facebook violated the federal wiretap laws. As...

Microsoft Security Essentials: Love the Product, Don’t like the Penalty! 0

Microsoft Security Essentials: Love the Product, Don’t like the Penalty!

It’s always a challenge to find the right anti-malware tool that you can proudly recommend. Besides anti-virus software, over the years I have used tons of anti-spyware tools. There were times when I used...

SharePoint 2010 Lockdown Mode (ViewFormPagesLockdown) 1

SharePoint 2010 Lockdown Mode (ViewFormPagesLockdown)

Microsoft Office SharePoint Server (MOSS) 2007 has a feature called ViewFormPagesLockdown, or some people simply refer to it as the SharePoint lockdown feature. Fortunately, the feature also works with SharePoint Server 2010. The lockdown feature is useful...

Vulnerability in SSL/TLS Could Allow Information Disclosure 0

Vulnerability in SSL/TLS Could Allow Information Disclosure

Microsoft recently posted this Knowledge Base article 2588513: Vulnerability in SSL/TLS could allow information disclosure. The actual Security Advisory is posted here. According to the advisory: “Microsoft is aware of detailed information that has...

Attention Hackers: You Can Win $200,000 from Microsoft 0

Attention Hackers: You Can Win $200,000 from Microsoft

Microsoft yesterday announced a Blue Hat Prize which is designed to generate new ideas for defensive approaches to support computer security. The goal is to inspire security researchers to develop innovative solutions intended to...

FTC’s Proposed “Do Not Track” List 0

FTC’s Proposed “Do Not Track” List

When Federal Trade Commission (FTC) came out with the Do Not Call list idea, everyone loved it. Okay, may be not everyone. I am sure the telemarketers didn’t like the fact that they can’t...

How to Manage Previewers in Outlook 2010 2

How to Manage Previewers in Outlook 2010

If you are unable to preview Word, Excel and PowerPoint files in Outlook 2010, make sure that the previewers are not disabled. The attachment previewers are enabled by default. Here’s how the previewers work...

Microsoft Encrypts Error Reports But Your Personal Information is Still at Risk 0

Microsoft Encrypts Error Reports But Your Personal Information is Still at Risk

I have been discouraging people from sending error reports to Microsoft for years. Microsoft’s own security experts agree that sending error reports to Microsoft is not a good idea for security reasons. One reason...

IT Administrator Gets A Year In Jail For Stealing, Damaging Data 0

IT Administrator Gets A Year In Jail For Stealing, Damaging Data

There are things that you should do if you are an IT administrator and there are things that you shouldn’t do. Here’s an example of things that you should never do…….and for obvious reasons....

Microsoft turns over all Windows 7 and server source code to Russia’s new KGB 1

Microsoft turns over all Windows 7 and server source code to Russia’s new KGB

Here’s something in the news lately that is rather interesting. According to this blog on ZDNet, Microsoft is turning over all Windows 7 and server source code to Russia’s new KGB. “Microsoft has always...

Evaluation Copies of Microsoft Products 0

Evaluation Copies of Microsoft Products

My students are always asking me where to get the evaluation copies of various Microsoft products. I’ve put together a list of some of the latest evaluation software downloads. My goal is to try...

Apple & AT&T Security Breaches…..Again! 0

Apple & AT&T Security Breaches…..Again!

I recently read an article by MVP Susan Bradley titled “iTunes account theft strikes close to home.” In her article Susan explained how someone used her credit card to make a purchase and Apple...

Difference Between Immediate and Urgent Replication 2

Difference Between Immediate and Urgent Replication

In Windows Server 2003 Active Directory domains, there is a concept of immediate and urgent replication. Certain types of information gets replicated immediately, rather than waiting for the standard Active Directory replication. One such...

Android Apps Expose Private Data 0

Android Apps Expose Private Data

About 20 percent of the 48,000 apps in the Android marketplace allow a third-party application access to sensitive or private information, according to a report released on Tuesday. Some of the apps were found...

Google in Trouble Over Privacy Issues (Again) 0

Google in Trouble Over Privacy Issues (Again)

The latest news on Google and privacy issues has to do with Google collecting unencrypted personal WiFi data. According to some reports, so many lawsuits are piling up that Google is saying guys can...

Linux infection proves Windows malware monopoly is over 0

Linux infection proves Windows malware monopoly is over

For some reason Apple and Linux users have a tendency to believe that their computers are immune from viruses and malware. I am not sure who spread this rumor (some people suggest it was...

Survey Finds 60% Facebook Members May Quit Over Privacy Concerns 0

Survey Finds 60% Facebook Members May Quit Over Privacy Concerns

Some people who are on Facebook understand that there is no such thing as privacy when it comes to Facebook. In other words, Facebook privacy is a joke. Unfortunately, there are millions who don’t...

Microsoft Virtual PC Exploit Discovered 0

Microsoft Virtual PC Exploit Discovered

According to Nicolas Economou, an exploit writer at Core Security Technologies, he has discovered a major flaw in the memory management of the Virtual Machine Monitor, which effects Microsoft Virtual PC 2007, Virtual PC...

Minimum Permissions Required for MOSS 2007 Necessary Service Accounts 2

Minimum Permissions Required for MOSS 2007 Necessary Service Accounts

For security reasons, it is best to ensure that the service accounts used with Microsoft Office SharePoint Server (MOSS) 2007 run with only the minimum permissions necessary. This is referred to as the principle...