web site

Tue
27
Nov
Dennis Faas's picture

How to Support Infopackets using Amazon.com

At the request of many users, I've put a link to this page on our tab menu (near: Home, Archive, Contact, etc), which is accessible on every page of our site. Refer back here any time you need to. This article was originally published November 22, ... 2012, and has been amended. Article Summary: This article describes our current financial situation, as well as instructions on how to support Infopackets using Amazon. Your support is greatly needed and appreciated and allows us to continue publishing. Update 2012/11/23: I've added links to Amazon.com (USA), Amazon.co.uk (UK), as well as Amazon.ca ... (view more)

Wed
07
Nov
Dennis Faas's picture

DriverScanner 2013 Review

Update 2013/05/08: We've contacted Uniblue and have finagled a generous 33% discount for DriverScanner 2013 for our readers (deal ends May 24, 2013). The discount link is at the end of the review; the discount is also enabled if you download the ... trial and purchase directly through the program. If you're in a hurry and know this software to be as useful as I do, you can go straight to the discount page by clicking here . Otherwise, please take a few minutes to read the review below, and then decide. -- Ever wonder why your PC gets balky, slows down, or fails to operate the way you want? One of ... (view more)

Wed
15
Feb
Dennis Faas's picture

Infopackets May Be Forced to Shut Down by June 1, 2012 -- Please Vote

February 15, 2012 Major Announcement from: Dennis Faas, CEO, Chief Editor and owner of Infopackets.com Dear Infopackets Readers, After 10 years of publishing online and having produced over 8,000 original articles, Infopackets may be forced to close ... its doors due to lack of funding. The site may shut down as early as June 1st, 2012. I do, however, have a plan to save this website and make it ten times better than it was before -- but, it requires an extraordinary amount of effort, as well as consensus from our readers. Note: The article below describes our situation in detail. Please read it ... (view more)

Fri
27
May
Dennis Faas's picture

Session Hijacking

In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web ... site, the user's PC is tagged with a session key using a browser cookie (a cookie is a small file stored on the users PC that the browser reads). Any time the user requires access to a restricted area of a website (usually requiring login), the session key is extracted from the users' PC and compared to the key stored on the web server. If valid, the ... (view more)

Fri
18
Feb
Dennis Faas's picture

Denial Of Service Attack (DoS)

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may ... vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name ... (view more)

Fri
31
Dec
Dennis Faas's picture

Facebook Tops Google as Most-Visted Website: Report

It seems most people don't need Google to look up their favorite social networking web site. According to a recent report, Facebook has surpassed the search giant's main site as the most-visited web page in the United States for 2010. The report ... comes courtesy of industry analysts at Experian Hitwise, which finds that in the past year Facebook eclipsed both Google and Yahoo in popularity. Of all visits to web sites made by American Internet users this past year (at least, between January and November), 8.9 per cent were associated with Facebook. By comparison, 7.2 per cent of website visits ... (view more)

Tue
15
Jun
Dennis Faas's picture

AT&T Hack Exposes High Profile Email Addresses

A recent hack of AT&T's web site has left over 100,000 Apple 3G iPad owners with exposed email addresses. It's feared the security hole could open the door to similar future hacks with more devastating results. Reporting on the hack is tech blog ... Gawker, which finds that a specialized hacking group was able to acquire 114,000 email addresses owned by iPad users when the former exploited a security gap in AT&T's central web site. The hacker group, known as Goatse Security, was also able to acquire the identification number these iPads use when communicating over AT&T's network, ... (view more)

Tue
04
Aug
Dennis Faas's picture

Beware Man-In-The-Middle Hacker Attacks

In an effort to raise awareness, three professional hackers are attempting to prove that trusted web sites make you just as vulnerable to attack as known malicious web sites. At the recent Black Hat and Def Con security conventions, three presenters ... brought light to a new wave of Internet attacks that operate in a similar manner to that of a telephone tap in the shared communication between computers and trusted web sites. "Man-in-the-Middle" Attack This type of computer infiltration, known as "man-in-the-middle" attacks, occur when an online deviant steals the data that is intended to be ... (view more)

Wed
08
Jul
Dennis Faas's picture

Browse and Get Owned: IE6, IE7 Users Victimized

Microsoft has confirmed that thousands of legitimate web sites have been compromised by hackers and are now targeting innocent users through a critical unpatched vulnerability in Windows' DirectShow, part of DirectX . This is the second time in just ... six weeks that hackers have been exploiting the unpatched bug. This time, however, it appears as though Internet Explorer (IE) has been chosen as the weapon of choice when trapping innocent users. Browse and Get Owned Attacks: Drive-By Hackings The new wave of attacks is being referred to as "browse and get owned attacks" or "drive-by hackings". ... (view more)

Thu
02
Jul
Dennis Faas's picture

XSS Cross Site Scripting

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. XSS: Background The expression "cross-site ... scripting" originated from the fact that a malicious web site could load another web site into another frame or window then use Javascript to read or write data on the other web site. The definition gradually changed to mean the injection of HTML and Javascript into a web page. Example of a Cross-site Scripting Attack Examples of an XSS code include ... (view more)

Pages

Subscribe to RSS - web site