access

Thu
14
Jun
Dennis Faas's picture

Vista's Deja Vu Snafu

Talk about deja vu. A Finnish security researcher recently discovered that the same problems affecting Windows XP and recovery disks were inherited by Windows Vista. If you have a Vista install DVD, you can gain administrative level access to the ... hard drive without needing a password. Detailed documentation, including possible workarounds, can be found at Kimmo Rousku's web site . The potential hack was discovered on February 8, 2007 during a Windows Vista training session. It was immediately reported to Microsoft Finland who confirmed it two days later. Apparently, the Command Prompt tool in ... (view more)

Thu
12
Apr
Dennis Faas's picture

Spring Fever: New Features Unveiled for Microsoft Xbox 360

Microsoft officially announced the Xbox Dashboard Spring Update this past Monday: a move that is sure to ignite spring fever among the game console's millions of users. Headlining the update is a new Xbox 360 accessory -- a QWERTY text-input device ... will directly connect into the Xbox 360 controller and will support text and instant messaging capabilities. (Source: itwire.com.au ) Scheduled to be launched on May 7, the new add-on will enable Xbox 360 users to access the Windows Live Messenger service through their game console, allowing gamers to identify each other by tags and communicate via ... (view more)

Tue
10
Apr
Dennis Faas's picture

Restricting Permission to your Documents: Office 2007

In Office 2007 (c), depending upon which edition you own, you can use Information Rights Management to allow only specified individuals to access a document. Using Information Rights Management, you can assign specific rights to each user, including ... restricting the ability to copy, print, forward, modify, or fact a document. You can even set an expiration date after which a user cannot access the document! To restrict permission to a document, follow the steps below: Click the Microsoft Office button, point to Prepare, Restrict Permission and then click Restricted Access. In the Permission ... (view more)

Wed
17
Jan
Dennis Faas's picture

Google Cookie Exploit Found, Fixed

In the world of search engines, nothing beats Google. The competition, led by Yahoo, makes up a single digit fraction of the market attempting to challenge the Goliath. However, with that success comes a substantial amount of attention from hackers ... and the like. The most recent issue facing Google were reports that users were seeing their cookies exploited, giving the web's most malicious access to a pile of personal information. It's pretty simple. If a user is signed into their Google account, the pages they visit give the web host access to their cookies. This means the web host -- or the ... (view more)

Fri
08
Sep
Dennis Faas's picture

Free WiFi for Residents and Businesses in Silicon Valley

Announced earlier this week, a group of technology companies are planning to provide a vast wireless network that will give the entire Silicon Valley free high-speed Internet access. The free WiFi service will be available as early as next year and ... will be provided by Silicon Valley Metro Connect: a group that is comprised of IBM, Cisco, SeaKay, and Azulstar. (Source: abcnews.com ) Silicon Valley Metro Connect will provide the service for 38 cities in California's San Mateo, Santa Clara, Alameda, and Santa Cruz counties -- an area covering roughly 1,500 square miles. This move takes advantage ... (view more)

Thu
27
Jul
Dennis Faas's picture

Firewalls: Hardware and Software Solutions, Part 2

[Continued from Firewalls: Hardware and Software Solutions , Part 1] On the software only side of things, there are quite a few possibilities available for a software firewall. These all install directly on your PC and use the internal resources ... like any other program run on your system (such as memory, disk space, CPU cycles, and so on). Software firewalls do a good job of preventing both inbound and outbound traffic and are easy to install and configure. First up is Zone Labs Zone Alarm. The download is free as is the firewall product itself. They will try to get you to buy the Pro version ... (view more)

Wed
19
Jul
Dennis Faas's picture

Firewalls: Definition

A firewall is a barrier to keep destructive forces away from your computer. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Firewalls use one or more ... of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved through the firewall and then ... (view more)

Thu
30
Mar
Dennis Faas's picture

CosmoPOD: Your Free Remote Linux Desktop

A short time ago, I found a cool web service called CosmoPOD that allows you to run a remote Linux PC from your desktop without having to actually install a Linux operating system. Once you are connected to the remote Linux PC, you are able to surf ... the web anonymously, plus have immunity to Spyware or adware attacks. But that's just one of the benefits of CosmoPOD. Once inside your new CosmoPOD desktop, you will have access to dozens of free or open source applications. For example: Open Office is one of the many installed applications and it lets you use and create most of the common ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Wed
14
Dec
Dennis Faas's picture

Application Programming Interface

An application programming interface (API) is the interface that an application provides in order to allow requests for service to be made of it by other computer programs, and/or to allow data to be exchanged between them. For instance, a computer ... program can (and often must) use its operating system's API to allocate memory and access files. Many types of systems and applications implement API's, such as graphics systems, databases, networks, web services, and even some computer games. API: Description One of the primary purposes of an API is to provide access to a set of commonly-used ... (view more)

Pages

Subscribe to RSS - access