How to make a Sawed-off USB Key

Thursday, April 17th, 2008

It's no secret that there are a lot of strange USB devices out there, particularly flash drives. Not a comprehensive list, but we've sure seen Lego, twigs, action figures, bowling balls, sushi, anatomical parts, transparent drives, erasers, cassette tapes and on and on and on. Despite all that, the picture above ...

‘Pro-Tibet’ Rootkit Attacks Windows PCs

Wednesday, April 16th, 2008

A cartoon that ridicules the efforts of a Chinese gymnast at the Olympic games is the latest ploy used by cyber-criminals to infect Windows PCs, according to McAfee Avert labs. While the movie files, which show the cartoon followed by images supporting a free Tibet, are playing, a keystroke logging tool, ...

Tracking down Firefox plug-ins

Monday, April 14th, 2008

My last posting was about upgrading the Adobe Flash Player, a Web browser plug-in. Adobe Systems just released a new version that fixes critical bugs in older versions, so everyone should update to the latest version. Adobe's Flash tester page displays the version of the Flash Player being used by your ...

ActiveX is least secure plug-in

Monday, April 14th, 2008

ActiveX controls made up most of all browser plug-in vulnerabilities in the second half of 2007, according to Symantec. The company has just released its semi-annual web security report and in it said that Microsoft's technology, primarily used to create add-ins for Internet Explorer, accounted for 79 percent of the 239 ...

Disinfecting a virus-laden PC

Monday, April 14th, 2008

The first thing is to isolate the computer (no more trading floppies until you're done) and then begin to disinfect it. One of my favorite tools is Knoppix. The great thing about this Linux distribution is that you don't have to know anything about Linux in order to be able to ...