Malware Request

Sunday, December 28th, 2008

I am looking to do some analysis on various pieces of malware.  Please forward me some of your junk and any questionable attachments that you may get in your Inbox.  This will be private analysis so please do not expect to hear anything back about what you send. Please send to: [email protected] Thanks, Troy

WinSxS Folder in Windows Vista

Wednesday, December 24th, 2008

What is the C:\Windows\WinSxS folder in Vista and why does it keep growing and growing and growing? The answer straight from a TechNet Blog: One of the largest changes between previous versions of Windows and Windows Vista was a move from an INF described OS to componentization.  A component in Windows is ...

Describing Malware

Tuesday, December 23rd, 2008

This picture just about sums it up: Picture Source: http://www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf

Unprotected computer rendered unusable in under two hours

Monday, December 1st, 2008

In just under two hours an unprotected computer was rendered unusable through online attacks in an experiment in Auckland today. The experiment was designed to show what a household with a computer put itself at risk of everyday, and was carried out by NetSafe and IBM. It was carried out to mark ...

Duplicating keys from a photograph

Monday, November 17th, 2008

Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine. Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...