Securing Wi-Fi Networks Doesn’t Have To Be Painful

Saturday, March 8th, 2008

Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...

Checking out AAC and MP3

Saturday, March 8th, 2008

RA and M4A are container formats for music used by Real Networks and Apple, respectively, in their downloads. The actually formatting of the music is done with AAC, which stands for Advanced Audio Coding. AAC, for these two brands, has taken the place of MP3s. Many feel AAC will supplant MP3s. ...

Clean and Infected File Sharing Programs

Saturday, March 8th, 2008

Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does. The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...

I Love The Smell Of Spyware Burning In The Morning

Saturday, March 8th, 2008

I now have even greater sympathy for people suffering a spyware infection than ever before. I spent the better part of Tuesday night fighting off the worst spyware infection I have ever seen or heard of. Someone was kind enough to donate a copy of VMWare for me to use ...

The six dumbest ways to secure a wireless LAN

Saturday, March 8th, 2008

For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...