Security Bug in Linksys Wireless-G Router

Saturday, March 8th, 2008

Cisco's Linksys WRT54G Wireless-G Broadband Router has a flaw that could allow an attacker to gain administrative privileges on vulnerable devices. Even if the remote administration feature on the device is turned off, the router serves the administration web page on ports 80 and 443, protected only by a weak ...

How to remove any BHO from your Computer

Saturday, March 8th, 2008

What I am about to suggest may not be the most correct method to remove a BHO from your system. In fact, there is no guarantee that instructions below will resolve your issue. What I can tell you, however, is that I have used the following methods to safely remove ...

Why Windows is a Security Nightmare

Saturday, March 8th, 2008

Security in all mainstream operating systems is non-existent; however, things are especially bad for Windows. Windows happens to be the favourite target of worm and virus writers. Conventional wisdom suggests that the huge installed base of Windows helps spread the worms and viruses, and also makes it a highly attractive ...

Prevent Browser Hijacking

Saturday, March 8th, 2008

Mike Healan March 23, 2004 If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...

Witty Worm

Saturday, March 8th, 2008

A new worm has been discovered exploiting the ISS/PAM ICQ module vulnerability. The worm payload is contained in a single 1025-byte UDP packet with a fixed source port of 4000 and a random destination port. Only the first 470 bytes of the payload are the working code of the worm; ...