// archivio

Security

Questo tag è associato con 1 articoli



8 Feb/11

Microsoft Security Bulletin Overview February 2011

Microsoft Security Bulletin Overview February 2011

(adsbygoogle = window.adsbygoogle || []).push({}); Microsoft has just enabled downloads for today’s security patches on Windows Update. Today’s Patch Day brings 12 security bulletins that fix vulnerabilities of various severity affecting the Microsoft Windows operating system, Internet Explorer and Microsoft Office. Three of the vulnerabilities have a maximum severity rating of critical, the highest possible rating. The remaining 11 have a maximum severity rating of...

25 Gen/11

Add serious web content control with WebContentControl in Linux

Add serious web content control with WebContentControl in Linux

(adsbygoogle = window.adsbygoogle || []).push({}); There are many reasons why you might want or need to control what is seen via a web browser. Be it children, work, or any other reason, you might want to have more control than just your standard proxy software offers. That is where the incredibly powerful WebContentControl comes into play. The WebContentControl GUI takes control of (and helps you configure) DansGuardian, FireHol, and TinyProxy to create a very powerful system...

13 Gen/11

Shields Up, Test Your Firewall Online

Shields Up, Test Your Firewall Online

The firewall is used to control incoming and outgoing traffic. Many users believe that simply installing a firewall is enough to protect their computer from malicious attacks but that does not have to be the case. An improperly configured firewall can do more damage than harm, or at least leave some attack vectors open that would be close if it had been configured properly. It is often a good idea to simply test the firewall for open ports. You see, ports are used for connections and only...


Realizzazione Sito Gestionale Immobiliare

28 Set/10

Microsoft Releases Out Of Band Security Patch

Microsoft Releases Out Of Band Security Patch

Microsoft today released a new out of band security bulletin addressing a vulnerability in ASP.NET that affects all versions of the Microsoft .Net Framework when used on Windows Server operating systems, or on client systems that run a web server from their computer. While that excludes the majority of desktop users, it may still affect some that run web servers on their desktop systems. Those users are asked to update immediately once the patch is released. About the release: Microsoft...

28 Set/10

Why You Should Use Adblock Plus, Even if You Don’t Block Ads [Firefox Tip]

Why You Should Use Adblock Plus, Even if You Don’t Block Ads [Firefox Tip]

Whether you block internet ads or not, Adblock Plus is a pretty handy Firefox extension. Not only can you use it to block offensive material, rickrolls, and other unpleasant things, but reader Dave-Farquhar lets us know that it also blocks malicious software. More » Continua a leggere – Original Link: Why You Should Use Adblock Plus, Even if You Don’t Block Ads [Firefox Tip] Technorati Tags: block, block-offensive,...

27 Set/10

Hotmail Announces Email Security Updates

Hotmail Announces Email Security Updates

Microsoft on Monday said that they started to improve the email service Hotmail with security updates to protect legit user accounts from being hijacked. The term hijacker refers to malicious users who manage to get access to email accounts of Hotmail users, either by brute force, phishing or other forms of social engineering. Like Microsoft, Hotmail users need to understand security concepts to keep their accounts safe. To support their users, Microsoft has created a short list of tips...

24 Set/10

Outlook Blocked Attachment Unlocker

Outlook Blocked Attachment Unlocker

Microsoft’s popular desktop email client Outlook blocks specific attachments by default, in order to increase the security of the system. File attachments with extensions such as exe or reg will be blocked by the email program to avoid unnecessary dangers to the system. This sometimes however blocks legit file attachments from being accessible after they have been received by the user. It is possible to change the file extensions, for instance by zipping the files, to bypass the...

24 Set/10

Outlook Blocked Attachment Unlocker

Outlook Blocked Attachment Unlocker

Microsoft’s popular desktop email client Outlook blocks specific attachments by default, in order to increase the security of the system. File attachments with extensions such as exe or reg will be blocked by the email program to avoid unnecessary dangers to the system. This sometimes however blocks legit file attachments from being accessible after they have been received by the user. It is possible to change the file extensions, for instance by zipping the files, to bypass the...

22 Set/10

Organize The Windows Start Menu

Organize The Windows Start Menu

The Windows start menu has not changed a lot in the last operating systems that Microsoft has released. Sure, some features like the ability to search or execute programs directly has been implemented, but those new features have not changed the overall look and feel of the start menu. One of the main points of criticism is the lack of options to organize the start menu. Practically any application that gets installed places an entry in the start menu, usually a folder with one or multiple...

21 Set/10

Twitter patches porn site worm flaw

Twitter patches porn site worm flaw

Twitter has today updated its website to patch a flaw that was allowing spammers to cause multiple pop-ups with links to porn websites. The code has beens spread by worms and thousands of people around the world have been caught out.  The self-replicating worm exploited a cross scripting (XSS) vulnerability and used just a small amount of Javascript to automatically direct Twitter website users to another website. The vulnerability appeared to users as a coloured block that users only...

19 Set/10

See what images are being viewed on your network with driftnet

See what images are being viewed on your network with driftnet

I want to preface this article by saying I am not, in any way advocating spying on your users. With that said, there are times (and reasons) why you might need to see what images are being viewed on your network. Whether it be an end user who is viewing content that goes against specific company policies or, worse, against the law. When this happens, you might have need or cause to see just what is being viewed from your LAN. When this is the case there is a handy tool for that called...

15 Set/10

Work Smart Video: Easily and Securely Save Passwords

Work Smart Video: Easily and Securely Save Passwords

When it comes to storing passwords, I’ve been a KeePass fan and user for years now, but when Leo Laporte told me he uses LastPass, I had to check it out. I don’t love the idea of syncing my password file to a third-party web site–I’m that paranoid–but it is a total pain to cart around my KeePass database file. Now that I’ve tried LastPass, I’m sold–well, for my lower-security logins, anyway. This week’s Work Smart video covers the security...

14 Set/10

Microsoft Releases September Security Patches

Microsoft Releases September Security Patches

Microsoft has released this month’s security patches for their operating systems and applications. The patches and updates are already available via Windows Update and Microsoft Download, and it is recommended to update the operating system as soon as possible to protect it from exploits targeting those vulnerabilities. A total of nine bulletins has been released by Microsoft of which four have received a maximum vulnerability impact rating of critical, the highest possible rating....

8 Set/10

Firefox 4 Beta 5 Now Available with Default Hardware Acceleration, Menu Redesign [Updates]

Firefox 4 Beta 5 Now Available with Default Hardware Acceleration, Menu Redesign [Updates]

Windows/Mac/Linux: Firefox 4 Beta 5 is out tonight, and it firms up a few things that have been slowly taking shape in previous betas of the browser. Most significantly, it enables by default the (Windows-only) hardware acceleration that had been available through a deep settings switch previously. New to the build, however, are a robust audio API (demonstrated at YouTube), a return to two-column menus, this time with multiple shades, and a new feature,...

3 Set/10

Without a Trace: Turn Your Flash Drive into a Portable Privacy Toolkit [Privacy]

Without a Trace: Turn Your Flash Drive into a Portable Privacy Toolkit [Privacy]

Whether you’re trying to increase your security at an internet café, tunnel your way to your home computer from your cubicle, or leave no trace on your friend’s borrowed computer, a flash drive turned portable privacy toolkit is invaluable. More » Continua a leggere – Original Link: Without a Trace: Turn Your Flash Drive into a Portable Privacy Toolkit [Privacy] Technorati Tags: cubicle, flash drive,...

1 Set/10

How To Detect A 64-bit Alureon Rootkit Infection

How To Detect A 64-bit Alureon Rootkit Infection

Alureon, or TDL, TLD3 and Tidserv, is the first rootkit that can infect 64-bit Windows PCs. Before that, only 32-bit systems were affected by rootkits, and many Windows users realized that in February, when Microsoft patch MS10-015 caused infected machines to display a blue screen. It obviously was not Microsoft’s fault back then, which was first assumed by professionals and users alike. It turned out after some research that the TLD3 rootkit was responsible for that behavior. The...

27 Ago/10

ACCOUNT ADMINISTRATOR ATTIVARE/DISATTIVARE IN WINDOWS 7

ACCOUNT ADMINISTRATOR ATTIVARE/DISATTIVARE IN WINDOWS 7

PRIMA PROCEDURA Come nel precedente sistema operativo Windows Vista, anche su Windows 7 è presente un’account administrator che è nascosto. Questo account poi diviene automaticamente nascosto in modo che non venga utilizzato dagli utenti in modo che venga tenuto in naftalina in caso di vera necessità, ossia quando l’account che usiamo normalmente si sia corrotto o per motivi similari. Attivare questo singolare account è cosa semplice da linea di comando: a)Start...

21 Ago/10

Working with KDE desktop effects

Working with KDE desktop effects

So you’ve followed the latest series on KDE 4.5 (see Ghacks KDE 4.5 content) and you are now using the spectacular latest release from the KDE team. You want to use Compiz, but quickly realize that it is not necessary as KDE has it’s own built-in compositing effects. What you will find is that the built-in KDE compositing is not like Compiz  – but it is comparable and much easier to use. And the fact that it is built-in, ensures you will have less issues with integration. In...

20 Ago/10

The 2010 Anti-Virus league tables are out!

The 2010 Anti-Virus league tables are out!

AV Test have now released the results of their 2010 best anti-virus for Windows 7.  The tests put each anti-virus package through a rigorous set of tests to determine not only how good they are at detecting and removing malware and viruses, but also how usable the software is… During the 2nd quarter of 2010 we have tested 19 security products in the areas protection, repair and usability. The “Protection” covers static and dynamic malware detection, including real-world...

19 Ago/10

BitDefender Total Security 2011 Review, Giveaway

BitDefender Total Security 2011 Review, Giveaway

BitDefender recently launched their security product line for 2011, with improvements all over the board, a set of new features to increase the protection of the system, and a new customizable interface suitable suitable for users of all experience levels. Total Security 2011 is the top of the line product that includes all features that the two other available products, Antivirus Pro and Internet Security offer, plus some that are exclusively available in Total Security. The installer...