It finally happened. I fell for one of those silly phishing scams. The kind that I previously took sanctimonious pride in having avoided. The kind where you get a frantic e-mail or IM from a friend saying that a malicious link was clicked, a secret password typed in, and that they didn’t know better. I feel so ashamed, guilty, violated…stupid. …
Read More »Windows Live Photo Gallery
The new Windows Live Photo Gallery application, Here are the features that I think make the product.
Read More »Exchange 2007 Client Access with ISA 2006 (part 2)
Create Web Listener Before creating the Web publishing rule, we must first specify a Web listener to be used. In the console tree of ISA Server Management, click Firewall Policy. On the Toolbox tab, click Network Objects, click New, and then select Web Listener. Type a name for the Web listener. For example, type Exchange FBA. Figure 1
Read More »Exchange 2007 Client Access with ISA 2006 (part 1)
Publishing Exchange Server Client Access with ISA Server should be a straightforward and easy task. Well, it isn’t. Although there are lots of resources on the Internet about the subject and Microsoft provides extensive technical documentation with more or less detailed steps, the truth is that every time I go through the process of providing access to Exchange for external …
Read More »DNS Publishing Topologies
DNS issues come up quite a bit on the ISAserver.org Web boards and mailing list. Recently there have been a flurry of questions related to DNS publishing. This spate of questions regarding DNS publishing intrigued me, since DNS publishing is a pretty straightforward process, and it’s hard to imagine that there could be many problems with the procedure. As it …
Read More »The Good, the Bad, and the horribly Ugly
I have no idea whether I’ll make it to entry #2. But the trials and tribulations of virtualizing my desktop system have been too many to chronicle in one blog post and it only seems fitting to break it up into a series of posts. I’m doing this because, for almost two years now, I’ve been extolling virtues of moving …
Read More »Do you know what’s leaking out of your browser
information seeping out of your Web browser could provide a gold mine for hackers doing reconnaissance for targeted attacks.At the ToorCon Seattle (beta) conference, Web application security specialist Robert Hansen (RSnake) demoed Mr-T (Master Recon-Tool), a new utility that combines information disclosure flaws in Internet Explorer and Firefox to collect information on a target’s computer system. For a basic idea …
Read More »How to repair an Outlook Express folder
An awful thing can happen to any Outlook Express user: you run Outlook Express and open the folder containing the necessary information just to find it empty. Outlook Express can’t read the folder and does not see your messages. It’s hard to imagine what you may feel at a moment like this. You ask yourself how to repair the Outlook …
Read More »Identify e-mails trying to steal your identity
ATTACK OF THE PHISHERS You open your in-box and find e-mail from eBay or PayPal, warning that your account has been compromised by identity thieves and that you must log on immediately to verify your information. Sounds scary, right? But here’s the really terrifying part: that e-mail is a fake, and so is the Web site it’s sending you to. …
Read More »
SON SON