The few souls that attempt to read and understand website privacy policies know they are almost universally unintelligible and shot through with clever loopholes. But one of the most important policies to know is your internet service provider’s — the company that ferries all your traffic to and from the internet, from search queries to BitTorrent uploads, flirty IMs to …
Read More »AutoRuns for Windows v8.61
This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other …
Read More »Keys to Protecting Data with BitLocker Drive Encryption
Windows BitLocker Drive Encryption is certainly one of the most talked-about features in Windows Vista. However, most people haven’t yet had much opportunity to test BitLocker to find out firsthand. what it does and how it works—particularly not on a computer with a Trusted Platform Module (TPM). In this article, I introduce you to the basics of BitLockerâ„¢ so that …
Read More »Microsoft Plugs Critical Vista Hole
Microsoft has just patched another critical hole in Vista that it knew about as long ago as last Christmas. The delay was similar to its lag in patching the serious (and heavily targeted) animated-cursor flaw I told you about last month. The new problem involves the way that the OS’s Client/Server Run-time Subsystem (CSRSS) handles error messages, and it affects …
Read More »Configuring Exchange Server 2007 Preview – Disaster Recovery with Exchange Server 2007
Disaster Recovery with Exchange Server 2007 Solutions in this chapter: Backing Up Exchange 2007 Using Windows 2003 Backup Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil Restoring Mailbox Data Using the Recovery Storage Group Feature Recovering an Exchange 2007 Server Using the RecoverServer Switch Recovering an Exchange …
Read More »Microsoft Invites Hackers Back for Blue Hat
Microsoft’s latest Blue Hat conference kicked off with talks on mobile security, hardware hacking, and Windows security tools Microsoft Corp. is once again inviting members of the hacking community into its Redmond, Washington, campus to show the software giant where it’s gone wrong. The company’s latest Blue Hat conference kicked off Wednesday with talks on mobile security, hardware hacking, Microsoft’s …
Read More »Configuring the ISA Server 2006 HTTP Filter
In this article I will give you a high level overview of the ISA Server 2006 HTTP Filter. I will show how to use this HTTP Filter to protect your internal network from some types of attacks in Webserver Publishing scenarios. We will also see how to prevent users from using the Universal Firewall Bypass protocol (HTTP) to bypass the …
Read More »The Greenest Laptop on the Planet
The One Laptop Per Child non-profit headed up by MIT’s Nicholas Negroponte is coming up against its self-imposed deadline of May 31 to secure three million orders for its little green computers. Lots of developing countries have shown interest, but none have yet signed on the dotted line. In a 60 Minutes segment, Negroponte accuses Intel of trying to scuttle …
Read More »MENGHUKUM DIRI SENDIRI
Suatu ketika, Raden Permadi didatangi sekelompok “orang kampung†dalam keadaan cemas. Kelompok orang tersebut minta pertolongan sang ksatria untuk menumpas sekawanan perampok yang sedang merajalela di kampungnya. Terdorong rasa kemanusiaan yang mendalam, apalagi mentaati posisinya sebagai penjaga ketentraman, Raden Permadi tanpa pikir masuk ke gudang senjata, mengambil panah sebagai sarana untuk menghadapi pengacau. Betapa terkejutnya dia, karena didapati kakaknya, Raden …
Read More »
SON SON