Thursday , 9 May 2024
Breaking News

Bank ATM’s Converted to Steal IDs of Bank Customers

A team of organized criminals are installing equipment on legitimate bank ATM’s in at least 2 regions to steal both the ATM card number and the PIN. The team sits nearby in a car receiving the information transmitted wirelessly over weekends and evenings from equipment they install on the front of the ATM (see photos). …

Read More »

iPhone Password Manager

Do you use an application to help you keep track of all web passwords and for automated sign-in? If yes, chances are you currently missing it on your iPhone. Not any more as there is some good news for all you folks, the makers of 1Password have come up with with a clever way to sync your passwords with the iPhone as they have just announced “1Password for iPhone” which uses an ingenious way to sync data to the iPhone. All the details of the latest iPhone application and a step by step guide available after the jump. Agile Web Solutions, the makers of 1Password have announced that 1Password 2.5 sports a new icon on its toolbar “Sync to iPhone” clicking on which will export all your 1Password data to an encrypted Safari Bookmarklet, which can then be used on the iPhone (or even iPod Touch) to access all your …

Read More »

Network design and defense

Computer network design can vary wildly from one corporation to the next. That said most networks follow the same design principles. By design principles I mean there is generally a demilitarized zone of DMZ where servers such as the mail, dns, and web server are found. This DMZ is kept relatively unprotected, and in turn is firewalled off from the rest of the internal network or intranet. This DMZ is there for good reason as services which companies have to offer like their web and email server are accessible via the Internet. If they are accessible then they are vulnerable to attack. We all know that there is a tremendous amount of “white noise” aka port scans, bot activity, and so on seen on the Internet at any given time. Bearing the constant threat it only makes sense then to have your publicly accessible servers firewalled off from the rest …

Read More »

How to using wireless laptop at work and home

So you’ve got a brand new laptop at the office. Maybe you’re really lucky and got a Tablet PC. Whatever model or brand you got, it almost certainly includes wireless support. Now you can work from anywhere in the office or campus without having to find an available network plug. Your IT department will handle setting up your new laptop for the work network. Make sure they show you how to connect to the network when you’re on the road or outside the office. They probably have specific instructions or software you need to use to make a virtual private network (VPN) connection to the network. But when you bring your new wireless laptop home, you’re in charge of making it work with the wireless setup you have there. And if you want to work from your neighborhood coffee shop, that’s up to you too. In this column, I’ll help …

Read More »

Optimize Windows Vista for better performance

No matter how fast or shiny computers might be when they are new, they all seem to get slower over time. That state-of-the-art PC you bought last year might not feel like such a screamer after you install a dozen programs, load it with antispyware and antivirus tools, and download untold amounts of junk from the Internet. The slowdown might happen so gradually you hardly notice it, until one day you’re trying to open a program or file and wonder, “What happened to my poor PC?” Whatever the cause, there are a lot of ways to help speed up Windows and make your PC work better—even without upgrading your hardware. Here are some tips to help you optimize Windows Vista for faster performance. Delete programs you never use Many PC manufacturers pack their new computers with programs you didn’t order and might not want. These often include trial editions and …

Read More »

Bid in online auctions and avoid ID theft

Online auctions are more popular than ever, enabling users to find everything from collectibles to car parts. Most auction transactions go smoothly. Auction fraud, however, is also more prevalent. You can choose LifeLock.com (Promotion Code) to be pro-active in protecting your identity and personal information. Simply reacting to identity theft isn’t enough anymore. Too many thieves have found out this is a safe, easy, money-making crime to commit. They’re out to get you. You may never receive the item that you won, or the item that you receive may not be what the seller promised. You may even discover that a seller has stolen your personal information. Fortunately, if you do a little research and follow these tips, you can help avoid auction fraud.

Read More »

10 tips home wireless security settings

1. ENABLE WIRELESS ENCRYPTION Enabling Wireless encryption is essential otherwise every one within your Radio Frequency (RF) range (and remember the Wireless network world record distance is 125 miles!), at best can capture your traffic compromising surfing habits, gathering usernames and passwords and at worst sharing illegal images or hacking over your Wireless network for which you are legally responsible. DO NOT USE WEP (WEP is trivially broken) DO NOT USE A DICTIONARY BASED WORD FOR YOUR WPA/WPA2 PSK DO USE WPA2 (BEST) or WPA (NEXT BEST) WITH A NON-DICTIONARY PSK Note: Use AES encryption where you can, it’s the strongest available. 2. DISABLE SSID BROADCAST Ensure you disable the SSID broadcast on you Access Point this will hide your Wireless access point from casual WARDRIVERS. While it is still trivial for a proficient WARDRIVER to determine the SSID it makes him/her work that little bit harder and there may …

Read More »

How to bypass Web Proxy service in ISA Server 2004 or 2006

In ISA Server 2006 or in ISA Server 2004, client Web requests are handled by the Web Proxy filter. This filter works at the application level on behalf of clients residing in networks that are behind an ISA Server-based server that requests HTTP and Secure Hypertext Transfer Protocol (HTTPS) objects. Web proxy client requests from client computers that have ISA Server specified as a proxy server in the browser settings are passed to the Web proxy filter.

Read More »

Firefox 3 to get a Visual Refresh

The Mozilla team is working really hard to make sure that Firefox 3 will be the best browser we will ever see on this planet. Part of the plan is to enhance the UI of Firefox to make sure it blends with the host OS. Firefox 3 will come out with inbuilt skins that will integrate completely with Windows Vista, OS X and Linux. The Mozilla team posted some screenshots on what we can expect, and here the screenshots of the theme for Vista and OS X in action :

Read More »