| Wednesday July 23rd 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

Posts Tagged ‘control’

HOWTO: Avoid online tracking (Hint: you can’t)

HOWTO: Avoid online tracking (Hint: you can’t)

Christopher Maag, writing for credit.com, says that any attempt to maintain your privacy online is doomed. Deleting cookies won't work, banning cookies won't work, and using privacy tools won't work, either. Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by [...]

PS3 completely hacked. Security on the system is apparently the worst security ever seen.

Basically, the ps3 has a hard outer shell, but once you break through the outer layer there is absolutely nothing stopping you... (more…)

Redhat Enterprise Linux 6 available

Redhat Enterprise Linux 6 available

CentOS 6 should be out in about a month or so, if it goes like past releases. Red Hat Enterprise Linux is an enterprise platform well-suited for a broad range of applications across the IT infrastructure. The latest release, Red Hat Enterprise Linux 6, represents a new standard for Red Hat by offering greater flexibility, efficiency, and [...]

Now you don’t even have to be flying to be “scanned” by x-rays

Now you don’t even have to be flying to be “scanned” by x-rays

AS&E's vans can be driven past stationary vehicles to scan their contents or parked to see the innards of passing cars and trucks. The Z Backscatter Vans, or ZBVs, as the company calls them, send a narrow stream of X-rays off and through nearby objects and read which ones bounce back. Absorbed rays indicate dense material such as steel. [...]

Botmasters include fake control interface to ensnare security researchers

Botmasters include fake control interface to ensnare security researchers

Security researchers compromised what they believed to be a control server for the Zeus botnet, but after examining it in detail, they concluded that it was a fake, designed to allow botmasters to spy on security researcher tactics and plan countermeasures. What particularly stands out about the EFTPS exploit toolkit is their admin interface. [...]

Microsoft’s DRM makes your computer vulnerable to attack

Microsoft’s DRM makes your computer vulnerable to attack

The msnetobj.dll library is an ActiveX control used by Microsoft's DRM; it is intended to prevent the owner of a computer from saving or viewing certain files except under limited circumstances, and to prevent the computer's owner from disabling it or interfering with it. As if that wasn't bad enough, it is also vulnerable to three separate [...]

What happens when you refuse to answer a passport control officer’s questions

What happens when you refuse to answer a passport control officer’s questions

In April, Paul Karl Lukacs landed at San Francisco International Airport after visiting China, and he refused to tell the passport control officer why he was there. He reports what happened on his blog. “Why were you in China?” asked the passport control officer, a woman with the appearance and disposition of a prison matron.“None of [...]