RSS
IT Glossary    1_9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z   .....  A                                          


SYSTEM
 Windows10
  Registry Windows 10
  Windows 10 tweaks & tricks
Windows8
Tweaks & tricks
  Network settings
  Registry
Windows7
Windows7: General settings
  Windows7: Registry
  Windows7: Registry faq
  Windows7: Network settings
  Windows7: Security
  Windows7: Firewall
  Windows7: Compatibility Mode
  Windows7: Administrator Password
Windows NT/2K/XP/VISTAWindows NT/2K/XP/VISTA
Win 2K faqWin 2K faq
  Win 2K(kernel & MEM.managment)
  Win 2K XP (Securit)
  Win 2K XP (Boot)
  Win 2K XP (Install)
  Win 2K XP (Admin)
  Win 2K XP (File system)
  Win 2K XP (Services)
  Win 2K & XP optim & tweak
  Win XP faq
  Win XP faq #2
  Win XP faq (net)
  Win XP faq (lan)
  Win XP recover & recovery console
  WinXP & ntfs
  WinXP & game faq
  Win PE
  Win Vista
  Win Vista FAQ
  Win Server tweaks
RegistryRegistry
Reg WIN2K/XP faq
Reg WIN2K/XP faq #2
Reg NT/XP: Structure
Reg XP: Restore & backup
Reg XP: Costumize XP
Reg XP: Inet
Reg NT/XP: SAM
Reg: Inet & LAN
BIOSBIOS
BIOS faq
BIOS recover
BIOS #
@Mail.ru
computer ambulance
Is Wi-Fi making you sick?

Wireless technology is everywhere these days. Almost every home seems to have a wi-fi router, as computer users find it so much easier to set up than running Ethernet cables. Businesses too are increasingly deploying wireless networks along with their wired ones, so employees can use their mobile devices while moving around the building. Hotels, conference centers, city parks, restaurants, coffee shops, airports they all have wireless hot spots, both public and private. Even on a cruise ship in the middle of the ocean, you cant escape those signals.Is Wi-Fi making you sick
(Read More... )

Ransomware takes it to the next level: Javascript

If youre lucky, youve only been hearing a lot about ransomware lately. If youre not so lucky, you might have experienced it firsthand. Victims of this most insidious form of malware know how devastating it can be to find that suddenly all of your important data from personal financial information to irreplaceable photos to mission-critical business documents is inaccessible. Its not gone (perhaps that would be less frustrating), but its sitting there on your drive, encrypted, and you dont have the key to unlock it. This has been the reality for many ransomware victims and now there is a new type of ransomware to be on the lookout for, one of the nastiest yet.
Ransomware has been in existence for over two decades (the first was the AIDS Trojan in the late 1980s), but there has been an explosion of it in the last few years, and its gotten more sophisticated. There are two basic types. In the case of computer locker ransomware, your entire system is locked so you cant log on. More commonly now, with crypto ransomware, the system is accessible but the data files are encrypted.
Ransomware takes it to the next level: Javascript
(Read More... )

Lenovo urges customers to uninstall dangerously flawed app from its systems

Exploit could lead to man-in-the-middle attack against desktop and laptop systems running the Lenovo Accelerator Application.
Chinese PC firm Lenovo has advised users of its desktop and laptop systems to uninstall a pre-loaded app that could allow hackers to execute code remotely and carry out a man-in-the-middle (MitM) attack.
Lenovo urges customers
(Read More... )

Ransomware hits 10K Australians

At least 10,000 Australians have been targeted in a ransomware campaign that lures recipients with an email that appears to come from local energy company AGL, according to the Sydney Morning Herald.Ransomware hits 10K Australians
(Read More... )

$100,000 Bounty on Syrian Electronic Army

The US Department of Justice believes it has identified three members of the notorious Syrian Electronic Army, who have in recent years made a name for themselves with their high profile hacks against media organisations, targeted spear-phishing attacks, and redirecting well-known websites to display propaganda in support of the Syrian Government and President Bashar al-Assad.
$100,000 Bounty on Syrian Electronic Army
(Read More... )

1.5Mn Customer Records Breached at Verizon Enterprise

Verizon Enterprise Solutions has suffered the theft of 1.5 million customer contact details, including for some of the top Fortune 500 companies. The customer info was found up for sale on an underground cybercrime forum, with a price tag of $100,000.1.5Mn Customer Records Breached at Verizon Enterprise
(Read More... )

18 Million Stolen Credentials Found in Japan

Stolen usernames and passwords belonging to 18 million Internet users have been found on a server owned by a Japanese company, which is said to have provided services to Chinese hackers.18 Million Stolen Credentials Found in Japan
(Read More... )

CTB-Locker ransomware infects over 100 websites

Crypto ransomware CTB-Locker has been pushed onto users once again. A new variant of the malware now targets websites instead of Windows.
According to PC World, at least 102 websites have been infected since the campaign began on 12 February, when the British Association for Counselling and Psychotherapy website fell victim to attack.
(Read More... )

Lenovo's ShareIt has Default Password "12345678"

Lenovo has been forced to release urgent software fixes after a number of embarrassing flaws were uncovered in its products, including one that left a hard-coded password set to '12345678' by default.
Researchers at Core Security posted an advisory that listed four vulnerabilities in Lenovo's ShareIT function that could result in man-in-the-middle attacks, information leaks and the bypassing of encryption.
Lenovo's ShareIt has Default Password "12345678"
(Read More... )

How the US Government vs. Apple will have long-lasting ramifications

If you believe Hollywood, or just about any modern crime or spy fiction, hacking our cellphones and computers is trivially easy for the resident tech guy on the team. He or she just needs the right connector, and a few keystrokes, and theyre in. All of the secrets stored on the device are out in the open and at their disposal. From a law enforcement perspective, if only it were that easy! From a privacy and security perspective, thank goodness its not. From a paranoiac perspective, what if it is? To Apple, the FBI, and to many others, the question of just what can and cannot be done is highly relevant at this time.US Government vs. Apple will have long-lasting ramifications
(Read More... )

computer service


June 2016 Microsoft Patch Tuesday
Microsoft seems to have a thing for Sweet 16 lately, as once again theyve released sixteen updates for this months Patch Tuesday, ensuring that IT professionals will be kept busy sorting through them, testing them and getting them applied. They say when youre hot, youre hot, and those of us in Texas and other southern states are feeling the heat as we scramble to roll out yet another big slate of patches.

This months basket full of patches includes the usual cumulative updates for IE and Edge, as well as an update for scripting engines and one for Microsoft Office. Other than an Exchange Server update, the rest are for Windows. The good news is that only five of the updates are critical; the rest are rated important.
(Read More... )
The bottom line
Ensuring that networks are secure and that compliance with regulations and industry standards can be achieved is a complex task for any organisation no matter how small or large. An organisation that tries to do everything itself will be in a constant state of catch up, which often leaves vulnerabilities exposed. As networks become increasingly open and inter-connected, with always-on availability expected from an ever-growing variety of devices, a far better strategy is to offload security needs that are either not a core competence or that are complex and costly to manage to a third party that has specialised expertise.

Home | Stop-screens | Wi-Fi faq | LAN faq | Full BIOS settings | IP faq | FTP faq | Motherboards faq | | Handbook of meta tags | Internet protocols | Internet and Security | | Protocols

Cookie policy | Sitemap

po gonn 2004