Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Sunday, July 31, 2011
How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop
"Before you attempt this modification, make sure that the BIOS on your SZ is updated to these versions: R0112N0 for Napa SZs or R0122S5 for Santa Rosa SZs."
Internet monitoring software for businesses
"Know what your employees are doing online?
Avoid non-work related employee Internet use
Block unwanted downloads of dangerous files
Enforce your privacy & security policies
Monitor & control employee Internet usage in real time"
Friday, July 29, 2011
In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury
"As of Wednesday, the Treasury reported it had $73.768 billion cash on hand. What the Obama administration has been saying is that that number will dwindle to a point where the U.S. will not be able to pay its financial obligations, unless it's allowed to borrow more money.
$73.768 billion sounds like a lot of money, but to put it in perspective, Apple Insider points out that in its third quarter earning's report, Apple said it had $76.156 billion in cash."
Ant Video Downloader - Ant.com
"Go to any video site and play any video. The download button from our add-on will be activated."
Open Directory - Computers: Security: Policy: Sample Policies
"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."
RIT - Information Security: Policy and Standards
"What are Policy and Standards?
Policy defines the strategy and direction of RIT’s approach to a particular issue; in this instance information security. All policies are grouped together in the Institute Policies and Procedures Manual.
Standards are created by the Information Security Office to help the RIT community implement the Information Security Policy.
The Information Security Policy (and standards) apply to the entire RIT community, including students, faculty, staff, external business associates, and volunteers."
Thursday, July 28, 2011
Researchers Build a Botnet Playground
"Researchers have created their own botnet and unleashed it on 98 servers running 3,000 copies of Windows XP to better understand how they operate. The team from ESET and Ecole Polytechnique de Montreal needed to keep the Waledac botnet from infecting other computers, and took a cue from 'Battlestar Galactica.' They physically disconnected the servers from the Ecole Polytechnique's network, and only loaded software from DVD."
Raising a Botnet in Captivity - Technology Review
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet."
Tuesday, July 26, 2011
Not All Free Identity Theft Services are Created Equal
"Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?
Think long and hard about who has your best interests at heart before accepting a complimentary identity theft service."
UPDATE: Booz Allen Hamilton Issues Statement on Hack
"The leak is being touted as 'Military Meltdown Monday' and includes 'logins of military personnel—including personnel from US CENTCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private sector contractors,' according to the Gizmodo article."
Weapon Systems Specs Stolen in Contractor Breach
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year.
Defense officials have announced plans to shore up information networks to prevent the future losses of sensitive and classified materials."
Saturday, July 23, 2011
Donating Blood Questions and Answers
FDA has always allowed individuals diagnosed with hemochromatosis to donate blood."
Friday, July 22, 2011
On LulzSec, Censorship & CloudFlare - CloudFlare's blog
US looks into alleged hacking by News Corp.'s ad arm - US news
Wednesday, July 20, 2011
Support questionSSD sleep mode problem.
Valuable Software, Downloads, Service & Support, Welcome to ADATA │Love‧Life‧Dreams
Tuesday, July 19, 2011
How to disable the Autorun functionality in Windows
"How to use Group Policy settings to disable all Autorun features in Windows Server 2003, Windows XP Professional, and Windows 2000"
Sunday, July 17, 2011
Bandwidth monitor, bandwidth speed test, bandwidth and traffic monitoring tool for Windows
"NetWorx is a simple and free, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection."
Internet Traffic Agent 2.5.1: monitoring the Internet traffic activity. Take the traffic under your control!
"Internet Traffic Agent is an efficient and handy network tool for detailed internet traffic monitoring. It monitors traffic on any IP address that the user has visited and keeps daily traffic statistics. This utility captures all IP packets in the local area network and allows accurate detection of the network traffic used by any application."
How the FBI and Interpol trapped the world's biggest Butterfly botnet
How the FBI and Interpol trapped the world's biggest Butterfly botnet - CSMonitor.com:
"Despite its mammoth size, the Metulji botnet has an Achilles heel that law enforcement and cyber security experts are exploiting: its criminal creator kept meticulous records of his customers."
Top 5 Operating Systems: Global Stats
Top 5 Operating Systems from Jun 10 to Jun 11 | StatCounter Global Stats
OS Statistics: XP Still top of the charts
Saturday, July 16, 2011
Rustock take-down proves botnets can be crippled, says Microsoft
"Microsoft Tuesday said the coordinated take-down of the Rustock botnet and follow-up efforts had purged the malware from over half of the PCs once controlled by Russian hackers."
Microsoft Says Any Botnet Can be Decapitated, Destroyed
"Today, networks of malware infected computers called 'botnets' are controlled by malicious masters to spread spam and orchestrate takedown attacks across the internet. The botnets are growing very, very well crafted, leading some to suggest that they may be 'indestructible'."
Feds declare victory over notorious Coreflood botnet
Feds declare victory over notorious Coreflood botnet • The Register
Tuesday, July 12, 2011
Phone Hacking Scandal Widens: News International Targeted Gordon Brown, BSkyB Bid Delayed (LIVE UPDATES)
"'Gordon Brown has now been informed of the scale of intrusion into his family's life. The family has been shocked by the level of criminality and the unethical means by which personal details have been obtained. The matter is in police hands."
WEBINAR: Reputation Repair: How to Restore Your Image after a Crisis
"From Enron’s auspicious failure to Japan's recent nuclear mishap to government officials’ misuse of social media, message strategies are the proven polish for tarnished reputations.
Join crisis communications expert Dr. Robert Chandler as he discusses what to communicate after the crisis is over to help salvage your reputation."
Wednesday, July 6, 2011
Saturday, July 2, 2011
Hemingway, Hounded by the Feds - NYTimes.com
Hemingway, Hounded by the Feds - NYTimes.com
On Nov. 30 he was registered under an assumed name in the psychiatric section of St. Mary’s Hospital in Rochester, Minn., where, during December, he was given 11 electric shock treatments.
In January he called me from outside his room. He sounded in control, but his voice held a heartiness that didn’t belong there and his delusions had not changed or diminished. His room was bugged, and the phone was tapped. He suspected that one of the interns was a fed.
During a short release he twice attempted suicide with a gun from the vestibule rack. And on a flight to the Mayo Clinic, though heavily sedated, he tried to jump from the plane. When it stopped in Casper, Wyo., for repairs, he tried to walk into the moving propeller.