Sunday, July 31, 2011

How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop

How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop:

"Before you attempt this modification, make sure that the BIOS on your SZ is updated to these versions: R0112N0 for Napa SZs or R0122S5 for Santa Rosa SZs."

Internet monitoring software for businesses

Internet monitoring software for businesses:

"Know what your employees are doing online?
Avoid non-work related employee Internet use
Block unwanted downloads of dangerous files
Enforce your privacy & security policies
Monitor & control employee Internet usage in real time"

Amazon.com: reese cargo carrier

Amazon.com: reese cargo carrier:

"Car Hitch & Rooftop Cargo Carriers"

Friday, July 29, 2011

In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury

In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury : The Two-Way : NPR:

"As of Wednesday, the Treasury reported it had $73.768 billion cash on hand. What the Obama administration has been saying is that that number will dwindle to a point where the U.S. will not be able to pay its financial obligations, unless it's allowed to borrow more money.

$73.768 billion sounds like a lot of money, but to put it in perspective, Apple Insider points out that in its third quarter earning's report, Apple said it had $76.156 billion in cash."

Ant Video Downloader - Ant.com

Ant Video Downloader:

"Go to any video site and play any video. The download button from our add-on will be activated."

Open Directory - Computers: Security: Policy: Sample Policies

Open Directory - Computers: Security: Policy: Sample Policies:

"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."

RIT - Information Security: Policy and Standards

RIT - Information Security: Policy and Standards:

"What are Policy and Standards?

Policy defines the strategy and direction of RIT’s approach to a particular issue; in this instance information security. All policies are grouped together in the Institute Policies and Procedures Manual.

Standards are created by the Information Security Office to help the RIT community implement the Information Security Policy.

The Information Security Policy (and standards) apply to the entire RIT community, including students, faculty, staff, external business associates, and volunteers."

Thursday, July 28, 2011

Researchers Build a Botnet Playground

Researchers Build a Botnet Playground

"Researchers have created their own botnet and unleashed it on 98 servers running 3,000 copies of Windows XP to better understand how they operate. The team from ESET and Ecole Polytechnique de Montreal needed to keep the Waledac botnet from infecting other computers, and took a cue from 'Battlestar Galactica.' They physically disconnected the servers from the Ecole Polytechnique's network, and only loaded software from DVD."

Raising a Botnet in Captivity - Technology Review

Raising a Botnet in Captivity - Technology Review

Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet."

Tuesday, July 26, 2011

Not All Free Identity Theft Services are Created Equal

Not All Free Identity Theft Services are Created Equal:

"Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Think long and hard about who has your best interests at heart before accepting a complimentary identity theft service."

UPDATE: Booz Allen Hamilton Issues Statement on Hack

UPDATE: Booz Allen Hamilton Issues Statement on Hack:

"The leak is being touted as 'Military Meltdown Monday' and includes 'logins of military personnel—including personnel from US CENTCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private sector contractors,' according to the Gizmodo article."

Weapon Systems Specs Stolen in Contractor Breach

Weapon Systems Specs Stolen in Contractor Breach:

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year.

Defense officials have announced plans to shore up information networks to prevent the future losses of sensitive and classified materials."

Saturday, July 23, 2011

Donating Blood Questions and Answers

Donating Blood Questions and Answers: "Is it true that individuals diagnosed with hemochromatosis can now donate?

FDA has always allowed individuals diagnosed with hemochromatosis to donate blood."

Friday, July 22, 2011

On LulzSec, Censorship & CloudFlare - CloudFlare's blog

On LulzSec, Censorship & CloudFlare - CloudFlare's blog: "Two broad points that I've drawn from the experience of watching this unfold over the last three weeks. First, CloudFlare is firm in our belief that our role is not that of Internet censor. There are tens of thousands of websites currently using CloudFlare's network. Some of them contain information I find troubling. Such is the nature of a free and open network and, as an organization that aims to make the whole Internet faster and safer, such inherently will be our ongoing struggle."

US looks into alleged hacking by News Corp.'s ad arm - US news

US looks into alleged hacking by News Corp.'s ad arm - US news - Crime & courts - msnbc.com: "The trial also featured testimony by Robert Emmel, a former News America employee turned whistleblower who has turned over voluminous material about alleged anti-competitive behavior by the firm to U.S. Senate and federal investigators."

Tuesday, July 19, 2011

How to disable the Autorun functionality in Windows

How to disable the Autorun functionality in Windows:

"How to use Group Policy settings to disable all Autorun features in Windows Server 2003, Windows XP Professional, and Windows 2000"

Sunday, July 17, 2011

Bandwidth monitor, bandwidth speed test, bandwidth and traffic monitoring tool for Windows

Bandwidth monitor, bandwidth speed test, bandwidth and traffic monitoring tool for Windows:

"NetWorx is a simple and free, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection."

Internet Traffic Agent 2.5.1: monitoring the Internet traffic activity. Take the traffic under your control!

Internet Traffic Agent 2.5.1: monitoring the Internet traffic activity. Take the traffic under your control!:

"Internet Traffic Agent is an efficient and handy network tool for detailed internet traffic monitoring. It monitors traffic on any IP address that the user has visited and keeps daily traffic statistics. This utility captures all IP packets in the local area network and allows accurate detection of the network traffic used by any application."

How the FBI and Interpol trapped the world's biggest Butterfly botnet

Reminds us of the way record-keeping by mobsters led to IRS charges when nothing else would stick:

How the FBI and Interpol trapped the world's biggest Butterfly botnet - CSMonitor.com:

"Despite its mammoth size, the Metulji botnet has an Achilles heel that law enforcement and cyber security experts are exploiting: its criminal creator kept meticulous records of his customers."

Top 5 Operating Systems: Global Stats

Why XP still matters -- More people in the world use it than any other OS, about 5X as many as use Mac OS X.

Top 5 Operating Systems from Jun 10 to Jun 11 | StatCounter Global Stats

OS Statistics: XP Still top of the charts

OS Statistics: "From the statistics below, collected from W3Schools' log-files over a period of seven years, you can read the long term trends of operating system usage."

Handout: HHC Blood Facts Tri-fold brochure | The Hemochromatosis Information Center | Hemochromatosis | Too Much Iron

Handout: HHC Blood Facts Tri-fold brochure | The Hemochromatosis Information Center | Hemochromatosis | Too Much Iron

Saturday, July 16, 2011

Rustock take-down proves botnets can be crippled, says Microsoft

Rustock take-down proves botnets can be crippled, says Microsoft - Computerworld:

"Microsoft Tuesday said the coordinated take-down of the Rustock botnet and follow-up efforts had purged the malware from over half of the PCs once controlled by Russian hackers."

Microsoft Says Any Botnet Can be Decapitated, Destroyed

DailyTech - Microsoft Says Any Botnet Can be Decapitated, Destroyed:

"Today, networks of malware infected computers called 'botnets' are controlled by malicious masters to spread spam and orchestrate takedown attacks across the internet. The botnets are growing very, very well crafted, leading some to suggest that they may be 'indestructible'."

Feds declare victory over notorious Coreflood botnet

Federal authorities say they have crippled a notorious botnet that penetrated some of the world's most sensitive organizations, thanks to an unprecedented take-down strategy that used a government-run server that communicated directly with infected PCs.

Feds declare victory over notorious Coreflood botnet • The Register

Tuesday, July 12, 2011

Phone Hacking Scandal Widens: News International Targeted Gordon Brown, BSkyB Bid Delayed (LIVE UPDATES)

Phone Hacking Scandal Widens: News International Targeted Gordon Brown, BSkyB Bid Delayed (LIVE UPDATES):

"'Gordon Brown has now been informed of the scale of intrusion into his family's life. The family has been shocked by the level of criminality and the unethical means by which personal details have been obtained. The matter is in police hands."

WEBINAR: Reputation Repair: How to Restore Your Image after a Crisis

WEBINAR: Reputation Repair: How to Restore Your Image after a Crisis:

"From Enron’s auspicious failure to Japan's recent nuclear mishap to government officials’ misuse of social media, message strategies are the proven polish for tarnished reputations.

Join crisis communications expert Dr. Robert Chandler as he discusses what to communicate after the crisis is over to help salvage your reputation."

Saturday, July 2, 2011

Hemingway, Hounded by the Feds - NYTimes.com

Little known facts about Hemingway's suicide attempts
Hemingway, Hounded by the Feds - NYTimes.com

On Nov. 30 he was registered under an assumed name in the psychiatric section of St. Mary’s Hospital in Rochester, Minn., where, during December, he was given 11 electric shock treatments.

In January he called me from outside his room. He sounded in control, but his voice held a heartiness that didn’t belong there and his delusions had not changed or diminished. His room was bugged, and the phone was tapped. He suspected that one of the interns was a fed.

During a short release he twice attempted suicide with a gun from the vestibule rack. And on a flight to the Mayo Clinic, though heavily sedated, he tried to jump from the plane. When it stopped in Casper, Wyo., for repairs, he tried to walk into the moving propeller.