Five Signs of a Spyware Infection

Throughout most of 2008 it seemed that virus and spayware infections were decreasing, and I assumed that meant that the Anti-Virus and Anti-Spyware software comapnies had a handle on dectection and prevention. But in the last 2 months, it appears that the forces of darkness are back with better than ever mal-ware products that are taking over machines of my clients.
Most of this seems to be delivered via e-mail, usually in the form of ...

Continue Reading →
0

It’s About The Money, Stupid – Or Is It?

I have been harping long and loud recently about the purpose of malware writing. It’s about the money. No one is writing viuses for notoriety, fun, and fleeting fame anymore. It’s about the money – it’s phishing, it’s spam, it’s botnets, it’s identity theft and credit card and banking fraud.

But there may be some relief. It appears that phishing, at least, has hit the wall of diminishing returns. ...

Continue Reading →
0

The Dominance of Microsoft Slips Further

It has been my contention for some time now that the only company able to take on Microsoft for world-wide dominion of the information technology space would be Google. There is evidence from the Internet traffic monitoring service Net Applications that there are other contneders nibbling away at the Kingdom of Redmond. Here is a quote from an aticle by John Murrell at SiliconValley.com.

Last month, Microsoft’s Internet Explorer was used by 68.15 percent ...

Continue Reading →
0

Rogue Security Software – “Scareware”

One of the more common viral or spyware infections I see more of is the installation of rogue or fake anti-virus or anti-spyware programs. These have been called “scareware” programs by some, because they work by “scaring” you into purchasing their security “solution.” They generally start out as an e-mailed invitation (SPAM) to run a free security scan, with a link that takes you to a web site. When you go to this web site and run the ...
Continue Reading →
0

Drive-By Trojan Downloader Compromises Security

One of my collegues sent a link to a BBC article about the Sinowal Trojan horse , which is also known as Torpig and Mebroot. This trojan installs itself on victims’ computers when they simply visit certain web sites, and collects banking and credit card information and reports back to the what appear to be eastern European and Russian criminal gangs, such as the Russin Business Network. Links to the article are here.

Your best form of protection ...

Continue Reading →
0

Domain Name Phishing Scam

I received information of a massive ‘phishing’ scam that is taking place on the Internet today. This attack is not on WyzHost’s network, services or your account with us, but we feel it is significant enough to help protect you through awareness. The attack description is below:
An e-mail will show up appearing as if it is from support@networksolutions.com. It will indicate that your domain name has already expired. The e-mail asks the user to click on a link, ...

Continue Reading →
0

Domain Name Phishing Scam

I received information of a massive ‘phishing’ scam that is taking place on the Internet today. This attack is not on WyzHost’s network, services or your account with us, but we feel it is significant enough to help protect you through awareness. The attack description is below:

An e-mail will show up appearing as if it is from support@networksolutions.com. It will indicate that your domain name has already expired. The e-mail asks the user to click ...

Continue Reading →
0

Inmates Running the Asylum – Your Tax Dollars At Work

Sorry to put a financial/economic article in my blog but we need to know this.

The insane are running this country!  We are now insuring deposits up to 250,000 but this expires on 12/31/09 the end of THIS YEAR! – Info comes straight out of the FDIC information sent to the bank’s!

Basic Coverage for all depositors:
1.Until December 31, 2009: Under 12 C.F.R. 330.1(n)-Standard maximum deposit
Insurance amount, referred to as "the SMDIA" hereafter, means $250,000 adjusted ...

Continue Reading →
0

Why Are You Still Branding AOL, gmail, or Comcast On Your Business E-Mail?

This is a rant.  This really bugs me!  I can not for the life of me figure out why anyone sending business e-mail is doing it from an account on AOL, Hotmail, gmail, Comcast, ATT.net, or any other ISP.  This goes double for those of you (and you ought to know who you are) that have a perfectly valid registered domain name that your web site is hanging out on.

Well, I do know the reason.  It’s something like ...

Continue Reading →
0

Fun with .htaccess files

Chris Hanscom, aka Veign, a Microsoft MVP and frequent contributor to the Microsoft Expression Web Group, recently posted some links to further information about using the .htaccess file to customize some web site functions, like setting password protected areas or generating custom error (404) pages

If you are on a Linux server then you can use an htaccess file.

htaccess:
http://www.veign.com/blog/2007/01/on-linux-server-then-see-what-htacc…

htaccess Generator: http://cooletips.de/htaccess/
.HTACCESS files useful tips and tricks: http://www.garnetchaney.com/htaccess_tips_and_tricks.shtml

Continue Reading →
0
Page 99 of 107 «...708090979899100101...»