Info on Rootkits
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
Wordfence Lists Top Security Analysis Tools, and it is generally worthwhile to read their material.
I had read about this a couple of times, but since the defense is the same as for previous versions, I hadn’t yet written about it. I’ve now had a call in which I had to deal with it. For some time, scam emails have been informing you that some amount of money had been…
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
To maintain information you need to regularly remind yourself and your employees to be attentive in their use of tools. We learn to follow certain safety rules with power tools, but often we forget to be similarly attentive with the devices that store and (hopefully) protect our information Some (but by no means all) things…
More than a decade ago I was called in to do some work on the computer used by an office receptionist. After hearing the explanation, I sat down for what would be a rather easy job. Moments later, the receptionist interrupted me and said, “I guess you’ll need my password.” Problem was, I was already…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)