Info on Rootkits
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
… along with other annoying things. But today I was reminded of these emails when Jody showed me one she got that purported to be from Amazon. The folks who do this stuff know that a whole bunch of people shop on Amazon, so they create a fake email and choose a price that many…
Wordfence Lists Top Security Analysis Tools, and it is generally worthwhile to read their material.
The hope of getting something for nothing was encouraged with the advent of computers and software. For technically oriented people, it’s fairly easy, and relatively safe, to steal software. You just copy it. For many, especially in the early days, this didn’t seem like stealing. After all, where is the thing that you’re stealing? I…
How to beat ransomware: prevent, don’t react, from MalwarebytesLabs. The one thing I would add to this article is further emphasis on backup. I can’t emphasize it enough. No matter how attentive you are, you cannot absolutely be certain that you won’t get hit by ransomware. You can be careful, but most people use their…
Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
I just got notice of a vulnerability in Firefox from Wordfence. I have no original information, but I have generallly found that the Wordfence people provie good information. I will post a comment here (an a note at the top of this post) when this vulnerability has been fixed. The one way to avoid the…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)