by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Microsoft, Security
That’s just the LEGAL way to get at it. There’s very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Security
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it’s high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...
by wwarren | Jun 30, 2011 | Internet, Security, Security Alerts
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it’s buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is...
by wwarren | Jun 30, 2011 | Internet, Microsoft, Security, Security Alerts
I am seeing more and more infections on client computers using this rootkit. The common vector i see if either flash or IE ActiveX exploits. It is nearly time to just block flash at the firewall as well as ActiveX. ‘Indestructible’ rootkit...
by wwarren | Jun 29, 2011 | Cloud Computing, Internet
I’ve seen this for many years but nobody at Mozilla came out and said it…until now. If you are a business entity use Either Google Chrome or…IE. I have not used Firefox in over a year. their underlying technology is over 3-5 years old and they...