by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Microsoft, Security
That’s just the LEGAL way to get at it. There’s very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Security
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it’s high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...
by wwarren | Jun 30, 2011 | Internet, Security, Security Alerts
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it’s buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is...
by wwarren | Jun 30, 2011 | Internet, Microsoft, Security, Security Alerts
I am seeing more and more infections on client computers using this rootkit. The common vector i see if either flash or IE ActiveX exploits. It is nearly time to just block flash at the firewall as well as ActiveX. ‘Indestructible’ rootkit...
by wwarren | Jun 29, 2011 | Cloud Computing, Internet
I’ve seen this for many years but nobody at Mozilla came out and said it…until now. If you are a business entity use Either Google Chrome or…IE. I have not used Firefox in over a year. their underlying technology is over 3-5 years old and they...
by wwarren | Jun 27, 2011 | Hardware, Security
When hackers from penetration testing firm Netragard were hired to pierce the firewall of a customer, they knew they had their work cut out. The client specifically ruled out the use of social networks, telephones, and other social-engineering vectors, and gaining...
by wwarren | Jun 19, 2011 | Hardware, Linux, Open Source
The author forgets another huge market that Linux is behind. HDTV. I would say well north of 80% of all HDTV come with some form of Linux. The next time you purchase a HDTV check the packet for something about GNU license. If you see that..your tv is running...
by wwarren | Jun 19, 2011 | Hardware, Input Devices, Intel
as technology and pricing changes this will change. Right now here is what i would reccomend for somebody like me…a light gamer with heavy multitasking single threaded programs: Qty. Image Product Description Unit Price Savings Total Price Update Intel Core...
by wwarren | Jun 19, 2011 | Internet, Linux, Open Source, Security, Sophos
I just passed the Astaro Certified Administrator course. The next one is the Astaro Certified Engineer. These will help further my status and abilities as an Astaro partner. These courses I ahve found to be a good use of time and actually add to my knowledge...