The TSA have been the butt of jokes and the bane of airline passengers’ existence since the infamous Al Qaeda attack on 9/11 of 2001. I will admit that I don’t hold them in high regard. Actually, I am sure they think they’re doing a good thing, and I don’t have any hard feelings toward […]
Metasploit 3.1 was unleashed on the world today. According to the press release posted on the metasploit.com site, this “latest version features a graphical user interface, full support for the Windows platform, and over 450 modules, including 265 remote exploits.”
The legitimate value of the Metasploit Framework has been debated. Some security experts feel it is […]
Microsoft’s Director of Security, Jeff Jones, published the One Year Vulnerability Report for Windows Vista, in which he demonstrates that Vista is the most secure OS ever measured (based on the criteria used to calculate the first year vulnerability report).
Granted, the declaration came from Microsoft, so many will take it with the proverbial ‘grain of […]
While the debate rages on about whether Vista is worthy of being Microsoft’s flagship operating system, development marches on to replace it. It is still very early in the process. The screenshots that were leaked by ThinkNext reveal an interface that is strikingly similar to Windows Vista. The version shown in the leaked screenshots is […]
I think I know what Superman, Batman, and all those other superheroes feel like while masquerading around as their alternate identities. Maybe not. First of all, I am not a superhero (just so we clear that right up). Secondly, they chose to have a mild-mannered alternate identity. I did not.
Here is the issue. I lead […]
If you have visited a web site recently, it is a virtual certainty that you have seen pay-per-click advertising links. Actually, you are here on my site reading this post, and I have pay-per-click advertising links, so it is an absolute certainty. Most likely, they were from the current king of the pay-per-click advertising hill, […]
Remember the IT apocalypse commonly referred to as ‘Y2K’? That was when every computer system in the world was going to shut down or fail in some way because the internal date would not be able to comprehend that the year ‘00′ was the year 2000 rather than 1900. Of course, the troops were mobilized […]
Microsoft recently created a new blog site designed to provide insight on emerging vulnerabilities. The blog, titled <a href=”http://blogs.technet.com/swi/”>Security Vulnerability Research & Defense</a>, provides detailed information about newly discovered vulnerabilites- including screen shots, network traffic captures and other evidence to help demonstrate the flaw or a potential fix. The blog will also address workarounds for […]