Category: Cybersecurity


  • Great day for computer security stories… a virus pretending to be a Microsoft patch Kazaa and Morpheus programs can reveal username and hostname more hacking into Hotmail Apache with SQL flaws smugglers caught transporting encryption devices to China (sooooo illegal). – – – – – Interesting… wonder if our students are targetted for identity theft? –…

  • SirCam

    ,

    Only 800+ emails to download this morning. Lots of SirCam attachments to disinfect and deduce the owner’s real identity. Another 200+ instances of computers looking at mine without permission over the weekend (reinstalled ZoneAlarm since Tiny Firewall let everything through unless I told it not to allow it). – – – – – Funny… Someone sends me…

  • 2 possibilities: CP 2.2.1 is more stable than 2.1.1 or Joe has been hiding the crashes. Hopefully the former. 2.1.1 rarely made it over 2 weeks without at least 1 crash. 2.2.1 has gone at least 2 weeks so far. There is another “helpful” virus on the scene…TROJ_ALLGRO.A. This one sends and attachment tells you it…

  • Our new leather chairs are almost here. Okay, so we are geeky. They have more options and adjustments than a calculator. Can you tell I am excited?!?! Whipped up another web page on the President Bailey’s retirement. This one is about how he is not going anywhere until the presidential search concludes. This is just disturbing… If…

  • Graduate Catalog is up. Now for Undergraduate Catalog update, Evening Program updates, and some PHP research. – – – – – Auuuggghghhhh!!! Ran across a guestbook where all they talked about was the author’s period?!?? – – – – – Damn… thought this virus was pretty much stamped out!?! Just got one. Today, Snowhite was turning 18.…

  • Here is an extortion letter from a hacker to a company. So he figures out how to break into the system, sends a letter to the company that the vulnerabilities of the company are known to the hacker community, and wants $$$ to help fix the vulnerabilities. Sick

  • What kind of password do you use? Your own name? A family member’s name? Your favorite sports star or actor? Tsk, tsk, tsk. Here is a SecurityWatch article on a poll in the U.K. which asked people about what password they use on their PC or laptop. – – – – – Such low amounts of…

  • Great article on secure use of email titled Secure Online Behavior, Part II: Secure E-Mail Behavior over at the SecurityFocus site. It discusses the types of email clients and some potential problems, how to create passwords, and how to handle attachements. Seems clear and concise. This seems a little overboard. What authentication method does Microsoft use with MSN…

  • The remnants of Tropical Storm Allison was good to us last night. 8 to 9 inches of rain. So what if most of it ran off, a place that felt as dry as we did needed the precipitation. Two scam artists for the price of one? Lesson one: Get rich quick schemes make the other…