Now this is an interesting analysis of password recovery speeds. It compares password length and chars used to the time different computers need to bruteforce the password, ranging from Class A (speed of a pentium 100) to Class F (supercomputers, large scale distribution) computers.
I´ve written about virtual computers before and found a nice way program to make the same method available for virtual software installations. Altiris Software Virtualization Solution lets you install every kind of software in a protected environment that prevents access from this software to your core system. This is great if you want to try out some new alpha / beta software or software that you are suspicious about.
The question that many people ask is why would someone want to surf anonymously in the first place. Why would someone who does not do something illegal want to surf anonymously at all ? I can think of lots of reasons, here are a few:
The guys of darknet.org.uk have posted a new article that lists the 10 best security live cd distros. Each distribution is introduced in a small paragraph and features links to the distributions homepage.
A cert.org guide that helps you configure your web browser for safer surfing. It starts with the question why you should secure your web browser and explains common web browser features like Java, ActiveX and Cookies. After that introduction the important part of the article begins with chapter 3 Vulnerabilities and Attack Vectors. Common vulnerabilities like Cross-Site Scripting, Spoofing and Cross-Zone and Cross-Domain Vulnerabilities. The article does not explain everything in great detail but provides links to a in depth explanation.
Some weeks ago Sony made the attempt to protect the music from some of the cd´s they distribute by adding a rootkit software which would be installed if the user wanted to play the cd on his personal computer. The technique had its flaws and was only working on windows but it still ment that a rootkit was installed on the pc and other scripts could use this rootkit for malicious purposes. After a large outcry from the web community Sony decided to pull the cd´s from the shelves and offer a tool to uninstall the rootkit. (which you would only get through a long process)
Most people tend to use passwords that they can rememeber easily. If you take a deeper look many use the same password for most of their password protected activities which is a high security risk. Break one, get access to all.
Lets assume your system has been hacked. What steps would you undertake after the hacking attempt ? The article written at techtarget.com tries to answer the question and presents a checklist of things to do after being someone hacked into your system. Its more of a checklist for corporate networks than for individual computers but it would not hurt to take a look and probably get some new ideas that you did not think about.
I know that some of you are using a firewall and therefor the home pc firewall guide site might be worth a visit. The website has more sections than I can list here so i stick with some interesting ones and leave the rest to you. To start with a good one, Installig Security Products, a guide on how to install security type software on a new windows operating system.
This guide will provide you with the means to detect and remove spyware that is installed on your system. Before we start we should define the term spyware. There are different categories of spyware, like adware and malware, that make it difficulty for the user to distinguish between them and select the right tool for their removal.
A friend of mine moved to a new house and had to change his internet provider as well. The room with the computer and the one with the phone line were not close to each other and he decided to buy a wireless lan router and use it to connect to the internet.
We had to do a scan of the surroundings of course and found lots of unsecured wireless lan networks. I don´t know why people keep these unsecured, maybe its laziness, maybe they simply don´t know the risks involved. Its like leaving your doors open when you leave your house. Lots of things can happen..
Only a few days ago I wrote a first small article about true crypt and recommended it. Back then I bought a usb 2.0 hard drive with 300 GB capacity and encrypted its entire partition with true crypt. This was done to test the programs functionality but also to see if it would slow down my main computer (athlon 64 3000+, 1 gb ram).
To my great suprise it did not slow down the pc and I decided to expand the encryption to cover all my hard drives. Let me tell you why and how i did this and why you should also be considering this.
After a lot of people told me that I forgot one of the best anti-virus freeware products out there I decided to take a look at Clam Win to get a better judgement on the claims made. The good thing besides that its free is that it´s also Open Source which makes it more transparent than the rest of the free antivirus programs.
Pc Magazine wrote a article with such a long title that I had to cut it to make it fit, the article "Maximum Security: 94 Essential Tips for Staying Safe" has some useful tips for everyone that wants to have a secure as possible computer. They divided the article into several categories, system, networking and wireless, e-mail, Web surfing, malware, and mobile.
You´d probably heard this before. Everyone should secure his personal computer. You read stories like this in every other computer mag, your geeky friends probably tell you the same and even name some programs that you should use because they are the best and most secure. I know that you would like to have a secure computer, well a secured computer, there is nothing like 100% security if you are on a network or the internet. Keep that in mind.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.