Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

CNS News

January 31, 2013

A British court has sentenced a teenage hacker to youth rehabilitation after he and other members of the Anonymous movement carried out cyber-attacks targeting financial sites like PayPal and Visa.

Jake Birchall had admitted conspiring to impair the operation of computers in 2010 and 2011. The 18-year-old Birchall was sentenced Friday to 18 months of rehabilitation and 60 hours of unpaid work. Three other co-defendants, aged 22 to 28, were given jail sentences of up to 18 months last week for their part in the attacks. They targeted groups involved in combating Internet piracy and companies that had stopped processing online donations to WikiLeaks.

redkestrel.co.uk

January 29, 2013

What is a CSR? A Certificate Signing Request (CSR) is a message sent to a Certification Authority (CA) to request a public key certificate for an entity, where the entity is the subject of the certificate, for example a web server.

The CSR is typically generated by the software that requires a certificate; most web servers, for example, are able to generate CSRs. Before a CSR can be created, however, the software creating the CSR must generate a key pair; the key pair comprises a public and private key. The public key is bundled with the subject's name, and other information to form the CSR. The private key is used to sign the CSR and should be stored securely The most widely used format for CSRs is defined by RSA in the PKCS#10 specification. Another, far less common CSR format is the Signed Public Key and Challenge (SPKAC), which was defined by Netscape for use inside their browsers. Unless otherwise stated, this FAQ describes the PKCS#10 CSR...

blog.sucuri.net

January 23, 2013

There are many ways to inject a malicious payload onto a website. The attacker can modify any of the web files (index.php for example), the .htaccess file or php.ini (if the site is using PHP).

There are other ways, but those are the most common methods, specially on shared hosts. However, for the last year, we started to see a new way to inject malware on compromised servers via a malicious Apache module. We posted about it before and it has been covered on many other mediums. After a few months of tracking them, and working on multiple servers that had this issue, we want to share a bit of what we have learned.

CNS News

January 23, 2013

Federal authorities in New York say they've brought criminal charges against three people in connection with a computer virus that infected more than a million computers worldwide.

The authorities said Wednesday that NASA computers were among those infected by what was labeled the "Gozi Virus." Authorities say they believe the three people who are charged created and distributed the virus.

CNS News

January 23, 2013

British regulators have fined Sony 250,000 pounds ($396,100) for failing to prevent a 2011 cyberattack on its PlayStation Network which put millions of users' personal information - including names, addresses, birth dates and account passwords - at risk.

Britain's Information Commissioner's Office said Thursday that security measures in place at the time "were simply not good enough." It said the attack could have been prevented if software had been up to date, while passwords were also not secure. David Smith, deputy commissioner and director of data protection, acknowledged that the fine for a "serious breach of the Data Protection Act" was "clearly substantial" but said that the office makes "no apologies" for that.

CNS News

January 23, 2013

Belkin, a maker of smartphone cases and computing accessories, said Thursday that it is buying the home networking business unit of Cisco, including the Linksys router brand.

Privately held Belkin, based in Playa Vista, Calif., did not disclose the purchase price, nor did Cisco Systems Inc. The deal is expected to close in March. Belkin intends to maintain the Linksys brand, as well as honor warranties on current and future Linksys products. The company said that after the acquisition, it will account for about 30 percent of the U.S. retail home and small-business networking market.

openoffice.org

January 21, 2013

Java is required for complete OpenOffice (OpenOffice.org) functionality. Java is mainly required for the HSQLDB database engine (used by our database product Base) and to make use of accessibility and assistive technologies.

So what does this imply for me? Base (the database component) relies completely on Java technologies to run, but other programs (like Writer, Calc and Impress) only need Java for special functionality. If you do not need to use Base and do not want to use any of the Wizards, then you do not need to have Java installed and configured for running Apache OpenOffice (and older versions of OpenOffice.org). You can completely prevent OpenOffice from prompting you about the use of Java by telling OpenOffice not to use a Java runtime environment (JRE). From the OpenOffice main menu use: Tools -> OpenOffice.org -> Java, and uncheck "Use a Java runtime environment". However, we do recommend that you have a Java Runtime Environment on your system to take full advantage of OpenOffice's features without any issues. Legacy versions of OpenOffice.org (3.3 and below) included a JRE packaged with the download. The latest Apache OpenOffice 3.4.1 does not.

wprealm.com

January 17, 2013

Per Soderlind recently alerted me to a rather important security issue regarding plugins hosted outside of WordPress.org.

All WordPress.org hosted plugins receive plugin updates from WordPress.org. Commercial plugins often add scripts to provide plugin updates from other sources*, but the vast majority of plugins simply go without automatic updates at all. Now, imagine a scenario in which you create a custom plugin, but someone with malicious intent registers a plugin with the exact same name and slug as yours with the WordPress.org repository. It is conceivable that you or someone else working on the site could accidentally hit the "update" button and be immediately infected by a malicious plugin launched to attack your site from WordPress.org itself.

CNS News

January 14, 2013

Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of Homeland Security last week.

Even after the patch was issued, the federal agency continued to recommend that users disable Java in their Web browsers. "This and previous Java vulnerabilities have been widely targeted by attackers, and new Java vulnerabilities are likely to be discovered," DHS said Monday in an updated alert published on the website of its Computer Emergency Readiness Team. "To defend against this and future Java vulnerabilities, consider disabling Java in Web browsers until adequate updates are available."

Fox News

January 12, 2013

The U.S. Department of Homeland Security is advising people to temporarily disable the Java software on their computers to avoid potential hacking attacks.

The recommendation came in an advisory issued late Thursday, following up on concerns raised by computer security experts. Experts believe hackers have found a flaw in Java's coding that creates an opening for criminal activity and other high-tech mischief.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp AddThis Social Bookmark Button
Google