Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

 Title   Date   Author   Host 


by Joris Evers

June 1, 2006

Part of the Circuit City Web site was hacked and used in an attempt to install malicious code on PCs of unknowing visitors, the electronics retailer said Thursday.

Cybercrooks were able to break in and modify a home theater message board on Circuit City's Web site, said Bill Cimino, a spokesman for Circuit City of Richmond, Va. Over an approximately two-week period, visitors to the board were subsequently sent to a site in Russia that attempted to install a "backdoor" on their PCs that gives the attackers remote access, he said. Circuit City was made aware of the attack on Thursday by the SANS Internet Storm Center, Cimino said. The company took down the message board, operated by a third party, and is in the process of notifying the 1,000 or so registered users of the online forum, he said. "At this point we think approximately 200 users visited the site while the exploit was active," Cimino said. Those people are registered users of the message board. Circuit City has no data on people who visited the site without being registered, he said.

by Monte Enbysk

April 26, 2006

Pirates still roam freely in the ocean of software out there, but if your business is among the pirates, it could end up costing you literally and figuratively.

You may very well be a smart, community-minded business owner. But if your company is using pirated software " and you condone it, you aren't aware of it or you don't really give a rip " you're not a responsible business owner. And you are taking unnecessary risks. No, you're not alone. In the United States, about one-fourth of the software programs used today by businesses are illegal copies, according to the statistics from the Business Software Alliance (BSA), an active industry group. For U.S. small businesses, those with 100 or fewer employees, the piracy rate is even higher: about 40%. While those numbers are bad enough, the piracy problem worldwide is worse " although software piracy worldwide has decreased since 1994, some $13.08 billion was still lost in 2002 due to pirated software.

by Kim Komando

April 26, 2006

It used to be, back in that last century, that people wished for a reverse time machine. This would allow them to go back in time after they messed up their computer.

Well, Windows XP has that time machine. And when some awful thing gives your computer the staggers, it's easy to go back to the day before. Or the day before that. Or last week or last month. It's an all-too-often unused feature that may save your bacon someday, called System Restore. Here are four things to know about it.

by Kim Komando

April 26, 2006

You should know this by now: Computers can and do fail. And nasty viruses can take down your system by creeping through your antivirus software and firewall.

The problem is that you usually get no warning before it's too late. Puff! Your data is gone. This has happened to more than a few businesspeople. In extreme cases, it has put companies out of business. And the worst part is this: It's completely avoidable. By backing up your data, you can retrieve all or most of what you lose. Yes, yes, I hear some of you snickering about the hassle involved. Indeed, there is a hassle involved. But you owe it to yourself -- and your business -- to take stock of your backup plan (or lack thereof) by reviewing these tips.

USA Today

by Byron Acohido and Jon Swartz

April 24, 2006

From his home in Downey, Calif., the then-19-year-old high school dropout controlled thousands of compromised PCs, or "bots," that helped him earn enough cash in 2004 and 2005 to drive a souped-up 1993 BMW and spend $600 a week on new clothes and car part

But Ancheta got caught. In the first case of its kind, he pleaded guilty in January to federal charges of hijacking hundreds of thousands of computers and selling access to others to spread spam and launch Web attacks. In separate cases, federal authorities last August also assisted in the arrest of Farid Essebar, 18, of Morocco, and last month indicted Christopher Maxwell, 19, of Vacaville, Calif., on suspicion of similar activities. The arrests underscore an ominous shift in the struggle to keep the Internet secure: Cybercrime undergirded by networks of bots " PCs infected with malicious software that allows them to be controlled by an attacker " is soaring.


by Richard Martin

March 15, 2006

For the first time, researchers have raised the possibility of RFID tags being infected by viruses and worms.

In a paper being presented today at the Pervasive Computing and Communications Conference in Pisa, Italy, sponsored by the Institute of Electrical and Electronics Engineers Inc. (IEEE), a group of computer scientists show just how susceptible radio-frequency tags may be to malware. "Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify backend software, and certainly not in a malicious way," the paper's authors write. "Unfortunately, they are wrong."


by Ingrid Marson

December 29, 2005

Sony BMG has struck a deal with the plaintiffs in a class action lawsuit over copy-restriction software it used in music CDs, according to a settlement document filed at a New York court Wednesday.

The record label has agreed to compensate buyers of CDs that contained the XCP and MediaMax DRM programs and to provide software utilities to allow consumers to uninstall both types of software from their computer. The furor over Sony's DRM software began at the end of October when a U.S. programmer discovered that XCP software on a Sony music CD had installed copy-restriction software on his computer that was hidden using a rootkit. Antivirus companies later discovered Trojan horses that exploited this software to avoid detection and found that another type of Sony DRM, MediaMax, also posed a security risk.

The Register

by John Leyden

December 23, 2005

Critical Symantec bug hits 40 products

A flaw affecting many Symantec security products - both consumer and enterprise - has been discovered. Users of Symantec's Norton Internet Security 2005, Norton AntiVirus 2005, Norton Antivirus for Macs, corporate anti-virus apps and Brightmail anti-spam software (among others) all need to apply patches following the discovery of the "critical" security bug. In all 40 packages are affected. The vulnerability stems from a flaw in an library component (called Dec2Rar.dll) involving the processing of RAR archives. This vulnerability can be exploited as a means to inject hostile code onto vulnerable systems when a malicious RAR file is scanned. The flaw affects Dec2Rar.dll version and potentially hits all Symantec products that use the library file, hence the large number of affected packages.


by Dawn Kawamoto

December 23, 2005

A Santa Claus worm is attempting to trick America Online, Microsoft MSN and Yahoo instant-messaging users into clicking on a file that delivers unwanted software to a victim's computer.

The IM.GiftCom.All worm attempts to dupe IM users into thinking an acquaintance has sent them a link to a harmless Santa Claus file, according to a security advisory issued Tuesday by IMlogic. People who click on the file will see an image of Santa, but what they are less likely to notice is a so-called rootkit being installed onto their system. A rootkit is a tool designed to go undetected by the security software used to lock down control of a computer after an initial hack. The malicious attacker can then distribute messages to the user's IM contacts, using a similar technique to lure the unsuspecting acquaintance to click on the link.


by Ryan Naraine

December 23, 2005

A private security researcher publishes a proof-of-concept exploit for a potentially serious bug in Apple's popular iTunes and QuickTime media players.

A heap overflow vulnerability in Apple Computer Inc.'s iTunes and QuickTime media players could put millions of PC and Mac users at risk of malicious hacker attacks, security experts warned Wednesday. In an advisory posted on, researcher Tom Ferris warned that attackers can rig QuickTime movie files to trigger a denial-of-service crash that may lead to malicious code execution. In an interview with eWEEK, Ferris said he flagged the issue to Apple more than a month ago but only received a cursory confirmation that the bug was being investigated. As per policy, Apple does not comment on security issues until a patch is available.


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options.