Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

 Title   Date   Author   Host

by Sam Gustin

January 15, 2014

The FCC faces tough policy choices after a federal court struck down key aspects of the agency's open Internet rules

Open Internet advocates suffered a stinging defeat on Tuesday when a federal court struck down rules designed to prevent the nation's largest broadband service providers from charging content companies for access to Internet "fast lanes." The ruling, which was expected, is a blow to the Federal Communications Commission's ability to enforce "net neutrality," the principle that Comcast, Verizon, and AT&T shouldn't be able to favor certain Internet services at the expense of rivals. As a practical matter, the ruling by the United States Court of Appeals for the District of Columbia means that the broadband giants are now permitted to charge Netflix, Amazon and other streaming services for access to faster broadband speeds.


October 10, 2013

An Illinois man has developed a Gmail browser extension designed to randomly insert fake, nonsensical stories into the signature of every email one sends to confuse the NSA's surveillance operations.

Benjamin Grosser says "ScareMail" takes keywords from an extensive US Department of Homeland Security list used to troll social media websites and utilizes them "to disrupt the NSA's surveillance efforts by making NSA search results useless." The buzzwords include the likes of "Al-Qaeda" and "Al-Shabab," yet also more mundane terms like "breach," "threat," "death" and "hostage," among many others. Documents released by former National Security Agency contractor Edward Snowden revealed that the NSA uses the "selector" terms to sift through Internet data it collects via a tool known as "XKEYSCORE."

CNS News

October 19, 2011

The YouTube channel for "Sesame Street" is expected to be back online shortly after hackers forced its shutdown by loading X-rated material.

Pajamas Media

by Rob Taylor

October 8, 2011

The hacker collective is far more evil than you ever imagined.

It was in 2008, during their inappropriately celebrated "War on Scientology," that the hacker collective known as Anonymous first began using the phrase "We are Legion" in their communiques. Not being a Christian myself, it is usually hard for me to get too worked up over this sort of ham-fisted, pop-culture pseudo-Satanism. In most cases it is window dressing designed to distract people from the vapid and lazy "thought" that too many young people think is provocative. With Anonymous however, it's different.

by Patrick Howley

January 17, 2014

The man formerly known as "The World's Most Wanted Hacker" told Congress that the Obamacare enrollment website clearly "did not consider security as a priority."

"It would be a hacker's wet dream to break into," said Kevin Mitnick, once the world's most wanted cybercriminal and now a top cyber security consultant, in written testimony before the House Science, Space and Technology Committee. "After reading the documents provided by David Kennedy that detailed numerous security vulnerabilities associated with the web site, it's clear that the management team did not consider security as a priority," Mitnick wrote.

Commtouch Cafe

by Avi Turiel

October 28, 2012

Sometimes the "other side" uses a neat trick that seems so obvious. In these cases we think "they must have done this before" - then we search the archives (Google) for proof that it has indeed been used before.

A good example is our post from last year where we documented the abuse of the HTML textarea tag. We received several responses informing us that it wasn't a new trick - but no one could actually remember having seen it used anywhere. So with this in mind, we present today's obvious malware trick - that seems new but may have been used before... The email doesn't include much text - simply asking that you "Pay attention at the attach."

by Liam Eagle

November 8, 2011

Registries offering the soon-to-be launched adult-focused .xxx top-level domain began the land rush period on Tuesday.

The .xxx domain was a long time in development, facing opposition from adult industry proponents who expressed concern that their business and their websites could be "ghettoized" by the domain, and that the existence of a .xxx domain in the first place - with the rules that accompany it - implicitly suggest that the online adult industry was not capable of policing itself.

by Nicole Henderson

September 6, 2011

As of Wednesday, the sunrise period for .XXX domain registration begins. The Sunrise A and Sunrise B period will run until October 28, 2011.

The distinction between Sunrise A and B is that Sunrise A gives trademark holders in the adult community the opportunity to secure their trademark .XXX domain names. On the other hand, Sunrise B is for non-adult companies to claim trademark names for the registry to not give out to others and block it from a .XXX domain for 10 years. Sunrise B is for companies to protect their brands from being registered with non-related content. ICANN approved the .XXX TLD in March, and will register the domain with the ICM Registry.

September 21, 2010

On September 19th and 20th, over 600 sites, mainly in Malaysia and Indonesia, were temporarily listed by Google as potentially harmful. The roll call of sites affected include many of Malaysia's major online media sites...

by Ericka Chickowski

August 7, 2013

Cyber criminals often go after your enterprise data by preying on your end users. Here are ten of the most current exploits to watch for

With so much of today's business conducted via the Web -- on so many types of devices -- cybercriminals smell blood in the water. Employees share more information than ever and connect to more outside networks than ever, making them subject to the threats posed by opportunistic attackers. Every day, criminals devise new malware and social engineering attacks that target what has become an organization's weakest link: end users and their Web-connected devices. Here are the most common attack methods and social engineering techniques, and ideas on how to stop these attacks before they infect end user devices and work their way into your corporate data.


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options.