Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

microsoft.com

by Kim Komando

April 26, 2006

It used to be, back in that last century, that people wished for a reverse time machine. This would allow them to go back in time after they messed up their computer.

Well, Windows XP has that time machine. And when some awful thing gives your computer the staggers, it's easy to go back to the day before. Or the day before that. Or last week or last month. It's an all-too-often unused feature that may save your bacon someday, called System Restore. Here are four things to know about it.

microsoft.com

by Monte Enbysk

April 26, 2006

Pirates still roam freely in the ocean of software out there, but if your business is among the pirates, it could end up costing you literally and figuratively.

You may very well be a smart, community-minded business owner. But if your company is using pirated software â€" and you condone it, you aren't aware of it or you don't really give a rip â€" you're not a responsible business owner. And you are taking unnecessary risks. No, you're not alone. In the United States, about one-fourth of the software programs used today by businesses are illegal copies, according to the statistics from the Business Software Alliance (BSA), an active industry group. For U.S. small businesses, those with 100 or fewer employees, the piracy rate is even higher: about 40%. While those numbers are bad enough, the piracy problem worldwide is worse â€" although software piracy worldwide has decreased since 1994, some $13.08 billion was still lost in 2002 due to pirated software.

CNET News.com

by Joris Evers

June 1, 2006

Part of the Circuit City Web site was hacked and used in an attempt to install malicious code on PCs of unknowing visitors, the electronics retailer said Thursday.

Cybercrooks were able to break in and modify a home theater message board on Circuit City's Web site, said Bill Cimino, a spokesman for Circuit City of Richmond, Va. Over an approximately two-week period, visitors to the board were subsequently sent to a site in Russia that attempted to install a "backdoor" on their PCs that gives the attackers remote access, he said. Circuit City was made aware of the attack on Thursday by the SANS Internet Storm Center, Cimino said. The company took down the message board, operated by a third party, and is in the process of notifying the 1,000 or so registered users of the online forum, he said. "At this point we think approximately 200 users visited the site while the exploit was active," Cimino said. Those people are registered users of the message board. Circuit City has no data on people who visited the site without being registered, he said.

CNET News.com

by Dawn Kawamoto

June 29, 2006

Security experts warn of two flaws in IE, and in an unusual twist, one of them can be replicated in Firefox.

Two new security flaws have been discovered in Microsoft's Internet Explorer, and one could also affect Mozilla's Firefox, security experts have warned. Code for both the vulnerabilities has been published, but there have been no reports of attacks taking advantage of the flaws , the SANS Internet Storm Center, which monitors network threats, said in an advisory released Wednesday. The flaw that affects both IE and Firefox is related to the handling of a technology that is used to access documents delivered from one Web site to another, according to the advisory.

Debian

July 13, 2006

One core Debian server has been reinstalled after a compromise and services have been restored. On July 12th the host gluck.debian.org has been compromised using a local root vulnerability in the Linux kernel. The intruder had access to the server using a

At least one developer account has been compromised a while ago and has been used by an attacker to gain access to the Debian server. A recently discovered local root vulnerability in the Linux kernel has then been used to gain root access to the machine. At 02:43 UTC on July 12th suspicious mails were received and alarmed the Debian admins. The following investigation turned out that a developer account was compromised and that a local kernel vulnerability has been exploited to gain root access. At 04:30 UTC on July 12th gluck has been taken offline and booted off trusted media.

Washington Post Blog

by Brian Krebs

July 19, 2006

Hacked Ad Seen on MySpace Served Spyware to a Million An online banner advertisement that ran on MySpace.com and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the si

Michael La Pilla, an iDefense "malcode" analyst, said he first spotted the attack Sunday while browsing MySpace on a Linux-based machine. When he browsed a page headed with an ad for DeckOutYourDeck.com, his browser asked him whether he wanted to open a file called exp.wmf. Microsoft released a patch in January to fix a serious security flaw in the way Windows renders WMF (Windows Metafile) images, and online criminal groups have been using the flaw to install adware, keystroke loggers and all manner of invasive software for the past seven months. The Deckoutyourdeck ad launching the WMF exploit.

spidynamics.com

by SPI Labs

July 27, 2006

Imagine visiting a blog on a social site like MySpace.com or checking your email on a portal like Yahoo Webmail. While you are reading the Web page JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects

This scenario is no longer one of fiction.

informationweek.com

by Kevin McLaughlin

August 9, 2006

In the never-ending cat-and-mouse game between hackers and those charged with stopping them, it's pretty clear who's winning--and it's not the cat.

Speaking at the Black Hat conference in Las Vegas last week, Kevin Mandia, president of Mandiant, an Alexandria, Va.-based security consultancy, said attackers are using increasingly sophisticated methods to evade detection and make life difficult for security incident response teams. The sophistication of hackers' tools is outpacing that of investigators' forensic tools, and one of the consequences is that incident response teams charged with investigating attacks on networks are taking between 5 and 8 days to find malicious code, Mandia said. "Malware analysis can be time consuming, and most firms don't want to spend the money to fully analyze the malicious code, which could cause further damage [to the network]," said Mandia.

New York Times

by John Markoff

August 11, 2006

The flaw would make it possible to install malicious programs or to change or delete data.

The Department of Homeland Security issued an unusual security alert yesterday, warning users of Windows-based personal computers to patch a flaw in the Microsoft operating system. On Tuesday, Microsoft issued its monthly list of security flaws, including one that the company rated "critical."

Information Week

by Sharon Gaudin

August 25, 2006

The key indicator is a repeat "problem child" who continually argues with fellow employees, complains about salary or benefits, or is otherwise aggressive or hostile.

Brian Robak, a network security analyst at National Cooperative Bank, used to manage the company's help desk workers back when he was the LAN manager. Being a manager is never an easy chore, but there was one employee who generally made his job a nightmare. A full 80% of people who launch a computer-related attack on their own company's system had been problem employees, according to the Secret Service.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp
Google