Category Archives: Security

Creating an Encrypted Disk Image in Snow Leopard

Creating an encrypted image from existing data copies the data from an unprotected area to the encrypted image.

If you must maintain data confidentiality when transferring files from your computer but you don’t need to encrypt files on your computer, create a encrypted disk image from existing data. Continue reading

Posted in business, Macintosh, Security | 6 Comments

Creating Encrypted PDFs in OS X 10.6

You can quickly create password-protected, read-only PDF documents of confidential or personal data Continue reading

Posted in business, Macintosh, Security | Leave a comment

ikee worm & how to change your root ssh password for your Jailbroke iPhone

Presently it appears that the worm does nothing more malicious than spread and change the infected user’s lock screen wallpaper. Continue reading

Posted in Security | Tagged , , | 1 Comment

Audit your Linux box with Lynis

Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. Continue reading

Posted in Linux, Open source, Security | Tagged , , , , , | Leave a comment

Hacked Facebook applications reach out to exploit sites in Russia

http://www.daniweb.com/news/story231627.html# http://thompson.blog.avg.com/2009/10/hacked-facebook-applications-reach-out-to-exploit-sites-in-russia.html Hi folks, All the social networking sites have issues with calling out to exploit pages. Usually what happens is that someone’s website gets hacked, and because they link to it from their MySpace or Facebook page, their contacts … Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

A look at some of the ways hackers use social networking tools to gain access to victims’ systems

Great article from Computerworld http://www.computerworld.com/s/article/343900/How_Hackers_Find_Your_Weak_Spots?taxonomyId=16 Computerworld – While there are an infinite number of social engineering exploits, typical ones include the following: Stealing passwords: In this common maneuver, the hacker uses information from a social networking profile to guess a … Continue reading

Posted in Security | Leave a comment

Bootkits, What is Bootkit and why should it concern you?

Before the days of mass inter-connectivity “before everyone was connected to the internet”, malicious code traveled on portable storage media, like a CD-ROM or floppy disk. The malware, usually a virus hidden in the boot sector of a disk, acted … Continue reading

Posted in Linux, Security, Windows | Tagged , , , , , , , | 5 Comments

P2P information gathering…. What your computer can reveal about you.

How to get Pwnd’ with P2P networks. P2P networks… and you thought that there was just music on there? Information is the key to everything, with enough information anyone can do anything. I am not going to tell you how … Continue reading

Posted in Security | Tagged , , , | Leave a comment

Does your mac really need and anti-virus?

Are you new to the Macintosh, just recently switched from PC to Mac; do you really need an anti-virus? One thing you should pay attention to is what you are doing with your computer. Do I download software, music, and … Continue reading

Posted in Macintosh, Security | Tagged , , , , , | Leave a comment