background preloader

News/Tips

Facebook Twitter

Malware Protection Center. Deactivating botnets. Botnets are networks of compromised computers that are controlled remotely and surreptitiously by one or more cyber criminals.

Deactivating botnets

Botnets are attractive to these individuals for two reasons: botnets are easy to hide behind and botnets make a lot of money for the botnet controller, or bot-herder. By harnessing the processing power, storage, and bandwidth of personal and business computers, bot-herders can generate vast amounts of spam, launch attacks against large websites, commit online advertising fraud, and more.

Tracing the origin of an attack only leads back to the hijacked computer of an innocent user, where the trail ends. The impact of botnets is huge. According to Microsoft's Security Intelligence Report volume 9: Microsoft cleaned more than 6.5 million computers of botnet infections in 2Q 2010—double the number for the same period a year before. Botnet Protection. Featured Intelligence. Managing Risk. Addressing threats and risks requires a concerted effort on the part of people, organizations, and governments around the world.

Managing Risk

Microsoft has a number of suggestions to prevent harmful actions from malware, breaches, and other security threats and to detect and mitigate problems. Global Threat Assessment. BotnetInAction_large.jpg (JPEG Image, 727x936 pixels) - Scaled (73%) Infographic_large.jpg (JPEG Image, 1200x800 pixels) Create Strong Passwords. Videos. NebuAD, Inc blocked every 4 minutes - Storageforum. I Can Stalk U - Raising awareness about inadvertent information sharing - Iceweasel. How are you doing this?

I Can Stalk U - Raising awareness about inadvertent information sharing - Iceweasel

That's easy. Metadata Metadata In short, metadata is more data about data. In most common document types, embedded within a file is more information, typically hidden from casual viewing. In the case with many popular image/picture formats, the list of possible metadata is quite extensive. The metadata in images is often retained by default by desktop image processing software and many online photo storage websites.

About Geotagging The storage of location based data, in the form of Latitude and Longitude inside of images is called Geotagging; essentially tagging your photograph with the geographic location. However, most modern digital cameras do not automatically add geolocation (Latitude and Longitude) metadata to pictures. There is a large exception to this rule: Smartphones. Fwix is geotagging the entire Internet, here's more about this API - YouTube - Iceweasel. OIT Security Services - Iceweasel. Geotagging+still+active+when+disabled%fbi - Dogpile Web Search - Iceweasel. #Beginner - IRC Glossary, IRC Terms and Definitions.

IRC Information .....

#Beginner - IRC Glossary, IRC Terms and Definitions

IRC Glossary - Definition of Terms Everything you ever wanted to know but didn't know who or what to ask :) Address The numerical location of a web site. Example: 206.103.179.190. Alias The process of typing a shortcut to play a line to channel or chat window. Clones and Flooders and Warbots, Oh My! Presents By Dennis Holmesdholmes@email.rahul.net Most IRC users who have been around even a little while have encountered IRC abuse or seen its effects on other channels and users.

Clones and Flooders and Warbots, Oh My!

Here we'll discuss a little about the different types of abuse and what you can do to protect yourself and prevent future occurences. Types of Abuse. WWW2. Greasespot. Userscripts.org: Power-ups for your browser. Welcome. Chat with Your Friends through ms dos Command Prompt - StumbleUpon. -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....!

Chat with Your Friends through ms dos Command Prompt - StumbleUpon

@echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. The Hacker Crackdown - StumbleUpon. Research. NSA creates partnership with North Carolina State University New Laboratory Focuses on Big Data Analysis NSA Announces 2013 Best Scientific Cybersecurity Paper Competition Our vital research program focuses on four critical goals: We develop the means to dominate the global computing and communications network.

Research

We cope with the overload of information in our environment and turn that overload to our strategic advantage. Botnet Operation Disabled. Thieves tracked keystrokes on two million infected computers to steal users' information.

Botnet Operation Disabled

In an unprecedented move in the fight against cyber crime, the FBI has disrupted an international cyber fraud operation by seizing the servers that had infected as many as two million computers with malicious software. Botnets are networks of virus-infected computers controlled remotely by an attacker. They can be used to steal funds, hijack identities, and commit other crimes. Welcome to the CIA Web Site. L34K5 Everywhere ! Will your computer's "Secure Boot" turn out to be "Restricted Boot"? — Free Software Foundation — working together for free software - Iceweasel. To respect user freedom and truly protect user security, computer makers must either provide users a way of disabling boot restrictions, or provide a sure-fire way that allows the computer user to install a free software operating system of her choice.

Will your computer's "Secure Boot" turn out to be "Restricted Boot"? — Free Software Foundation — working together for free software - Iceweasel

Microsoft has announced that if computer makers wish to distribute machines with the Windows 8 compatibility logo, they will have to implement a measure called "Secure Boot. " However, it is currently up for grabs whether this technology will live up to its name, or will instead earn the name Restricted Boot. Please sign our statement to show your support! When done correctly, "Secure Boot" is designed to protect against malware by preventing computers from loading unauthorized binary programs when booting. In practice, this means that computers implementing it won't boot unauthorized operating systems -- including initially authorized systems that have been modified without being re-approved. Windows 7 Sins — The case against Microsoft and proprietary software - Iceweasel.