|
|
|
|
|
|
|
|
|
McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
Using Google's search index has a tool, McAfee has launched SiteDigger 2.0, a utility designed to locate human error information vulnerabilities that can show up in search engines. SiteDigger checks for errors against 7 defined categories, ensuring data leaks are kept to a minimum. The categories that SiteDigger checks in order to protect site privacy are: back-up files, configuration mistakes, remote administrator interface, error messages, public vulnerabilities, and technology profile.
|
|
|
|
|
|
|
|
Troy-horses infects Windows Media files?
Video files appear that download malicious application when they are run. These files are .wmv files infected by Trj/WmvDownloader.A and Trj/WmvDownloader.B, two Trojans that take advantage of a new technology incorporated in Microsoft Windows Media player to install spyware, adware and dialers, as well as computer viruses. PandaLabs has detected the appearance of two new Trojans, Trj/WmvDownloader.A and Trj/WmvDownloader.B, which are spreading through P2P networks in video files.
|
|
|
|
|
|
|
|
IDC: 3 future technologies
According to IDC's recently published research, we have top 3 technologies for the Information and Communications Technology (ICT) market. "The current ICT industry structure is inefficient and highly fragmented with numerous players competing in each market segment. At the same time, disruptive innovations continue to shift and re-define competitive markets. Given the imminent pressures on profits due to a combination of moderating industry growth worldwide, and intense global competition, industry consolidation will accelerate over the coming years as the industry...
|
|
|
|
|
|
Windows XP SP2 Firewall shows your files and printers to every Internet user
After you set up Windows Firewall in Microsoft Windows XP Service Pack 2 (SP2), you may discover that anyone on the Internet can access resources on your computer when you use a dial-up connection to connect to the Internet. For example, after creating an exception in Windows Firewall for File and Printer Sharing, you may discover that anyone can access shared files and printers.
|
|
|
|
|
|
|
|
|
|