Category Archives: Tech Zone
Protecting against Money Theft
Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars. Brian Krebs …
Security vs. Productivity in the Workplace
Conventional wisdom has always told us that when it comes to deciding what users should be allowed to do, the correct choice would be to allow access only to what they need to do, or more accurately, to allow the …
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?
A very annoying occurrence that I sometimes suffer is when all of a sudden the copy and paste function stops working when I am connected to a remote machine. Turns out the problem is coming from a little process called …
The Dangers of Social Networking
Social sites such as Facebook and MySpace are a big hit nowadays; not just with the young generation but with people of all ages. It’s an amazing platform for people to connect but it certainly isn’t without its dangers. As …
Into uncharted territory
I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …
Vulnerability Related Standards
Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …
Could Cross Platform be used as a means of redundancy?
I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …
The SVN recovery story
So it happened that the disk hosting our code repository developed some bad blocks. Must be contagious or something, this is already the third system within a month… I noticed this, when I received some strange messages from cron. Basically …
Facebook, Facebookhealth and the rogue AntiVirus application
A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however …
Disk failing, what now?
A disk can, and will, develop bad blocks during its lifetime. Usually the disk firmware is good enough in recognizing failing blocks, before they become unrecoverable and remap them, but nothing is perfect and problems happens. In that case, where …









