Category Archives: Tech Zone
Thousands of Hotmail login credentials stolen
News has broken out that a large number of Hotmail/Windows Live credentials have been stolen and published on the internet. It is not yet clear how these credentials were obtained; however, Microsoft claims it was by means of a phishing …
Keeping your bank accounts safe from cybercriminals
I have dealt with cyber crime in a number of previous posts, such as the 21st Century heists series. This post chronicles a recent event about some of the themes tackled in that series. Finjan has recently released a report about …
DHL Delivery Problem NR.59544
DHL Delivery Problem NR.59544 Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form …
Identity Theft
A while ago I wrote a series of articles about theft in the modern age that provided an in-depth account on how malicious people were stealing using technology in the modern age. I recently came across a very interesting article by Jacqui …
Zero-day flaw in Microsoft Internet Information Service (IIS)
Recent figures put Microsoft IIS as the second most popular web server on the internet, second only to the Apache HTTP Server. It is therefore of no surprise that following the Apache site breach on 28th September ’09, it was …
CSVDE – A Means to Simplify Active Directory Administration (Part 3)
Importing Data from AD In Part 2 we discussed how to export data from a working Active Directory installation. That was the easy part, now the real fun begins as we discuss how to import data to your Active Directory …
No MS09-048 patch for Windows XP and Windows 2000, what to do?
On September 8th Microsoft released its usual set of patches. One particular issue CVE-2009-1926 affects all Microsoft Windows platforms except for Windows 7 and Windows 2008 R2.However Microsoft neglected to issue a patch for the Windows XP and Windows 2000 …
Using a 32bit COM object in a 64bit environment
A while ago I ran into a problem while working on a 64bit application. I needed to use a 32bit COM object in my 64bit application but alas that didn’t work. It seems that by default 32bit COM objects are …
CSVDE – A Means to Simplify Active Directory Administration (Part 2)
In the first article of this series we discussed what CSVDE is and why you should use it. I will now discuss how to export data from Active Directory and how to import it in Microsoft Excel using CSVDE as well …
Twitter Security Flaw
The Vulnerability Threat Social networking sites, such as Twitter, are nowadays a leading target for hackers. The reason is simple… such sites have large user-bases; by infecting a social networking site, attackers can get to a whole lot of users… …









