Researchers at Rice University have discovered what they say is a flaw in the beta version of Google's Desktop Search product that could allow third parties to access users' search result summaries, providing a sneak peek at part of the content of personal files
and it isn't the first one, so give google some more time developing it and do not install it untill they have got their act together
Dialup Users Broadband users
Antivirus installed 84% 86%
Firewall installed 7% 51%
Parental controls 16% 4%
Virus infected 25% 15%
Spyware/adware 88% 74%
watch the news tomorrow or tuesday, this guy is behind a important initiative to get a safer internet for the simple users in Belgium
and if the press doesn't report it, well, i've tried and I can only hope everybody can help to get it starting
a baby is born, shown, ready to grow http://www.veiligecomputer.be
more in the coming weeks
and if you didn't already do these things, you still have ...... euh 48 hours
do today what should be done by tomorrow because you didn't do it yesterday
and he is right
firstly as a word (even something that is a combination of letters and numbers and people won't remember and change to something more stupid). It is better to take a phrase.
secondly as a principle. http://blogs.zdnet.com/Ou/index.php?p=21 because even the password protection in vpn and wireless connections with pptp is gone with the release of a new tool. ASLEAP
sure you want to have wireless ? In the flemish parliament there is a e-mama dreaming about it...... maybe someone should hack here webcam..... so she will think about security first.
there it goes again - every time we thought we were safe some-one somewhere gets done what is supposed to be not possible and scares the hell out of us and let us go scrambling searching for a solution for a problem we thought we had solved
new techniques to crack WEP encryption make it now very easy to crack the WEP encryption that is used in wireless networks and of which the sales- and technical persons told you that it was as safe as it could become because it would need an enormous lot of resources and time from the hacker to crack this. But many organisations haven't migrated because that would ask some investment and they aren't obliged to secure their networks, so why should they invest.
Prefer to uncover IM & P2P use with a self-assessment? Download RTMonitor™, our FREE network utility tool designed to detect all real-time communications activity within corporate networks. With RTMonitor you’ll receive a comprehensive report detailing who’s using IM, P2P and VoIP on your network http://www.facetime.com/forms/assessment_request.aspx?req...
You will also find some papers about IM and P2P policies
cut the sales crap. Just block it dead if you don't have a security team that has too much time on its hands and doesn't know what to do....