View RSS Feed

Recent Blogs Posts

  1. VB Script to set Java security level to medium

    by , 28th October 2013 at 03:45 PM
    Long story short, Java started including an expiration timer on JRE releases. So many days after a release, regardless of update settings, a dialog will start popping up asking the user to update. This really isn't an issue, but with it JRE will stop running unsigned code. Many sites that my teaching staff have come to rely on have unsigned Java apps, and keeping over 500 frozen wireless laptops up to date every time a new version of JRE is released isn't really feasible. So enters VB script ...
    VB Script
  2. Password Security Tips From a Hacker

    by , 12th July 2013 at 04:02 PM (Nervepoint Technologies)
    It's amazing just how easy it is to crack passwords these days, Nate Anderson from ArsTechnica a self confessed script-kiddie shows in his article just how easy it was to crack 4,000 passwords in the space of a minute!

    We all know how to build complex passwords:

    • Include mixed cases, letters, number, symbols
    • Change passwords regularly
    • Avoid names especially of people you know
    • And don't repeat old passwords

    All the things you would find ...
  3. EcoSplash / ShowerSaint

    , 5th November 2011 at 01:35 PM (100 Grades Per Minute)
    Just had this rubbish through the door in postcard format:

    Your request for an EcoSplash has been received. (No, We never sent a request!)

    If you don't require it contact us on... (Stop there. We didn't order one so no!)

    You will need to give us your address so that we can remove your details (And confirm I am an idiot? No thanks!)

    For more information visit... (Doesn't even appear in Google searches and the WHOIS points to a marketing

    Updated 9th December 2011 at 09:27 PM by CAM

  4. Malware - How It Works

    , 20th May 2011 at 07:58 PM (100 Grades Per Minute)
    With the recent spotlight on malware and computer security I want to share some of the tricks I have discovered whilst reading up on it. And yes, some of these can affect multiple platforms (Windows/OSX/etc).

    Google Image Poisoning: The act of using Google Image Search to trick users into visiting infected pages. Images related to popular topics on Twitter or the news are pushed high up the ranks of searches relating to that topic. Victims search for said topic in their droves, click ...
  5. Breaking In - Literally

    , 10th April 2011 at 02:05 AM (100 Grades Per Minute)
    A program called Breaking In is being launched in America and it is the IT world's equivalent of CSI. the show follows a fictional IT team breaking into museums, nicking cars and doing other things that real security researchers likely don't do as part of their day to day affairs. The producers even created a Flash game for people to play around in and supposedly "hack" by guessing a password.

    Unfortunately for the show's marketing team, one user responded to the Naked Security blog post ...

    Updated 10th April 2011 at 02:30 AM by CAM

    Technical , Amusement
  6. Facebook: Sure You Are Secure?

    , 18th March 2011 at 01:02 AM (100 Grades Per Minute)
    Facebook profiles have become a bit of a commodity these days for crooks looking to cash in on unsuspecting members of the public. From spam messages to social engineering scams, the holy grail for any attacker is open access to a person's profile. From here, they can capture details about a person's private life along with their family, friends, business contacts and everything they require to pull the perfect scam.

    On the same note I paid a visit to the Apple Store in London today ...

    Updated 18th March 2011 at 01:06 AM by CAM

  7. Banning Ipods, Blackberries, Androids, home laptops from your School network

    , 10th November 2010 at 12:54 PM
    I recently had a problem where we were running low on IP addresses. I looked in DHCP and had about 655 active leases over the last 7 days. Now I'm pretty sure I don't have that many devices in the entire school! It turns out that there were a large amount of IPhones and other unauthorized mobile devices attached to our wireless. I guess the kids managed to find out the wireless key again!

    Anti-Virus Software-iphone7-copy.jpg

    There are a number of solutions to this problem, ...
    Tags: ban, dhcp, security