Long story short, Java started including an expiration timer on JRE releases. So many days after a release, regardless of update settings, a dialog will start popping up asking the user to update. This really isn't an issue, but with it JRE will stop running unsigned code. Many sites that my teaching staff have come to rely on have unsigned Java apps, and keeping over 500 frozen wireless laptops up to date every time a new version of JRE is released isn't really feasible. So enters VB script
It's amazing just how easy it is to crack passwords these days, Nate Anderson from ArsTechnica a self confessed script-kiddie shows in his article just how easy it was to crack 4,000 passwords in the space of a minute!
We all know how to build complex passwords: Include mixed cases, letters, number, symbolsChange passwords regularlyAvoid names especially of people you knowAnd don't repeat old passwords
All the things you would find
Just had this rubbish through the door in postcard format:
Your request for an EcoSplash has been received. (No, We never sent a request!)
If you don't require it contact us on... (Stop there. We didn't order one so no!)
You will need to give us your address so that we can remove your details (And confirm I am an idiot? No thanks!)
For more information visit... (Doesn't even appear in Google searches and the WHOIS points to a marketing
Updated 9th December 2011 at 08:27 PM by CAM
With the recent spotlight on malware and computer security I want to share some of the tricks I have discovered whilst reading up on it. And yes, some of these can affect multiple platforms (Windows/OSX/etc). Google Image Poisoning: The act of using Google Image Search to trick users into visiting infected pages. Images related to popular topics on Twitter or the news are pushed high up the ranks of searches relating to that topic. Victims search for said topic in their droves, click
A program called Breaking In is being launched in America and it is the IT world's equivalent of CSI. the show follows a fictional IT team breaking into museums, nicking cars and doing other things that real security researchers likely don't do as part of their day to day affairs. The producers even created a Flash game for people to play around in and supposedly "hack" by guessing a password.
Unfortunately for the show's marketing team, one user responded to the Naked Security blog post
Updated 10th April 2011 at 01:30 AM by CAM
Facebook profiles have become a bit of a commodity these days for crooks looking to cash in on unsuspecting members of the public. From spam messages to social engineering scams, the holy grail for any attacker is open access to a person's profile. From here, they can capture details about a person's private life along with their family, friends, business contacts and everything they require to pull the perfect scam.
On the same note I paid a visit to the Apple Store in London today
Updated 18th March 2011 at 12:06 AM by CAM
I recently had a problem where we were running low on IP addresses. I looked in DHCP and had about 655 active leases over the last 7 days. Now I'm pretty sure I don't have that many devices in the entire school! It turns out that there were a large amount of IPhones and other unauthorized mobile devices attached to our wireless. I guess the kids managed to find out the wireless key again!
There are a number of solutions to this problem,