Sunday, November 05, 2006

Weekend Reading

Attack of the Bots

The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia – and lost.

Read the entire article HERE.

==================================================================
I Know What You Did Last Logon

A White Paper from the Microsoft Antimalware Team : We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

To some, the thought of keystroke logging and other forms of monitoring bring to mind the Orwellian surveillance society – a view that is reinforced by recent news as well as the increasing presence of monitoring software in spyware and the frequency with which such software is found accompanying botnets. The act of capturing keystrokes on a computer as well as other forms of monitoring can manifest in a range of ways from completely benign to overtly criminal. In cases where the logged party is unaware of the activity there is also the possibility of financial impact through various types of fraud as well as personal endangerment when the monitoring is a component of stalking or domestic violence. However, monitoring also has legitimate commercial uses such as consensual workplace monitoring, parental controls and computer troubleshooting. We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

Download the entire article HERE.

==================================================================
Quantum attacks worry computer scientists

Today's network administrators have it easy. In the weird world of quantum computing, the state of computer systems networked together is so fragile that a read access to a single quantum bit, or qubit, on one machine would require a network-wide reset. It's no wonder, then, that two researchers who are working on ways of defending against the future possibility of malicious attack assume that any unauthorized access to a quantum computer constitutes a catastrophic failure.

Read the entire article HERE.

==================================================================
What is an MVP ?


As a Microsoft MVP (Most Valuable Professional), I've occasionally found that people have no idea what that means. Here are some of the suggestions I've heard from others:

Read the article - get the answers - HERE.

0 Comments:

Post a Comment

<< Home