Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 SERVER SECURITY


  Is Shared Hosting Secure?

Shared hosting is incredibly popular with users who are looking for the cheapest hosting available – the problem is that along with the low price you get poor performance and even more concerning – questionable security.When running on a shared host dozens if not hundreds of other sites are running on the same servers – this means any single security flaw in any of those applications can compromise the entire server. This  dramatically increases the odds of your server being compromised.Because shared hosting is inherently in-secure Microsoft has built in fe...

3,085 0       SECURITY SHARED HOSTING VIRTUAL HOST DATA SECURITY


  A completely new approach to surveillance - should you be worried?

Paranoia is not necessarily a bad thing - assuming someone is really out there to get you. True or not, the paranoid have had issues they need to control explode as the internet developed, they also got specific tools to make their secrets (or their life, not everybody has a dark secret) more secure and under control. Unfortunately to them, and to the amazement of science and science fiction fans worldwide, a new way of obtaining secrets has appeared and it’s something very few expected. The result of the combined brainpower of Adobe, Microsoft and MIT researchers is the visual microphon...

3,084 0       SECURITY


  Microsoft’s “Picture Password”: A Breath Of Fresh Air On The Lock Screen, Of All Places

Remember that feeling you got back when Steve Jobs was unveiling the iPhone, and he did the “slide to unlock” gesture for the first time? I remember the way he said it – “You like that? Want to see it again?”Since then I haven’t seen a lock screen interface that has made me feel that same “how obvious, how elegant!” feeling – until today at the NVIDIA press conference, and later at the Microsoft keynote here at CES. It sounds a little silly, sure, making such a big deal of such a small feature, but it’s just nice to see a genuinely na...

2,915 0       MICROSOFT WINDOWS 8 PICTURE PASSWORD CES


  Is 99.8% Secure Secure?

A group of researchers (Arjen Lenstra and collaborators  from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewer key generation problems than RSA, that uses two random primes.The technical problem they identify...

2,630 0       SECURITY PERCENTAGE SECURITY INDEX


  Why is my IP blocked at a website I visit regularly after I changed ISPs?

I just installed a new Express Card with Verizon Broadband wireless lastnight. Had tons of fun accessing the web from places I usually cannot, (we arein trucking) until I got to my favorite forum. It's a public place I have beento thousands of times, but instead of happily browsing all the daily newsevents and checking to see if the world blew up yet, I found myself blocked bya big white screen that said YOUR IP ADDRESS HAS BEEN BANNED.What can I do? I can't go to the forum owners to tell them it's just lil 'olme. Besides, I have picked them up on all other wireless connections at varioush...

2,511 0       SOLUTION ISP IP BLOCK STOPFORUMSPAM


  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noisy device known as a blue box, Draper -- soon to be known as "Cap'n Crunch" -- made it possible for many to...

2,407 0       HACK GREATEST ALL TIME


  Setting server timezone

To set your web servers date timezone, for example for Eastern Standard Time (EST) use the following code:SetEnv TZ America/IndianapolisFor example, for Los Angeles time (Pacific time), use the following code:SetEnv TZ America/Los_AngelesOther location examples include:America/New_York - Eastern Time America/Detroit - Eastern Time - Michigan (most locations) America/Louisville - Eastern Time (Louisville, Kentucky) America/Indianapolis - Eastern Standard Time (Indiana, most locations) America/Indiana/Marengo - Eastern Standard Time (Indiana, Crawford County) America/Ind...

2,343 0       SERVER CHANGE .HTACCESS TIME ZONE


  Full disk encryption is too good, says US intelligence agency

You might be shocked to learn this, but when a quivering-lipped Chloe from 24 cracks the encryption on a terrorist’s hard drive in 30 seconds, the TV show is faking it. “So what? It’s just a TV show.” Well, yes, but it turns out that real federal intelligence agencies, like the FBI, CIA, and NSA, also have a problem cracking encrypted hard disks — and according to a new research paper, this is a serious risk to national security.The study, titled “The growing impact of full disk encryption on digital forensics,” illustrates ...

2,187 0       FDE FULL DISK ENCRYPTION CRACK DIFFICULTY