<meta name='google-adsense-platform-account' content='ca-host-pub-1556223355139109'/> <meta name='google-adsense-platform-domain' content='blogspot.com'/> <!-- --><style type="text/css">@import url(https://www.blogger.com/static/v1/v-css/navbar/3334278262-classic.css); div.b-mobile {display:none;} </style> </head><body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d8501869839560069346\x26blogName\x3dSpiderhost+-+The+Official+Blog\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://spiderhost.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://spiderhost.blogspot.com/\x26vt\x3d-1484168905477056254', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
0 comments | Sunday, November 28, 2010

In the 20th century, this would have been a job for James Bond.

The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.

But in the 21st century, Bond doesn't get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran's nuclear program but has caused a major rethinking of computer security around the globe.

Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they've all found, says Sean McGurk, the Homeland Security Department's acting director of national cyber security and communications integration, is a “game changer.”

The construction of the worm was so advanced, it was “like the arrival of an F-35 into a World War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus.

Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program.

The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility.

When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions.

And finally, after the job was done, the worm would have to destroy itself without leaving a trace.



read more to find out how this was possible!
http://www.foxnews.com/scitech/2010/11/26/secret-agent-crippled-irans-nuclear-ambitions/
By Ed Barnes

Published November 26, 2010
| FoxNews.com

0 comments | Friday, November 12, 2010

The recently created Google TV, an Android-based solution to a set-top box and TV media integration.

http://iptv.tmcnet.com/topics/iptv/articles/116729-internet-invades-living-room-with-dish-networks-google.htm

JW

0 comments

Check in and check out without ever stopping by the front desk

http://news.discovery.com/tech/mobile-phones-replace-hotel-keys.html

JW

0 comments

BTIG Research: The iPad does not perform as well on Clearwire’s 4G iSpots as it does on typical Wi-Fi access points.



http://digitaldaily.allthingsd.com/20101105/for-ipad-users-hex-marks-the-ispot/

JW

0 comments | Sunday, November 7, 2010

Simply one of the finest free malware scanners available.

install this on a USB drive for instant scanning on any PC or laptop.
Runs on Servers as well
free scans, free cleans, free updates.

very effective.

http://www.techspot.com/downloads/4716-malwarebytes-anti-malware.html

Ed

0 comments

Now, many may have heard of this powerful little tool. And some may have tried or used it.
The newest version has some very nice tools built in for keeping your PC somewhat safer than without it.

It has, among other things, a registry back up on install.
An "immunization" tool to take a form of snapshot/locking of important files.
And it will not allow these to be modified without user intervention. This can be updated after a new, trusted program is installed.

This is also a very powerful ( can be dangerous in unexperienced hands ) registry scanning and reporting and Cleaning tool. Not to mention a large and dedicated online community you can submit these reports to for free inspection and they will help you find problems, if you have them, in your PC.

all in all the newest free version of search and destroy, installed after a Clamwin install, will go along way in free protection - adding realtime file protection for immunized files.

both work on Win2K8 servers as well.

http://spybot-download.net/spybotsd162.exe

this will run an update on install as well.

Ed

0 comments | Tuesday, November 2, 2010

The first batch of Wi-Fi Direct products were formally certified Monday Oct. 22, 2010, launching a wireless technology in which devices will be able to communicate directly with each other without being on a network or without first connecting to a network access point


http://www.informationweek.com/news/infrastructure/remote_access/showArticle.jhtml?articleID=227900741


JW

0 comments

60-Year-Old man loses job, Creates 12 Websites for income

http://www.huffingtonpost.com/2010/10/28/from-unemployed-to-selfem_n_775544.html