Select Page

Using rootkits for good?

Aleksander Czarnowski of AVET has written a technical overview of using rootkits for penetration (pen) testing:Some parts of rootkit technology can be used to understand system security better and to strengthen systems against future attack – not only on a...

Creative image spam

Image spam, a plague on email right now, continues to get more and more creative.  For the most part, the images are embedded in the email, although sometimes they’re sent as a hyplink (an email client like Outlook can show images in the email when...

Laptop pyrotechnica

Our friends over at PC Pitstop decided to see just how bad these smokin’ batteries can be.  Amazing video — a must watch.  When I asked Dave Methvin (PC Pitstop’s CTO) about the experiment today, he mentioned a few things:...