Tech Tips

name
Tech Tips
2014
2013
March, April, May 2012
January 2012

Routers released since 2007 support an easy setup mode called Wireless Protected Setup (WPS) designed for end users that are not able to login to the router and configure, WPA and its options. The problem, discovered at the end of 2011, is that WPS is broken and a persistent attacker can use WPS to learn the password for the wireless network. On some routers, even when WPS appears to be disabled, it is not and the router is still vulnerable to attack. For more see: WiFi Routers: Oldies are Goodies January 10, 2012

May and June 2011
April 2011

The big data breach at Email Service Provider Epsilon prompted some blogs by Michael Horowitz.

May – July 2009

Malicous software can be very good at defending itself. Thus, the best way to remove it, is not to let it run in the first place. You can do this by booting the machine from a CD and running an operating system on the CD that treats the C disk as a data disk. See this series of articles:

The Best Way to Remove Viruses, Spyware and other Malware (Part 1) May 19, 2009

How to Remove Malware: Booting from a CD (Part 2) June 16,2009

The Best Way to Remove Viruses and Malware: The Clean-Up (Part 3) July 20,2009

January 2009

Michael Horowitz has a Defensive Computing blog at Computerworld.com with assorted tech tips, including a series of articles on protecting your computer from USB flash drives that contain malware. The Conficker worm is among many others that spread by infecting a USB flash drive.

949 total views, 1 views today