Technology Made Simple
Wednesday July 6th 2022

Insider

Archives

‘Security’ Archives

Q&A Monday: IIS 7.5 Error 401.3

Q&A Monday:  IIS 7.5 Error 401.3

Question: I'm trying to test my ASP.Net website and I keep getting this error: HTTP Error 401.3 - Unauthorized You do not have permission to view this directory or page because of the access control list (ACL) configuration or encryption settings for this resource on the Web server. I tested the site both from the IP address, as I [...]

Security Update: Mozilla Firefox 6 and 3.6.20

Security Update:  Mozilla Firefox 6 and 3.6.20

    Mozilla identified and fixed several memory safety bugs in its browser engine used in Firefox 3.6, Firefox 5 and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and that they fear that someone with enough effort could be exploited to run arbitrary code.  This update is [...]

Security Update: Blackberry Enterprise Software

Security Update:  Blackberry Enterprise Software

Blackberry has announced that there is a vulnerability on their Blackberry Enterprise Server product and have released a patch to fix the vulnerability.  RIM (the maker of the blackberry) has released the patch for what they are calling a high risk vulnerability and being that it is being classified as "high risk", it is recommended you get the [...]

Safe Web Browsing Myths

Safe Web Browsing Myths

More often than not, if you are reading articles from this site, you consider yourself a savvy computer user.  Though many of us think that we are using the internet in a safe way, we are actually vulnerable to malware or viruses.  The problem I often run into, is that people think getting infected is about going to seedy internet sites or [...]

Windows Security Best Practices

Windows Security Best Practices

In todays age, you can not be too secure when it comes to your network it's better to be safe than sorry.  In the current economy I've seen many companies consolidate jobs and add new burden to already over-burdened admins.  One of the places where this will hurt companies is the network security departments. I've learned many security faux [...]

Software Update: Adobe Flash and Air Update

Software Update: Adobe Flash and Air Update

    Adobe has released Flash Player 10.1.82.76 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition. This vulnerability also affects Adobe Air 2.0.2.12310 and earlier versions. Links for More Information: [...]

Browser Update: Google Update Chrome to 5.0.375.126

Browser Update: Google Update Chrome to 5.0.375.126

Google has released Chrome 5.0.375.126 for Linux, Mac, and Windows.  Chrome 5.0.375.126 contains an updated version of the Flash plugin which addresses multiple vulnerabilities. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code.

Software Update: iPhone, iPod Touch and iPad Update

Software Update: iPhone, iPod Touch and iPad Update

Apple has released iOS 4.0.2 for the iPhone and iPod touch and iOS 3.2.2 for the iPad to address vulnerabilities in the FreeType and IOSurface packages. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or gain system privileges.    This is most likely to address the jailbreakme.com website that was [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Browser Update: Google release new Chrome Update

Browser Update: Google release new Chrome Update

Google has released Chrome 5.0.375.125 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or obtain sensitive information. Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of the users are up [...]

 Page 2 of 6 « 1  2  3  4  5 » ...  Last »