Quantcast
Channel: dsh Solutions
Browsing all 151 articles
Browse latest View live

Microsoft Warning: Email Worm Posing as MS Update

John Lister / InfoPackets on 20110107 @ 12:11AM EST Microsoft is today warning users of fake security alerts arriving via email. Microsoft is reminding users that it never sends out security alerts...

View Article


Kama Sutra PowerPoint in Email is MalWare

From Office Watch, January 19, 2011 A nasty email is doing the rounds promising a PowerPoint presentation of the Kama Sutra but includes a program to take control of your computer as well. Sophos is...

View Article


A Clever Idea for Your Phone Camera

There are a lot of things you use your phone for, but have you considered you can use it as a reminder?  Using your phone camera makes remembering things a breeze.  You’re at Disneyland and you’ve...

View Article

Taken Over

According to Neil J. Rubenking taking over your computer remotely appears to be ridiculously easy, as long as you’re a bit gullible and don’t have any antivirus productions.  Apparently he’s done it,...

View Article

What is Two-Factor Authentication? Why Should You Care?

What is two-factor authentication?  According to Wikipedia: Two-factor authentication (TFA, T-FA or 2FA) is an approach to authentication which requires the presentation of two or more of the three...

View Article


PWN — The New Term In Town

So you may have been seeing this word “pwn” in articles regarding security and hacking and thought it was a typo and it should have read “own.”  Well you’re partly correct.  Pwn (pronounced “powned“)...

View Article

Twitter Bootstrap

Bootstrap is a modular framework developed by Mark Otto and Jacob Thornton at Twitter as a framework to encourage consistency across internal tools. Before Bootstrap, various libraries were used for...

View Article

Image may be NSFW.
Clik here to view.

The JAVA Security Risk

Why everyone should be concerned about Java An article by Woody Leonhard, Microsoft Office Expert Woody Leonhard is a Windows Secrets senior editor and a senior contributing editor at InfoWorld. His...

View Article


Reset the Net – Don’t Ask For Your Privacy, Take It Back!

We have a problem today with the NSA and others exploiting weak links in Internet security to spy on the entire world, twisting the Internet we love into something it was never meant to be: a glass...

View Article


The New Calculator Speller: Hex Codes!

When you first got your shiny, new calculator, can you remember discovering that you could spell words with the numbers? Did you also experience the joy of figuring out how to spell all the various...

View Article

How the US’ Requests for Linked-In Member Info Measures Up Worldwide

So I just got the notification that Linked-In had changed their privacy and transparency policy so I took a minute to see what the changes were. During my perusal I see a link to their Government...

View Article

4 Stats to Make You Rethink Your Web Design Plan

By Lindsay Silberman Business on Tapp, 101 And now, for a mouthwatering thought experiment… You’re going out to dinner and deciding between two restaurants. When you visit the restaurant sites, option...

View Article

Social Presence v. Website Presence

A social business or organization presence is a great idea. You can listen to what people say and think and you can get in contact with like-minded groups and/or individuals. This allows you to share...

View Article


So, What is “Responsive” Web Design and Why Should I Care?

These days you don’t just need a website, you need a responsive website. So what is “responsive” web design? According to Wikipedia: Responsive web design (RWD) is an approach to web design aimed at...

View Article

WordPress Users at Risk of ISIS Hacking Spree

According to WCCF Tech, the FBI is warning WordPress users against a possible exploit being used by ISIS that could take control of sites using older versions of WordPress. According to the FBI, ISIS...

View Article


WordPress Security Vulnerability

Please update your WordPress version to 4.2.1 and any out-of-date plug-ins installed immediately! According to Securi: Security Advisory: XSS Vulnerability Affecting Multiple WordPress Plugins By...

View Article

Make the Breakup with Internet Explorer 8 — TODAY!

Yes, there is an official site urging you to break up with IE8.  Not just to make us developers lives so much easier — and one less browser to test — but because, little one, it’s definitely way past...

View Article


Google Tells You How To Stay Safe Online

Research done by the Google team provides some common sense and conclusive results that will help you stay safe online. Source: Google Tells You How To Stay Safe Online

View Article

Windows 10 WiFi Ease By Default Causes Vulnerability | Hacked- How To Change...

A new feature within Windows called “Wi-Fi Sense” shares Wi-Fi passwords with contacts by default, lowering one’s network privacy and security. Source: ‘Wi-Fi Sense’ Vulnerability in Windows 10, the...

View Article

Top 5 Facebook Scams That You Should Be Aware Of

Facebook has about 1.4 billion users making it the most active social media site for the hackers. Here’s a list of Top 5 Facebook scams. Source: Top 5 Facebook Scams That You Should Be Aware Of

View Article
Browsing all 151 articles
Browse latest View live