The DShield organization, which appears affiliated with the SANS Internet Storm Center, collects information about what attacks are being seen at computers. If you have a broadband internet connection (DSL or cable modem), you really need a firewall. And if you have a firewall, it should be set to generate a log of incoming and outgoing communication attempts.
The DShield site puts received data into a database so they can analyze attacks. They also have a list of how to send the data for various firewalls. The site also has links to third-party solutions.
DShield describes this as a distributed intrusion detection system, since tons of people pitch in from all over the globe.
Thursday, August 17, 2006
Wednesday, August 16, 2006
Create a healthy computer work environment
Computers are everywhere and we spend a ton of time using them. But we often neglect to take care of our bodies, which hammer away at keyboards, tenaciously gripping mice, and sitting uncomfortably for long periods of time -- all the while staring at flickering monitor screens.
About.com has a series of pages with tips to reduce strain on your body while you use your computer. Give yourself a break (literally). Take these tips to heart and enjoy a happier, healthier life.
Please note that About.com has pop-ups on nearly every page. So if you don't want to see them, enable your pop-up blocker before clicking on a link below.
About.com has a series of pages with tips to reduce strain on your body while you use your computer. Give yourself a break (literally). Take these tips to heart and enjoy a happier, healthier life.
Please note that About.com has pop-ups on nearly every page. So if you don't want to see them, enable your pop-up blocker before clicking on a link below.
- Avoid computer vision syndrome.
- Prevent eye strain.
- Use eye-strengthening exercises. Here's some "Yoga exercises for the eyes" -- exercises that everyone can do!
- Adjust your monitor and lighting setup.
- Properly use your keyboard and mouse.
- Get a good chair and use good posture.
Wednesday, August 09, 2006
Intel Centrino Wireless driver security vulnerability
The Microsoft Windows drivers for the Intel 2200BG and 2915ABG PRO/Wireless Network Connection Hardware have a secuity vulnerability and should be patched.
How do you tell if you need this? Use Device Manager:
How do you tell if you need this? Use Device Manager:
- Select the Start Button
- RIGHT-click on "My Computer"
- Select "Properties" from the pop-up menu.
- Select the "Device Manager" button
- Expand the "Network adapters" section if it's not already expanded.
- If either of the above adapters shows in your list, RIGHT-click on the adapter and then select "Properties"
- Select the "Driver" tab and note the Driver version.
Saturday, August 05, 2006
Like emerging technology? Read a blog
Reuters (the news people) have an interesting "Emerging Technology" blog. If you're a technology news junkie, add this one to your list. And here's a few more, in no particular order. Surf. Enjoy.
- Tech & Space blog (Angela Gunn, USA Today)
- cNet Tech Blogs - an umbrella blog for all their tech blogs
- Gizmodo (gadgets)
- Engadget
- Wired News
- Technology News (Popular Mechanics)
- Reiter's Wireless Data Web Log
- PhysOrd Weblog (for science and tech buffs)
- Educational Technology
- Slashdot ("news for nerds")
- Techdirt
- TechE Blog (tech and gadget news)
- ZD Net Tech blogs - an umbrella blog for all their tech blogs
- SciFi Tech
- Tech blog
Friday, August 04, 2006
Fake Google toolbar spreads virus
Surf Control reports that computer hackers are now using a Google Toolbar look-alike application. The fake app tries to lure you into installing a malicious program. Be paranoid. Be very, very paranoid.
Subscribe to:
Posts (Atom)