Crackers Cause Pentagon to Put Computers Offline

Crackers Cause Pentagon to Put Computers Offline – Anarchysoft writes “As many as 1500 Pentagon computers were brought offline on Wednesday in response to a cyber attack. Defense Secretary Robert Gates reported of the fallout both that the attack had ‘no adverse impact on department operations’ and that ‘there will be some administrative disruptions and personal inconveniences.’ When asked whether his own e-mail had been compromised, Gates responded, ‘I don’t do e-mail. I’m a very low-tech person.'” Read more of this story at Slashdot. [Slasdot]
Crackers Cause Pentagon to Put Computers OfflineAnarchysoft writes “As many as 1500 Pentagon computers were brought offline on Wednesday in response to a cyber attack. Defense Secretary Robert Gates reported of the fallout both that the attack had ‘no adverse impact on department operations’ and that ‘there will be some administrative disruptions and personal inconveniences.’ When asked whether his own e-mail had been compromised, Gates responded, ‘I don’t do e-mail. I’m a very low-tech person.'”

Read more of this story at Slashdot.

[Slasdot]


Did you like this article?


0 Shares:
You May Also Like

JkDefrag 3.16

JkDefrag 3.16 - Free (released under the GNU General Public License) disk defragment and optimize utility for Windows 2000/2003/XP/Vista/X64. Completely automatic and very easy to use, fast, low overhead, with two optimization strategies, and can handle floppies and USB disks/sticks. Included are a Windows version, a commandline version (for scheduling by the task scheduler or for use from administrator scripts), a screensaver version, a DLL library (for use from programming languages), and versions for Windows X64. JkDefrag is based on the standard defragmentation API by Microsoft, a system library that is included in Windows 2000, 2003, XP, and Vista. All defragmenters are based on this API, including commercial defragmenters. JkDefrag is therefore very solid and there is no risk of losing data. You can stop the program at any time, it will finish the current file in the background. If your disks use NTFS then you're even safe when the computer crashes in the middle of defragging. Nevertheless, it's still a good idea to backup before defragmenting, just like with other defragmenters, because the heavy use of the harddisk may trigger a hardware fault.

Changes in this version:

- Changed the message in the docs about the screensaver under Vista, it works if User Account Control is turned off.
- Bugfix in "-a 3" (fast optimize). It would not use Perfect Fit for gaps that were larger than all the data already processed.

Read full story...

[NeoWin-Software]
Read More

Webroot Spy Sweeper 5.5.1 Build 3354

Webroot Spy Sweeper 5.5.1 Build 3354 - Spy Sweeper safeguards your identity and restores system performance through fast, smart and powerful anti-spyware protection. Spy Sweeper protects against all types of spyware, including system monitors, Trojan horses, and other threats like CoolWebSearch, Look2Me, and more. Spy Sweeper's advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This removal technology saves time and effort by eliminating these vicious threats in one sweep - requiring no need for multiple reboots. As soon as it's installed, Spy Sweeper with AntiVirus offers 360 degrees of protection against spyware and viruses and is now compatible with Windows Vista.

Product features include:

* Detect and disinfect viruses, spyware, Trojans and worms at the point of infection to keep your PC safe
* Your PC can be completely cleaned and disinfected in just a couple of mouse clicks - it's that easy.
* Protect your PC and your Internet activities without any cumbersome configuration using Spy Sweeper with AntiVirus software.

Read full story...

[NeoWin-Software]
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More

Selecting the Fastest Ubuntu 18 Mirror

Run the following commands. wget http://ftp.us.debian.org/debian/pool/main/n/netselect/netselect_0.3.ds1-28+b1_amd64.debdpkg -i netselect_0.3.ds1-28+b1_amd64.deb https://askubuntu.com/questions/39922/how-do-you-select-the-fastest-mirror-from-the-command-line Did you like this article?
Read More