Hijack A Facebook Account in One Click

(Image used under: Creative Commons 2.0 [SRC])

Ok so maybe not ONE click. But someone has put together a simple tool that you can use to take over the active sessions of anyone within wireless range of you. Hang out at the Starbucks free wi-fi and you'll be able to control the Facebook or other accounts of people nearby. It's an attack that was always simple to do for those who know how, but now any idiot can do it with a simple new interface.

By the way, they mention a few protections from this at the bottom of the article, but here's one more.

Tags: , ,

Wrapping Text in PowerPoint

A friend asked me today how to wrap text around an image in PowerPoint and it occurred to me that I had never done or even tried to do that. So I looked up the answer and found this from Microsoft's webpage:

We want to wrap this
There! That's better!

The trick is to use a built in Microsoft function called the tab key. That right… there is no function. First you put your graphic behind the text (and make sure the textbox doesn't have a background color). Then, Microsoft's own tutorial says you have to use tabs or the spacebar to create empty space over the image.

"Sure", you say, "but that's an irregular object. If I want to wrap around something square on the left or right, that should be much easier right?" Rest assured, it is.

In that case, all you have to do is create three different text boxes. One above the image, one to the side, and one below. Use the same font and size and be sure to place the boxes so they look like the text in the top flows to the one on the side then bottom when they're actually just three different boxes.

Seriously! Those are the instructions for wrapping text. What kills me is that sounds exactly like what I'd tell someone as a hack to make it work when no other way exists which must mean that it's an unsupported feature in PowerPoint. I can only assume that there's so little demand for this feature that they still haven't bothered to add it even to their 2007 version of office. Tags: , , , ,

Sarah Palin’s Private E-mail Account Hacked

(Image is in the Public Domain)

Sarah Palin's Yahoo account has been broken into and e-mails found there posted to Wikileaks. I would say this was a pretty rotten thing to do, but the perpetrators claim they did it to prove that Palin has been using her private e-mail to circumvent recordkeeping laws about government business. If that's true, then perhaps this needed to happen.

Tags: , , , ,

Sony Settles for $4.5 Million for their Illegal CD-Virus

Sony literally hacked US citizens and got a slap on the wrist.
(Image used under: Creative Commons 2.0 [SRC][Mod][Comp])

Consumer Affairs reports a settlement with 39 states for Sony's use of a "rootkit" to try and prevent users from copying their music. This forced DRM was detected by computer experts and quickly raised a stir.

Most importantly,

Sony said it was "pleased" with the settlement and said it would stop using copy-protection software that cannot be easily removed from consumers' PCs
Tags: , , , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]