Tuesday, March 19th, 2019 (
No comments yet)
Ok so maybe not ONE click. But someone has put together a simple tool that you can use to take over the active sessions of anyone within wireless range of you. Hang out at the Starbucks free wi-fi and you'll be able to control the Facebook or other accounts of people nearby. It's an attack that was always simple to do for those who know how, but now any idiot can do it with a simple new interface.
By the way, they mention a few protections from this at the bottom of the article, but here's one more.
Tags:
Account Security,
Facebook,
Hacking
Saturday, March 23rd, 2019 (
No comments yet)
A friend asked me today how to wrap text around an image in PowerPoint and it occurred to me that I had never done or even tried to do that. So I looked up the answer and found this from Microsoft's webpage:
The trick is to use a built in Microsoft function called the tab key. That right… there is no function. First you put your graphic behind the text (and make sure the textbox doesn't have a background color). Then, Microsoft's own tutorial says you have to use tabs or the spacebar to create empty space over the image.
"Sure", you say, "but that's an irregular object. If I want to wrap around something square on the left or right, that should be much easier right?" Rest assured, it is.
In that case, all you have to do is create three different text boxes. One above the image, one to the side, and one below. Use the same font and size and be sure to place the boxes so they look like the text in the top flows to the one on the side then bottom when they're actually just three different boxes.
Seriously! Those are the instructions for wrapping text. What kills me is that sounds exactly like what I'd tell someone as a hack to make it work when no other way exists which must mean that it's an unsupported feature in PowerPoint. I can only assume that there's so little demand for this feature that they still haven't bothered to add it even to their 2007 version of office.
Tags: Bad Design, Computers, Hacking, Microsoft, PowerPoint
Monday, March 25th, 2019 (
No comments yet)
Sarah Palin's Yahoo account has been broken into and e-mails found there posted to Wikileaks. I would say this was a pretty rotten thing to do, but the perpetrators claim they did it to prove that Palin has been using her private e-mail to circumvent recordkeeping laws about government business. If that's true, then perhaps this needed to happen.
Tags:
Account Security,
Congress,
Hacking,
Onstar,
Sarah Palin
Sunday, March 3rd, 2019 (
No comments yet)
Consumer Affairs reports a settlement with 39 states for Sony's use of a "rootkit" to try and prevent users from copying their music. This forced DRM was detected by computer experts and quickly raised a stir.
Most importantly,
Sony said it was "pleased" with the settlement and said it would stop using copy-protection software that cannot be easily removed from consumers' PCs
Tags:
Hacking,
Market Lies,
Regulation,
Rootkits,
Sony,
Viruses