BuyLow.com Computers And Internet - Internet Security, Computers, Mobile Devices, Networks

BuyLow.com | Resources | Contact Us


 

E-mail Is Insecure by Default

E-mail is insecure because it is more like a postcard, not a sealed envelope.
A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the person it [...]

Read More About - E-mail Is Insecure by Default »

Understanding Your Computer: Email Clients

How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is johndoe@example.com, and the person you are contacting is at [...]

Read More About - Understanding Your Computer: Email Clients »

Secure Your Wireless Network

Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information.
How do wireless networks work?
As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your [...]

Read More About - Secure Your Wireless Network »

Don’t Let Personnel Issues Become Security Issues

Terminate Computer Access Before You End a Contract or Tell People They Are Fired
Shortly before a labor union strike in August 2006, two Los Angeles transportation engineers allegedly disconnected traffic signals at four busy intersections. Subsequently, these disgruntled employees were accused of unauthorized access to a computer, identity theft and unauthorized disruption or denial of [...]

Read More About - Don’t Let Personnel Issues Become Security Issues »

Identifying Hoaxes and Urban Legends

Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along.
Why are chain letters a problem?
The most serious problem is from chain letters that mask viruses or other [...]

Read More About - Identifying Hoaxes and Urban Legends »

Obama To Boost U.S. Broadband Access

Washington, DC — President Obama plans to award $2 billion in grants and loans over the next 75 days in an effort to expand America’s broadband Internet access, as well as, create tens of thousands of jobs.
“Broadband touches nearly every aspect of the U.S. economy, providing Americans with unprecedented opportunities in employment, education, health care, [...]

Read More About - Obama To Boost U.S. Broadband Access »

Report On Web Security: Danger!

The IBM X-Force 2009 Mid-Year Trend and Risk report finds growing security concerns related to surfing the web.
“The trends highlighted by the report seem to indicate that the Internet has finally taken on the characteristics of the Wild West where no one is to be trusted,” said X-Force Director Kris Lamb. “There is no such [...]

Read More About - Report On Web Security: Danger! »

How To Choose An ISP

National Cyber Alert System
Understanding ISPs
ISPs offer services like email and internet access. Compare factors like security, services, and cost so that you find an ISP that supports all of your needs.
What is an ISP?
An ISP, or internet service provider, is a company that provides its customers access to the internet and other web [...]

Read More About - How To Choose An ISP »

Fraudulent Web Sites

We are aware of public reports indicating that attackers are using legitimate web pages to run malicious code on victims’ machines.
Reports, including a posting by Sophos, indicate that these messages
* Include keywords and names related to a current event (such as, the 9/11/2001 terrorist attack)
* Prompt users [...]

Read More About - Fraudulent Web Sites »

Apple Safari And Firefox

Apple has released Safari 4.0.3 for Windows and Mac OS X to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, obtain sensitive information, or spoof a website.
The Mozilla Foundation has released Firefox 3.0.13 and Firefox 3.5.2 to address multiple vulnerabilities. These vulnerabilities may allow an [...]

Read More About - Apple Safari And Firefox »

RSS BugTraq

  • [SECURITY] [DSA 2100-1] New openssl packages fix double free
    Posted by Moritz Muehlenhoff on Aug 30------------------------------------------------------------------------ Debian Security Advisory DSA-2100-1 security () debian org http://www.debian.org/security/ Moritz Muehlenhoff August 30, 2010 http://www.debian.org/security/faq ------------------------------------------------------------------------ Package : opens […]
  • Re: [Full-disclosure] QtWeb Browser version 3.3 build 043 Insecure DLL Hijacking Vulnerability (wintab32.dll)
    Posted by security curmudgeon on Aug 30: 1. OVERVIEW : : The QtWeb Browser application is vulnerable to Insecure DLL Hijacking : Vulnerability. Similar terms that describe this vulnerability have been : come up with Remote Binary Planting, and Insecure DLL : Loading/Injection/Hijacking/Preloading. : 3. VULNERABILITY DESCRIPTION : : The QtWeb Browser applicat […]
  • [ MDVSA-2010:165 ] libHX
    Posted by security on Aug 30 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2010:165 http://www.mandriva.com/security/ _______________________________________________________________________ Package : libHX Date : August 30, 2010 Affected: 2009.0, 2009.1, 2010.0, 2010.1 _________________________ […]
  • {Lostmon - Groups} Safari for windows Invalid SGV text style Webkit.dll DoS
    Posted by Lostmon lords on Aug 30################################################### Safari for windows Invalid SGV text style Webkit.dll DoS Vendor URL:www.apple.com Advisore:http://lostmon.blogspot.com/2010/08/safari-for-windows-invalid-sgv-text.html Vendor notify :Yes exploit available :YES ################################################### Safari browse […]
  • R7-0036: FCKEditor.NET File Upload Code Execution
    Posted by HD Moore on Aug 30R7-0036: FCKEditor.NET File Upload Code Execution August 30, 2010 -- Vulnerability Details: FCKEditor contains a file renaming bug that allows remote code execution. Specifically, it is possible to upload ASP code via the ASP.NET connector  in FCKEditor. The vulnerability requires that the remote server be running IIS. This vulne […]