Blog Archives
Search Blog Archives
Category Archives: Windows
Security, Art of Hacking, & the Worst 2014 Security Breaches
Security is hot; no doubt about it. Consider the fact that between 2011 and 2013, venture investors put nearly $3 billion into cyber security companies, resulting in new funding for some 300 firms (Source: Thomson Reuters). Worldwide security software revenue … Continue reading →
Posted in Business, Hacks, Labs, Linux, Network Architecture, Network Security, Networking, Operating Systems, Programming Languages, Python, Red Hat Linux Enterprise, Security, Technology, Technology, Tips, Tips & Tricks, Windows
|
Tagged backdoor, backdoor access, backdoor script, brute-force, cyber security, data breach, DOS, employee negligence, Experion, firewall, firewall misconfiguration, Gartner, Global Cybersecurity Spending, Goodwill industries, Goodwill Industries data breach, Goodwill industries security breach, hacked Linux, hacked pc, hacked target, hacker, hacking, Home Depot, Home Depot data breach, Home Depot security breach, host scanning, JP Morgan, JP Morgan data breach, JP Morgan security breach, linux, malicious code, malware, malware detection software, malware software, malware software detection, Michael Bruemmer, Michaels Data Breach, Michaels security breach, micro-segmentation, microsegmentation, negligence, Neiman Marcus data breach, Neiman Marcus security breach, network security, novice hackers, packet injection, perl, Point-of-sale, Point-of-sale system, Point-of-sale systems, Point-of-sales system, Point-of-sales systems, Ponemon Institute, POS, POS systems, proxy server, Python, Python client, Python hacking, Python hacks, Python server, RedHat, RedHat Linux, RedHat Linux Enterprise, security, security breach, security exploitation, security infrastructure, security perimeter, security software, sensitive information, social engineering, Sony, Sony data breach, Sony security breach, sophisticated hackers, spyware, spyware detection software, spyware software detection, SQL injection, Target, Target data breach, Target security breach, traffic sniffing, trojan, unpatched Windows, unpatched Windows flaw, vi, Visa, windows, Windows flaw
|
Leave a comment
Updating Windows XP/Vista/7 Graphic Card Drivers
If you are running Windows XP/Vista/7, you can find more info on the exact model of the graphic card by doing the following:
Posted in Graphic/Video Cards, Technology, Utilities, Windows, Windows 7, Windows Vista
|
Tagged DirectX, DirectX Diagnostic Tool, DxDiag, GeForce, graphic card, NVIDIA, NVIDIA GeForce, NVIDIA GeForce graphic card, Update driver, Update graphic driver, Update video driver, Windows 7, Windows Vista, Windows XP
|
Leave a comment
How to Transfer Your Putty Settings Between PCs Running Windows
I can’t tell you how many times I’ve had people ask me how they can export their Putty settings. For those of you who have been completely in the dark for the last decade, Putty is a Telnet and SSH … Continue reading →
Posted in Applications, Hacks, Networking, Operating Systems, Technology, Tips & Tricks, Windows, Windows 7, Windows Server 2008 R2
|
Tagged export putty, export putty settings, export windows putty, export windows putty settings, hack, putty, putty hack, putty hack to export settings, putty windows registry hack, regedit, registry hack, Simon Tathamm, ssh client, telnet client, transfer putty settings, transfer putty settings between computers, transfer putty settings between pcs, windows, Windows 7, windows 7 registry hack, windows regedit, windows registry, windows registry hack
|
8 Comments
Installing the Microsoft Loopback Adapter in Windows 7
The Microsoft Loopback Adapter is a logical dummy network card. It can be very useful for testing purposes with a virtual network environment where network access is not available. You can also bind network clients and other network configuration items … Continue reading →
Posted in Networking, Operating Systems, Windows, Windows 7, Windows 7
|
Tagged dummy network card, gns, Graphical Network Simulator, Hardware Wizard, Install Microsoft Loopback Adapter in Windows 7, Installing Microsoft Loopback Adapter in Windows 7, loopback, loopback adapter, Microsoft Loopback Adapter, Network adapter, Network adapters, pc loopback adapter, windows, Windows 7, Windows 7 Microsoft Loopback Adapter, windows loopback adapter
|
2 Comments
Intel Hyper-Threading Technology
Intel Hyper-Threading Technology (HT Technology) enables each processing core to run multiple tasks or “threads” at the same time. Intel HT Technology also improves overall performance on threaded software by increasing processor throughput. For each physical processor core, the operating … Continue reading →
Posted in Intel, Operating Systems, Processors/CPUs, Technology, Windows
|
Tagged CPU, HT Technology, Intel, Intel Core, Intel Core i7-2630QM, Intel Core i7-2630QM processor, Intel Core processors, Intel Hyper-Threading Technology, Intel Xeon, Intel Xeon processors, multitasking, thread, threads
|
Leave a comment