Let’s stop being suckers

I feel like shouting, Wake Up, WakeUpWakeUpWakeUp!!! We are getting the shit hacked out of us! But please, don’t take it from me: Cyber-attackers are already targeting the country’s financial services, transportation and other critical infrastructure and have come close to crashing portions of them.http://www.eweek.com/c/a/Security/CyberAttackers-Already-Targeting-Critical-Infrastructure-DHS-573564/?kc=rss

Surprise, surprise, surprise! The Chinese are hacking our satellites!

Well, somebody did. Somebody in China. As Computerworld states: The report does not directly accuse the Chinese government or its military of being behind the attacks. But it does note that the disruptions are consistent with Chinese military strategies that advocate the disabling of enemy space systems and ground-based satellite control systems, Bloomberg said. China’s …

What is the exact difference between a ‘terminal’, a ‘shell’, a ‘tty’ and a ‘console’?

So here’s an interesting question, and Linux-news.org provides an excellent article that answers it: http://linux-news.org/index.php/2011/10/19/what-is-the-exact-difference-between-a-terminal-a-shell-a-tty-and-a-console/ In unix terminology, the short answer is that terminal = tty = text input/output environment console = physical terminal shell = command line interpreter

Have the Chinese put “secret chips” in our military planes?

Next up: Are the Chinese sneaking secret controller chips into products bound for our military aircraft? The Times of India reports this disturbing possibility at http://articles.timesofindia.indiatimes.com/2009-04-17/us/28040752_1_chinese-spies-chinese-cyber-networks. Listing out some of the examples of Chinese cyber spy penetration, [a US official] said: “We’re also seeing counterfeit routers and chips, and some of those chips have made …

Geeks 2 Go

Greetings and salutations after a couple of very killer weeks. I’m catching up with a handful of valuable tips and leads, the first of which is the topic of this post. If you’ve dealt with a truly malevolent malware infection, you’ve likely used Malware Bytes Anti-Malware, and relied on community analysis and directions to free …