Pownce Refugees

Keeping the community alive, post Pownce

SkiCat56's Blog (107)

Cub Scouts can now earn Video Games awards


Added by SkiCat56 on April 29, 2010 at 11:40am — No Comments

Pwn2Own winner tells Apple, Microsoft to find their own bugs

Charlie Miller won't hand over 20 flaws he found by fuzzing Mac OS, Office, Adobe Reader


Added by SkiCat56 on March 26, 2010 at 2:45pm — No Comments

Are users right in rejecting security advice?

Should you change your passwords often? What’s the risk if you don’t? Little did I know, listening to one podcast would cause me to rethink how I

would answer those questions.
  • Date: March 15th, 2010
  • Author: Michael Kassner…

Added by SkiCat56 on March 17, 2010 at 12:51pm — No Comments

Backdoor found in Energizer Duo USB battery charger

March 8, 2010 9:10 AM…

Added by SkiCat56 on March 9, 2010 at 8:27am — No Comments

Microsoft Warns of F1 Site Attack

Microsoft Warns of F1 Site Attack

Erik Larkin



A new security advisory from Microsoft warns about a risk involving any version of Internet Explorer on Windows 2000 and Windows XP that can allow a malicious Web site to infiltrate your PC.

The vulnerability, detailed… Continue

Added by SkiCat56 on March 4, 2010 at 11:20am — No Comments

Fake Microsoft Outlook Update Installs Trojan

Fake Microsoft Outlook Update Installs Trojan

Erik Larkin


A malicious spam campaign caught by Panda Labs is using a fake Microsoft Update notice to trick victims into installing a Trojan. While well crafted, the attack still provides dead… Continue

Added by SkiCat56 on February 4, 2010 at 8:59am — No Comments

GoogleSharing: A way to prevent tracking by Google

A security expert is taking on Google. His innovative Firefox add-on prevents Google from tracking your whereabouts on the Internet.

# Date: January 25th, 2010

# Author: Michael Kassner

# Category: Security


Any security pundit worth their salt knows about Moxie Marlinspike. You may remember Marlinspike getting a… Continue

Added by SkiCat56 on January 26, 2010 at 3:07pm — No Comments

IE Exploit Used to Launch Chinese Attacks on Google

January 14, 2010 5:40 PM

IE Exploit Used to Launch Chinese Attacks on Google

By Tony Bradley


Early speculation focused on the Abobe Reader zero-day exploit as the source of the Chinese attacks on Google and other corporations earlier… Continue

Added by SkiCat56 on January 21, 2010 at 10:34am — No Comments

Product Spotlight: CCleaner

Derek Schauland outlines the basics of CCleaner for keeping your computer optimized and helping you get rid of the mess that piles up from Internet surfing, old applications, and other fragments.

Product Spotlight: CCleaner

Date: January 8th, 2010

Author: Derek Schauland


Keeping your computer moving like the day it… Continue

Added by SkiCat56 on January 11, 2010 at 12:30pm — No Comments

Identify a Phishing Scam

Identify a Phishing Scam

From Wired How-To Wiki


Hold on to your passwords if you want to stay safe on the internet. Of course, you need those passwords to access your bank, your e-mail and sites where you connect with friends. There are people out to trick you into giving those private codes away using a scam called "phishing." Let's look at how to… Continue

Added by SkiCat56 on January 6, 2010 at 11:48am — No Comments

Understanding Windows 7's 'GodMode'

January 4, 2010 12:41 PM PST

Understanding Windows 7's 'GodMode'

by Ina Fried


Windows 7's so-called GodMode is actually a shortcut to accessing the operating system's various control settings.

(Credit: CNET News)

Although its name suggests perhaps even grander capabilities, Windows enthusiasts are excited over the… Continue

Added by SkiCat56 on January 5, 2010 at 1:07pm — No Comments

Credit-card extended warranties come in handy

Credit-card extended warranties come in handy


By Dennis O'Reilly

Most experts recommend against paying for an extended warranty when you purchase a PC or peripheral, partly because you may already be covered beyond the vendor's standard warranty period.

If you used a credit card to buy the system, your card company's extended warranty could be the key to a free… Continue

Added by SkiCat56 on December 14, 2009 at 11:38am — No Comments

Google promises faster Web with launch of Public DNS

Posted by Sam Diaz @ 11:38 am


Google is taking control of the Internet’s equivalent of the telephone switchboard, called the Domain Name System, or DNS. In a blog post this morning, Google announced the release of a public DNS resolver called Google Public DNS, one of the things that the company is doing as part of its ongoing effort to make the web… Continue

Added by SkiCat56 on December 4, 2009 at 9:18am — No Comments

Microsoft: Stop Playing Games with the Customer!

ARTICLE DATE: 07.07.09


By John C. Dvorak

The glory days of Microsoft ended with Vista for one reason, and one reason only: Vista Ultimate. It was part of an ill-advised scheme called "subtractive marketing" or "fake versioning"—purposely taking features out of a finished product to create an artificial range or selection.

Who ever dreamed up the Vista Ultimate moniker, I consider that individual… Continue

Added by SkiCat56 on July 8, 2009 at 6:08pm — No Comments

VC's automated Twitter feed spreads malware

June 24, 2009 4:59 PM PDT

by Elinor Mills


Updated June 25 at 9:00 a.m. PDT with Trend Micro saying the Trojan is harmful to Macs and PCs.

Venture capitalist Guy Kawasaki got more than he bargained for from an automated feed he set up on his Twitter account.

Some of Kawasaki's more than 139,000 Twitter followers noticed something strange when they saw a particular non-VC-related tweet sent… Continue

Added by SkiCat56 on June 26, 2009 at 8:36am — No Comments

The Perfect Mobile Phone Is (Nearly) Here

The iPhone may have begun the smartphone's transition into a full-fledged computer, but lots needs to change before we get there. Here's my wish list.


by John C. Dvorak


As the world begins to adjust to the mobile phone as a computing platform, we have to recognize the fact that for many people the device is bound to become the complete substitute for all computing needs. But not quite in the form we see… Continue

Added by SkiCat56 on June 17, 2009 at 4:32pm — No Comments

Big-name sites spread latest malware infections

Going by such names as Gumblar, JSRedir-R, Martuz, and Beladin, a new generation of malware has managed to surreptitiously place malicious JavaScript code on tens of thousands of popular Web sites.

Top Story, June 11, 2009

By Susan Bradley


The hacker scripts try to infect site visitors and then attempt to use their compromised PCs to spread the infection to yet other… Continue

Added by SkiCat56 on June 11, 2009 at 1:26pm — No Comments

Hacker named to Homeland Security Advisory Council

June 5, 2009 5:27 PM PDT

by Elinor Mills


Jeff Moss, founder of the Black Hat and Defcon hacker and security conferences, was among 16 people sworn in on Friday to the Homeland Security Advisory Council.

The HSAC members will provide recommendations and advice directly to Secretary of Homeland Security Janet Napolitano.

Moss' background as a computer hacker (aka "Dark Tangent") and role as a… Continue

Added by SkiCat56 on June 8, 2009 at 11:54am — No Comments

© 2017   Created by Heidi Cool.   Powered by

Report an Issue  |  Terms of Service