Working on a theory in the usage and defense of Virtual Machines. It seems that since a virtual OS is isolated from the original computer, people have been using it to make a simple "Disposable" OS. Writing a virus to this type of setup is moot, due to the os simply being destroyed upon lo...
Actually mate I got pulled another direction. I've been persuaded to work my way into Linux. There's supposed to be a lot of money for a Linux network security man for some businesses. As the person told me "Be smart enough with windows to cause -damage-, be smart enough in Linus to cause -dev...
I don't mind your italic writing, but I still don't know (and fashizzle neither ,I think at least) if you meant MAC as in: 1) Media Access Control address ( wiki link ) or 2)Mac OS X ( wiki link ) Here most people say MAC when they mean 1 and Mac OS X (or just OS X for short) when they mean 2 2 But...
Routeing numbers etc..etc. I'm guessing it's not the effectiveness of one attack but a multiple grouping of them. Exactly. Even if just 1% of the population is stupid enough to fall for viruses/scams/phishing/social engineering, that's still 3 million people just in the United States alone. Yeesh. ...
Social Engineering? Fake emails? Keyloggers? All of the above, and more. Even identities are easy to steal now. I'm sure you still see people occasionally use a check at the grocery line. Those have just about everything you could ever want to steal someone's identity and clear out their bank accou...