Google announced today that it is beginning to roll out the option to enable two-factor authentication for Google and Gmail accounts when signing in. This improves security by invoking both something you know and something you have, in this case your phone. You'll be able to verify a computer for 30 days, so you don't have to verify every time you sign on. You may opt to … [Read more...]
An Old PC Converted Into A Musical Instrument, Phantom of the Floppera
Test run of my (d)iskette (O)rgan doing Toccata & Fugue. People have made floppy drives sing before, but this is my personal take on it. Features two 3 1/2" drives and two 5 1/4" drives connected to a PIC18f14k50 microcontroller. It interfaces to any MIDI source via MIDI over USB. Straight MIDI would also be possible with an additional small circuit and some minor … [Read more...]
Using RunAs With Active Directory Users And Computers and Group Policy Management Console
Best practice has us not logging in with Administrator-level accounts for everyday activities. One way to ease the burden of having to log off and log on with an admin account when duty calls is to use the Run As... process that I refer to frequently. Running an executable, like Setup.exe, as an administrator is easy. You can right-click on it (or hold down Shift and … [Read more...]
Adobe Patches Reader and Acrobat to 10.0.1, Joins Windows Updates For A Busy Patch Tuesday
Adobe released patches for Adobe Reader and Adobe Acrobat bringing the products up to versions 10.0.1, 9.4.2, or 8.2.6 for the three currently supported major versions. For the first time in a long time, Adobe was able to keep their scheduled quarterly updates. Congrats to them on being able to keep ahead of major security exploits making it public. The update does resolve … [Read more...]
Infographic: Inside the Business of Malware
This flowchart shows how individuals or organizations profit out of infecting your computer. Amongst other things, it also shows a few reasons why it is important to clean up your infected computer immediately and change the accounts of any possibly compromised accounts. Check out this infographic from byJess.net. (click for full res image) (via threatpost) … [Read more...]