After Palm Pre ownership for a little while, I started wanting to invest in a good case. I was initially very satisfied with the little cloth pouch that came with the Pre but annoyances grew over time. I missed phone calls because getting the pouch out of my pocket and then the phone out of the pouch took too long. A case would also be nice because it would protect against any … [Read more...]
Book Review: Exploiting Online Games
Exploiting Online Games is the third book in series of titles by Greg Hoglund and Gary McGraw. Their two other books have previously been reviewed here at 404 Tech Support - Exploiting Software: How to Break Code and Rootkits: Subverting the Windows Kernel. These titles typically provide information for developers to take into consideration in their projects and for IT … [Read more...]
Book Review: All-In-One CompTIA A+ Certification Exam Guide
At over 1200 pages, the All-In-One CompTIA A+ Certification Exam Guide, 6th Ed by Mike Meyers, is quite the tome. I read it cover to cover in preparation for the A+ exam and just completed it. For a little information on the CompTIA A+ certificate, it is a standard achievement proving basic competency with computer hardware and software. This should probably be the first … [Read more...]
Microsoft SuperPreview and BrowserShots – Your website in different browsers
Due to the way Internet Explorer is integrated with the Windows operating system and just the restrictions Microsoft puts on it in the first place, you can only have one version of IE on a machine at a time. Of course, I've covered Tredosoft's Multiple IE solution before, which does allow you to have more than one version, but Microsoft has just released (in beta) a solution … [Read more...]
Book Review: Exploiting Software – How to Break Code
Exploiting Software - How to Break Code by Greg Hoglund and Gary McGraw is an earlier work by the same authors of the previously reviewed Rootkits. This one dives into the security risks for poorly coded software. Copyright 2004, the book provides lots of examples of exploitable code from wrongfully used functions and improper coding methods five years ago. Despite its age (5 … [Read more...]