Our final mini-sode and the very last 404 before 2009! It's been a big year for The 404 even though it's been a really crappy year for everything else in the world. We talk about the origins of the show, the infamous BOL hijack, the addition of Justin Yu and of course, Dan the Mantern. We reminisce about all our fantastic guests and dry our eyes as we count down to the new year. Thanks to all our loyal fans! We couldn't do this without you! See you in 09...The 404 New Year's Eve Show Download today's podcast … Read more
A network administrator will stand trial for allegedly hijacking the network he designed and maintained for the city of San Francisco.
A superior court judge ruled Wednesday that there was enough evidence to hold Terry Childs for trial on four felony charges of tampering with a computer network, denying other authorized users access to the network, and causing more than $200,000 in losses, according to a report in the San Francisco Chronicle. Childs, who has been in custody since July 13, had worked at San Francisco's Department of Telecommunication Information Services for five years. Childs, 44, is being … Read more
Only days after the city of San Francisco regained control of its computer network after an alleged hijacking, a new vulnerability has come to light--this time brought on by the city itself.
The San Francisco district attorney's office has apparently made public nearly 150 usernames and passwords used by city officials to gain access to the city's network. The list was submitted to the court as Exhibit A in a case against Terry Childs, a 43-year-old network administrator for the city who was arrested July 13 on four felony charges of tampering with the city's computer network.… Read more
The computer network hostage crisis in San Francisco is over, thanks to the city's mayor.
Terry Childs, a network administrator for the city of San Francisco, has been in custody since July 13 on four felony charges of taking control of the city's computer network and locking administrators out. Access to much of the city's information was blocked, including law enforcement, payroll, and jail-booking records.
Childs had reportedly refused to surrender the codes to his supervisors, but after a little more than a week as a guest of the city, he apparently had a change of heart … Read more
Register.com is looking into the hijack of Photobucket's DNS records that redirected customers to an unrelated Web page this week.
"The Photobucket site was down for a very short time and was restored immediately when we became aware of the issue." Roni Jacobson, general counsel of Register.com, said in a statement on Thursday. "We are currently investigating the source of the problem."
On Tuesday afternoon, some Photobucket customers trying to access the site were temporarily redirected to a page that appeared to have been hacked by a Turkish group calling itself "NetDevilz.&… Read more
As a follow-up to last week's story on Hotmail users getting locked out, the second account mentioned has been restored.
Last Wednesday, Hotmail account holder Will showed CNET an e-mail verifying that he notified Microsoft on May 2 that his Hotmail password had been changed without his knowledge. Microsoft support staff responded with the following message: "Thank you for your message to MSN and Windows Live Privacy. I understand you are having difficulties accessing your MSN Hotmail account because you believe someone has gained unauthorized access to your account. For assistance with this issue, please contact the MSN … Read more
Editor's note: This article was updated on February 21, 2008. The original was published on February 28, 2007.
Like its mythical namesake (dramatized in Lego), whatever crawls out of a digital Trojan horse will be a nasty surprise. A Trojan horse usually takes the form of an innocuous software program that unleashes a flood of malware or viruses after it's installed and run. Since attacks and ease of removal vary--an ad generator is easier to remove than a stealth rootkit--there's no one-size-fits-all solution. However, there are some common spyware removal techniques that can help you pick your way through the wreckage.
Reboot Windows in Safe Mode
What is Safe Mode? Safe Mode is a diet version of the Standard Mode of Windows that your computer ordinarily runs. Rebooting in Safe Mode loads minimal programs and disables most device drivers that manage hardware like CD drives and printers. The result is a more stable iteration of the Windows operating system that's better suited for disabling malware while you perform a system scan.
How do you use it? If you can, follow the necessary steps for a safe shutdown process and then reboot. When you restart Windows, as the screen begins to load, press F8 repeatedly until the Windows booting options appear. Select "Boot in Safe Mode" from the menu of options. Once in Safe Mode, you should be able to run your installed antispyware software with less interference from the malicious software that the Trojan brought onto your system.
What is System Restore? System Restore strings out a safety net if everything goes kaput. Under default Window settings, System Restore saves a snapshot of your computer configuration once a day and on major upgrades that can be used to replace corrupted files. In the event of a Trojan attack, System Restore can revert Windows to a previous, uninfected state. It won't restore everything, like changes to your user profile, but it does reinstate biggies like your Registry and DLL cache.
When do you use it? When purging your computer of spyware, System Restore has an optimal time and place. You wouldn't want your computer including corrupted files as the reference point of the day, so it's important to disable System Restore before you start cleaning. You can reactivate it once your system is spick-and-span.
How do you use it? The paths for accessing System Restore differ by operating system. In Windows XP, disable System Restore by right-clicking My Computer and selecting Properties. Under the Performance tab, select File System, then the Troubleshooting tab, and finally check Disable System Restore. You'll be prompted to reboot. Follow these steps to uncheck the box before restoring your system.
To use System Restore after scrubbing your computer, choose Accessories from the program list in the Start menu. You'll find System Restore under System Tools.
This comprehensive article from TechRepublic demonstrates how to create and use System Restore in Windows Vista.
Scan with antivirus/antispyware apps Downloading diagnostic and removal tools with an infected computer is a huge time sink--spyware can cripple your speed and Internet access. The Trojan's payload could prevent EXE files from downloading or launching. Also, malware can affect the performance of installed security software on your PC. If you store your antivirus/antispyware programs on a CD or flash drive, however, those malware-busting apps can commence their swashbuckling unhindered.… Read more
Whether your pilgrimage tour makes it to Bethlehem or ends up as Mediterranean fish bait may all depend on a credit-card-size keypad designed to prevent hijacked airliners from entering Israeli airspace.
Starting next year, Israel will require all airlines flying into its airports to use a new Security Code System device designed to prevent a 9/11-style attack by identifying commandeered planes before they enter the country's airspace, Reuters reported last week.
Silent and invisible, some malware sneaks up on you to quietly wreak havoc on your system resources and possibly mine your files for personal, bank account-cracking information. Shudder.
Other types of Trojans more helpfully announce their presence by lobbing pop-ups, disabling your Start menu, or in Matthew's case, playing puppet master with your browser.
For a system-savvy Romeo, saving a damsel in malware distress is one way to win her heart. At least that's the sincerest hope of one teenage boy who helps his crush extinguish malware. Who knew that malicious code could be such an aphrodisiac?
It's just the reverse for Charles, who agrees to help a love interest optimize her system, only to discover that her blinding security ignorance--and excessive toolbars--are an instant turn-off.
But what killjoys got the girls in the first place? Discover the identity of the villainous malware bandits, the assistance of our two heros, and what … Read more