The Latest in IT Security

Posts Tagged ‘Magic’

There’s a bit of a spam run taking place on Tumblr right now, in the form of a “Tumblr Dating Game”.The spam message reads as follows: “Lol half of your followers are on tumblrdatinggame(.)com”Visiting the URL will result in a dating website totally unrelated to the awesome prospect of “Tumblr dating” being served up under […]

Read more ...

06
Jan
2012

Did you ever had to identify a Cisco IOS image when you couldn’t rely on the filename?Look for strings starting with CW_ between strings CW_BEGIN and CW_END in the image file, for example like this:You will find strings like CW_IMAGE, CW_FAMILY, CW_FEATURE, CW_VERSION, CW_MEDIA, CW_SYSDESCR and CW_MAGIC between strings CW_BEGIN and CW_END.In this example, the […]

Read more ...

04
Jul
2011

+1 if you immediately understood the title before reading the article. +2 if you still have no idea by the end of it. There’s a Spanish language Facebook fakeout knocking around this week, a variation on a tried and tested scam theme (aren’t they all?) Here’s a “Facebook Dislike Button” site, located at descargarapida(dot)es: Click to […]

Read more ...


Categories

SATURDAY, FEBRUARY 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments