|
What is a security sandbox? Think about the type of sandbox that kids play in. It is small, safe environment where kids can play with just the toys in the sandbox, and they’re temporarily contained so that they can’t touch anything outside the sandbox (unless they leave the sandbox).
In computer security, there is […]
A few months ago, I had a problem with one of my Virtual Machines (VMs), so I fired up Wireshark, and started capturing traffic. At first I thought I was seeing things. There was a bunch of traffic that was not originating on the VM; it was originating on the host OS. That seemed mighty […]
Software is a fact of modern life, but not all of it is safe to use. The real problem is that there is no way for us to tell if a program is good or not. There is no software vetting process, no “seal of approval” that our programs are good, so all we can […]
By now, I hope you’re aware that all of your programs can access your Quicken data. If you don’t care if your data is lost, destroyed, stolen, or published on the Internet, then you don’t have anything to worry about. For the rest of us, it’s an issue that needs to be addressed immediately. Here’s […]
You may not know it, but ALL your programs can access your Quicken data. Not good. So, what can you do?
One solution to this nasty problem is to run all programs in a security sandbox. Unfortunately, the sandboxes in Windows 8 and Mac OS X Mountain Lion (10.8) are voluntary. Programmers can choose to […]
Note: The issue discussed on this page affects you if you use Windows or Mac OS X, unless you have taken the following precautions:
For Windows: You are running Windows 8 or later, and only purchase and run programs from the Windows App store. For Mac OS X: You are running Mountain Lion (10.8) or […]
The easiest way to take advantage of the new security sandbox technology is to upgrade your hardware and software. Not everyone can afford to do that. What other options are there if you want a security sandbox? Sandboxing is closely related to virtualization. Virtual computing is a good way to get some of the benefits […]
Ever been interested in a certain product, and done some Google research about it? Then, for days afterwards, whenever you go to a website, you see ads for that very same thing? What a coincidence! Well, actually, it is not a coincidence. It is called Targeted Advertising. Whenever you browse to a certain site, the […]
Indulge me in a little test. Create a text file on your PC. Copy and paste this into it:
<html>
<body>
<br>My secret plans to become the next billionaire.
<br>My secret recipe for killer scones to sell to Starbucks.
<br>My password to all my websites.
[…]
Suppose you run Quicken. You enter your checkbook balance, and some checks that haven’t cleared the bank. Then, you enter the password for your online account at the bank, and download your checking account history and/or your credit card history.
Now that you have synchronized your computer with your bank, Intuit (the makers of Quicken) […]
|
|
Recent Comments