• Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Pentest on BT4 R1 GUIDE EXPLANATION: Text in {} = Titles # In front of text = Info Text in [] = Your Input # Here are some examples on [] from the guide beneath: # set LHOST [IP ADRESS INT.] = set LHOST 192.168.1.15 # rdesktop [IP]:[port] -u "[USERNAME]" = rdesktop...
  • Disaster Recovery Planning Keys to Success

    Disaster recovery planning is a great idea until someone actually has to do it. There are many reasons and events that will try and sabotage your disaster recovery planning project. Here are 10 keys to developing a successful disaster recovery plan and implementing it successfully.1. Set...

Friday, May 6, 2011

The U.S. Federal Bureau of Investigation warned computer users Tuesday that messages claiming to include photos and videos of Osama bin Laden's death actually contain a virus that could steal personal information.The FBI said in a press release that emails with supposed links to bin Laden death photos or videos could unleash a virus that can damage computers.The warning comes as security companies...