It's a rare and exciting opportunity when I get to introduce something I've developed. I'm an administrator for a small phpBB forum and I've regularly installed mods to tweak the behavior of phpBB to match my user's needs. I did some looking around but couldn't find anything to match a direct request I had: Open all the unread posts in one click instead of having to click each … [Read more...]
Microsoft SuperPreview and BrowserShots – Your website in different browsers
Due to the way Internet Explorer is integrated with the Windows operating system and just the restrictions Microsoft puts on it in the first place, you can only have one version of IE on a machine at a time. Of course, I've covered Tredosoft's Multiple IE solution before, which does allow you to have more than one version, but Microsoft has just released (in beta) a solution … [Read more...]
Power Manage PC Power Management
With Green Initiatives becoming the norms these days, lots of people are looking for elaborate ways to save electricity and reign in their energy-sucking computers. Looking at the numbers, we can see that just turning off something like a CRT monitor when it's not in use can save a lot of juice. There are quite a number of elaborate schemes and utilities (both hardware and … [Read more...]
Prevent the latest exploit in Adobe Acrobat, Disable JavaScript
If you haven't heard already, there is a buffer overflow attack in the wild that exploits the fully-patched and latest versions of Adobe Acrobat and Adobe Reader, 8.3 and 9.0. The exploit can come in the form of opening a malicious or poisoned PDF file. You can read more about the specifics of the attack and how it works from an article at The Register. To summarize the … [Read more...]
Book Review: Exploiting Software – How to Break Code
Exploiting Software - How to Break Code by Greg Hoglund and Gary McGraw is an earlier work by the same authors of the previously reviewed Rootkits. This one dives into the security risks for poorly coded software. Copyright 2004, the book provides lots of examples of exploitable code from wrongfully used functions and improper coding methods five years ago. Despite its age (5 … [Read more...]