Router passwords

Following up on my recent post about computer security (and my comment about phishing scams being cross-platform), Bruce Schneier has posted an entry about “Drive-By Pharming”. It has a stupid name, and it’s nothing to do with wireless access; there is also some doubt about how feasible the attack vector actually is. Still, it’s worth …

Computer security

I see that there’s now a UK version of the “PC vs Mac” adverts. These are pretty similar to the original American versions, although there are fewer UK ones so far. Still, I think that they’re quite funny, and I actually prefer the UK ones, mainly due to the actors involved (Mitchell and Webb); the …

Windows Vista: first impressions

Two weeks ago I went off to a Microsoft event in Reading: “Ready for a New Day: Microsoft’s Launch of Exchange, Office and Vista”. That was quite interesting, and I came away thinking that there are enough useful features to justify an upgrade. They gave me a freebie copy of Windows Vista and Office 2007 …

Upgrading to Visual Studio 2005

Today I got my copy of Visual Studio 2005 through the post, so I’ve been having a play with that, by upgrading some of my VB.NET 2003 projects. Unfortunately, I got a rather confusing error message from them, and I couldn’t find much info on the web, so I’m documenting it here for other people’s …

Anatomy of a hack: mail server

Today I’ve been fixing a problem with my mail server after someone “hacked” (cracked) it. I’m reconstructing the chain of events as best I can, but the causality wasn’t obvious at the time. Background: this machine is running Windows Server 2003 SP1 with Exchange Server 2003 SP2. A few weeks ago, someone gained unauthorised access …