Up Up Down Down dot Net: News of Innovation, K-12 IT, Enterprise Networking, and all things Tech.

Sunday, January 14, 2007

Stringing-along 419 scammers for my amusement

You know those Nigerian guys that would love to buy your items with fake checks, or have 1 MILLION DOLLARS and they want to share with you...well this guy baits them on and messes with them.

read more | digg story

Scambaiting. How a 'Nun' scammed a Nigerian email scammer - with photo

Ever been offered larges amounts of money from Nigeria? Well this group of 'scambaiters' are taking their revenge on those elaborate hoax emails. Check out the photo of the Butterfly scammer. Apparently they have developed 'scambaiting' software.

read more | digg story

Saturday, January 13, 2007

Do-it-Yourself Phishing Kit Found Online

A software kit has been discovered for sale on the Internet that makes it possible for non-experts to set up and carry out sophisticated phishing attacks on large numbers of websites.

read more | digg story

Friday, January 12, 2007

So neighbors steal your wi-fi net access, kill the connection or have fun

So you find out that everyone in on your block is using your network without your permission. Do you lock it down or...? Or maybe you want to have a little fun. A little creativity with squid and you could turn your everything they browse upside down (literally)

read more | digg story

Wednesday, January 10, 2007

Teacher convicted due to porn pop-ups on infected computer

Is this a miscarriage of justice? A substitute school teacher in Connecticut has been found guilty of exposing children to porn when pop-ups appear on infected school computer. She could face up to 40 years in prison.

read more | digg story

Sunday, January 07, 2007

understanding ARP Posioning attacks

Sniffing in a non-switched network where hub is used is a very easy process as you can capture every packet flowing on the network. You just need to run the sniffer and you are done. But when it comes to switched network things are little different as switch are intelligent enough to route the packets to destination Mac only.

read more | digg story

Fix Mom's Computer Without Leaving Your Desk

This is an article about an excellent set of tools for remotely accessing/operating other peoples PCs.

read more | digg story

How To Build A Voip Network - An Expert's Guide

A great forum post on the rules and requirements for building a succesful VOIP network - from a guy with hand's on experience, who has spent a lot of time with other experts in the VOIP community.

read more | digg story

Thursday, January 04, 2007

How to: Conduct a Basic Security Audit

These days every business--from Fortune 500s to Mom and Pop groceries--have valuable IT assets such as computers, networks, and data. This detailed 10-step guide can help anyone to conduct their own quick n dirty security audit.

read more | digg story

Wednesday, January 03, 2007

How To Build A Spam Filtering Mail Gateway

"You can use filtering software loaded on all your users computers, but that takes a lot of time to install and maitenance can be real drag on your time and resources. A better way is to use a centralised device which filters your spam before it enters your enterprise. This is called an Anti-Spam Gateway."

read more | digg story

Get your iBook working again with fire

Getting an old 700MHz iBook working with large flame and alcohol. Great pictures and even a video. Learn how you can save your old broken iBook today!

read more | digg story

eXTReMe Tracker