| || |
|Tech Support Guy|
| Welcome to Tech Support Guy!|
If you're looking for free technical support, you've found it! This site is run completely by volunteers and paid for completely by donations and sponsors. There is no charge to you (although we do appreciate donations). To get started, check out the Tech Support Guy Forums. We hope you will return frequently!
"There's no such thing as a stupid question, but they're the easiest to answer!"
|What's going on around here?|
| Here's how it works!|
First, you might want to try searching for your answer. Chances are, someone else has already had the same problem you are! If you can't find what you're looking for by searching, you can post your question in our Forums, where other users will try to answer your question.
We highly recommend that you print a copy of our:
GUIDE FOR NEW MEMBERS
|Computer America Radio Show|
| We are proud to be the Official Tech Support Forums of the Computer America Radio Show! |
You can listen to the Computer America radio show every week night nationwide on the Business TalkRadio Network, or listen live on the Internet at www.ComputerAmerica.com.
| The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block |
Jul 21, 2014 - 7:25 PM - by TechSocial |
The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block |
A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites.
The type of tracking, called canvas fingerprinting, works by instructing the visitor’s web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.
Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles or other types of content are displayed to them.
0 Replies | 188 Views |
| Critical design flaw in Microsoft's Active Directory could allow password change |
Jul 15, 2014 - 10:48 AM - by TechSocial |
Microsoft’s widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place. |
Aorato used public information to craft a proof-of-concept attack that shows how an attacker can change a person’s network password, potentially allowing access to other sensitive systems, said Tal Be’ery, its vice president of research.
“The dire consequences we are discussing—that an attacker can change the password—was definitely not known,” said Be’ery in a phone interview Tuesday.
About 95 percent of Fortune 500 companies use Active Directory, making the problem “highly sensitive,” Aorato wrote on its blog.
The company’s research focuses on NTLM, an authentication protocol that Microsoft has been trying to phase out for years. All Windows versions older than Windows XP SP3 used NTLM as a default, and newer Windows versions are compatible with it in combination with its successor, Kerberos.
0 Replies | 185 Views |
| » Online Users: 2,959 |
|23 members and 2,936 guests |
| BlessingPanther, blueridge142, Chris7631, DaveBurnett, EAFiedler, foxidrive, gjdmcwzv, gjmawkvr, gustere, joel7689, LiquidTension, marhuf, Mark1956, OBP, OneClick, osamaanjum, pcatrocity, tompatrick, TulsaRose, tutorials |
|Most users ever online was 16218, 08-Feb-2012 at 01:15 PM. || || |