Archive for the ‘Network’ Category

Preserve Windows Update files

May 27, 2012

Lately Β I had to bring back to life an old Windows XP vm, and … tadaaa … tons of downloads from Windows Update. πŸ™‚
Well, lots of files to be saved for next sleeping WinXP vm to restore.

This is directory where Windows stores Windows Update file:Β  %WINDIR%\SoftwareDistribution\Download\

source Windows XP: Save Downloaded Windows Update Files For Re-Use

Windows 7 (ATTENTION: not verified!): Update Windows 7 PC Offline By Downloading Windows Updates To Another Computer

This wasy you save bandwidth and, most important, time πŸ˜‰

browsers: last closed tab(s) and other features …

August 23, 2011

Well, Opera and Chrome have some features very interesting, where Firefox is missing (???).

  • Opera and Chrome: last closed tabs (yes, more than one)
  • Firefox: last closed tab (Ctrl+Shift+T)
  • Opera: turbo , a transmission compressed so less bandwith needed

Of course, Firefox have loooooooots of interesting add-ons …. just one: AdBLock+ πŸ˜‰

MiFi = personal WiFi

February 26, 2010

Are you looking for share you internet link cordless way ?
Enable your wi-fi router … but what happen when you don’t have a *DSL?

If you have only a 3G internet access ?
Here is very very special toy, Huawei E5830
enable sharing your mobile connection with multiple devices simultaneously, via your personal WiFi … MiFi πŸ˜‰

watch MobileDeveloper.TV‘s review, hereΒ  Episode 30: Hands-on with the 3UK MiFi wireless hotspot
italian here: Huawei E5830, la prima chiavetta HDSPA e Wi-Fi

Security, two-factor authentication, man-in-the-browser attacks, etc

February 19, 2010

Home banking, webmail via https, e-commerce website … and so on!
Authentication is really important, and your browser tells you when you’re surfing over a secure connecti0n and when not.

Fraudsters are beating strong two-factor authentication and are proving that any authentication method that relies on browser communications can be defeated. A layered fraud prevention approach can thwart these attacks.
Criminals are successfully launching man-in-the-browser attacks that circumvent strong two-factor and other authentication that communicate through the user’s browser. The fraudsters are also successfully having telecommunication carriers forward phone calls used to authenticate users and/or transactions to the fraudster’s phone instead of the legitimate user’s phone. These attacks were successfully and repeatedly executed against many banks and their customers across the globe in 2009. While bank accounts are the main immediate targets, these attack methods will migrate to other sectors and applications that contain sensitive valuable information and data within the next three years.
A layered fraud prevention approach that includes server-based fraud detection and out-of-band transaction verification that precludes call forwarding to illegitimate user phone numbers can and has mitigated these threats.

read full article here: Where Strong Authentication Fails and What You Can Do About It

source: Attenzione con l’Internet Banking

Zeroconf network

September 7, 2009

Looking for a different network configuration, you might discover something unsual: zerconf. πŸ˜‰

more info here:
Zero configuration networking
Zero Configuration Networking (Zeroconf)

Technorati Tags: