Your Ad Here
IVC Inc. Match.com

FireFox 4.0 RC on Windows

6 comments
Firefox 4 has moved out of its beta period and is now in the “release candidate” stage.

Around 70% of Firefox plugins are compatible with Firefox 4, and the browser has been optimized for better add-on management, as well. Users can submit feedback on the browser’s performance or issues at any time from the Help menu.

Also, the new RC release represents significant bug fixes (8,000 squashed and counting) and performance enhancements, including faster start-up, speedier graphics rendering, and faster page loading.



screenshot Of reader Lens

How to Get Free Food (Basic)

1 comments
If there is already a tutorial on this, do not flame, instead just see this as my version. I have a few different methods:

METHOD #1:
1) Get some food (e.g. fries)
2) Pull out a piece of hair
3) Put it in the food
4) Return food and complain
5) ???
6) Profit

METHOD #2:
Note: This is mainly for drive throughs.
1) When you get to talk to a worker, tell them someone you know (friend, relative, etc.) was just there and did not receive an item he/she ordered. He/she is already home across town and knew you were on the way over, so he/she called you to pick it up for them.
2) If they are stupid and ask for the receipt, repeat step 1. If not, proceed to step 3.
3) ???
4) Profit

METHOD #3:
1) Go to a restaurant and eat in.
2) For your sides, order things that sound similar (e.g. fries or rice)
3) When your meal comes, tell them you ordered the similar sounding item. (e.g. "I ordered fries, not rice.")
4) ???
5) Profit
screenshot Of reader Lens

Social Engineering Facts

0 comments
Social engineering exploits human nature by convincing someone to reveal information or perform an activity. Examples of social engineering include:

Impersonating support staff or management, either in person or over the phone.
Asking for someone to hold open a door rather than using a key for entrance.
Spoofed e-mails that ask for information or ask for tasks to be performed (such as delete a file or go to a Web site and enter sensitive information).
Looking on desks for usernames and passwords.
Specific social engineering attacks include:
Attack Description
Dumpster diving
Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.

Shoulder surfing

Shoulder surfing involves looking over the shoulder of someone working on a computer.

Piggybacking

Piggybacking refers to an attacker entering a secured building by following an authorized employee.

Masquerading

Masquerading refers to convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
The attacker usually poses as a member of senior management.
A scenario of distress is fabricated to the user to convince them that their actions are necessary.

Eavesdropping

Eavesdropping refers to an unauthorized person listening to conversations of employees or other authorized personnel discussing sensitive topics.
Phishing Phishing uses an e-mail and a spoofed Web site to gain sensitive information. In a phishing attack:

A fraudulent message that appears to be legitimate is sent to a target.
The message requests the target to visit a Web site which also appears to be legitimate.
The fraudulent Web site requests the slave to provide sensitive information such as the account number and password.

Hoax virus
information e-mails is a form of a phishing attack. This type of attack preys on e-mail recipients who are fearful and will believe most information if it is presented in a professional manner. All too often, the victims of these attacks fail to double check the information or instructions with a reputable third party antivirus software vendor before implementing the recommendations. Usually these hoax messages instruct the reader to delete key system files or download Trojan horses.

screenshot Of reader Lens

Advertisement

 

Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com