tag:blogger.com,1999:blog-564647735809658980.comments2012-06-17T12:07:16.925-05:00Computer Security for Home and SB UsersBrice Smithhttp://www.blogger.com/profile/02005536770483633716noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-564647735809658980.post-80149039117738821772010-01-02T11:06:38.903-06:002010-01-02T11:06:38.903-06:00As long as you change the default SSID name, the a...As long as you change the default SSID name, the answer to your question is no. Most manufacturer's default name has the vendor name, for example "Linksys". This is one of the reasons you want to change that. Also, I would advise you not to broadcast your SSID, which is in the setup of your router. And lastly, if you are concerned about some kid seeing your wireless AP, you should secure it with WPA2, not WEP. WEP was cracked years ago and can be done fast by someone with the right tools.Brice Smithhttps://www.blogger.com/profile/02005536770483633716noreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-11824240642629273592009-10-16T12:22:58.405-05:002009-10-16T12:22:58.405-05:00I read your post and i have one question,is it pos...I read your post and i have one question,is it possible to someone find out my model and serial number of router when i change the ssid which is a speedtouchxxxxxx and set a wep key. I change ssid to a name and numbers and wondering can some kid see my model and serial num...Unknownhttps://www.blogger.com/profile/06980330524225297978noreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-90968270797275679102009-02-01T01:57:00.000-06:002009-02-01T01:57:00.000-06:00I have too have made the mistake of buying Cleaner...I have too have made the mistake of buying Cleaner 2009. Your comments about it are too nice. Not only have I expericed the issued you talked about but getting a response on the phone is not realistic. They system hangs up on you after 40 min. of hold time. Stupidly, I sat on the phone (with redials) for 3 hours.The couple times I got through I got one round around and one guy hung up, and I wasn't being antagonistic because I thought he was actually going to help me. Both times it sounded like they had 5 people around 1 table with one phone jack, so the crackling was intense. Here is my name and email if anyone what to verify this with me.<BR/>Jeff Golden<BR/>jlgefp@aol.comAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-35965286053100981912009-01-31T09:44:00.000-06:002009-01-31T09:44:00.000-06:00Well you can remove the code that was injected fro...Well you can remove the code that was injected from your web app. Now for the hard part for you, you need to find out what enabled the bad guys to inject the code into your app. There are tools that you can run against your web app like Nessus that will check your application for vulnerabilities. Once identified, you can probably find information on the Internet to fix it. You just have to have some kind of scanner to review your web app with.Brice Smithhttps://www.blogger.com/profile/02005536770483633716noreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-1323392870250528732009-01-31T08:33:00.000-06:002009-01-31T08:33:00.000-06:00my site is also infected by iwdown/inc/e.js. How t...my site is also infected by iwdown/inc/e.js. How to solve this problem?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-26341863683512285762009-01-10T11:38:00.000-06:002009-01-10T11:38:00.000-06:00LOL, maybe she changed her password to 's@dn3$s'. ...LOL, maybe she changed her password to 's@dn3$s'. And yes it is funny...if you don't work for Twitter.Brice Smithhttps://www.blogger.com/profile/02005536770483633716noreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-32842054039836303982009-01-09T21:59:00.000-06:002009-01-09T21:59:00.000-06:00did the Twitter Admin change his password to "sadn...did the Twitter Admin change his password to "sadness" after he was hacked? haha... ok not funnyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-23572461964483911832009-01-07T21:37:00.000-06:002009-01-07T21:37:00.000-06:00If you trace the phone number(s) calling with this...If you trace the phone number(s) calling with this pitch, you will find they come from all over the US. Not only that, but oft times they target people who do not even own cars.<BR/><BR/>These calls are coming in to cell phones which are on the do not call list.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-564647735809658980.post-73813883178459957942008-09-04T08:13:00.000-05:002008-09-04T08:13:00.000-05:00Children in this century is in difficult situation...Children in this century is in difficult situation. The internet has changed everything. Its technology which is very useful also brings destruction to our children. Hopefully, web companies can help to save the kids. Perhaps later on we need to register ourselves to social bookmarks lively via webcams.Anonymousnoreply@blogger.com