The groundwork for the display of 3D graphics and 3D stereographics using the web has been laid. Head-mounted displays such as Google Cardboard and Oculus Rift now make it possible to view stereoscopic scenes in your home or out on the street.
This is a short follow-on to the Passwords and Hacking series.
The Internet worm "Morto A" continues to infect computers. It uses Microsoft's Remote Desktop to spread. It attempts to gain access to your computer using Remote Desktop's protocol. It will succeed if your password is one of 37 simple passwords listed below.
Solution: Don't use a simple password. See Passwords and Hacking for various means to create complex passwords.
Microsoft has confirmed that Internet Explorer (all versions) has a bug that allows the browser to run software as you on your computer. Making it happen is rather technical, but it can happen when you go to a "specially crafted"1 web site that downloads the code into the browser than causes the browser to execute the code as if it were part of the browser's regular code. The attacks "in the wild"2 use Flash on IE V9, 10, and 11.
Cloud computing offers small and medium businesses (SMB) many opportunities to reduce computing costs and improve their internal computing operations. The attached file contains the slides from a presentation I made to a group of SMB executives. The discussion below is my slide-by-slide notes.
There are several services that meet these needs. Like the desktop solutions, some cost and some are free. These tools work by encrypting passwords you enter into your browser and saving those encrypted passwords on a server.
How many accounts do you have – one, five, ten, twenty or more? There are accounts for email, online banking, games, shopping, retirement, entertainment, Facebook, work, networking, blogging, and others. Many of these categories have multiple accounts. You know that you should use complex passwords, but complex passwords are hard to remember so you reuse the same password for many of these accounts. You are not alone.
Firefox, Chrome, and other browsers have had anti-fishing mechanism for a couple of years. These browsers prevent users from going to know phishing sites unless each site is specifically approved. Crackers have found a method to bypass browser security by using email.