Disk failing, what now?

A disk can, and will, develop bad blocks during its lifetime. Usually the disk firmware is good enough in recognizing failing blocks, before they become unrecoverable and remap them, but nothing is perfect and  problems happens. In that case, where you end up with unrecoverable i/o errors, and your OS refuses to cooperate, don’t give […]

Continue reading

DHL Delivery Problem NR.59544

DHL Delivery Problem NR.59544 Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form of service to the innocent victim. The aim is to make the user perform an […]

Continue reading

Donate for Byte Night 2009; support GFI UK and help Action for Children

Each year, over 500 IT and business community professionals give up their beds for one night to experience a little of what it might be like to be homeless on the streets of London. It all began 11 years ago when 30 individuals from the IT industry slept out and raised £35,000. Since then the […]

Continue reading

Greetings from China

During the recent months, spam originating from China has been hitting the mailboxes of users from all over the world. One interesting fact is that this latest wave of spam is constructed differently from its predecessors. What makes this spam different is the way that the advert is delivered to the victim. Such spam takes […]

Continue reading

Playing with processor affinity and Python

Have you ever wondered as to how processor affinity influences a single threaded process on a multiprocessor machine? Well, I have. Today nearly all new machines come with 2 or 4 cores. If you’re lucky, you have an 8 core machine, and if you are a very lucky, you get 16 or more to play […]

Continue reading

The current and future SPAM storms

You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’

Continue reading

Conficker, at the airbase and hospital near you…

Old news: Fighter jets grounded, base infected with Conficker! Recent news: Hospital equipment infected by Conficker worm! What? How can a supposedly secure environment like a military installation or a hospital catch a worm? Panic everywhere. Why is everyone so scared of Conficker? The worm basically does nothing! It only tries to dig in and […]

Continue reading