Be careful on downloading video files…

Microsoft ‘MPEG2TuneRequest’ Object Vulnerability

Another remote execution issues found last July 6, 2009 regarding vulnerability in Microsoft Video ActiveX Control. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. When using Internet Explorer, code execution is remote and may not require any user intervention. Meaning to say, an attacker can easily manipulate security settings of your computer by just using Internet Explorer. In other word, one possibility is you can be locked out from using your own desktop or laptop.


Read more

Which Operating System do you prefer in replace of Windows XP

Windows 7, Windows Vista, Linux, or Mac OS

Sooner or later Microsoft will phase out Windows XP in the IT industry. Which operating system are qlick to your preferences or current setup?

Read more