Not so long ago CryptoLocker victims had to pay a hefty fee to get the keys to decrypt their encrypted files. Recently, law enforcement agencies and security companies, FireEye and Fox-IT, seized a worldwide network of hijacked computers that was being used to spread both CryptoLocker and another strain of malware known as Gameover Zeus. With control over part of the network police forces and security firms were able to ascertain a copy of the database holding all encryption keys … Continue reading


The latest edition of Microsoft Windows, Windows 8, comes complete with an overhaul of the user interface and the new infamous Start Screen. At first this may appear confusing to many first time users but with the combination of new and old quick keys means many tasks can be performed in the same manner or quicker then in earlier editions of Windows. The Windows key comes into use a lot more then previous version of Windows and can typically be found at the … Continue reading


A DDoS (distributed denial-of-service) attack is an attack where the result is to make a resource, often a website, unavailable to its intended users. The attack can be performed in a variety of ways but the general idea remains the same. A collection of machines, usually zombies of a botnet, target a resource and bombard it with so many requests the services is overwhelmed and it is no longer able to service these requests. Denial of service attacks can be … Continue reading


The Computer Browser service starts then stops, this may happen in Windows XP, Windows Vista or Windows 7! A quick summart of Computer Browser service – The service maintains a list of the domain/workgroup name the computer is in, and the protocol being used for each computer on the network segment being served by the computer running the browser service. A master browser is elected from the group. The master browser is responsible for collecting host or server announcements, which … Continue reading


Logon Logoff Event Reader is a small and very basic utility I have wrote which reads the Windows Security hive and lists the logon and logoff events. These can be filtered both by user and within a timeframe, and then saved to a CSV file. Before running the program note Microsoft .NET 3.5 framework is required. The original need for this program was for use with a Terminal Server, however it will run on most flavours of the Windows operating system, … Continue reading