I first started using Google Adsense sometime in 2003 or 2004. But using Adsense with WordPress isn’t completely straightforward. So here’s an easy, concise guide to using Adsense with WordPress, including within your content.
I’m not a full-time blogger. I’m a computer security analyst by day, and blog part time. I went to journalism school in the ’90s in hopes of landing a job that doesn’t exist anymore. Some of what I learned about printing magazines applies to modern blogging. Some of it is subtly different. I don’t need to make a ton of money blogging, but I don’t blog to lose money either. There are an awful lot of bad people with bad motives making a lot of money online off sketchy or downright dishonest content. I’m writing this so the good guys can learn what the bad guys know, and make a little money too.
On Monday, March 13 at approximately 10:30 AM CST, I will be appearing on KFUO Radio’s Faith and Family program to discuss home computer security with host Andy Bates. One of the questions he’s planning to ask: How can I know how secure my home computer is? Or, to put his question another way, how safe is my computer from hackers?
I’m going to use this space to elaborate ahead of time on some of the things we are going to talk about. We could talk for an hour on any of the questions he’s going to ask, and he gave me three questions and 25 minutes. This is my workaround.
I guess Matt Weeks is as sick as I am of tech support scammers, because he developed a way to fight back, in the form of a Metasploit module that exploits a software defect in the AMMYY remote access tool that these scammers sometimes use. Metasploit is a tool that penetration testers use to demonstrate–with permission–how hackable a computer network is. In this case, the would-be victim is penetration testing someone without permission. Run the module when the scammer connects to the would-be victim, and he or she gets a command prompt on the criminal’s PC. At that point, the would-be victim can break their computer, perhaps by deleting critical files, corrupting the Windows registry, or something else. Anything you can do from a command prompt would be possible at that point.
I’m anything but heartbroken that this threat exists, although I’m not going to do this myself. Let me explain. Read more
On Slashdot, a newcomer to the IT field asked a really good question: What do you do to avoid seeing things you’re not supposed to see?
Clearly, some people do it better than others, but it seems to me it’s a fact of life that eventually you will see things you’re not supposed to see. How you handle it is the bigger problem. Read more
After Ebay got hacked, someone asked Rob O’Hara why they don’t just hire hackers to stop the hackers.
That’s a more complicated question than it sounds like. The simple answer is that most companies do, but their hackers don’t find everything. The more complicated question is one of ethics. Read more
I’m reading the excellent Blackhatonomics right now. And one thing I read in it reminded me of a question that someone asked me last year. I was probably the third or fourth guy with an advanced security certification he’d met, and he asked me one day what it is that keeps us from turning criminal.
I said, “Well, for one thing, good guys have much longer careers.”
I didn’t cite a specific example, but Blackhatonomics cited the case of Albert Gonzalez, the infamous hacker convicted of breaking into TJX, Dave & Buster’s, and others. His crime spree, which ended when he was captured in 2008, netted him $2.98 million.
He was convicted in 2010, and had to give back what was left of his fortune, and now is serving 20 years in a minimum-security prison.
I like my approach better. Read more
My tell-all about my encounter with “Computer Maintenance Department” was a little heavy on the jargon yesterday. It occurs to me that explaining what some of the terminology means, and the problem with their reasoning, may be helpful. I’ve also heard a few questions through various channels, and I think those are worth answering. Read more
This week I posted a link to a video showing how to crack a WPS-enabled wifi network, and this week, Ars Technica wrote a firsthand account of cracking a password list. I’m sure this raises questions of ethics in some people’s minds. To be honest, spreading this kind of information makes me a little uncomfortable too, but I also think it’s necessary.
I saw this on Slashdot today: A computer science student was expelled from a Canadian university for practicing what most people would call white-hat hacking.
Their reasoning: “Schools are supposed to teach best practice, which includes ethics and adherence to reasonable laws.” Read more
There’s a crazy rumor going around saying that the government didn’t do much of anything to create the Internet, and that private industry did it all.
I remember the Internet before the private sector got involved in it. I was there.