This is a follow-up to an article Martin wrote about a computer he found whilst helping a client move offices. It is surprising what you can find in the back of cupboards. Whilst helping him find out more details about his portable computer I came across this video by The …
CISA advises three exploited vulnerabilities
Although a US government agency the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog is a valuable resource for anyone responsible for cyber security. It reports on mainstream and less used software so that offbeat package you use could be reported on one day! They have released an …
Continue reading “CISA advises three exploited vulnerabilities”
The money involved in ransomware
Research has shown that payments to threat actors, demanded by ransomware, has dropped, but the double action of stealing the data and threatening exposure and encrypting that data at source is increasing: Ransom payments fall as fewer victims choose to pay hackers (bleepingcomputer.com) This next story wasn’t really surprising, that …
IBM 726 dual tape drive. A Platinum Jubilee Fact.
There was a time, in TV and movie history, when if you needed to show a really powerful computer, then it needed lots of big cabinets with big spinning tapes – for example have a look at the image above from the 1964 film Dr Strangelove or the example below …
Continue reading “IBM 726 dual tape drive. A Platinum Jubilee Fact.”
Legacy software – always a challenge
Old software that does exactly what you want, in the way you like to do it is everywhere – I am still using a copy of Paint Shop Pro v7.04 from 2000! But what happens when that legacy software or hardware is part of vital infrastructure or other systems? Bruce …