Risk
10/30/2007
01:18 PM
Keith Ferrell
Keith Ferrell
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Free Security Tech Support: Treat Yourself (And Your Computer) On Halloween

Security Company CyberDefender's offering free phone-in technical support for one day only -- and that day's tomorrow, October 31. How's that for a Halloween treat?

Security Company CyberDefender's offering free phone-in technical support for one day only -- and that day's tomorrow, October 31. How's that for a Halloween treat?The company's putting its mouth where its money is: they've announced free phone-in tech support (click here for further details) all day tomorrow and until 9:00 AM PST on Thursday, November 1.

Here's a chance to get a live tech person on the phone and talk through your computer problem -- and get talked through to a solution for problems ranging from, as they put it, "startup, shutdown, or slow performance." At no charge. The company offers phone-in tech-support bundled with their premium products on the other days of the year.

Nice approach on a scary day -- be interesting to find out how many calls CyberDefender gets, and what sorts of patterns of problems it finds.

And how many calls they get. Nothing worse than running out candy while there are still trick-or-treaters at the door.

But the company assures me that they've got plenty of technicians ready to field the calls. They do suggest that you make things run faster (same as they hope to make your computer run) by having the computer already booted up, having it connected to the Net (in case they need to take a remote look, with your permission) and -- obviously -- having your phone beside the computer before you call.

Pretty sweet surprise for Halloween.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.