Blessed are the Geeks, for they shall internet the earth

What's old becomes new again

thenetworkadministrator.com is not dying but changing. It's been a while since the last time I wrote for thenetworkadministrator. I think I still had hair back then. Time has moved on, and so did I for a while. Now it's time to come full circle and here I am back …

Read More →

Virus Insecurity

Viruses are to the IT department, what venereal diseases are to doctors. Once a virus can infiltrate a users contact list, it infects the user and all the people the user has ever had e-mail with. The "I Love You" virus is a perfect example of this; The I Love …

Read More →

The Healing Powers of SPAM

If there were any truth in Internet advertising, with respect to SPAM, the world would be a thinner, more medicated, lower interest rated, a place where lonely housewives finally have a place where they can be appreciated. And lets not forget the advancements in penis...

Read More →

Phising

Phishing is what a spammer does when he or she wants to steal someone's identity. Some have labeled the action as "Social-engineering hacking done through e-mail", but there are no hackers involved in this scam. Phishing is all the work of spammers and conmen.

Read More →

2004 Top Hacking Tools

Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, trojans and worms. Hackers and spammers use all the latest software security holes, worms and trojans to attack many businesses and trick Internet users into revealing their personal and...

Read More →

Subscription based licenses

A study released by the Macrovision Corporation says that more than 50 percent of software publishers favor subscription-based software licensing by 2006. Subscription-based software licensing is nothing more than a fancy term for leased software. The lease product...

Read More →


AD Space
Seriously ads? Yes I need to think about ads. I need to pay for the shit some way.