{"id":226,"date":"2007-05-17T09:31:36","date_gmt":"2007-05-17T13:31:36","guid":{"rendered":"http:\/\/clay.blogdns.net\/?p=226"},"modified":"2007-05-17T09:45:28","modified_gmt":"2007-05-17T13:45:28","slug":"ocr-eeye-demo-vistao2k7-hack","status":"publish","type":"post","link":"https:\/\/claymccauley.info\/index.php\/2007\/05\/17\/ocr-eeye-demo-vistao2k7-hack\/","title":{"rendered":"OCR, eEye demo Vista\/O2K7 hack"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.ocregister.com\/gadgetress\/archives\/2007\/04\/hacking_vista_e.html\">OCRegister blog: Gadgetress &#8211; post: Hacking Vista: Easier than you&#8217;d think<\/a><\/p>\n<p>I thought I would post this for any of the non-techies that happen across my site.  In case you&#8217;re thinking about upgrading to Windows Vista because it&#8217;s more secure, you might want to take a look at the <a href=\"http:\/\/www.youtube.com\/watch?v=0fAdcrin9Mc\">video<\/a> on the link above.  The guys at eEye show just how easy it is to use the old trojan horse tactic to hack a computer running the latest OS from Redmond.  In this case the attackers use an attack script disguised as a word document to take control of the target computer.  I do have to wonder if <a href=\"http:\/\/en.wikipedia.org\/wiki\/User_Account_Control\">UAC <\/a>was enabled on the example target, but either way it shows what is still the largest vulnerability on any computer.  It&#8217;s the human behind the keyboard.  This is the critical piece of information that Tamara C. misses on her blog.  That&#8217;s one security problem not easily fixed by software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OCRegister blog: Gadgetress &#8211; post: Hacking Vista: Easier than you&#8217;d think I thought I would post this for any of the non-techies that happen across my site. In case you&#8217;re thinking about upgrading to Windows Vista because it&#8217;s more secure, &hellip; <a href=\"https:\/\/claymccauley.info\/index.php\/2007\/05\/17\/ocr-eeye-demo-vistao2k7-hack\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-226","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":0,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"wp:attachment":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}