Author: gpanther

  • Companies, technology and security

    When I saw this piece in my google reader, I thought: that’s interesting, so I headed over and checked it out thinking that I get some information about are the practices at big companies. Somewhat disappointingly it was just a link to a tutorial which looks like it was written by someone who is just…

  • Hack the Gibson – Episode #56

    Read the reason for these posts. Read Steve Gibson’s response. Here I am again, as promised. I won’t turn soft because of a nice e-mail. (Then again I hope that these posts are of technical nature, they point out objective mistakes and don’t become a personal attack. If you think that I’m sliding in that…

  • (Yet an other) Javascript random password generator

    Here is YARPG (Yet Another Random Password Generator). Why on earth would I do yet an other random password generator? Because I can :). Seriously: there are at least two random password generators out there that I’ve used, and I have some problems with them: The one that Steve Gibson created can not be customized…

  • Steve Gibson responds!

    Steve Gibson responded to my blog postings. It’s a very nice response and I must say that maybe I’ve misjudged him. This doesn’t mean that I’m getting soft, but every side should get a chance to display his opinions. Here is the letter I’ve received (republished with the permission of the sender): I’m sorry that…

  • Wisdom of the crowds? Maybe not

    Yesterday I’ve spotted the following article on the digg frontpage: PacMan written entirely in Excel. On the page it linked too I’ve found two games written in Excel and VBA (Visual Basic for Applications – the stuff macro viruses are written in). What is interesting that as of the time of me writing this there…

  • Traceroute on Windows and Linux

    Did you know that the Linux version of traceroute uses UDP packets with various TTLs instead of ICMP echo requests by default? I sure didn’t, but thinking about it is a very smart way to do it. My only question would be: doesn’t this interfere with the operation of a server if you happen to…

  • Rookits? Who needs rootkits?

    What are rootkits and why are they dangerous? You can read the detailed explanation at Wikipedia which I won’t reproduce, but the basic idea is that they alter the operating system (using either documented or undocumented methods) so that certain objects (processes, directories, files) become invisible. They are very dangerous because they breed new life…

  • Bye-bye DHTML Editing

    While browsing on the MSDN website, the following article caught my eye: Replacing the DHTML Editing Control in Windows Vista and Beyond. It seems that starting with Windows Vista the fast and dirty way to add WYSIWYG editing to your web pages with IE won’t be available any more because the needed ActiveX component won’t…

  • Software vs. Hardware firewalls

    I’ve already done my post for the day and was listening to episode 56 of Security Now when I’ve heard something that ticked me of. I hear this all the time from various sources (but those are mostly uninformed and not security experts). This won’t be an other Hack the Gibson post, although you can…

  • WAP

    Yesterday I’ve participated in the local Windows Academic Program pitch. The main content was delivered by Adrian Marinescu. I can sum it up as a short version of the book Windows Internals. For the one of us who actually have read the book it was a little boring (although in the breaks I’ve managed to…