Author: gpanther

  • Congratulation to AV-Comparatives!

    AV-Comparatives is an independent, well-known and well respected testing organization in the AV/Anti-Malware field. They recently published two reports and one meta-report: Whole Product Dynamic Test Performance Test Summary Reports Go read them if you have questions like “which product is the best for me?”. Thank you Andreas for providing a great and impartial service.…

  • Don’t listen alone!

    Do you like Linux? Do you listen to podcasts? If you’ve answered yes to both of those questions, you should know what LUG Radio is (if not, do a quick checking – I promise you that it will be worth it!). The bad news? They stopped it in 2008. The good news? A documentary titled…

  • delicious/cdman83

    A long overdue “linky” post: Internet Guide | dyn.com Posted: 22 Oct 2009 04:55 AM PDT Dyn (of DynDNS) is also getting in the internet content filtering business. About the Fitbit Posted: 23 Oct 2009 11:10 AM PDT BorderWare ReputationAuthority Posted: 23 Oct 2009 12:09 AM PDT Petabytes on a budget: How to build cheap…

  • Schneier videos

    Bruce Schneier is always fun, and together with Markus Ranum he is extra fun (sidenote: although it is title “face-off”, they agree more than they disagree): Schneier-Ranum face-off, part1: The future of information security Schneier-Ranum face-off, part 2: Social networking Schneier-Ranum face-off, part 3: Compliance and security Schneier-Ranum face-off, part 4: Cybersecurity coordinator Schneier-Ranum face-off…

  • New challenges

    After missing the announcement for the second part of the Network Forensics Puzzle (yes, I’m subscribed the feed now!) I would like to regain your trust by bringing two other contests to your attention: Miracle on Thirty-Hack Street from ethicalhacker.net the sevenfour challenges (a “keygen-me” type of challenge) Bonus content: t2’09 challenge solutions (via the…

  • A game of Chinese whispers

    Yet an other example of real-life Chinese whispers in the security journalism: A Hungarian online news site published an article titled “Hackers tried to steal user data from Amazon” (here is a somewhat usable automatic translation for the non-Hungarian speakers). I assume that the information went like this: What happened –> What the security company…

  • Twitter hacked

    It had to happen, didn’t it? I’ve fired up Pidgin with the microblog-purple plugin, only to get an “invalid certificate” error for twitter. I’ve quickly became nervous, since a quick digging indicated that I was getting the wrong IP address for the domain twitter.com. My first thought was: “I’ve been compromised”. After quickly verifying my…

  • Discount Codes UK review

    These days most online shops offer the ability to use discount codes at checkout and get a price reduction anywhere from 5% to 50%. These codes are announced in various media (like podcast or blogs), but even if you don’t follow the particular program, it is rather easy to find them with a search engine.…

  • I’m the spam killa’

    I’m happy to announce that I’m one of two “spam killers” on the Software Engineering radio website. Spam was starting to run rampant on their site, so they asked for help and I responded. It is so simple to donate your time to a worthy cause. You to can do it, it takes just a…

  • Screenshot forensics

    One of the interesting thing I like to do when reading (security) blog posts, is to try to deduce details about the machine setup used. You can find some very interesting tidbits of information, like Sunbelt using Symantec AV on some of their machines. A couple of current examples: a CA researcher uses Office 2007…