Author: gpanther

  • Free Microsoft e-book: Writing Secure Code for Windows Vista

    From /dev/random (where I stole the title from – because I’m a lazy bastard :-)): you can get an (electronic) copy of Writing Secure Code for Windows Vista by signing up for a free newsletter. I actually have read an older version of the book and found it very good. A large part of it…

  • Solution to the Ethical Hacker Challenge posted

    Not to this one, but to an older one. This is the announcement and here is the winning solution. This one was actually one of the harder ones for me, I missed the hardware keylogger and didn’t figure out the Vigenere cipher.

  • Yet an other alternative for “Reverse IP”

    Nitpicker’s corner: so the title it not 100% correct, since I’m focusing more on the question “what websites are hosted on this server” rather than “what DNS names is this server known under”. Here are some possible ways to answer this question: Do an actual reverse DNS lookup. The problem is that there isn’t actually…

  • GHDB mirror

    Seeing that the GHDB (Google Hacking DataBase) might soon disappear (the site was offline for weeks recently for example), I grabbed a mirror of it and put it up on a free hosting website (no, not that one) – enjoy it while it lasts: the main page a link to each individual entry – this…

  • Mixed links

    From the Notes & Thoughts blog: a new AV blog – the Avira blog. An other reason for linking to them is that it is impossible to find it from Google 🙂 (probably because they used “techblog” instead of “blog”). Keryx Tutorial: Bringing Updates Home – Keryx is a cross-platform tool to download Ubuntu packages…

  • Physical condition

    I mentioned some time ago that I’ve started the one hundred pushups program. A small progress report (hopefully this can inspire others to start doing a little more exercise): In ~7 weeks (not counting the holidays) I went from 5 pushups to almost 60! This is not exactly the 100 which I should have done…

  • “Official” DDoS tools

    There are quite a few people who perform computer attacks while claiming political reasons. The Arbor Network blog discusses a recent example: a group of people asking you to download and run their tool it “help israel” (this could maybe be called “political-engineering”, and is quite curious, because people are being told that the downloaded…

  • pl/lolcode

    The news (via Joshua Drake’s blog): video / audio / slides available for two more talks on the postgresql conference site. Now for the funny part (this is from the slides of the “Babel of Procedural Languages” by David Fetter): HAI CAN HAS DATABUKKIT? I HAS A RESULT I HAS A RECORD GIMMEH RESULT OUTTA…

  • New packetlife contest

    The January contest for PacketLife is up. As usual, I have absolutely no idea on how to approach it :-), but I’m very curious about the solution.

  • Congestion Control in Computer Networks

    Here is a short presentation I’ve done about congestion control in computer networks. Some thoughts: Things usually are simpler than they look. For example the TCP congestion control algorithm. Still, they can be very powerful (this is similar with DES for example – which I’ve had to reimplement for “educational purposes”, and found that, at…