Author: gpanther

  • More links

    Zone-H got defaced!. Read the article for an in-depth analysis. America is in debt bigtime Pamela-Systems – is it just me or does this name remind others too of the other Pamela (the NSFW one)?

  • A mixed bag of comments – part 2

    Via the boagworld forum: Web Design Tools. I haven’t checked them all out, but the color chooser ones look very interesting. A simple (but not really easy to use and unsupported tool to mount CDs from Microsoft (via tech-recepies): Virtual CD Control Panel – be sure to take a look at the readme file before…

  • Hack the Gibson – Episode #71

    Read the reason for these posts. Read Steve Gibson’s response. Hello all! Here is the latest of my rants / commentary series regarding the Security Now! podcast. This podcast is dedicated to discussing a vaporware security freeware: SecurAble. This isn’t more than a glorified CPU identification utility, similar but (based on the description) much more…

  • I know what you did last page!

    With the hype around AJAX many people jumped on the Javascript bandwagon and assumed that everything should be done client side (even encryption) and even when perfectly suitable server side solutions exists, people insist on using Javascript. (Just a quick note: I realize that many times a well written client side script can (a) hide…

  • A mixed bag of comments

    A short post of things I found in my Google Reader: A new challenge from the guys over at SANS: The Twelve Days of Christmas Packet Challenge Also there are some vulnerabilities there: All I want for christmas are my exploits…. – my thoughts: you have to be insane to put your DB server on…

  • I’m not a ‘lone bitter old man 🙂

    You might remember this post, where I was criticizing the so called vulnerability in Internet Explorer 7. Alex Eckelberry over at the SunbeltBLOG just came out with a post saying the exact same thing. While I don’t agree with many of his previous posts (like those about HIPSs and Patchguard), this one is spot on.

  • What you don’t need javascript for – part 2

    Read part 1 of my rant There is a saying in Hungarian: Don’t look at the teeth of a horse you received as a gift. It refers to the fact that you shouldn’t criticize something if you get it for free. However from time to time I feel the need to raise my voice about…

  • Hackers and Hollywood

    Servers in the Movies Top 20 Hackers in Film History What code DOESN’T do in real life (that it does in the movies)

  • Portable GUI applications

    After moving almost entirely to Ubuntu (I haven’t booted Windows on my home computer for almost a month now :)), I searched for ways to create little applications which I can use at my workplace (in a mostly Windows environment). For command line scripts Perl worked out great (just a reminder to everyone, including myself:…

  • The fact that you write for a big site doesn’t make you an expert

    The corollary of the above being: don’t rephrase what the expert said if you don’t understand it. Real life example from an eweek article: The Redmond, Wash. software giant has convinced major U.S. computer makers—including Dell, Gateway and Hewlett-Packard—to make default changes at the BIOS level to allow a new Vista security feature called ASLR…