Author: gpanther

  • Two spaces

    Not being a native English speaker myself there are many parts of the culture I don’t know about. Like the fact that at some time putting two spaces after sentences was usual. From what I gather however this isn’t the case any more since people have failed to show the (supposed) advantage in accessibility. Here…

  • Even more links

    Have you’ve had enough yet? 😀 Recently I found out about Soushin, an free solution which tries to help you secure your PHP installation (similarly to mod_security – meaning that it doesn’t require you to modify the source code of your applications). It seems that a new feature which is currently in beta test is…

  • Hack the Gibson – Episode #72

    Read the reason for these posts. Read Steve Gibson’s response. The first thing I want to mention is that the constant marketing push for SpinRite makes me curious. I have no way to try it (because Steve doesn’t make a demo version publicly available), but after reading a book Kurt (a very well known company…

  • Perl contest

    I’m not a Perl guru (although I consider myself a medium level wizard :)), and this last contest shows it. My entry for it was 4.6258 times longer than the shortest one submitted. :(. Some tips (maybe you can do better than me): Wrapping your head around Roman Numerals is hard. I suggest that in…

  • And even more links

    Check out the 2006 Vaporware awards We have also two contests: One that has ended, and the winner actually produced a 210 bytes executable file which downloads and executes a file from an encrypted (XOR-ed) URL. See also the previous entries at the SecuriTeam blog (look for Tiny PE). And if you are into such…

  • Don’t be stupid

    Or alternatively: how to collect malware samples from the file sharing networks: Be sure that you know what you are doing! These are real, dangerous files (mostly Adware and Spyware). Get yourself a decent, open source, spyware, adware free multi network client (if you are on Windows) Search for anything. Be sure to select Any…

  • Funny quote

    The internet: Where men are men, women are men, and teenage girls are undercover FBI agents. Found it over at tssci security

  • More links

    Zone-H got defaced!. Read the article for an in-depth analysis. America is in debt bigtime Pamela-Systems – is it just me or does this name remind others too of the other Pamela (the NSFW one)?

  • A mixed bag of comments – part 2

    Via the boagworld forum: Web Design Tools. I haven’t checked them all out, but the color chooser ones look very interesting. A simple (but not really easy to use and unsupported tool to mount CDs from Microsoft (via tech-recepies): Virtual CD Control Panel – be sure to take a look at the readme file before…

  • Hack the Gibson – Episode #71

    Read the reason for these posts. Read Steve Gibson’s response. Hello all! Here is the latest of my rants / commentary series regarding the Security Now! podcast. This podcast is dedicated to discussing a vaporware security freeware: SecurAble. This isn’t more than a glorified CPU identification utility, similar but (based on the description) much more…