-
Hack the Gibson – episodes 63, 64 and 65
Read the reason for these posts. Read Steve Gibson’s response. Hello all. I have little time lately to blog. Also the latest episodes of Security Now seem to contain less and less errors, allowing me to do one post for three episodes. Episode #63 Steve Gibson says: But frankly, you know, a personal firewall, a…
-
How to know what you’ve installed?
I’m doing a presentation on wireless as a school project (so that it can be included in a book ;)) and came across the following problem: neither OpenOffice 2 nor Gimp can read SVG files so I had to convert them in something which they can display (preferably PNG since it can preserve the transparency…
-
Do NOT simplify when you are explaining!
Or at least make it very clear when you do so! Simplifications and metaphors are very dangerous because they hide some detail deemed non-important by the person who is using them. But you can’t know in which context your explanation will be read (if you are posting it on the Internet), so be sure to…
-
The perfect solution?
I’ve been experimenting with different collaboration solutions, and I think I may just have found the one: Socialtext. What I really like: It is open source (just click the for developers link) It is free (if you don’t want the support) It is written in Perl It has an API for manipulating the pages (I…
-
Two contest you might enjoy
Two contests you might consider checking out if you are a security person: The Hitchhackers Guide to the Galaxy – HTML / scripting oriented The malware analisys quiz 7 from SANS – a challenge oriented more at disassembly, and be aware! this is a real malware sample! Good luck
-
Tracking web users
Again, this will be something new here (at least for me): I’ll publish a pre-rant for Security Now! Steve Gibson expressed interest in the subject of cookies, so I’ll tackle that in this post and also the more general question of user-tracking. I discuss different ways it can be accomplished, ways you could protect yourself…
-
Stars of the earth
Hello all (of my 2 readers, one of which is my girlfriend 🙂 )! This is my 50th post, so I thought that I do something special with it. The blog has grown steadily until now and I have many more subjects that would like to write about. The picture below stands as a small…
-
Talking out of your head (as opposed to an other body part)
Recently a hoax / misinformation / hype is making its way around the web (or at least the part of the web I see ;)). I’m talking about the article title Internet Explorer 7 – Still Spyware Writers Heaven. While I’m by no means a MS fan and criticized the IE7 team for not making…
-
Creating random passwords – the easy way
Passwords are used as the main authentication method in almost all of the current websites. They are easy to implement (from the websites owner point of view), however the user must consider several conflicting goals if s/he wants to stay safe: Passwords should be long The user must be able to remember the password It…