-
(Yet an other) Javascript random password generator
Here is YARPG (Yet Another Random Password Generator). Why on earth would I do yet an other random password generator? Because I can :). Seriously: there are at least two random password generators out there that I’ve used, and I have some problems with them: The one that Steve Gibson created can not be customized […]
-
Steve Gibson responds!
Steve Gibson responded to my blog postings. It’s a very nice response and I must say that maybe I’ve misjudged him. This doesn’t mean that I’m getting soft, but every side should get a chance to display his opinions. Here is the letter I’ve received (republished with the permission of the sender): I’m sorry that […]
-
Wisdom of the crowds? Maybe not
Yesterday I’ve spotted the following article on the digg frontpage: PacMan written entirely in Excel. On the page it linked too I’ve found two games written in Excel and VBA (Visual Basic for Applications – the stuff macro viruses are written in). What is interesting that as of the time of me writing this there […]
-
Traceroute on Windows and Linux
Did you know that the Linux version of traceroute uses UDP packets with various TTLs instead of ICMP echo requests by default? I sure didn’t, but thinking about it is a very smart way to do it. My only question would be: doesn’t this interfere with the operation of a server if you happen to […]
-
Rookits? Who needs rootkits?
What are rootkits and why are they dangerous? You can read the detailed explanation at Wikipedia which I won’t reproduce, but the basic idea is that they alter the operating system (using either documented or undocumented methods) so that certain objects (processes, directories, files) become invisible. They are very dangerous because they breed new life […]
-
Bye-bye DHTML Editing
While browsing on the MSDN website, the following article caught my eye: Replacing the DHTML Editing Control in Windows Vista and Beyond. It seems that starting with Windows Vista the fast and dirty way to add WYSIWYG editing to your web pages with IE won’t be available any more because the needed ActiveX component won’t […]
-
Software vs. Hardware firewalls
I’ve already done my post for the day and was listening to episode 56 of Security Now when I’ve heard something that ticked me of. I hear this all the time from various sources (but those are mostly uninformed and not security experts). This won’t be an other Hack the Gibson post, although you can […]
-
WAP
Yesterday I’ve participated in the local Windows Academic Program pitch. The main content was delivered by Adrian Marinescu. I can sum it up as a short version of the book Windows Internals. For the one of us who actually have read the book it was a little boring (although in the breaks I’ve managed to […]
-
A (non-hacking) tutorial on elevating privileges on Windows
Running as a normal user can be real pain on Windows (however it has become better with every version). This is because every program runs on the behalf of a given user and the credentials of that user determine what the program can or can not do. Usually you wish to run as user to […]
-
Apache and mod_proxy
We’ve been having problems with Apache and mod_proxy at the workplace for a couple of days. The scenario was the following: there is server A which listens on HTTPS (with Apache) and server B which uses mod_proxy to serve the contents for A in a subdirectory. B runs CentOS with Apache 2.0.52. The issue was […]