-
What can a malicious program do under a limited account with Windows 7?
The scope of this post is to demonstrate what a malicious program can do under Windows 7 (the newest and presumably most secure version of MS Windows) with a Guest account (the most limited one from a capability point of view). The “malware” in the video below demonstrates that a program run by the user…
-
Jango review
Update: I no longer use Jango because of the amount of advertising and feature crippling. I rather use Grooveshark. You should give it a try if you like to listen to streaming music. Disclaimer: I have no relation with the company, its owners or employees, other than being a user of their site. I receive…
-
delicious/cdman83
Brealey-Myers: Principles of Corporate Finance Posted: 08 Jul 2009 10:29 PM PDT Zero Hedge: Phishing Out The Goldman Code Fishers Posted: 08 Jul 2009 07:38 AM PDT This is way cool! (almost as cool as tracking company IP addresses which are editing Wikipedia :p): after the news got out that the Goldman Sachs sourcecode for…
-
Nokia not displaying the callers phone number
I found out from a friend recently that all the Nokia phones (from the very basic ones up to the N series) have the following weird behavior: If you have a phone number multiple times in your address book (this means the phone memory + the SIM), the phone number is displayed instead of the…
-
delicious/cdman83
Make: Online : Day planner clock erases itself Posted: 06 Jul 2009 09:23 PM PDT Pennies per square foot, literally Posted: 06 Jul 2009 09:22 PM PDT gulli: WikiLeaks: Daniel Schmitt interviewed (English) Posted: 06 Jul 2009 11:55 AM PDT Good interview about WikiLeaks
-
Great songs
Seasons in the sun – I just found out that it is an adaptation of a French song. It was one of the songs of my childhood, from a Russian vinyl disc (I’m quite sure that they didn’t pay royalties on that one :-)). And two great ones ones from Die Toten Hosen:
-
The right way to embed
I occasionally rant about “web 2.0” services which want me to embed Javascript on my page to get the functionality. Besides them being a security risk (because they can change the JS on their servers at any time and p0wn all my visitors – and it doesn’t have to be malice on their part –…
-
Goldman Sachs security incident
Allegedly the source code for Goldman Sachs “low latency (microseconds) event-driven market data processing, strategy, and order submissions” systems have been stolen by an insider (via Zero Hedge here and here). Personally I find this (and similar cases) overblown for several reasons: Sourcecode by itself is worthless. The important thing is the mathematical model behind…
-
Panda Challenge
I know that it is kind of short notice, but I too have only found about it recently: the Panda Challenge (from Panda Security). It begins tomorrow (on the 7th of July) at 10 AM GMT+1 and consists of three rounds. Picture taken from Joachim’s photostream with permission.
-
More benchmarking in the 127.0.0.1 vs 0.0.0.0 issue
I’ve done a little more benchmarking in the 127.0.0.1 vs. 0.0.0.0 issue: <script>var start=new Date();</script> <script src="http://ad.a8.net/foo.js"></script> <script src="http://asy.a8ww.net/foo.js"></script> <script src="http://a9rhiwa.cn/foo.js"></script> <script src="http://www.a9rhiwa.cn/foo.js"></script> <script src="http://acezip.net/foo.js"></script> <script>var stop=new Date(); alert(stop.getTime() – start.getTime());</script> What this code does, is to try to include javascript files from five sites and measure the time it takes to process these tags.…