-
Toying around with andLinux
I don’t remember exactly where I heard about it (although I seem to remember that it was on the Ubuntu UK Podcast). andLinux is a package based on coLinux (Cooperative Linux), which in turn is a port of the Linux kernel to the Windows platform. How does that work? The short (and somewhat inaccurate) description…
-
Database links
Via the MySQL performance blog: the Percona 2009 conference posted the slides (most of them anyways). There is some very good and diverse material in there (not necessarily MySQL specific). I also found the following link in one of the presentations: http://omniti.com/does/postgresql – love it! Testing Disk Speed: the dd Test – I/O is the…
-
Using Procmon for finding malware
The scenario is: you know you are infected, because you’ve identified a process associate with a malware, but you can’t figure out how that given process is getting launched. A variation of this is: you kill the process, remove the executable but it reappears after a given amount of time / after reboot / etc.…
-
Oracle buys Sun (and gets MySQL)
Here is Monty’s (co-founder of MySQL, left SUN some time ago) opinion. On a more light-hearted note, here are some Slashdot comments 🙂 Fro rho – a good example for why case sensitivity is important: > Their string comparisons are case sensitive. 8.4 has citext. Or you can make an index with lower() on the…
-
Mixed links
We start off with a rebuttal from VMWare to a video posted by Microsoft comparing Hyper-V and VMWare ESX. While I’m no fan of any big company, such misleading marketing attempts should be considered unethical and maybe even illegal, since it contains mischaracterizations of some features like the page sharing between VMs. While in this…
-
Social engineering for malware – a bright future
Some time ago I wrote a post in which I pondered the deficiencies of the “executable file” definition and the implications for whitelisting products. The problem is that “data” files can also result in actions being taken (and we don’t even need arbitrary code execution type of vulnerabilities for that). The particular example given the…
-
Interesting method for website blocking
Quick note: I was listening to the latest episode of Watchguard’s Radio Free Security podcast (no relation with them, other than a listener to the podcast) and they discussed an interesting technique for filtering websites (I’m no fan of traffic filtering, but the technique seemed interesting): Usually SSL requests are either blocked by the target…
-
Interesting videos
It seems that the Internet is helping more and more to find the equilibrium point between the needs of “big media” and “independent media”. In this post I would like to mention two sources of useful / interesting videos: The first would be the videos from the TED (Technology, Entertainment, Design) conference (credit goes to…
-
Weird Sybase JDBC driver issue (jConnect)
I post this so that the search engines can pick up on it and maybe it can help somebody out. I had the following issue with the Sybase JDBC driver (jConnect): I was calling a stored procedure and it was throwing an error. However these errors weren’t propagated to the Java code in form of…
-
Be an (imaginary) hero
I got the link from splitbrain.org, however I was hesitant to post the image, since the site didn’t display any information about the conditions of using it: Make your own at www.cpbherofactory.com However I finally got a response from the cpbgroup (the creators of the Hero Factory), in which they state that I can use…