-
It’s all in the eye of the beholder
One key aspect of the of the rogue AV/AS/AM products is the fact that they are using scare tactics to sell their "products". However even legitimate products have tendencies to go in this direction, as the two examples below illustrate. The first example is from a Secunia PSI install. Just to clarify my stance on…
-
ScribeFire review (comparison with Windows Live Writer)
I’m constantly searching for more efficient ways to write blogposts. Currently I’m using Windows Live Writer in a VirtualBox instance running Windows 7, but I wanted to give ScribeFire a try. The short version: it had some interesting features, but on the whole it had too many negatives compared to Live Writer to be useful…
-
Function references in Perl
A friend asked me how to do the following: use strict; use warnings; use File::Copy ‘move’; my $op = $condition ? &move : &link; # … $op->($a, $b); So, I tried to get it working, but I kept getting the error: Undefined subroutine &main::link called at linkme.pl line 2. For move it worked fine. Finally,…
-
Mixed links
This post will be quite “video-heavy”, so I won’t embed all the videos (because the post would load very hard), rather I will just link to them. Nate Koechley: "Professional Frontend Engineering" – a good introduction in the topic. Covers progressive enhancements and similar topics. If you are already well-versed in the basics, there isn’t…
-
How does the Panda USB vaccination work?
I stumbled on the Panda USB and AutoRun Vaccine on the Panda Research blog and it peaked my interest because autorun-based malware is very wide-spread these days and also because I’ve written extensively about the topic. An other reason is that I don’t like black boxes and it is my opinion that all knowledge should…
-
Music from Hungary
This is slightly off-topic: a collection (in the form of YouTube playlist) of songs by Hungarian bands (mostly older, because I hate new stuff :-)) which I love and find inspiring. I plan to to a similar playlist for Romanian songs/bands, however I’m not that well versed in the topic as to not to miss…
-
Update to the DeShortify Pipe
A while ago I created a pipe to transform short URL’s in their longer versions. However the pipe itself was rather complicated and required a modification for each new service to be supported. Luckily, on the Network Security Blog I saw the link to LongURL, which provides the same action for multiple services (in fact…
-
Blogger tag cloud
Some time ago I experimented with the Cumulus plugin for Blogger, but concluded that I had so many tags (probably a sign of ADD :-)) that the only thing it did, was to transform your computer into a heater, by keeping the processor at 100%. So, I created a Yahoo Pipe which extracts the top…
-
Mixed links
An analisys of the C variant of Conficker Via Jeremiah Grossman: Detecting browsers which are in incognito mode – Interesting. It is based on the CSS history color hack and works because browsers in incognito mode seem to report all URL’s as not visited, even if the visit occurred in the same session. From Joanna…
-
Installing the webhoneypot on OpenWrt
This is a raw tutorial for installing webhoneypot on a router running OpenWrt. The used version is Kamikaze 8.09 (this can be important because commands change between version). The tutorial is not 100% complete and I will update it in the future when I learn new information. An other assumption I make is that you…
