-
Winter landscape
The winter is almost gone, so here is an image to commemorate its passing.
-
Twitter Content
And here is an other pipe: did you find it annoying that when you subscribe to the RSS feed for a Twitter account (not being a Twitter head myself – probably because I don’t have time to write short posts 😛 – I subscribe to the RSS feed rather than “follow” them) that they put…
-
DeShortify
Update: I created a simpler version of this pipe using the API from LongURL. A positive side-effect of using the service is that it supports many more URL shortening services. Some people feel that URL shortening services like TinyURL are a security risk because they take away the user’s ability to hover over a link…
-
Enabling / disabling the SD card reader on laptops
Just a quick note: it seems that on some laptops (the Dell Inspiron 9200 for example) the SD card reader is enabled / disabled together with the Firewire port. I found this it because I always disable firewire ports on laptop, given that it can be used to dump the contents of the memory and…
-
A new Perl twitter account
Now, besides the perl one-liner account we have CPANr: Reviewing CPAN modules 140 chars at a time Very cool! The latest (as of this posting) is Net::Pcap, a module to slicing and dicing packet capture files, something which I’m sure will come in handy someday. Image taken from ivanlanin’s photostream with permission.
-
Webhoneypot
In the last couple of months I’ve been helping out with the webhoneypot project. From the Google code website: DShield.org is offering this honeypot for users to capture automated web application exploits. It is a very simple "semi interactive" honeypot implemented in PHP. The core idea is the following: you install it on a webserver…
-
Malicious sites by country
In an earlier post I’ve said that the number of malicious sites in a country has a close relation to the level of connectivity in the given country. Here is a chart to show this visually: (The data collection method is the same as for the other data: malicious domains from DNS-BH and clean domains…
-
FRHACK creates sexist award
The organizers of FRHACK, a french security conference in the making, came up with the idea of the “The Best IT Security Girl of the Year”. If you think I’m being over-sensitive, just look at the picture below and judge for yourself if it is a proper way to encourage women to participate in the…
-
The limits of mob-style takedowns
It is interesting to observe the dynamics of the interactions on the Internet. In the last couple of years several hosting (RBN, McColo and so on) organizations have been taken down by “denouncing them to the masses”. The usual flow of events was: Evidence was gathered against them The media “exposed” them Their upstream providers…
-
Mixed links
New blog in town: Telic Thoughts about information security – I especially liked their Is the CIA model still relevant? post. The CIA triad is a concept which I often reference and it is interesting to see how its limits are being pushed. Windows Server 2003 SP1 Out of Support in April – the Microsoft…