-
Somebody messed up their routing tables…
tracepath podcast-files.cnet.com gets me this (observe the loop): … 6: r11-Vl3001.buh7.ro.gtsce.net (85.9.9.245) 29.703ms asymm 8 7: 85.9.9.169 (85.9.9.169) 26.761ms 8: r37-Vl2002.buh3.ro.gtsce.net (85.9.9.1) 27.132ms 9: r11-Vl3200.buh7.ro.gtsce.net (85.9.9.246) 25.090ms asymm 7 10: r10-gi13-0.buh7.ro.gtsce.net (85.9.32.73) 26.592ms asymm 6 11: r11-ten4-3.buh7.ro.gtsce.net (85.9.32.74) 29.970ms asymm 9 12: r11-Vl3001.buh7.ro.gtsce.net (85.9.9.245) 38.560ms asymm 8 13: 85.9.9.169 (85.9.9.169) 27.047ms asymm 7 14: r37-Vl2002.buh3.ro.gtsce.net…
-
Compiling OpenTyrian under Ubuntu
I suspect that every one of you has some childhood memories about computer games. Recently I discovered that one the games which was iconic for me at the time, was released as freeware. I’m talking about Tyrian. Not only was it released as freeware, but the full source was made available (together with the artwork!).…
-
Ethical hacker challenges
A new challenge is in full swing: Scooby Doo and the Crypto Caper. The solutions for the previous one will be shortly announced. It should be very interesting because it contained some hardcore Linux hacking which is always interesting.
-
Mixed links
Interesting series, given the current economic situation: a crash course in economics. A two part series on what it is like to write the technical book from one of the authors of “High Performance MySQL”: Part 1 Part 2 The editor’s reply It is very interesting, especially the technical methods used to automatically detect parts…
-
Network Miner
I don’t really like magazines because they (as they try to get money out of them) blur the line between content and advertising more and more (just recently I picked up an issue of Wired and it was incredible how much advertising is in it). Also, in the case of electronic magazines delivered in the…
-
Popular ideas about AV
There was a recent posting on Slashdot asking what reliable, free AV software is out there? It is very interesting to read the comments, since this is a geeky audience. If they get things wrong, what chance does the large population have of getting things right? Also, these are the people most likely to act…
-
Stop the “Anti-Spyware” nonsense!
Some time ago the term “spyware” was invented, and promptly “anti-spyware” products appeared. Their “myth” still persists, many people (who should know better!) recommending that you have an “anti-virus and a anti-spyware product” (I’ve even seen “anti-malware” added to this list which is an even bigger nonsense, since the term malware includes both viruses and…
-
(Un)intentional spam?
Recently I’ve been annoyed by the site swik.net. From the site: SWiK.net is a SourceLabs project to help people collaboratively document open-source software. It seems to be a legitimate project (it was mentioned for example by the O’Reilly radar) and there are relatively few complaints against it. However, it has the unfortunate sideeffect that it…
-
Mixed links
Via Deb-Tech: Security Watch Revisiting the 10 Immutable Laws of Security, Part 1. Very good post, definitely worth reading, I can’t wait for part 2 and 3. From the same author: Help: I Got Hacked. Now What Do I Do?. While you’re there, you can refresh your memory by reading the original 10 Immutable Laws…
-
Stepping beyond the vendor-centric security solution
Even these days too many organisations have a “one silver bullet solution” mentality when it comes to IT security. Most often the software presented as solution is an AV package. However, I argue, this is far from sufficient and the better solution would be to have experienced and knowledgeable people implement and maintain a multi-layered…
