-
Two quick tips
Via the .:Computer Defense:. blog: the Windows command prompt has a history feature: just press F7 in a command window. One of the great features of Firefox 2 is the session saving (I know, there were extensions before that to do the same thing, but they somehow never worked for me). If you want to…
-
Why not to chain remote desktops?
Quick tip (learned the painful way): do not chain remote desktops, meaning don’t open a remote desktop (or VNC sessions for that matter) to one computer and open in that session a remote desktop to an other computer, unless you have bandwidth to waste and don’t mind the increased delay :-). The explanation is rather…
-
Regex magic
First of all I want to apologize to my readers (both of them :-)) for bein AWOL, but real life sometimes interferes pretty badly. I always been a big fan or regular expressions and one of the main reasons I love Perl is because they are so deeply integrated in it and are natural to…
-
Installing and using Truecrypt on Ubuntu
Update: while truecrypt still doesn’t offer native packages (ie. .deb / .rpm) for Linux distributions, their shellscript installer works just fine. So the simplified version of the installation procedure is: Download the correct package from Truecrypt (either 32 or 64 bit – you can find out which you need by typing uname -a – if…
-
Mixed links
A new Ethical Hacker Challenge is on. X for Windows without Cygwin! GreatFireWallOfChina – test any site and see if it’s blocked in mainland China – via OffTheHook Via the All About Linux blog: a very fun (and very addictive!) flash game: Desktop Tower Defense.
-
Cleaning it all up – temporary files in Perl
One of the most frustrating things in programming is doing all of the extra plumbing. You can just say (if you are trying to create a stable product): open file A, read a line, transform it and dump it to file B. You have to think about all the error conditions which may appear: what…
-
Hack the Gibson #88
Read the reason for these posts. Read Steve Gibson’s response. A question which popped up twice in this episode was the problem with broadband user and the answer provided was very good: even if 50% of the people who have broadband would to turn off their connection when they are not using it, the other…
-
Hack the Gibson #81 to #87
Read the reason for these posts. Read Steve Gibson’s response. Here is again a long overdue post about the recent Security Now episodes. I have to say that the quality of the information provided in the recent episodes deteriorated (or maybe it is that they started talking about more concrete things where the errors are…
-
SQL injections – what they are and how to avoid them
SQL injections are a subtype of the larger category of command reparse vulnerabilities. These attacks work because there is an intermediate language between different components of the system, more specifically between the frontend (which is tipically a webserver giving access to the whole world) and the backend (which is hidden behind a firewall / NAT…
-
Active vs. Reactive protection
Hello all. I want to bring to your attention the following article written by fellow blogger Kurt Wismer: defensive lines in end-point anti-malware security. I especially like it because it puts AV technology in place and creates a good foundation to start any meaningful debate. Here are my opinions on the matter (in no particular…
