-
Don’t be stupid
Or alternatively: how to collect malware samples from the file sharing networks: Be sure that you know what you are doing! These are real, dangerous files (mostly Adware and Spyware). Get yourself a decent, open source, spyware, adware free multi network client (if you are on Windows) Search for anything. Be sure to select Any…
-
Funny quote
The internet: Where men are men, women are men, and teenage girls are undercover FBI agents. Found it over at tssci security
-
More links
Zone-H got defaced!. Read the article for an in-depth analysis. America is in debt bigtime Pamela-Systems – is it just me or does this name remind others too of the other Pamela (the NSFW one)?
-
A mixed bag of comments – part 2
Via the boagworld forum: Web Design Tools. I haven’t checked them all out, but the color chooser ones look very interesting. A simple (but not really easy to use and unsupported tool to mount CDs from Microsoft (via tech-recepies): Virtual CD Control Panel – be sure to take a look at the readme file before…
-
Hack the Gibson – Episode #71
Read the reason for these posts. Read Steve Gibson’s response. Hello all! Here is the latest of my rants / commentary series regarding the Security Now! podcast. This podcast is dedicated to discussing a vaporware security freeware: SecurAble. This isn’t more than a glorified CPU identification utility, similar but (based on the description) much more…
-
A mixed bag of comments
A short post of things I found in my Google Reader: A new challenge from the guys over at SANS: The Twelve Days of Christmas Packet Challenge Also there are some vulnerabilities there: All I want for christmas are my exploits…. – my thoughts: you have to be insane to put your DB server on…
-
I’m not a ‘lone bitter old man 🙂
You might remember this post, where I was criticizing the so called vulnerability in Internet Explorer 7. Alex Eckelberry over at the SunbeltBLOG just came out with a post saying the exact same thing. While I don’t agree with many of his previous posts (like those about HIPSs and Patchguard), this one is spot on.
-
What you don’t need javascript for – part 2
Read part 1 of my rant There is a saying in Hungarian: Don’t look at the teeth of a horse you received as a gift. It refers to the fact that you shouldn’t criticize something if you get it for free. However from time to time I feel the need to raise my voice about…
-
Hackers and Hollywood
Servers in the Movies Top 20 Hackers in Film History What code DOESN’T do in real life (that it does in the movies)