-
A (non-hacking) tutorial on elevating privileges on Windows
Running as a normal user can be real pain on Windows (however it has become better with every version). This is because every program runs on the behalf of a given user and the credentials of that user determine what the program can or can not do. Usually you wish to run as user to…
-
Password security on popular sites
We use (and sometimes reuse, although we shouldn’t) passwords on the web every day. There has been so much talk about password security lately that the least we should expect is that the big sites have proper passwords policies. I will single out two of them here: digg.com – I’ve tried to register with them…
-
Hack the Gibson – for Episode #50
Read the reason for these posts. The issue of different ports: as you can read on Wikipedia, there are three categories of ports: Common ports: from 0 to 1023 (not 1024, but the first 1024! – we computer guys are sometimes a little weird with our numbers) – these are special in the sense for…
-
Hack the Gibson – for Episode #58
Read the reason for these posts. This episode was actually quite good and as far as I can tell there were no errors in it. But I just wanted to get the word out: unregister vgx.dll (instructions here – towards the middle of the page where it says “Suggested Actions”) and / or use a…
-
Hack the Gibson!
Hack the Gibson! First a piece of advice: don’t hack the Gibson if you don’t have written permission to do so :-). First go watch the movie. This series of posts wants to be an unofficial errata for the Security Now! podcast by Steve Gibson (this is the first and only time I’ll post this…