-
Setting up laptops
I’ve had to setup a laptop, and I thought I share the methods which I used to secure it, so that others can inspire themselves from it (to improve security of their mobile platforms) and/or tell me how I’m wrong 🙂 The general assumption of these steps is that the data on the laptop is…
-
You And I
I lose control because of you babe. I lose control when you look at me like this. Theres something in your eyes that is saying tonight. I’m not a child anymore, life has opened the door To a new exciting life. Scorpions – You and I (PS. Hope this falls under fair use and they…
-
I can be wrong too 🙂
As Forest Gump said: Shit happens, and the best you can do is to admit that you were in error and to post in the forum where you previously posted the erroneous message to make sure that people who would possibly be mislead have a better chance at finding it. The situation: I’ve commented on…
-
Using co.mments.com with NoScript
A couple of months ago I was complaining about the fact that blog comments are usually one-off fire and forget, you can’t really have a discussion (compared to forums) because usually you don’t have a way to notify users about new comments. That’s when fellow blogger kurt wismer from the anti-virus rants blog came to…
-
PostgreSQL REPLACE INTO
When migrating from MySQL to PostgreSQL a question which seems to come up often is how to do the equivalent of REPLACE INTO? At the supplied link you will find the answer (with the mention that you should wrap the code in a transaction if it’s not done already for you by your data access…
-
The case of the missing blog post
After seeing the post on rootkit.com about Atsiv I planned to take a look at it because the official announcement (which is by the way now changed to a reply to Microsofts actions) didn’t give any details. Fortunately people smarter than me did that (proving the old saying that if you can do something today,…
-
Mixed links and commentary
Via rootkit.com: a tool to load arbitrary unsigned drivers under Vista without playing with the boot parameters. Very nice. I didn’t play with it, but I assume that it does this by loading its (signed) driver, then using that to perform the load from kernel mode. The question remains: can’t Microsoft revoke their certificate, so…
-
The Cisco challenge
Today being (very probably – there is an oxymoron for you) the last day I play the Cisco Networking Academy challenge (but the first day you might play it), I thought it may be useful to share some thoughts (cough-cough brag) about it. The challenge is very simple: you can answer fifty questions each day…
-
Two channel authentication – part two
I’ve had some excellent replies to my last post (including the CTO of PhoneFactor – probably via Google Alerts or something similar 😉 – I don’t delude myself into thinking that he reads my blog :)), so I thought I expand a little on the subject: As it was pointed out in the comments, this…
-
Mixed links
A new Ethical Hacker Challenge is on. X for Windows without Cygwin! GreatFireWallOfChina – test any site and see if it’s blocked in mainland China – via OffTheHook Via the All About Linux blog: a very fun (and very addictive!) flash game: Desktop Tower Defense.