Category: Uncategorized

  • What is a rogue anti-spyware / anti-malware product?

    Seeing how Kurt over at anti-virus-rants doesn’t yet have a definition for this, and I’ve just blogged about such a situation, I thought I take a shot at it. The definition of a rogue anti-spyware/anti-malware usually includes the following items: it is program which claims to be an anti-spyware / anti-malware product, however It has…

  • How to verify executable digital signatures under Linux?

    The PE executable format (the one used by Windows) supports the use of digital certificates to verify the source of the file. Normally you can verify it using Windows Explorer (by right-clicking on the file and selecting Properties). It also shows up when you try to run an executable downloaded from the Internet with IE…

  • Why Web Applications Firewalls don’t block

    Jeremiah Grossman describes it much more concisely than I did. To implement default-deny Web Application Firewalls (WAF) must know everything about a website at all times, even when they change. That’s programmatically documenting every expected request method, URL, parameter name/value pair, cookie, process flow, etc making default-permit deployments the rule rather than the exception.

  • I smell propaganda

    Being in a post-communist (whatever that might mean) country has some advantages. For example it sensitives you to propaganda. You can smell it instinctively and immediately you start to raise questions: how true is this? what are the supporting facts? Wikipedia defines propaganda as: Propaganda is a concerted set of messages aimed at influencing the…

  • YATP – Yet An other Twitter Problem

    Twitter isn’t the most reliable service out there. Today I signed up to follow a friend who is too lazy to type more than 140 characters at a time ;-), so doesn’t blog. While signing up, the CAPTCHA didn’t show up. After several page refreshes I took a look at the source and it is…

  • Other bugs which are passe

    After talking about a problem with older versions of Opera, here is a problem with version 5.8.4 of ActivePerl for Windows (but which isn’t present in 5.8.8, so the simple solution is to upgrade): If you use the POSIX module to print out the day of the week (Friday, Monday, etc) with a code like…

  • Things you can get for free

    It is amazing what you (commercial) software you can get today for free: Delphi Visual Studio IDA if you are a student, you can get lifetime (!) access to all of Microsoft’s products, provided you don’t use them for commercial purposes I for one welcome our overlords prefer the open-source alternatives, because I know that…

  • Flaws in the Cisco PIX appliances

    Via NetworkWorld (emphasis added): Crafted TCP ACK Packet Vulnerability Crafted TLS Packet Vulnerability Instant Messenger Inspection Vulnerability Vulnerability Scan Denial of Service Control-plane Access Control List Vulnerability The first four vulnerabilities may lead to a denial of service (DoS) condition and the fifth vulnerability may allow an attacker to bypass control-plane access control lists (ACL).…

  • Automated analisys

    Disclaimer: the views expressed here are my own, and unless expressly stated, do not necessarily represent the views of any former or current employer. Automated security analysis is good for dealing with a large flux of (possibly) malicious files, however information resulting from these types of sources must be clearly marked as such (as oppsed…

  • Why exercise?

    Geeks have a hard time justifying to themselves exercising. Sure, it makes you healthier and you live longer, but you’ll have less time tinkering with your toys. I found the perfect reason. Via the Security4All blog: It seems that as little as 20 minutes of exercise 3 times in a week doubles (!) your problem…