Category: Uncategorized

  • Port redirection under Windows

    When you want to forward a port, there are several possibilities from iptables to SSH. However I needed a low-latency link with no encryption or compression (because the protocol running over it was encrypted and double-encryption just slows things down without any substantial benefit in this case). My first idea was to chain two Netcat…

  • You affect all of us

    I finally decided to sit down and write the tutorial about configuring Windows XP in a secure fashion, based on my experiences in the last four years or so. And I emphasize again: these methods worked well for me on several computers and even in "though" scenarios like writing and debugging software. And then I…

  • One letter, big difference

    I was trying to send a mail to the DokuWiki development list for a couple of days with regards to a possible problem in their mailing-code and my mail seemed to go in a black hole. I started to have conspiracy theories: my e-mail address was banned. Yahoo was banned. The end is near. Finally…

  • The productive worker

    This presentation seems to have popped-up on a lot of blogs lately (some may even say that it’s a successful meme): | View | Upload your own While it sounds very nice and has that "everybody should do it this way!" ring to it, there are many problems a company must overcome even to get…

  • How efficient are non-standard configurations in combating the malware problem?

    Very. Thank you for reading this article, hope to see you soon. Just kidding :-), you won’t get off this easy. You’ll have to read my ramblings about the topic. It isn’t a new idea to model the malware problem using methods borrowed from the field of the biology, more specifically the study of diseases…

  • Enabling Bluetooth on Ubuntu

    is as simple as 1, 2, 3 (although it ought to be as simple as 0 – it should work out of the box – more on this later). So I was trying to copy some photos from a phone to an Ubuntu machine which, although it had recognized the phone, kept coming up with…

  • A new competition

    Via terminal23.net: the Python challenge (this does not have any deadlines, nor does it carry prizes, so you can relax).

  • Hostile JS Debug

    I was looking through a presentation delivered by a McAfee employee during an Indian security conference (Club Hack 2007) and there it was: a reference to a little project of mine dedicated to ease the debugging of obfuscated javascript. Neat. (Or, I could use the the word of the year and say: w00t 🙂

  • 2008 Scripting games

    Via the terminal23 blog: the Microsoft 2008 Winter Scripting Games. Also with Perl for extra fun 🙂

  • Sunbelt is using Symantec in-house

    This is quite old (it has been sitting in my to-do list for a while) but still fun: What can screenshots reveal about your company? This blog posting from the Sunbelt blog from Friday, November 16, 2007 entitled Some new twists in the Storm worm contains the screenshot which can be seen below with the…