This Is AmazingThis Is Amazing

Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software have awiretap backdoor that allows the government to tap into all …

Read more »
31 Jan 2006

Geting Close To Nmap 4.0 ...Geting Close To Nmap 4.0 ...

new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release.QUOTEI am pleased to announce the release of Nmap 3.9999. From the versionnumber, you can probably guess that we are…

Read more »
31 Jan 2006

Cross Site CookingCross Site Cooking

There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake it possible (and alarmingly easy) for malicious sites to pla…

Read more »
30 Jan 2006

Cyber Crime Strides In Lockstep With SecurityCyber Crime Strides In Lockstep With Security

Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per centof firms experienced computer attacks last year despite th…

Read more »
29 Jan 2006

Microsoft Readies Two-way Firewall For VistaMicrosoft Readies Two-way Firewall For Vista

For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuch greater control over which applications can run on the sys…

Read more »
28 Jan 2006

Good Worms Back On The AgendaGood Worms Back On The Agenda

ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould perform better penetration testing inside networks, turningvu…

Read more »
28 Jan 2006

The Five Great Inventions of Twentieth Century CryptographyThe Five Great Inventions of Twentieth Century Cryptography

By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPreface [This talk was presented as the keynote address at the 19…

Read more »
28 Jan 2006

Kaspersky Boss Debunks Security MythsKaspersky Boss Debunks Security Myths

Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security industry.Speaking in Moscow, the head of Kaspersky Lab said c…

Read more »
26 Jan 2006

Stopbadware Backed By Google, Lenovo, And SunStopbadware Backed By Google, Lenovo, And Sun

Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompasses spyware and adware.Harvard University's Berkman Centre and the Oxf…

Read more »
25 Jan 2006

Functional FilesFunctional Files

Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of memory, they are tremendously usefulfor a huge number of programm…

Read more »
23 Jan 2006

Require Complex PasswordsRequire Complex Passwords

This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to any Operating System or to perfectsecurity on any Computer.If …

Read more »
21 Jan 2006

PC virus celebrates 20th birthdayPC virus celebrates 20th birthday

Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanuary 1986. Brain spread via infected floppy disks and was are…

Read more »
21 Jan 2006

Easily Extending MozillaEasily Extending Mozilla

Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis would fill a firkin with mnemona anon parfay. Compared to o…

Read more »
20 Jan 2006

Feds After Google DataFeds After Google Data

The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddatabases.The move is part of a government effort to revive an …

Read more »
20 Jan 2006

Windows Wireless Flaw A Danger To LaptopsWindows Wireless Flaw A Danger To Laptops

Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards to how Windows searches for connections after an AP is not a…

Read more »
17 Jan 2006

Wmf Not An Intential Backdoor Says MicrosoftWmf Not An Intential Backdoor Says Microsoft

Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploit being an intential backdoor.The article leads through an Micro…

Read more »
17 Jan 2006

Hacking ContestHacking Contest

National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make sure u attend the "The Digital Fortress - Hacking Contes…

Read more »
12 Jan 2006
 
Top