This Is Amazing This Is Amazing

Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software ha...

Read more »

Geting Close To Nmap 4.0 ... Geting Close To Nmap 4.0 ...

new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release. QUOTE I am pleased to announce the release of Nmap 3.99...

Read more »

Cross Site Cooking Cross Site Cooking

There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake ...

Read more »

Cyber Crime Strides In Lockstep With Security Cyber Crime Strides In Lockstep With Security

Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per ce...

Read more »

Microsoft Readies Two-way Firewall For Vista Microsoft Readies Two-way Firewall For Vista

For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuc...

Read more »

Good Worms Back On The Agenda Good Worms Back On The Agenda

ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould p...

Read more »

The Five Great Inventions of Twentieth Century Cryptography The Five Great Inventions of Twentieth Century Cryptography

By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPrefa...

Read more »

Kaspersky Boss Debunks Security Myths Kaspersky Boss Debunks Security Myths

Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security i...

Read more »

Stopbadware Backed By Google, Lenovo, And Sun Stopbadware Backed By Google, Lenovo, And Sun

Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompas...

Read more »

Functional Files Functional Files

Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of m...

Read more »

Require Complex Passwords Require Complex Passwords

This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to an...

Read more »

PC virus celebrates 20th birthday PC virus celebrates 20th birthday

Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanu...

Read more »

Easily Extending Mozilla Easily Extending Mozilla

Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis ...

Read more »

Feds After Google Data Feds After Google Data

The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddat...

Read more »

Windows Wireless Flaw A Danger To Laptops Windows Wireless Flaw A Danger To Laptops

Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards ...

Read more »

Wmf Not An Intential Backdoor Says Microsoft Wmf Not An Intential Backdoor Says Microsoft

Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploi...

Read more »

Hacking Contest Hacking Contest

National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make s...

Read more »
 
Top