Category Archives: Security

Cryptocat: iPhone webapp video – YouTube

Cryptocat: iPhone webapp video – YouTube.

Posted in Security, Technology | Leave a comment

Chromium password bypass

On the local auth, if you put in the default user (chronos) and space plus anything else in the username field, it will log you I’m as the local user.

Posted in Security | 1 Comment

Paypal API breaks security tokens?

A while ago I purchased the PayPal security token, and had really been liking it. The card is nice and small – about the size of a normal credit card, and it generates a key for you with each push … Continue reading

Posted in Security, Technology | Leave a comment

NANOG: NANOG46 Presentation Abstracts and Speaker Biographies

Much has been written about prefix hijacking but almost nothing has been presented and documented about best practices for preparing for a hijacking, detecting one, and responding when one happens. This presentation attempts a first pass to cover those areas … Continue reading

Posted in Security, Technology | Leave a comment

NANOG: NANOG46 Presentation Abstracts and Speaker Biographies

The internet has made many things easier in human society, especially including crime. For the last decade the good guys keep losing and the bad guys keep getting rich — why? Drawing from contemporary examples including the 2008/2009 “conficker worm”, … Continue reading

Posted in Security, Technology | Leave a comment

Tell Obama: Stop blocking court review of illegal wiretapping.

Sign the petition “President Obama, I am deeply concerned that lawyers from your Department of Justice are invoking the ‘state secrets’ defense to block court review of warrantless wiretapping by the National Security Agency. Please ask the Department of Justice … Continue reading

Posted in political perspective, Security | Leave a comment

Inside the AT&T–NSA “Secret” Relationship—By Scott Horton (Harper’s Magazine)

AT&T and NSA entered into this agreement in flagrant violation of U.S. criminal law, with the assumption that the Bush Administration would not enforce the criminal law against itself or those who entered into criminal conspiracies with it. There is … Continue reading

Posted in Conspiracy Theories, political perspective, Security, Technology, The Courts | Leave a comment

Stupid mod_security

Mod_Security, I don’t know why I keep you. Every time something breaks, it’s your fault. I guess I feel you have some vague sort of prophylactic value for my server – expecially since it’s hard for me to keep on … Continue reading

Posted in Security | 1 Comment

AutoScan-Network, Network Tool – Home

AutoScan-Network is a network discovering and managing application. No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network. Features: •Multithreaded Scan •Automatic network discovery •Low surcharge on the … Continue reading

Posted in Security, Technology | Tagged , , , | Leave a comment

WifiZoo

WifiZoo does the following: -gathers bssid->ssid information from beacons and probe responses *(now the graph contains the ssid of the bssid :), new in v1.1)* -gathers list of unique SSIDS found on probe requests (you can keep track of all … Continue reading

Posted in Security, Technology | 1 Comment