Category Archives: Security
Cryptocat: iPhone webapp video – YouTube.
On the local auth, if you put in the default user (chronos) and space plus anything else in the username field, it will log you I’m as the local user.
A while ago I purchased the PayPal security token, and had really been liking it. The card is nice and small – about the size of a normal credit card, and it generates a key for you with each push … Continue reading
Much has been written about prefix hijacking but almost nothing has been presented and documented about best practices for preparing for a hijacking, detecting one, and responding when one happens. This presentation attempts a first pass to cover those areas … Continue reading
The internet has made many things easier in human society, especially including crime. For the last decade the good guys keep losing and the bad guys keep getting rich — why? Drawing from contemporary examples including the 2008/2009 “conficker worm”, … Continue reading
Sign the petition “President Obama, I am deeply concerned that lawyers from your Department of Justice are invoking the ‘state secrets’ defense to block court review of warrantless wiretapping by the National Security Agency. Please ask the Department of Justice … Continue reading
AT&T and NSA entered into this agreement in flagrant violation of U.S. criminal law, with the assumption that the Bush Administration would not enforce the criminal law against itself or those who entered into criminal conspiracies with it. There is … Continue reading
Mod_Security, I don’t know why I keep you. Every time something breaks, it’s your fault. I guess I feel you have some vague sort of prophylactic value for my server – expecially since it’s hard for me to keep on … Continue reading
AutoScan-Network is a network discovering and managing application. No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network. Features: â€¢Multithreaded Scan â€¢Automatic network discovery â€¢Low surcharge on the … Continue reading