Monday, April 21st, 2008
Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...
Posted in Internet, Privacy, Security | No Comments
Sunday, April 20th, 2008
Storwize has developed a new range of in-line data compression appliances which it claimed can compress files at up to 500MB/s, doubling or even tripling the effective capacity of a NAS array.
The three new systems are 64-bit, meaning they can use far more memory than the company's previous models. That ...
Posted in Internet, Networking, Software | No Comments
Saturday, April 19th, 2008
Back in the '60s, when the spy craze first hit, would-be snoops had to satisfy their desire for spy gear with products like 007 cologne and aftershave, when what they really wanted was the bug Bond hid beneath the bumper of a quarry's car, or the greenscreen mapping device mounted ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Friday, April 18th, 2008
The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.
What information is ...
Posted in Internet, Privacy, Security | No Comments