Monday, April 11th, 2011
TCHunt is a small portable application that can be used to find encrypted True Crypt volumes on the system. It has been specifically designed to demonstrate the possibility of finding True Crypt volumes even if they are not mounted and well disguised by the user. With True Crypt, it is ...
Posted in Privacy, Software | No Comments
Saturday, November 27th, 2010
The Web is an insecure place and getting more insecure all the time. The latest threat, the Firesheep add-in for Firefox, is particularly dangerous because it is exceedingly simple to use. Someone with absolutely no hacking experience can grab your private login information to sites such as Facebook and Amazon, ...
Posted in Internet, Privacy, Security | No Comments
Saturday, July 31st, 2010
The good news about SSL-based websites: Most are running strong encryption. The bad news: More than 60 percent aren't properly configured.Researcher Ivan Ristic, who is director of engineering, Web application firewall, and SSL at Qualys, revealed findings here yesterday from a study he conducted of some 120 million registered domain ...
Posted in Internet, Privacy, Security | No Comments
Monday, July 26th, 2010
Security experts at AirTight Networks have discovered a hole in the WPA2 Wi-Fi security protocol. The security hole was named as Hole 196 after the number of the relevant page in the IEEE 802.11 (2007) standard document:. Right at the bottom of this page, the IEEE introduces the keys used ...
Posted in Internet, Networking, Privacy, Security | No Comments
Friday, November 20th, 2009
I've been using SyncToy to back up data to an external USB drive and then using Jungle Disk to back up the data to Amazon S3. With the newest version of SyncToy (2.1) they fixed a bug for EFS and now files retain their encryption when copied to an NTFS ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments