Saturday, March 22nd, 2008
I have a System Forensics class this quarter at ITT Technical Institute and this was my first true lab where I actually got to use the tools and resources against "real" data. We are doing a simulated case from The HoneyNet Project and here was the documented police report:
...
Posted in Coding, Linux, Privacy, Security | No Comments
Saturday, March 22nd, 2008
This is how dangerous the web has become. Lately it is estimated that over 10K of websites fell victim to a large attack that included a remote Javascript file into the title tag of a web page. The JS malware exploits vulnerabilities in Windows, RealPlayer, and other applications to break ...
Posted in Coding, Internet, Privacy, Security | No Comments
Thursday, March 20th, 2008
The wildly popular open source Snort intrusion prevention technology is getting a major makeover.
Marty Roesch, who wrote the first version of the software nearly 10 years ago, has rewritten the software from top to bottom in the next-generation Snort 3.0 release, due in beta next month and early next year ...
Posted in Coding, Internet, Networking, Privacy, Security | No Comments
Thursday, March 20th, 2008
Voltage Security offers to make deploying encryption at the database level less painful with a technique called Format-Preserving Encryption.
Shocking the encryption market is not easy to do, but officials at Voltage Security must hope their new approach to encryption will do exactly that.
The company's flagship SecureData product uses a cryptographic ...
Posted in Coding, Privacy, Security, Software | No Comments
Tuesday, March 18th, 2008
Insomniac and coder Chad Perrin says that hackers who stay up all night coding can get more done in those hours than most people can in a month because an all-nighter lends itself to getting into "hack mode," or the state of flow. The Jargon Wiki defines hack mode as:
A ...
Posted in Coding, General BS | No Comments