Friday, February 13th, 2009
A number of industry heavywights have unveiled the Key Management Interoperability Protocol (KMIP), a new specification jointly developed by Brocade, EMC, HP, IBM, LSI, Seagate and Thales.
"Our customers' IT environments are growing in complexity and, at the same time, these companies are under extreme pressures to meet compliance regulations and ...
Posted in Coding, Internet, Privacy, Security | No Comments
Thursday, February 12th, 2009
The Partial GET Request (HTTP 206 Status Code) of a WAV file results in a Denial of Service of the application.
Last HTTP packet from Firefox before the DoS is listed below in RAW format:
GET /fpaudio/footprints_waves.wav HTTP/1.1
Accept: */*
User-Agent: NSPlayer/11.0.6001.7001 WMFSDK/11.0
UA-CPU: x86
Accept-Encoding: gzip, deflate
Range: bytes=34848-
Unless-Modified-Since: Mon, 09 Jul 2007 12:44:57 GMT
If-Range: "4f0018-440f2-434d403204440"
Host: ...
Posted in Coding, Internet, Linux, Security, Software, Windows | No Comments
Wednesday, February 11th, 2009
This is it! After many months of effort from the Remote Exploit Dev team, BackTrack 4 Beta is ready and available. I thought I'd post up some "getting started" notes, to help people out with the first surge of questions.
Default password to BackTrack 4 hasn't changed, still root / toor.
KDE ...
Posted in Coding, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Tuesday, February 3rd, 2009
As you may already be aware from the message on phpBB.com or the topic in the #phpBB channel on Freenode, we have recently been attacked via a vulnerability in an outdated PHPList installation. The initial attack was performed well before a new version of the software was released or a ...
Posted in Coding, Internet, PHP, Privacy, Security | 1 Comment
Wednesday, January 21st, 2009
Drives such as USB sticks infected with the virus trick users into installing the worm, according to researchers.
The "Autoplay" function in Vista and early versions of Windows 7 automatically searches for programs on removable drives.
However, the virus hijacks this process, masquerading as a folder to be opened. When clicked, the ...
Posted in Coding, Hardware, Networking, Privacy, Security, Windows | No Comments