Monday, December 29th, 2008
I found out the hard way that you cannot simply copy and paste your .vdi file, rename, and add a second virtual machine to your system. Each VDI file has a unique UUID that a single VirtualBox installation will not duplicate. You have to "clone" it. The screenshot below is ...
Posted in General BS, Hardware, Linux, Networking, Software | No Comments
Monday, December 1st, 2008
In just under two hours an unprotected computer was rendered unusable through online attacks in an experiment in Auckland today.
The experiment was designed to show what a household with a computer put itself at risk of everyday, and was carried out by NetSafe and IBM.
It was carried out to mark ...
Posted in General BS, Hardware, Internet, Security | No Comments
Monday, November 17th, 2008
Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine.
Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...
Posted in General BS, Hardware, Privacy, Security, Software | No Comments
Monday, November 10th, 2008
With the news that Google's Android shipped with an embarrassing security hole being followed by a simple two-step method to 'jailbreak' the OS, you'd think that the company had ironed out most of the remaining bugs – but you'd be wrong.
According to ZDnet's Ed Burnette, the open-source Linux-based smartphone platform ...
Posted in Coding, General BS, Hardware, Security, Software | No Comments
Friday, November 7th, 2008
Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments