Tuesday, June 3rd, 2008
Microsoft has further extended the life of Windows XP so that computer makers can include the operating system on low-cost desktop PCs, the company announced at the Computex trade show on Tuesday.
Microsoft has been under pressure from computer makers to provide a version of its OS for an emerging class ...
Posted in Hardware, Windows | No Comments
Wednesday, May 28th, 2008
Complexity is the enemy of security. Simple systems are inherently more secure than complex solutions. We see this idea validated again and again in security.
Unfortunately, our IT systems are getting more and more complex as we depend on technology to fuel business growth and innovation. But do we really need ...
Posted in General BS, Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, May 27th, 2008
Last Thursday at the EUSecwest conference, security researcher Sebastian Muniz of Core Security Technologies demonstrated a proof-of-concept rootkit for Cisco's IOS router operating system.A root kit consists of one or several related applications designed to give the program user root or administrator privileges on a given computer, whether or not ...
Posted in Hardware, Networking, Security | No Comments
Tuesday, May 27th, 2008
Whether you hire outside consultants or do the testing yourself, here are some tips for making sure your time and money are well spent.
1. Set goals. Make sure you know before you start your penetration testing what you want the results to encompass. Adding in too many systems can be ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Monday, May 26th, 2008
Pretty cool video doing a local physical attack against a Vista Box.
http://www.offensive-security.com/movies/vistahack/vistahack.html
McGrew Security Blog pointed me to it:
"he demonstrates a quick and easy way of obtaining SYSTEM privileges on a Vista system, given physical access to the machine. In the video, he uses BackTrack to replace Utilman.exe with a copy ...
Posted in Hardware, Security, Windows | No Comments