HTTP Proxies Bypass Firewalls

Tuesday, May 20th, 2008

This may seem painfully obvious to some people, but I looked around and couldn’t find a reference to it, so I apologize ahead of time for anyone who already knew this. When we normally think of how attackers use proxies they are almost always just trying to hide their IP ...

Permanent Denial-of-Service Attack Sabotages Hardware

Tuesday, May 20th, 2008

You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely. A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike ...

How To Run Linux From A USB Flash Drive

Tuesday, May 20th, 2008

Most of the time, Linux is run from either an installation on a hard drive or a live CD/DVD distribution. The first is fast, but not very portable; the second can be run anywhere you have a computer and a CD drive with boot access, but typically isn't very fast. ...

Cisco alums readying firewall killer

Monday, May 19th, 2008

Five former Cisco engineers have co-founded a start-up called Rohati Systems whose products take dead aim at traditional perimeter firewalls. A traditional firewall and its access control lists "is not capable of doing its job today from an access-control perspective," says CEO and President Shane Buckley. "Nowadays, your ...

Researchers find new ways of snooping

Monday, May 19th, 2008

Researchers have developed techniques for stealing computer data from a computer using some unlikely hacking tools: cameras and telescopes. In two separate pieces of research, teams at the University of California, Santa Barbara, and at Saarland University in Saarbrucken, Germany, describe attacks that seem ripped from the pages of spy novels. ...