Thursday, June 18th, 2009
Researchers have built a tool that automatically finds and exploits SQL injection and cross-site scripting vulnerabilities in Web applications.
The so-called Ardilla tool uses a technique developed by the researchers -- MIT's Adam Kiezun, the University of Washington's Michael Ernst, Stanford's Philip Guo, and Syracuse University's Karthick Jayaraman -- that creates ...
Posted in Coding, Internet, PHP, Security, Software | No Comments
Thursday, June 18th, 2009
Yesterday an interesting HTTP DoS tool has been released. The tool performs a Denial of Service attack on Apache (and some other, see below) servers by exhausting available connections. While there are a lot of DoS tools available today, this one is particularly interesting because it holds the connection open ...
Posted in Internet, Linux, Security | No Comments
Wednesday, June 17th, 2009
Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions.
Wireshark 1.2.0 has been released. This is the new stable release branch of Wireshark and many new and exciting features have been added since 1.0 was released.
In ...
Posted in Internet, Networking, Security, Software | No Comments
Tuesday, June 16th, 2009
Torfox is a mash-up between Firefox and Tor. Ideally, we want to completely remove all direct communication between Firefox and the localhost. Instead, all address lookups are done through tor-resolve and all connections are made through tor socks server. Right now the project only works on Windows and relies on ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, June 15th, 2009
I recently came upon a few articles that once again offered the computer security tip to use onscreen keyboards to defeat keyloggers. Most of these tips are suggesting to install an onscreen keyboard or make use of the default one of the operating system to defeat keyloggers while making transactions ...
Posted in Hardware, Internet, Privacy, Security | No Comments