Finding the name behind a gmail address

Tuesday, July 15th, 2008

Ever wondered what name is behind some obscure gmail address? Maybe your preferred gmail address was taken and you’re wondering who took it? Here’s a cute vulnerability in the gmail system that comes from the strong tie-ins between gmail, the google calendar and all the other services. Source: http://blogs.securiteam.com/index.php/archives/1113

DNS Protocol Flaw: Don`t Panic, Just Patch

Monday, July 14th, 2008

The exploit discovered by IOActive's Dan Kaminsky, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. Organizations should move quickly to patch vulnerable DNS servers against a flaw revealed last week. Dan Kaminsky said the bug can be exploited to redirect Internet traffic, but the problem ...

FWAuto v1.1 – Firewall Auditing & Ruleset Analyzer Tool

Monday, July 14th, 2008

FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files. Maybe ...

ISPs Join to Block Child Porn

Sunday, July 13th, 2008

AT&T Inc. and AOL LLC have joined three other major Internet service providers in eliminating access to child pornography newsgroups, New York Attorney General Andrew Cuomo said Friday. In June, Verizon Communications Inc., Time-Warner Cable and Sprint Nextel Corp. signed an agreement with Cuomo to shut down access to two major ...

Accessing Internet at 640 Gb/s?

Sunday, July 13th, 2008

University of Sydney physicists have developed an optical chip that could potentially improve ‘Internet speeds to up to 100 times faster than current Australia’s networks.’ According to the Sydney Morning Herald, these chalcogenide glass photonic chips will be very cheap to produce as they’re based on plain glass. As said ...