Tuesday, July 15th, 2008
Ever wondered what name is behind some obscure gmail address? Maybe your preferred gmail address was taken and you’re wondering who took it?
Here’s a cute vulnerability in the gmail system that comes from the strong tie-ins between gmail, the google calendar and all the other services.
Source:
http://blogs.securiteam.com/index.php/archives/1113
Posted in Internet, Privacy, Security, Software | No Comments
Monday, July 14th, 2008
The exploit discovered by IOActive's Dan Kaminsky, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. Organizations should move quickly to patch vulnerable DNS servers against a flaw revealed last week. Dan Kaminsky said the bug can be exploited to redirect Internet traffic, but the problem ...
Posted in Internet, Security, Software | No Comments
Monday, July 14th, 2008
FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files.
Maybe ...
Posted in Internet, Privacy, Security, Software | No Comments
Sunday, July 13th, 2008
AT&T Inc. and AOL LLC have joined three other major Internet service providers in eliminating access to child pornography newsgroups, New York Attorney General Andrew Cuomo said Friday.
In June, Verizon Communications Inc., Time-Warner Cable and Sprint Nextel Corp. signed an agreement with Cuomo to shut down access to two major ...
Posted in Internet | No Comments
Sunday, July 13th, 2008
University of Sydney physicists have developed an optical chip that could potentially improve ‘Internet speeds to up to 100 times faster than current Australia’s networks.’ According to the Sydney Morning Herald, these chalcogenide glass photonic chips will be very cheap to produce as they’re based on plain glass. As said ...
Posted in Hardware, Internet, Networking | No Comments