Evil Maid goes after TrueCrypt!

Friday, October 16th, 2009

Let’s quickly recap the Evil Maid Attack. The scenario we consider is when somebody left an encrypted laptop e.g. in a hotel room. Let’s assume the laptop uses full disk encryption like e.g. this provided by TrueCrypt or PGP Whole Disk Encryption. Many people believe, including some well known security experts, ...

Unauthentication

Monday, September 28th, 2009

In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated—and hopefully more secure—ways for you to prove you are who you say you are over the Internet. This ...

Metasploit Unleashed – Mastering the Framework

Monday, September 28th, 2009

This free information security training is brought to you in a community effort to promote awareness and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth open course about the Metasploit Framework. http://www.offensive-security.com/metasploit-unleashed/

VirtualBox 3.0.6 released

Thursday, September 10th, 2009

VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software. Sun today released VirtualBox 3.0.6, a maintenance release of VirtualBox 3.0 which improves stability and performance. See the ChangeLog for ...

Kernel 2.6.31 To Speed Up Linux Desktop

Saturday, September 5th, 2009

Dan Jones writes "As the Linux community looks forward to another kernel release, the kernel hackers have been working on improving the memory management so that the X desktop responsiveness is doubled under high memory pressure. The result is an improved desktop experience. Benchmarks on memory-tight desktops show clock time ...