Monday, December 29th, 2008
I found out the hard way that you cannot simply copy and paste your .vdi file, rename, and add a second virtual machine to your system. Each VDI file has a unique UUID that a single VirtualBox installation will not duplicate. You have to "clone" it. The screenshot below is ...
Posted in General BS, Hardware, Linux, Networking, Software | No Comments
Monday, December 22nd, 2008
Microsoft late Monday issued a pre-patch advisory confirming a remote code execution vulnerability affecting its SQL Server line.
The vulnerability, publicly disclosed with exploit code more than two weeks ago, affects Microsoft SQL Server 2000, Microsoft SQL Server 2005, Microsoft SQL Server 2005 Express Edition, Microsoft SQL Server 2000 Desktop Engine ...
Posted in Coding, Internet, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, December 21st, 2008
DNS Changer 2.0 (Trojan.Flush.M) is the next –in the wild- variant of this famous malware. Now the strategy has been changed, no need to modify the DNS settings on ADSL routers. Instead it will install a network driver (NDISProt.sys) which allows the malware to send/receive raw Ethernet packets. Such approach ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, December 10th, 2008
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
Homepage:
http://sourceforge.net/projects/networkminer/
Download:
http://sourceforge.net/project/showfiles.php?group_id=189429
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Monday, December 8th, 2008
Symantec researchers have reported finding a variation on the old DNSChanger trojan that installs a rouge DHCP server simulation on local networks. This means that even uninfected machines on the network can get re-directed to malicious servers.
DNSChanger has been present in the wild for some time and was originally designed ...
Posted in Internet, Networking, Security | No Comments