Monday, November 17th, 2008
Nowadays you don't need a locksmith or even lockpicking tools to get past a locked door without a key--you can do it using software, a photograph of the key and a key-cutting machine.
Researchers from University of California, San Diego developed software called "Sneakey" that enables anyone to make duplicates of ...
Posted in General BS, Hardware, Privacy, Security, Software | No Comments
Monday, November 17th, 2008
According to the UK-based Centre for the Protection of National Infrastructure (CPNI), an error in the secure shell protocol (SSH) specification can in rare cases be exploited to reconstruct part of the plain text. According to their description of the error, the standard OpenSSH configuration allows 32 bits of plain ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Friday, November 14th, 2008
I received another email today supposedly from an FBI Director claiming that I am the beneficiary for a $10.5 million sum. Basically, it's the newer version of the old Nigeria scam. Here are the exact email contents, including the basic headers:
-----Original Message-----
From: Federal Bureau of Investigation [mailto:
[email protected]]
Sent: Friday, November 14, ...
Posted in Internet, Privacy, Security | 28 Comments
Sunday, November 9th, 2008
The viewing of porn at work can result in lost time, creativity, productivity, and employer profitability. More importantly, it can help create a hostile work environment and can be considered sexual harassment, in violation of Title VII of the Civil Rights Act of 1964. Naturally, corporations want to avoid the ...
Posted in Internet, Privacy, Security | No Comments
Friday, November 7th, 2008
Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments