Wednesday, May 21st, 2008
I forgot to tell you all about this actually. I found this about 8 months back and never discussed it for various reasons. Since I saw that Mozilla has fixed a lot of memory leaks inside Firefox 2/3, I guess it's safe to say I can talk about this now. ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Tuesday, May 20th, 2008
This may seem painfully obvious to some people, but I looked around and couldn’t find a reference to it, so I apologize ahead of time for anyone who already knew this. When we normally think of how attackers use proxies they are almost always just trying to hide their IP ...
Posted in Coding, Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, May 20th, 2008
You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely.
A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike ...
Posted in Coding, Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, May 20th, 2008
Developers of the Firefox browser are designing new technologies aimed at protecting users from some of the nastiest and most prevalent forms of website attacks.
One protection is designed to minimize end users' risk to cross-site scripting (XSS) attacks and cross-site request forgeries (CSRFs), both of which subvert basic internet security ...
Posted in Coding, Internet, Privacy, Security | No Comments
Tuesday, May 20th, 2008
Most of the time, Linux is run from either an installation on a hard drive or a live CD/DVD distribution. The first is fast, but not very portable; the second can be run anywhere you have a computer and a CD drive with boot access, but typically isn't very fast. ...
Posted in Hardware, Linux, Privacy | No Comments