Firefox Heap Corruption

Wednesday, May 21st, 2008

I forgot to tell you all about this actually. I found this about 8 months back and never discussed it for various reasons. Since I saw that Mozilla has fixed a lot of memory leaks inside Firefox 2/3, I guess it's safe to say I can talk about this now. ...

HTTP Proxies Bypass Firewalls

Tuesday, May 20th, 2008

This may seem painfully obvious to some people, but I looked around and couldn’t find a reference to it, so I apologize ahead of time for anyone who already knew this. When we normally think of how attackers use proxies they are almost always just trying to hide their IP ...

Permanent Denial-of-Service Attack Sabotages Hardware

Tuesday, May 20th, 2008

You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely. A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike ...

Firefox developers tinker with new security protections

Tuesday, May 20th, 2008

Developers of the Firefox browser are designing new technologies aimed at protecting users from some of the nastiest and most prevalent forms of website attacks. One protection is designed to minimize end users' risk to cross-site scripting (XSS) attacks and cross-site request forgeries (CSRFs), both of which subvert basic internet security ...

How To Run Linux From A USB Flash Drive

Tuesday, May 20th, 2008

Most of the time, Linux is run from either an installation on a hard drive or a live CD/DVD distribution. The first is fast, but not very portable; the second can be run anywhere you have a computer and a CD drive with boot access, but typically isn't very fast. ...