Friday, May 30th, 2008
A wiry young man with his head shaved and wearing a tank top points a handgun straight at the camera in a disturbing YouTube video. The man wears what appears to be a wedding ring, and he gazes vacantly away from the viewer.
Though it's an odd image for an advertisement, ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 29th, 2008
Web developer Aza Raskin knows we visit Digg, Del.icio.us, Reddit and Facebook without even having to ask.
No, he isn't employing privacy violating hackery, but he is exploiting a "cute" information leak in CSS that traditionally displays visited links differently than those that have yet to be visited. By loading in ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, May 28th, 2008
Links:
Built-in Windows commands to determine if a system has been hacked
More built-in Windows commands for system analysis
Posted in Security, Windows | No Comments
Wednesday, May 28th, 2008
Mass SQL injection attack, take four: Yet another wave of SQL injection attacks is exploiting an Adobe Flash vulnerability that appears to be coming from the same series of attacks originating from China.
The intent, as in previous attacks, has been to steal online gamers’ password credentials. But given the persistence ...
Posted in Internet, Security | No Comments
Wednesday, May 28th, 2008
I used to joke about the client that once told me their management mandated “double encryption” on all financial information after a breach. In their case, they were encrypting their database and backup tapes. Not that there isn’t a valid reason to encrypt databases and backup tapes, but the way ...
Posted in Security | No Comments