High-Security Flash Storage

Monday, May 5th, 2008

If you think of flash memory, people typically think of USB memory sticks or memory cards for digital cameras and camcorders. But the potential applications for flash have expanded tremendously. The media started off as non-volatile memory for firmware on PCs and consumer electronics devices. It then became an ultra-portable ...

Sandman – Read the Windows Hibernation File

Monday, May 5th, 2008

This is a pretty new tool and a very cool one, Hibernation is a fairly new feature for Windows so it’s good to see a new tool targeting that. Microsoft provides a feature called Hibernation also know as suspend to disk that aims to save the system state into an undocumented ...

Simple Pharming

Monday, May 5th, 2008

Today I decided to give a very brief example on pharming and why it's so easy to pharm surfers with little or no skills. Usually, browser exploit writers give simple examples on how to read the boot files, or launch a calculator. There is so much you can do with ...

Safest Way to Bank Online? Your Cell Phone

Monday, May 5th, 2008

So you want to bank safely online? Then ditch your computer and make the transaction via your cell phone instead. Using a mobile handset for this most sensitive online act might sound counterintuitive, given that phones are prone to being lost or stolen, but your cell phone might actually be safer ...

The ABCs of securing your wireless network

Sunday, May 4th, 2008

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...