Tuesday, February 17th, 2009
Sun today released VirtualBox 2.1.4, the second maintenance release of VitualBox 2.1 which improves stability and performance. See the ChangeLog for a list of changes since VirtualBox 2.1.2.
VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, February 14th, 2009
To steal your identity, a cybercriminal doesn't have to have direct access to your bank account or other personal information. Often, he collects information about you from a variety of seemingly innocuous sources, then uses that data to map out a strategy to crack your online defenses and drain your ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Thursday, February 12th, 2009
The Partial GET Request (HTTP 206 Status Code) of a WAV file results in a Denial of Service of the application.
Last HTTP packet from Firefox before the DoS is listed below in RAW format:
GET /fpaudio/footprints_waves.wav HTTP/1.1
Accept: */*
User-Agent: NSPlayer/11.0.6001.7001 WMFSDK/11.0
UA-CPU: x86
Accept-Encoding: gzip, deflate
Range: bytes=34848-
Unless-Modified-Since: Mon, 09 Jul 2007 12:44:57 GMT
If-Range: "4f0018-440f2-434d403204440"
Host: ...
Posted in Coding, Internet, Linux, Security, Software, Windows | No Comments
Wednesday, February 11th, 2009
This is it! After many months of effort from the Remote Exploit Dev team, BackTrack 4 Beta is ready and available. I thought I'd post up some "getting started" notes, to help people out with the first surge of questions.
Default password to BackTrack 4 hasn't changed, still root / toor.
KDE ...
Posted in Coding, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Tuesday, February 10th, 2009
Google has discovered a vulnerability in its Chrome web browser that can allow an attacker to execute his own commands on a vulnerable Windows system. The vulnerability requires that the victim has previously installed Chrome, but is visiting a rigged web page using another browser, such as Internet Explorer.
According to ...
Posted in Internet, Security, Software | No Comments