cxcv: security* + __blog__*

20 bookmark(s) - Sort by: Date / Title ↑ / - Bookmarks from other users for this tag

  1. Some of you may be aware of the technique of banner grabbing to find out what software is running on a remote machine. It is done by reading out transmitted data that contains a product name and/or version, such as HTTP's "Server:" response header. Like virtually every content sent by a server, the server is totally free what to send, i.e. this can be easily faked by an HTTP server's admin, and is sometimes even done.
  2. boing boing reports that the brand new hddvd encryption key was leaked one weak after its rollout. grats.
  3. I tried to log in to Apple Developer Connection this morning to find out that my password had been changed and the email associated with my account was now a yahoo.com address that wasn't mine. Luckily, my "security question" was still the same, so I was able to reset the password and email address back.
    Tags: , , , by Benjamin Schweizer (2008-07-09)
  4. "I've always wanted to change my legal name to ;DROP DATABASE; and see what kind of havoc ensues..."
  5. I'm not sure how serious this thing is, but an application error should never disclose account data including passwords.
  6. The good, the bad, the ugly. Wireshark/Ethereal is probably the worst software ever written (besides IE). It counts 112 CVE entries and I finally give up hope that this software will ever improve. Why is it that hard to write a protocol analyzer?
  7. Three London hospitals have been forced to shut down their entire computer systems for at least 24 hours after being hit by a virus.
  8. In 1950, Alan Turing proposed a test to determine artificial intelligence: when an observer cannot distinguish a machine from a man (connected with a typewriter), this is artificial intelligence. Today, the day has come... (via fefe)
  9. Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)
  10. Sending out enciphered postcards is great fun. The hackers at Entropia have published a set of cards on their website. Some postcards have already been deciphered, others are still undisclosed.

Top of the page

First / Previous / Next / Last / Page 1 of 2 Bookmarks: Tags: security + __blog__

About - Propulsed by SemanticScuttle