Archive | September, 2006


18 September 2006 | 3,851 views

Former Hacker Irks Microsoft in EU Dispute

Ah the anti-trust battle continues, good to see someone with technical skills involved, I wonder how the case is coming along, I haven’t heard about it for a while. Again this is quite an old story. As an expert witness on digital crime, British computer consultant Neil Barrett has helped prosecutors in the United Kingdom [...]

Continue Reading


14 September 2006 | 16,582 views

Impressive Open Source Intrusion Prevention – HLBR

It’s good to see work on open source tools in the countermeasure department aswell as the attack and penetration arena. It’s a shame since Snort and Nessus have gone semi-commercial. I hope more people invest their time in good IDS, Firewall and IPS systems, I love things like IPCop and hope to see more products [...]

Continue Reading


13 September 2006 | 19,559 views

Using the capture command in a Cisco Systems PIX firewall.

This is an excellent article you might find useful covering the use of the capture command in Cisco PIX firewalls. A vital tool to use when troubleshooting computer networking problems and monitoring computer networks is a packet sniffer. That being said, one of the best methods to use when troubleshooting connection problems or monitoring suspicious [...]

Continue Reading


12 September 2006 | 13,394 views

Moving Ahead in the War Against Botnets

This effort started quite a long time ago, I was just checking up to see how they were getting on, but there’s not much news of their progress. perating under the theory that if you kill the head, the body will follow, a group of high-profile security researchers is ramping up efforts to find and [...]

Continue Reading


11 September 2006 | 69,131 views

LCP – A Good FREE Alternative to L0phtcrack (LC5)

Since Symantec stopped development of L0phtcrack many people have been looking for alternatives. So don’t forget.. Jack the Ripper is still king Medusa is good Ophcrack for Rainbow Tables And now one more, introducting LCP, which we have talked about before in the article Password Cracking with Rainbowcrack and Rainbow Tables. LCP is freeware! The [...]

Continue Reading


10 September 2006 | 4,821 views

What Responsibility do Anti-Spyware Researchers Have?

Ethical debates are always interesting, and people have gotten in trouble lately for reverse engineering and various other branches of research. This is a fairly old topic, but as I’m clearing out some old drafts, I still find it an interesting one. There’s been an ongoing debate in security circles concerning how security researchers should [...]

Continue Reading


07 September 2006 | 125,073 views

Hacking Still Can’t Outdo Stupidity for Data Leaks

Can you believe this the provincial government in British Columbia has managed to auction off a set of data tapes containing people’s social insurance numbers, dates of birth and medical records among other information. The provincial government has auctioned off computer tapes containing thousands of highly sensitive records, including information about people’s medical conditions, their [...]

Continue Reading


06 September 2006 | 1,054,727 views

Brutus Password Cracker – Download brutus-aet2.zip AET2

If you don’t know, Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made [...]

Continue Reading


06 September 2006 | 5,871 views

Charity Computers May Fuel Malware Wars

Sometimes doing good can help bad things propagate, sometimes it’s good to consider the big picture and the repercussions of your charitable actions. This is a case where such logic rings true. Programs to send PCs to third world countries might inadvertently fuel the development of malware for hire scams, an anti-virus guru warns. Eugene [...]

Continue Reading


05 September 2006 | 32,325 views

The Top 10 PHP Security Vulnerabilities from OWASP

This is a useful article that has basically taken the OWASP Top 10 Vulnerabilities and remapped them to PHP with actual examples. The Open Web Application Security Project released a helpful document that lists what they think are the top ten security vulnerabilities in web applications. These vulnerabilities can, of course, exist in PHP applications. [...]

Continue Reading