When you are connected to a network (Internet or private), your TCP/IP stack must know which DNS server(s) use to resolve host names into IP addresses. For a while, publicly alternative DNS servers – like OpenDNS or Google DNS – implemented a blacklist protection mechanism. If a domain is suspected
Category: Net
Demystify the URL Shorteners
URL shortener on-line services are very helpful. You probably already use them every day. With mobile Internet and micro-blogging services like Twitter , it’s much more convenient to use short URLs. But the downside is, once again, the bad guys who quickly understood the opportunity of new type of attacks.
A “Google Analytics” for Government Requests?
Google released interesting statistics about the number of requests they received from Governments Agencies around the world. If you offer free services on the Internet, they are (mis)chances that people will try to abuse of them. Google is certainly not the exception with all the services they provide: webmail, web
Yellow? Green? Red? The Security Rainbow Sky…
There was an interesting post on the diary page of isc.sans.org yesterday: Some readers asked why ISC did not switch the InfoCon status to yellow due to the recent IE 0-day exploit. The on-duty ISC handler explained the situation and why they decided to stay “Green”. The following question popped
Protect your Infrastructure with IRON!
Question: Do you remember the Amiga computer? I was an early fan is this wonderful machine and operating system. Starting with AmigaOS 2.0, a macro language called ARexx (with a letter “A” like “Amiga) was added. This language, derived from REXX (“REstructured eXtended eXecutor“) developed initialy by IBM. The power
Belgium Would Like to Track Your Emails for Two Years?
Mr Stefaan De Clerck , the Belgian Justice Minister announced a new plan to fight (cyber-)criminals. Belgian ISP’s could be asked forced to keep a trace of all communications via e-mail for two years. Read the article on the RTBF website in French (or via Google Translate). The main reason
Easy Geolocalization of IP Addresses
If there was only one annoying operation for me, it will be to search contact information about IP addresses! Often, network administrators and security guys have to found out to who is assigned a given IP address (example: when analysis logs or doing forensics searches). Useful information linked to IP
Side Effect of Swine Flu: Optimize Your Remote Access Solutions!
“Swine Flu”, what a hot topic! The disease continues to progress and infects more and more people every day. Medical experts estimate an exponential number of new cases due to the summer period: We travel more across countries for holidays and meet more people, increasing the risk to catch the
The Great Belgian Firewall is Back?
During the month of April, the Belgian authorities decided to prevent a very controversial web-site to be accessed by Belgian citizens (read my previous post). According to ZDNet.be, the idea of a firewall is back on the table. The article states that host or domain names could be blocked via
iPhone Tethering Howto
In the long list of new features brought by the new iPhone firmware 3.0 comes “tethering” in my personal top-ten! What’s this? Tethering means a way to connect to the Internet from a device (usually a laptop computer using a mobile device as modem/router. More info are available on Wikipedia.