I’m back from a local event organized in my village: “Ce qu’il faut savoir pour surfer sans risque” what can be translated by “How to use the Internet in a safe way“. I heard about this conference via the local newspaper and found interesting to attend. Not to learn new
Family Security Awareness Training
For a while my daughters are using a laptop at home for games. A specific account was created for this purpose with limited access rights (no Internet at the moment!), access time and no password. Now, the youngest (six years old) has enough knowledge to type words on the keyboard.
Virtual Banking, Real Risks?
Announced on BBC News, Mindark, the developers of Entropia, get their license to perform on-line banking! Entropia is an online game defined as “The first virtual universe with a real cash economy”. The Swedish Financial Supervisory Authority accepted and issued a license to Mindark. It allows players to convert their
Introduction to SEAT
SEAT – Search Engine Assessment Tool – is a tool dedicated to security professionals and/or pentesters . Using popular search engines, it search for interesting information stored in their caches. It also uses other types of public resources (see later). Popular search engines like Google or Yahoo! (non-exhaustive list) use
Oups! Gmail Undo Function
Gmail Labs are back with a new feature for Gmail… A few months ago, they introduced a feature to help users to not send e-mails at the wrong moment (late night, after a party, …) Now, there are back with a new protection: An undo function! It’s very simple: once
ISSA-Be Event: Targeted attacks: Balancing FUD, Reality and the Future
Back from the last ISSA Belgium Chapter event about targeted attacks. The speaker was Swa Frantzen. This is really a great guy who’s also a SANS ISC handler. Last year, he already made a presentation for ISSA about one day @ ISC. Less than twenty people attended the meeting today,
Dynamic Signature Verification
Authentication is a key point in security. How to be sure that the user behind the keyboard is really the one he pretend to be? A hand-written signature can by used as an authentication factor (but combined with another one – remember – strong authentication requires multiple factors). Basic signature
ActuSecu #22 is Out!
Release #22 of ActuSecu is out! Available here. Covered topics: Identity theft on the Internet, MD5 collisions and SSL certificates vulnerabilities, Conficker, FreeBSD telnet and Microsoft XML exploits and malicious RSS feeds.
Wi-Fi @ Hospital
For a few days, I spend my time between home and the hospital. My wife has undergone surgery (nothing critical, it was planned). Personally I hate hospitals and spending hours over there “offline” is a pain. Luckily our hospital offers sells Wi-Fi access to the patients. On a pure business
Bye-bye Acrobat Reader!
It’s decided! I get rid of all my Acrobat Readers! My primary environment is Linux but I also use Windows operating systems (virtualized or running on separated hardware). And today, you can’t life without a PDF reader! I looked for an alternative. My PDF reader is now Foxit. To make