Warning! Warning! You just reached a dangerous website! I’m surprised that my IP address isn’t yet blacklisted by Barracuda Central! I was offline for 48 hours, now back online and it seems that the buzz about Pieter De Crem is still growing! According to our Defense Minister, all the blogs
Software Easter Eggs and Security?
An interesting thread started last Friday on /.: Would You Add Easter Eggs To Software Produced At Work? Easter eggs are hidden message present in movies or softwares (or any kind of medias). It’s a tradition for developers to code some funny features or messages in their softwares. To show
VoIP Sniffing with UCSniff
As the acronym says VoIP (Voice over IP) is based on IP networks! It means that the protocols used by this technology travel across links and routers like HTTP, SMTP or any other IP based protocols. With classic telephony (based on copper cables), tapping was very easy to perform but
Safe File Eraser on Linux
Working as a security consultant, my laptop contains a lot of confidential data: corporate data (emails, procedures, contacts list, etc) and, even more critical, temporary customers data (reports, documentations, network topologies, packet captures, etc ). That’s why data protection is a key point for me. First, data are encrypted using
Secunia PSI 1.0 (Final) Has Been Released
Secunia announced in its blog the availability of PSI 1.0 (Personal Software Inspector). This is a must have to keep track of unpatched or end-of-life applications!
Merry (Safe) Christmas!
We are just one month away from Christmas! Traditions, nice time with your family and friends, holiday. Internet will be even more used to spread greetings cards, to find the best gifts… Malicious activity will certainly grow in the same way: Cybercriminals release Christmas themed web malware exploitation kit Take
TV Show: Les pirates informatiques peuvent-ils vaincre les armées ?
Wednesday 26th November, 08:25 PM (GMT+1), La Une (Belgian First French TV Channel) will broadcast a reportage about the cyber war: “Les pirates informatiques peuvent-ils vaincre les armées ?En moins de dix ans, le réseau internet est devenu accessible à tous. Les grandes puissances mondiales se préparent à la guerre
The Right Words at the Right Place
I read an interesting post on itmanagement.earthweb.com. It covers the problem that almost all of us have: it is difficult to find the right words during a presentation. Terms must be properly chosen depending on the audience! If you don’t success, you won’t be able to captivate the attention of
Gmail Security Flaw?
Lot of sites report a security flow in Google Mail! It should be possible to redirect all your incoming e-mails to an external address. How? By using a malicious filter created without your approval! Check out a good review of this issue: http://geekcondition.com/2008/11/23/gmail-security-flaw-proof-of-concept/.