So simply and non destructive! (Source: http://www.gizmodo.fr/2008/07/31/la-camera-vaincue-par-le-ballon.html)
Tag: Security
Security Fun
Source: http://ars.userfriendly.org/cartoons/?id=20080726.
Bud Has Mail
Often, a video is the best way to train people or promote some best practices. Watchguard released some nice video tutorials about security. Like the French children books “Martine” (You know “Martine goes to the market“, “Martine visit her friends“, etc), we follow the adventures of Bud, a dummy regular
Check Your DNS Resolver
Since the announce of the major DNS vulnerability (multi-vendors), it’s patching time for all admins around the world. Did you already perform your homework? The people at OARC have crafted a special DNS name and server that you can query to check whether or not your resolver is using random
Infocus: Blocking Traffic by Country on Production Networks
Interesting article about traffic filtering based on countries: http://www.securityfocus.com/infocus/1900/4. (It’s based on Microsoft ISA server but can be easily extended to other platforms)
eBay Will Track Your IP Addresses
Like many of us, I’m an eBay user. Regularly, I buy or sell unused or deprecated stuffs. eBay (as Paypal, same group) should be one of the most targeted attacks (phising, fraud, …). Today, I received the following alert in my eBay mailbox: Like Google did recently, eBay will start
Four Minutes!
Four Minutes! This is the actual survival time on the Internet for an unpatched system (sources: ISC and the Survival Time Graph). Good practice: Always perform a full patch before connecting a new server on the Internet (even under pressure). A good deployment procedure must be in place.
The Pirate Bay Proposes “IPETEE”
The Pirate Bay wants to encrypt the whole Internet! As you probably read recently, more and more countries and Europe via the Intellectual Property Rights Enforcement Directive (IPRED2). In the ISO model, encryption is usually performed at the presentation or application levels. The Pirate Bay would like to encrypt all
TrueCrypt 6.0 is out!
A new release of TrueCrypt is available. What’s new? This feature sounds really interesting: Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from
Metasploit on an iPhone
An other good reason to get an iPhone (still not announced in Belgium, btw): Metasploit is available on the iPhone. See Muts’ Blog.