NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

5.31.2007

 
Yoggie Pico USB Firewall



5.30.2007

 
Effective Technological Measures: It Means What It Says, Says Finnish Court

 
Novell and EFF Team Up to Reform Software Patents



5.29.2007

 
How do I... Create secure tunnels for client-server communication with OpenSSH?

 
Seven Habits of Highly Malicious Hackers



5.26.2007

 
JUNOS As A Second Language e-Learning Course



5.25.2007

 
She looks so happy with that tracking device on her wrist. WIFI and RFIDs used for tracking (not really news)



5.24.2007

 
ACSAC CFP - ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.



5.22.2007

 
Mathematicians factor 2^1039-1



5.20.2007

 
2900 Virginia Students SOL

 
Judge Asks: What is a website?



5.19.2007

 
Biometric USB Drive from Tregg. I wonder if this is any more secure than the SecuStick?



5.17.2007

 
BLOG: Be Your Own War Driver

 
Bruce Schneier - How Security Companies Sucker Us With Lemons applies George Ackerlof's "The market for lemons: quality certainty and the market mechanism" to security products.



5.14.2007

 
Uninformed Journal v7 Released



5.13.2007

 
libewf supports the expert witness file format, a compressed file system image format



5.11.2007

 
WINDOWS TIP SHEET: Capture That Wild Packet Use pigs to find truffles and use Netcap to do quick and dirty packet captures.

By Jeffery Hicks

I know there are many packet-capturing tools, including some terrific open source products. But for real simplicity, and the cost is right, there's the command-line version of Network Monitor, also called Netcap.exe.

Netcap.exe is part of Windows Support Tools. The only other step you have to take to use it is to install the Network Monitor driver and bind it to the network card you'll be capturing.

 
Google finds that 1 in 10 webpages contains malware.



5.09.2007

 
Mentioned during tonight's demo: the Bit9 FileAdvisor search engine, allows you to look up a file via it's name or hash value.

 
TJX’s failure to secure Wi-Fi could cost $1B

 
BLOG: Forensics Follies



5.08.2007

 
NIST Announces Death of DES

 



5.07.2007

 
Malware Evolving In Nastiness

Full Coverage: how to hedge your cyber Risk

 
Security's Top 5 Priorities

Labels: , ,




5.05.2007

 
Vector Rewrite Attack - Exploitable NULL Pointer Vulnerabilities on ARM and XScale Architectures



5.04.2007

 
10 Hot Security Startups



5.03.2007

 
HD DVD Blu-Ray Decryption Key Widely Posted Online

DRM Hack Flap Sparks Digg 'Riot'



5.02.2007

 
Security's Biggest Train Wrecks



5.01.2007

 
Endpoint scan - scan the network for USB devices - from Tim

 
Call for Papers - 2nd Annual APWG eCrime Researchers Summit

 
eGold charged with money laundering

 
Analysis: Enterprise Key Management Encryption Key Overload

 
What would we do without experts?: Experts: US Not Prepared for Cyber Attack





This page is powered by Blogger.


Site Meter Locations of visitors to this page