HOME
- Archives -
07/28/2002 - 08/04/2002
08/11/2002 - 08/18/2002
08/18/2002 - 08/25/2002
08/25/2002 - 09/01/2002
09/01/2002 - 09/08/2002
09/08/2002 - 09/15/2002
09/15/2002 - 09/22/2002
09/22/2002 - 09/29/2002
09/29/2002 - 10/06/2002
10/06/2002 - 10/13/2002
10/13/2002 - 10/20/2002
10/20/2002 - 10/27/2002
10/27/2002 - 11/03/2002
11/03/2002 - 11/10/2002
11/10/2002 - 11/17/2002
11/17/2002 - 11/24/2002
11/24/2002 - 12/01/2002
12/01/2002 - 12/08/2002
12/08/2002 - 12/15/2002
12/15/2002 - 12/22/2002
12/29/2002 - 01/05/2003
01/12/2003 - 01/19/2003
01/19/2003 - 01/26/2003
01/26/2003 - 02/02/2003
02/02/2003 - 02/09/2003
02/09/2003 - 02/16/2003
02/16/2003 - 02/23/2003
02/23/2003 - 03/02/2003
03/02/2003 - 03/09/2003
03/09/2003 - 03/16/2003
03/16/2003 - 03/23/2003
03/23/2003 - 03/30/2003
03/30/2003 - 04/06/2003
04/06/2003 - 04/13/2003
04/13/2003 - 04/20/2003
04/20/2003 - 04/27/2003
04/27/2003 - 05/04/2003
05/04/2003 - 05/11/2003
05/11/2003 - 05/18/2003
05/18/2003 - 05/25/2003
05/25/2003 - 06/01/2003
06/08/2003 - 06/15/2003
06/15/2003 - 06/22/2003
06/22/2003 - 06/29/2003
06/29/2003 - 07/06/2003
07/06/2003 - 07/13/2003
07/13/2003 - 07/20/2003
07/20/2003 - 07/27/2003
07/27/2003 - 08/03/2003
08/03/2003 - 08/10/2003
08/10/2003 - 08/17/2003
08/17/2003 - 08/24/2003
08/24/2003 - 08/31/2003
08/31/2003 - 09/07/2003
09/07/2003 - 09/14/2003
09/14/2003 - 09/21/2003
09/21/2003 - 09/28/2003
09/28/2003 - 10/05/2003
10/05/2003 - 10/12/2003
10/12/2003 - 10/19/2003
10/19/2003 - 10/26/2003
10/26/2003 - 11/02/2003
11/02/2003 - 11/09/2003
11/09/2003 - 11/16/2003
11/16/2003 - 11/23/2003
11/23/2003 - 11/30/2003
11/30/2003 - 12/07/2003
12/07/2003 - 12/14/2003
12/14/2003 - 12/21/2003
12/28/2003 - 01/04/2004
01/04/2004 - 01/11/2004
01/11/2004 - 01/18/2004
01/18/2004 - 01/25/2004
01/25/2004 - 02/01/2004
02/01/2004 - 02/08/2004
02/08/2004 - 02/15/2004
02/15/2004 - 02/22/2004
02/22/2004 - 02/29/2004
02/29/2004 - 03/07/2004
03/07/2004 - 03/14/2004
03/14/2004 - 03/21/2004
03/21/2004 - 03/28/2004
03/28/2004 - 04/04/2004
04/04/2004 - 04/11/2004
04/11/2004 - 04/18/2004
04/18/2004 - 04/25/2004
04/25/2004 - 05/02/2004
05/02/2004 - 05/09/2004
05/09/2004 - 05/16/2004
05/16/2004 - 05/23/2004
05/23/2004 - 05/30/2004
05/30/2004 - 06/06/2004
06/06/2004 - 06/13/2004
06/13/2004 - 06/20/2004
06/20/2004 - 06/27/2004
06/27/2004 - 07/04/2004
07/04/2004 - 07/11/2004
07/11/2004 - 07/18/2004
07/18/2004 - 07/25/2004
07/25/2004 - 08/01/2004
08/01/2004 - 08/08/2004
08/08/2004 - 08/15/2004
08/15/2004 - 08/22/2004
08/22/2004 - 08/29/2004
08/29/2004 - 09/05/2004
09/05/2004 - 09/12/2004
09/12/2004 - 09/19/2004
09/19/2004 - 09/26/2004
09/26/2004 - 10/03/2004
10/03/2004 - 10/10/2004
10/10/2004 - 10/17/2004
10/17/2004 - 10/24/2004
10/24/2004 - 10/31/2004
10/31/2004 - 11/07/2004
11/07/2004 - 11/14/2004
11/14/2004 - 11/21/2004
11/21/2004 - 11/28/2004
11/28/2004 - 12/05/2004
12/05/2004 - 12/12/2004
12/12/2004 - 12/19/2004
12/19/2004 - 12/26/2004
12/26/2004 - 01/02/2005
01/02/2005 - 01/09/2005
01/09/2005 - 01/16/2005
01/16/2005 - 01/23/2005
01/23/2005 - 01/30/2005
01/30/2005 - 02/06/2005
02/06/2005 - 02/13/2005
02/13/2005 - 02/20/2005
02/20/2005 - 02/27/2005
02/27/2005 - 03/06/2005
03/06/2005 - 03/13/2005
03/13/2005 - 03/20/2005
03/20/2005 - 03/27/2005
03/27/2005 - 04/03/2005
04/03/2005 - 04/10/2005
04/10/2005 - 04/17/2005
04/17/2005 - 04/24/2005
04/24/2005 - 05/01/2005
05/01/2005 - 05/08/2005
05/08/2005 - 05/15/2005
05/15/2005 - 05/22/2005
05/22/2005 - 05/29/2005
05/29/2005 - 06/05/2005
06/05/2005 - 06/12/2005
06/12/2005 - 06/19/2005
06/19/2005 - 06/26/2005
06/26/2005 - 07/03/2005
07/03/2005 - 07/10/2005
07/10/2005 - 07/17/2005
07/17/2005 - 07/24/2005
07/24/2005 - 07/31/2005
07/31/2005 - 08/07/2005
08/07/2005 - 08/14/2005
08/14/2005 - 08/21/2005
08/21/2005 - 08/28/2005
08/28/2005 - 09/04/2005
09/04/2005 - 09/11/2005
09/11/2005 - 09/18/2005
09/18/2005 - 09/25/2005
09/25/2005 - 10/02/2005
10/02/2005 - 10/09/2005
10/09/2005 - 10/16/2005
10/16/2005 - 10/23/2005
10/23/2005 - 10/30/2005
10/30/2005 - 11/06/2005
11/06/2005 - 11/13/2005
11/13/2005 - 11/20/2005
11/20/2005 - 11/27/2005
11/27/2005 - 12/04/2005
12/04/2005 - 12/11/2005
12/11/2005 - 12/18/2005
12/18/2005 - 12/25/2005
12/25/2005 - 01/01/2006
01/01/2006 - 01/08/2006
01/08/2006 - 01/15/2006
01/15/2006 - 01/22/2006
01/22/2006 - 01/29/2006
01/29/2006 - 02/05/2006
02/05/2006 - 02/12/2006
02/12/2006 - 02/19/2006
02/19/2006 - 02/26/2006
02/26/2006 - 03/05/2006
03/05/2006 - 03/12/2006
03/12/2006 - 03/19/2006
03/19/2006 - 03/26/2006
03/26/2006 - 04/02/2006
04/02/2006 - 04/09/2006
04/09/2006 - 04/16/2006
04/16/2006 - 04/23/2006
04/23/2006 - 04/30/2006
04/30/2006 - 05/07/2006
05/07/2006 - 05/14/2006
05/14/2006 - 05/21/2006
05/21/2006 - 05/28/2006
05/28/2006 - 06/04/2006
06/04/2006 - 06/11/2006
06/11/2006 - 06/18/2006
06/18/2006 - 06/25/2006
06/25/2006 - 07/02/2006
07/02/2006 - 07/09/2006
07/09/2006 - 07/16/2006
07/16/2006 - 07/23/2006
07/23/2006 - 07/30/2006
07/30/2006 - 08/06/2006
08/06/2006 - 08/13/2006
08/13/2006 - 08/20/2006
08/20/2006 - 08/27/2006
08/27/2006 - 09/03/2006
09/03/2006 - 09/10/2006
09/10/2006 - 09/17/2006
09/17/2006 - 09/24/2006
09/24/2006 - 10/01/2006
10/01/2006 - 10/08/2006
10/08/2006 - 10/15/2006
10/15/2006 - 10/22/2006
10/22/2006 - 10/29/2006
10/29/2006 - 11/05/2006
11/05/2006 - 11/12/2006
11/12/2006 - 11/19/2006
11/19/2006 - 11/26/2006
11/26/2006 - 12/03/2006
12/03/2006 - 12/10/2006
12/10/2006 - 12/17/2006
12/17/2006 - 12/24/2006
12/24/2006 - 12/31/2006
12/31/2006 - 01/07/2007
01/07/2007 - 01/14/2007
01/14/2007 - 01/21/2007
01/21/2007 - 01/28/2007
01/28/2007 - 02/04/2007
02/04/2007 - 02/11/2007
02/11/2007 - 02/18/2007
02/18/2007 - 02/25/2007
02/25/2007 - 03/04/2007
03/04/2007 - 03/11/2007
03/11/2007 - 03/18/2007
03/18/2007 - 03/25/2007
03/25/2007 - 04/01/2007
04/01/2007 - 04/08/2007
04/08/2007 - 04/15/2007
04/15/2007 - 04/22/2007
04/22/2007 - 04/29/2007
04/29/2007 - 05/06/2007
05/06/2007 - 05/13/2007
05/13/2007 - 05/20/2007
05/20/2007 - 05/27/2007
05/27/2007 - 06/03/2007
06/03/2007 - 06/10/2007
06/10/2007 - 06/17/2007
06/17/2007 - 06/24/2007
06/24/2007 - 07/01/2007
07/01/2007 - 07/08/2007
07/08/2007 - 07/15/2007
07/15/2007 - 07/22/2007
07/22/2007 - 07/29/2007
07/29/2007 - 08/05/2007
08/05/2007 - 08/12/2007
08/12/2007 - 08/19/2007
08/19/2007 - 08/26/2007
08/26/2007 - 09/02/2007
09/02/2007 - 09/09/2007
09/09/2007 - 09/16/2007
09/16/2007 - 09/23/2007
09/23/2007 - 09/30/2007
09/30/2007 - 10/07/2007
10/07/2007 - 10/14/2007
10/14/2007 - 10/21/2007
10/21/2007 - 10/28/2007
10/28/2007 - 11/04/2007
11/04/2007 - 11/11/2007
11/11/2007 - 11/18/2007
11/18/2007 - 11/25/2007
11/25/2007 - 12/02/2007
12/02/2007 - 12/09/2007
12/09/2007 - 12/16/2007
12/16/2007 - 12/23/2007
12/23/2007 - 12/30/2007
12/30/2007 - 01/06/2008
01/06/2008 - 01/13/2008
01/13/2008 - 01/20/2008
01/20/2008 - 01/27/2008
01/27/2008 - 02/03/2008
02/03/2008 - 02/10/2008
02/10/2008 - 02/17/2008
02/17/2008 - 02/24/2008
02/24/2008 - 03/02/2008
03/02/2008 - 03/09/2008
03/09/2008 - 03/16/2008
03/16/2008 - 03/23/2008
03/23/2008 - 03/30/2008
03/30/2008 - 04/06/2008
04/06/2008 - 04/13/2008
04/13/2008 - 04/20/2008
04/20/2008 - 04/27/2008
04/27/2008 - 05/04/2008
05/04/2008 - 05/11/2008
05/11/2008 - 05/18/2008
05/18/2008 - 05/25/2008
05/25/2008 - 06/01/2008
06/01/2008 - 06/08/2008
06/08/2008 - 06/15/2008
06/15/2008 - 06/22/2008
06/22/2008 - 06/29/2008
06/29/2008 - 07/06/2008
07/06/2008 - 07/13/2008
07/13/2008 - 07/20/2008
07/20/2008 - 07/27/2008
07/27/2008 - 08/03/2008
08/03/2008 - 08/10/2008
08/10/2008 - 08/17/2008
08/17/2008 - 08/24/2008
08/24/2008 - 08/31/2008
08/31/2008 - 09/07/2008
09/07/2008 - 09/14/2008
09/14/2008 - 09/21/2008
09/21/2008 - 09/28/2008
09/28/2008 - 10/05/2008
10/05/2008 - 10/12/2008
10/12/2008 - 10/19/2008
10/19/2008 - 10/26/2008
10/26/2008 - 11/02/2008
11/02/2008 - 11/09/2008
11/09/2008 - 11/16/2008
11/16/2008 - 11/23/2008
11/30/2008 - 12/07/2008
12/07/2008 - 12/14/2008
12/14/2008 - 12/21/2008
12/28/2008 - 01/04/2009
01/04/2009 - 01/11/2009
01/11/2009 - 01/18/2009
01/18/2009 - 01/25/2009
01/25/2009 - 02/01/2009
02/01/2009 - 02/08/2009
02/08/2009 - 02/15/2009
02/15/2009 - 02/22/2009
02/22/2009 - 03/01/2009
03/01/2009 - 03/08/2009
03/08/2009 - 03/15/2009
03/15/2009 - 03/22/2009
03/22/2009 - 03/29/2009
03/29/2009 - 04/05/2009
04/05/2009 - 04/12/2009
04/12/2009 - 04/19/2009
04/19/2009 - 04/26/2009
04/26/2009 - 05/03/2009
05/03/2009 - 05/10/2009
05/10/2009 - 05/17/2009
05/17/2009 - 05/24/2009
05/24/2009 - 05/31/2009
05/31/2009 - 06/07/2009
06/07/2009 - 06/14/2009
06/14/2009 - 06/21/2009
06/21/2009 - 06/28/2009
06/28/2009 - 07/05/2009
07/05/2009 - 07/12/2009
07/12/2009 - 07/19/2009
07/19/2009 - 07/26/2009
07/26/2009 - 08/02/2009
08/02/2009 - 08/09/2009
08/09/2009 - 08/16/2009
08/16/2009 - 08/23/2009
08/23/2009 - 08/30/2009
08/30/2009 - 09/06/2009
09/06/2009 - 09/13/2009
09/13/2009 - 09/20/2009
09/20/2009 - 09/27/2009
09/27/2009 - 10/04/2009
10/04/2009 - 10/11/2009
10/11/2009 - 10/18/2009
10/18/2009 - 10/25/2009
10/25/2009 - 11/01/2009
11/01/2009 - 11/08/2009
11/08/2009 - 11/15/2009
11/15/2009 - 11/22/2009
11/22/2009 - 11/29/2009
11/29/2009 - 12/06/2009
12/06/2009 - 12/13/2009
12/13/2009 - 12/20/2009
12/20/2009 - 12/27/2009
12/27/2009 - 01/03/2010
01/03/2010 - 01/10/2010
01/10/2010 - 01/17/2010
01/17/2010 - 01/24/2010
01/24/2010 - 01/31/2010
01/31/2010 - 02/07/2010
02/07/2010 - 02/14/2010
02/14/2010 - 02/21/2010
02/21/2010 - 02/28/2010
02/28/2010 - 03/07/2010
03/07/2010 - 03/14/2010
03/14/2010 - 03/21/2010
03/21/2010 - 03/28/2010
03/28/2010 - 04/04/2010
04/04/2010 - 04/11/2010
04/11/2010 - 04/18/2010
04/18/2010 - 04/25/2010
04/25/2010 - 05/02/2010
05/02/2010 - 05/09/2010
05/09/2010 - 05/16/2010
05/16/2010 - 05/23/2010
05/23/2010 - 05/30/2010
06/06/2010 - 06/13/2010
06/13/2010 - 06/20/2010
06/20/2010 - 06/27/2010
06/27/2010 - 07/04/2010
07/04/2010 - 07/11/2010
07/11/2010 - 07/18/2010
07/18/2010 - 07/25/2010
07/25/2010 - 08/01/2010
08/01/2010 - 08/08/2010
08/08/2010 - 08/15/2010
08/15/2010 - 08/22/2010
08/22/2010 - 08/29/2010
08/29/2010 - 09/05/2010
09/05/2010 - 09/12/2010
09/12/2010 - 09/19/2010
09/19/2010 - 09/26/2010
09/26/2010 - 10/03/2010
10/03/2010 - 10/10/2010
10/10/2010 - 10/17/2010
10/17/2010 - 10/24/2010
10/24/2010 - 10/31/2010
10/31/2010 - 11/07/2010
11/07/2010 - 11/14/2010
11/14/2010 - 11/21/2010
12/05/2010 - 12/12/2010
12/12/2010 - 12/19/2010
12/19/2010 - 12/26/2010
12/26/2010 - 01/02/2011
01/02/2011 - 01/09/2011
01/09/2011 - 01/16/2011
01/16/2011 - 01/23/2011
01/23/2011 - 01/30/2011
01/30/2011 - 02/06/2011
02/06/2011 - 02/13/2011
02/13/2011 - 02/20/2011
02/20/2011 - 02/27/2011
02/27/2011 - 03/06/2011
03/06/2011 - 03/13/2011
03/13/2011 - 03/20/2011
03/20/2011 - 03/27/2011
03/27/2011 - 04/03/2011
04/03/2011 - 04/10/2011
04/10/2011 - 04/17/2011
04/17/2011 - 04/24/2011
04/24/2011 - 05/01/2011
05/01/2011 - 05/08/2011
05/15/2011 - 05/22/2011
05/22/2011 - 05/29/2011
05/29/2011 - 06/05/2011
06/05/2011 - 06/12/2011
06/12/2011 - 06/19/2011
06/19/2011 - 06/26/2011
06/26/2011 - 07/03/2011
07/03/2011 - 07/10/2011
07/10/2011 - 07/17/2011
07/17/2011 - 07/24/2011
07/24/2011 - 07/31/2011
07/31/2011 - 08/07/2011
08/07/2011 - 08/14/2011
08/14/2011 - 08/21/2011
08/21/2011 - 08/28/2011
08/28/2011 - 09/04/2011
09/04/2011 - 09/11/2011
09/11/2011 - 09/18/2011
09/18/2011 - 09/25/2011
09/25/2011 - 10/02/2011
10/09/2011 - 10/16/2011
10/23/2011 - 10/30/2011
11/13/2011 - 11/20/2011
11/20/2011 - 11/27/2011
11/27/2011 - 12/04/2011
12/04/2011 - 12/11/2011
12/11/2011 - 12/18/2011
01/01/2012 - 01/08/2012
01/08/2012 - 01/15/2012
01/15/2012 - 01/22/2012
01/22/2012 - 01/29/2012
01/29/2012 - 02/05/2012
02/05/2012 - 02/12/2012
02/12/2012 - 02/19/2012
02/19/2012 - 02/26/2012
02/26/2012 - 03/04/2012
03/04/2012 - 03/11/2012
03/11/2012 - 03/18/2012
03/18/2012 - 03/25/2012
04/01/2012 - 04/08/2012
04/08/2012 - 04/15/2012
04/15/2012 - 04/22/2012
04/22/2012 - 04/29/2012
04/29/2012 - 05/06/2012
05/20/2012 - 05/27/2012
05/27/2012 - 06/03/2012
06/03/2012 - 06/10/2012
06/10/2012 - 06/17/2012
06/17/2012 - 06/24/2012
06/24/2012 - 07/01/2012
07/01/2012 - 07/08/2012
07/08/2012 - 07/15/2012
07/15/2012 - 07/22/2012
07/22/2012 - 07/29/2012
07/29/2012 - 08/05/2012
08/05/2012 - 08/12/2012
09/02/2012 - 09/09/2012
09/16/2012 - 09/23/2012
09/23/2012 - 09/30/2012
09/30/2012 - 10/07/2012
10/07/2012 - 10/14/2012
10/14/2012 - 10/21/2012
10/21/2012 - 10/28/2012
11/04/2012 - 11/11/2012
11/11/2012 - 11/18/2012
11/25/2012 - 12/02/2012
12/02/2012 - 12/09/2012
12/09/2012 - 12/16/2012
12/16/2012 - 12/23/2012
01/06/2013 - 01/13/2013
01/13/2013 - 01/20/2013
01/20/2013 - 01/27/2013
01/27/2013 - 02/03/2013
02/03/2013 - 02/10/2013
02/10/2013 - 02/17/2013
02/17/2013 - 02/24/2013
02/24/2013 - 03/03/2013
03/10/2013 - 03/17/2013
03/31/2013 - 04/07/2013
04/07/2013 - 04/14/2013
04/14/2013 - 04/21/2013
04/21/2013 - 04/28/2013
04/28/2013 - 05/05/2013
05/05/2013 - 05/12/2013
07/07/2013 - 07/14/2013
07/28/2013 - 08/04/2013
08/04/2013 - 08/11/2013
08/11/2013 - 08/18/2013
08/18/2013 - 08/25/2013
08/25/2013 - 09/01/2013
09/01/2013 - 09/08/2013
09/08/2013 - 09/15/2013
09/15/2013 - 09/22/2013
09/22/2013 - 09/29/2013
09/29/2013 - 10/06/2013
10/20/2013 - 10/27/2013
10/27/2013 - 11/03/2013
11/03/2013 - 11/10/2013
11/10/2013 - 11/17/2013
11/24/2013 - 12/01/2013
12/08/2013 - 12/15/2013
12/15/2013 - 12/22/2013
12/29/2013 - 01/05/2014
01/12/2014 - 01/19/2014
02/02/2014 - 02/09/2014
02/09/2014 - 02/16/2014
02/16/2014 - 02/23/2014
02/23/2014 - 03/02/2014
03/02/2014 - 03/09/2014
03/09/2014 - 03/16/2014
03/16/2014 - 03/23/2014
03/30/2014 - 04/06/2014
04/06/2014 - 04/13/2014
04/27/2014 - 05/04/2014
05/11/2014 - 05/18/2014
05/18/2014 - 05/25/2014
05/25/2014 - 06/01/2014
06/01/2014 - 06/08/2014
06/08/2014 - 06/15/2014
06/15/2014 - 06/22/2014
06/22/2014 - 06/29/2014
06/29/2014 - 07/06/2014
07/13/2014 - 07/20/2014
07/27/2014 - 08/03/2014
08/03/2014 - 08/10/2014
08/10/2014 - 08/17/2014
08/17/2014 - 08/24/2014
08/24/2014 - 08/31/2014
08/31/2014 - 09/07/2014
09/07/2014 - 09/14/2014
09/14/2014 - 09/21/2014
09/21/2014 - 09/28/2014
10/05/2014 - 10/12/2014
10/19/2014 - 10/26/2014
10/26/2014 - 11/02/2014
11/09/2014 - 11/16/2014
11/23/2014 - 11/30/2014
12/14/2014 - 12/21/2014
12/21/2014 - 12/28/2014
12/28/2014 - 01/04/2015
01/04/2015 - 01/11/2015
01/18/2015 - 01/25/2015
01/25/2015 - 02/01/2015
02/01/2015 - 02/08/2015
02/15/2015 - 02/22/2015
03/08/2015 - 03/15/2015
03/15/2015 - 03/22/2015
03/22/2015 - 03/29/2015
03/29/2015 - 04/05/2015
04/05/2015 - 04/12/2015
05/17/2015 - 05/24/2015
05/24/2015 - 05/31/2015
06/14/2015 - 06/21/2015
07/05/2015 - 07/12/2015
07/12/2015 - 07/19/2015
07/19/2015 - 07/26/2015
08/02/2015 - 08/09/2015
08/30/2015 - 09/06/2015
09/13/2015 - 09/20/2015
09/20/2015 - 09/27/2015
09/27/2015 - 10/04/2015
10/04/2015 - 10/11/2015
10/11/2015 - 10/18/2015
10/18/2015 - 10/25/2015
11/01/2015 - 11/08/2015
11/15/2015 - 11/22/2015
11/29/2015 - 12/06/2015
12/06/2015 - 12/13/2015
12/13/2015 - 12/20/2015
12/20/2015 - 12/27/2015
01/03/2016 - 01/10/2016
01/10/2016 - 01/17/2016
01/24/2016 - 01/31/2016
01/31/2016 - 02/07/2016
02/28/2016 - 03/06/2016
03/20/2016 - 03/27/2016
05/08/2016 - 05/15/2016
05/29/2016 - 06/05/2016
06/05/2016 - 06/12/2016
06/12/2016 - 06/19/2016
07/17/2016 - 07/24/2016
07/31/2016 - 08/07/2016
08/07/2016 - 08/14/2016
08/14/2016 - 08/21/2016
08/21/2016 - 08/28/2016
09/04/2016 - 09/11/2016
09/11/2016 - 09/18/2016
09/18/2016 - 09/25/2016
09/25/2016 - 10/02/2016
10/02/2016 - 10/09/2016
10/30/2016 - 11/06/2016
11/27/2016 - 12/04/2016
12/04/2016 - 12/11/2016
12/11/2016 - 12/18/2016
12/18/2016 - 12/25/2016
01/15/2017 - 01/22/2017
01/22/2017 - 01/29/2017
01/29/2017 - 02/05/2017
02/12/2017 - 02/19/2017
02/19/2017 - 02/26/2017
03/05/2017 - 03/12/2017
03/12/2017 - 03/19/2017
03/19/2017 - 03/26/2017
03/26/2017 - 04/02/2017
05/21/2017 - 05/28/2017
05/28/2017 - 06/04/2017
06/18/2017 - 06/25/2017
07/30/2017 - 08/06/2017
09/03/2017 - 09/10/2017
09/10/2017 - 09/17/2017
09/17/2017 - 09/24/2017
10/15/2017 - 10/22/2017
11/05/2017 - 11/12/2017
11/12/2017 - 11/19/2017
12/31/2017 - 01/07/2018
01/21/2018 - 01/28/2018
02/04/2018 - 02/11/2018
02/11/2018 - 02/18/2018
02/18/2018 - 02/25/2018
02/25/2018 - 03/04/2018
03/18/2018 - 03/25/2018
04/08/2018 - 04/15/2018
04/22/2018 - 04/29/2018
05/06/2018 - 05/13/2018
05/20/2018 - 05/27/2018
05/27/2018 - 06/03/2018
08/26/2018 - 09/02/2018
09/23/2018 - 09/30/2018
09/30/2018 - 10/07/2018
11/25/2018 - 12/02/2018
01/06/2019 - 01/13/2019
01/13/2019 - 01/20/2019
01/20/2019 - 01/27/2019
01/27/2019 - 02/03/2019
02/03/2019 - 02/10/2019
02/17/2019 - 02/24/2019
02/24/2019 - 03/03/2019
03/03/2019 - 03/10/2019
03/10/2019 - 03/17/2019
03/17/2019 - 03/24/2019
03/24/2019 - 03/31/2019
04/07/2019 - 04/14/2019
05/05/2019 - 05/12/2019
05/26/2019 - 06/02/2019
06/09/2019 - 06/16/2019
06/30/2019 - 07/07/2019
07/14/2019 - 07/21/2019
07/28/2019 - 08/04/2019
09/22/2019 - 09/29/2019
10/06/2019 - 10/13/2019
11/03/2019 - 11/10/2019
11/10/2019 - 11/17/2019
01/12/2020 - 01/19/2020
10/18/2020 - 10/25/2020
04/18/2021 - 04/25/2021
07/04/2021 - 07/11/2021
10/03/2021 - 10/10/2021
06/05/2022 - 06/12/2022
09/18/2022 - 09/25/2022
01/29/2023 - 02/05/2023
02/05/2023 - 02/12/2023
08/25/2024 - 09/01/2024
09/01/2024 - 09/08/2024
09/15/2024 - 09/22/2024
LINUX
CYBERLAW
VIRTUALIZATION
Bugtraq
Packetstorm
FD
GrokLaw
RSS Feed
Netsec, comsec, infosec and IA news, research and trends
12.30.2008
MD5 considered harmful today: Creating a rogue CA certificate by Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
posted by GeeWhiz
Tuesday, December 30, 2008
12.29.2008
Attacking Critical Internet Infrastructure - Alex Sotirov and Jacob Appelbaum's live presentation will be available online via streaming video at 3:15pm (9:15am EST on Tuesday, December 30th.
posted by GeeWhiz
Monday, December 29, 2008
It will be interesting to see what Alex Sotirov and Jacob Appelbaum present in their CCC talk "Making the theoretical possible: Attacking a critical piece of Internet infrastructure."
posted by GeeWhiz
Monday, December 29, 2008
12.20.2008
Pen testing web servers - A good pen-test narrative from Dave at the Daily Dave
posted by GeeWhiz
Saturday, December 20, 2008
12.19.2008
Volatility Blog - The Volatility Framework: Volatile memory artifact extraction utility framework
posted by GeeWhiz
Friday, December 19, 2008
MANDIANT Memoryze is free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems can include the paging file in its analysis.
posted by GeeWhiz
Friday, December 19, 2008
12.17.2008
Random number generator - The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs.
posted by Theobromine
Wednesday, December 17, 2008
Robert Seacord on the CERT C Secure Coding Standard
posted by GeeWhiz
Wednesday, December 17, 2008
Microsoft: Emergency Patch for IE 0-day Coming Today
posted by GeeWhiz
Wednesday, December 17, 2008
12.16.2008
Pay attention to cyberlaw from Mich
posted by GeeWhiz
Tuesday, December 16, 2008
12.15.2008
Serious flaw in Internet Explorer not fixed yet. Specifically, its continued use
posted by GeeWhiz
Monday, December 15, 2008
12.12.2008
What we suddenly don't know about the new IE exploit from Leyla
posted by GeeWhiz
Friday, December 12, 2008
12.11.2008
Ruh-Roh - Checkpoint Sources plus SPLAT Remote Root Exploit
posted by GeeWhiz
Thursday, December 11, 2008
12.08.2008
with proper credit to http://www.dilbert.com
posted by Theobromine
Monday, December 08, 2008
12.04.2008
70% of small/medium enterprises will enter 2009 with networks at risk of security breach More info on the San Francisco security fiasco earlier this year Australia plans mandatory nation-wide internet filtering
posted by Theobromine
Thursday, December 04, 2008
11.21.2008
Internet Law Update : Court Sharply Limits Patentability of Business Methods Patents: In re Bilski, Case No. 2007-1130
posted by GeeWhiz
Friday, November 21, 2008
I heard of the issue regarding USB devices spreading viruses a while back and feel compelled to say that this is not a technical problem, it is a human problem... a stupid human problem. In the past, some have treated my suggestion of epoxy as an permanent fix for this issue as apostasy. "What???? Ban USB devices??? That's crazy!"
posted by GeeWhiz
Friday, November 21, 2008
NetWitness Investigator (Free)
posted by GeeWhiz
Friday, November 21, 2008
11.20.2008
Here is why USB drives have banned by the military until further notice.http://blog.wired.com/defense/info_war/index.html
posted by Douglas
Thursday, November 20, 2008
11.17.2008
McColo takedown nets massive drop in spam
posted by GeeWhiz
Monday, November 17, 2008
11.13.2008
Nicolas Waisman: Apology of 0days (from H2HC in Sao Paolo) - Immunity's 0day numbers: Average 0day lifetime: 348 days, Shortest life: 99 days, Longest life: 1080 (3 years).
posted by GeeWhiz
Thursday, November 13, 2008
11.12.2008
Elcomsoft researchers achieve 100-fold increase in WPA2 cracking speed from Brett
posted by GeeWhiz
Wednesday, November 12, 2008
11.11.2008
US Navy hacker avoids Romanian jail.
posted by bxche
Tuesday, November 11, 2008
CTO of the United States? - Read the technology related policy proposals here
posted by GeeWhiz
Tuesday, November 11, 2008
Spring 2009 - Priority Registration Now Open (Regular registration begins Nov 17th) ITN 260 Network Security Basics – Face-to-Face Course #25429 Section #N01C Wednesdays 6-9:30pm - Online Course#25435 Section# O02C - This course lays the foundation for further study in the network security program. Content domains include cryptography, communications security, infrastructure security, operating system security, wireless security, intrusion detection, malicious software, common attacks, and countermeasures. ITN 261 Network Attacks, Computer Crime and Hacking Tuesdays 6-9:30pm Course #39887 Section N01C - In ITN 261, students learn about security testing and vulnerability assessment strategies. From port scan to buffer overflow, hands-on labs teach students effective computer/network attack/defense techniques. ITN 275 Incident Response and Computer Forensics – Course # 25455 Section # N01C - Thursdays 6:00 pm – 9:30pm. In this intense hands-on course, students investigate live scenarios involving computer intrusion events, conspiracy, and espionage. Spring 2009 Linux / Unix Courses ITN 171 Unix I - Online 4 credits - Course #39883 Section O01C Provides an introduction to UNIX and UNIX-like operating systems. Teaches login procedures, file creation, UNIX file structure, input/output control, the UNIX shells, and shell scripting. ITN 170 Linux System Administration - Course #25431 Section N01C Monday Evenings 6:00pm – 9:30pm 4Cr Focuses on the installation, configuration and administration of the Linux operating system. Emphasis is placed upon use of Linux as a network client and workstation. Leads to Red Hat Certified Technician (RHCT) Certification. Prerequisite: ITN 171 ITN 270 Advanced Linux Network Administration – Course #25437 Section N01C – Wednesday Evenings 6:00pm – 9:30pm 4Cr. Focuses on the configuration and administration of the Linux operating system as a network server. Emphasis is placed upon the configuration of common network services and security. Leads to Red Hat Certified Engineer Certification. Prerequisite: ITN170
posted by GeeWhiz
Tuesday, November 11, 2008
11.07.2008
Battered, but not broken: understanding the WPA crack
posted by GeeWhiz
Friday, November 07, 2008
Computers at the headquarters of the Barack Obama and John McCain campaigns were hacked during the campaign by a foreign entity looking for future policy information
posted by Theobromine
Friday, November 07, 2008
11.06.2008
Aircrack-NG Adds WPA Cracking Support previously only available in KisMAC
posted by GeeWhiz
Thursday, November 06, 2008
10.30.2008
Goodbye, electronic voting. Farewell, fancy touch screen. Maryland and Virginia are going old school after Tuesday's election.
posted by Theobromine
Thursday, October 30, 2008
10.29.2008
Windows RPC hole being exploited in the wild
posted by GeeWhiz
Wednesday, October 29, 2008
10.28.2008
District Court Holds that Running Hash Values on Computer Is A Search - United States v. Crist, 2008 WL 4682806 (M.D.Pa. October 22 2008) (Kane, C.J.)
posted by GeeWhiz
Tuesday, October 28, 2008
10.24.2008
The Atlas of Cyberspace , by Martin Dodge and Rob Kitchin is now available for free online under a Creative Commons license.
posted by GeeWhiz
Friday, October 24, 2008
10.20.2008
Compromising the Electronic Emanations of Wired Keyboards by Martin Vuagnoux and Sylvain Pasini
posted by GeeWhiz
Monday, October 20, 2008
10.17.2008
Microsoft Windows Internet Printing Protocol service integer overflow being exploited in the wild.
posted by GeeWhiz
Friday, October 17, 2008
10.15.2008
Rafal Wojtczuk - "Adventures with a certain Xen vulnerability (in the PVFB backend)"
posted by GeeWhiz
Wednesday, October 15, 2008
10.14.2008
World Bank (Allegedly) Hacked
posted by GeeWhiz
Tuesday, October 14, 2008
[Dailydave ] The Static Analysis Market and You
posted by GeeWhiz
Tuesday, October 14, 2008
10.13.2008
Uninformed Journal Number 10 Released
posted by GeeWhiz
Monday, October 13, 2008
Russian researchers achieve 100-fold increase in WPA2 cracking speed
posted by Lance
Monday, October 13, 2008
10.10.2008
Token Kidnapping Windows 2003 PoC exploit
posted by GeeWhiz
Friday, October 10, 2008
Quick! Call the news!
posted by joat
Friday, October 10, 2008
10.08.2008
EU scientists launch new, 'unbreakable' encryption system from Leyla
posted by GeeWhiz
Wednesday, October 08, 2008
10.05.2008
Explaining the “New” TCP Resource Exhaustion Denial of Service (DoS) Attack
posted by GeeWhiz
Sunday, October 05, 2008
10.04.2008
Why Risk Management Doesn't Work from Tracy
posted by GeeWhiz
Saturday, October 04, 2008
9.29.2008
Last Chance: Tell Bush to veto the RIAA/MPAA Enforcement Bill
posted by GeeWhiz
Monday, September 29, 2008
From revision3.com , here is a program now available on your Tivo called HAK5 which covers network admin, black hat, white hat, and gaming. Recent episodes include topics like "hacking a wireless network with a pineapple," "analysis of a virus infection in windows," and "monitoring your network assets with spiceworks ." This appears to be a locally filmed (i.e. Williamsburg) show with guests from Hampton Roads. For those of you not familiar with Revision 3, I highly recommend you check out some of the growing number of tech shows now available through this organization including Systm , Tekzilla , and Diggnation
posted by Theobromine
Monday, September 29, 2008
9.28.2008
Paul Craig discussed a new way of owning a system by using his newly released 'Moth Trojan' today at Kiwicon in New Zealand. Paul also took owning a kiosk to a new level with hi
posted by Rauc
Sunday, September 28, 2008
9.26.2008
Dealing with UI redress vulnerabilities inherent to the current web - by Michal Zalewski
posted by GeeWhiz
Friday, September 26, 2008
9.23.2008
Download Helix 3.0 - MD5=93a285bfa8ab93d664d508e5b12446d3
posted by GeeWhiz
Tuesday, September 23, 2008
9.22.2008
Helix 2008R1 released (Ubuntu) changelog
posted by Lance
Monday, September 22, 2008
Off topic: Security for your home/office using WowWee's WiFi-enabled Rovio . Shipping this month . Not sure what type of wireless encryption this may use if any.
posted by Lance
Monday, September 22, 2008
9.21.2008
http://www.neopwn.com/ new pentesting mobile phone.
posted by Jacob
Sunday, September 21, 2008
9.19.2008
NIST: Profile for IPv6 in the U.S. Government from Chainman
posted by GeeWhiz
Friday, September 19, 2008
9.17.2008
Palin's Email Compromised and Posted to Wikileaks
posted by GeeWhiz
Wednesday, September 17, 2008
9.16.2008
Student faces charges for hack-and-tell from Chainman
posted by GeeWhiz
Tuesday, September 16, 2008
Berners-Lee of W3C says websites should have a trustworthiness label.
posted by Autonomous Coward
Tuesday, September 16, 2008
9.13.2008
Air Force Cyber Command Could Return, With Nukes
posted by GeeWhiz
Saturday, September 13, 2008
9.11.2008
San Francisco hunts for mystery device on city network from Chainman
posted by GeeWhiz
Thursday, September 11, 2008
9.10.2008
Online Posse Assembles, to Unmask Russia's Hackers from Ryan
posted by GeeWhiz
Wednesday, September 10, 2008
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications - from Brett
posted by GeeWhiz
Wednesday, September 10, 2008
Why All the Data Breaches? Businesses Just Don’t Care from Chainman
posted by GeeWhiz
Wednesday, September 10, 2008
9.08.2008
One Bad Apple from Luis
posted by GeeWhiz
Monday, September 08, 2008
Pentagon debates development of offensive cyberspace capabilities - from ChainmanMore on AF Cyber Hiatus
posted by GeeWhiz
Monday, September 08, 2008
9.06.2008
The CERT Virtual Training Environment (VTE) - A revolutionary resource for information assurance, incident response and computer forensic training, with over 500 hours of material available. VTE blends the best of classroom instruction and self-paced online training, delivering training courses, anytime access to answers, and hands-on training labs all through a standard Web browser. From Dale.
posted by GeeWhiz
Saturday, September 06, 2008
9.04.2008
IPv6 = Metavulnerability? - Yet another Remote IPv6 (ICMPv6) Flaw in FreeBSD
posted by GeeWhiz
Thursday, September 04, 2008
9.03.2008
Immunity Debug Register (DR) Linux Rootkit (loads via insmod so monolithic kernels with the module loader omitted should not be vulnerable)
posted by GeeWhiz
Wednesday, September 03, 2008
Google unveils open-source browser - Chrome - Proof-of-Concept DOS Exploit Released
posted by GeeWhiz
Wednesday, September 03, 2008
8.29.2008
DNSSEC Mandated for .GOV by Jan 2009 - The memo states that "DNSSEC provides cryptographic protections to DNS communication exchanges, thereby removing threats of DNS-based attacks... " Wow. Where can one buy a pair of those rose-colored glasses?
posted by GeeWhiz
Friday, August 29, 2008
8.27.2008
Computer viruses in space . Not to be confused with pigs in space
posted by Theobromine
Wednesday, August 27, 2008
Revealed: The Internet's Biggest Security Hole
posted by GeeWhiz
Wednesday, August 27, 2008
8.21.2008
Open Source Spear-Phishing Assessment Tool to Be Released Next Month at the OWASP Conference from Chainman
posted by GeeWhiz
Thursday, August 21, 2008
8.20.2008
Judge nixes gag order against MIT students - What a sham the entire case has been! The case was never going to stick anyway.
posted by GeeWhiz
Wednesday, August 20, 2008
8.19.2008
Spam from the botnet, for the botnet from Chainman
posted by GeeWhiz
Tuesday, August 19, 2008
8.16.2008
NIST revises guidance for assigning FISMA security categories
posted by GeeWhiz
Saturday, August 16, 2008
DefCon CTF 2008 Wrap-Up - There's been a bit of whinging on the DailyDave about the tournament.
posted by GeeWhiz
Saturday, August 16, 2008
8.14.2008
Computer Scientists Ask Court to Reconsider Gag Order in DefCon Case
posted by GeeWhiz
Thursday, August 14, 2008
8.13.2008
KARMA + Metasploit 3 == Karmetasploit
posted by GeeWhiz
Wednesday, August 13, 2008
Georgia: Before the Gunfire, Cyberattacks
posted by GeeWhiz
Wednesday, August 13, 2008
8.12.2008
Ru-Roh - Exploit successfully poisons latest BIND with fully randomized ports
posted by GeeWhiz
Tuesday, August 12, 2008
8.11.2008
Dan Kaminski's DNS Presentation from Defcon
posted by GeeWhiz
Monday, August 11, 2008
8.09.2008
Hardware Trojans - Professor Fouad Kiamilev and Ryan Hoover of University of Delaware produced some interesting hardware Trojan demos using optical, radio, and thermal sources to transmit AES keys from a compromised system.
posted by GeeWhiz
Saturday, August 09, 2008
The 11th U.S. District Court has issued an injunction against the presentation "Anatomy of a Subway Attack" by Russel Ryan, Zack Anderson, and Allesandro Chiesa which was scheduled for tomorrow at 1pm. According to the EFF , the plaintiffs will not likely prevail on their established legal rationale which was the CFAA prohibition against knowingly causing "the transmission of a program, information, code, or command, and as a result of such conduct, intentionally" causing "damage without authorization, to a protected computer." If this stands it could have a chilling effect on free speech.
posted by GeeWhiz
Saturday, August 09, 2008
8.07.2008
Defcon 16 Presentations
posted by GeeWhiz
Thursday, August 07, 2008
8.06.2008
Black Hat USA 2008 Presentations Professor Ian Angell from the London School of Economics has been my favorite presenter thus far [PPT ]. He's giving the keynote at Defcon and I plan on seeing that as well. He offered some rigorous critiques of IS, AI, misapplication of statistics, and the general fallibility of mankind. Big picture topics that served to broaden the scope of the security discussion society really needs to have one day (but will never happen). There are so many good talks that it is difficult to choose. Some favorites covered hardware rootkits, attacking virtualization, and writing shellcode for Cisco devices. The presenters of the Cisco shellcode talk picked up where Mike Lynn left off in 2005 . Cisco's security practices would likely never be tolerated in a commercial OS (of course, consumers put up with a lot due to ignorance or laziness) - no virtual memory implementation, no process separation, everything runs in a single flat address space with full system privs. As a result, shell code is easy to write and exploitation even easier as every process has full rights to all heap data.
posted by GeeWhiz
Wednesday, August 06, 2008
8.04.2008
California Secretary of State Debra Bowen supports paper ballots - Top to bottom review of e-Voting systems included code review and pen-tests (led by Matt Bishop) - 0wn the Vote! The Diebold (GEMS Server and Accuvote) system runs on an unpatched Windows 2000 Server!
posted by GeeWhiz
Monday, August 04, 2008
DNA identification may not be reliable
posted by GeeWhiz
Monday, August 04, 2008
Blue Cross and Blue Shield exposes 202,000 customers
posted by GeeWhiz
Monday, August 04, 2008
8.01.2008
Large Hadron Collider nearly ready
posted by GeeWhiz
Friday, August 01, 2008
Papers from the 2nd Annual USENIX Workshop On Offensive Technology
posted by GeeWhiz
Friday, August 01, 2008
7.31.2008
Kansas Senator (Brownback) Blasts Chinese Government For Ordering Internet Surveillance - Brownback must be concerned about China competing with the US when it comes to spying on it's own citizens .
posted by GeeWhiz
Thursday, July 31, 2008
Paper Catalog + Computer Database = Patent? Um, No.
posted by GeeWhiz
Thursday, July 31, 2008
Senators Announce New Intellectual Property Enforcement Bill - Why??? Enforcement of civil law is traditionally (and best) left to the harmed party or parties. Is DOJ prepared to force the FBI to start investigating copyright infringement (again) despite the fact such frivolous issues would steal resources away from much more pressing matters? I do not think that anyone could possibly want this bill to pass other than special interests in Hollywood.
posted by GeeWhiz
Thursday, July 31, 2008
7.29.2008
WEIS 2008: Do data-breach-disclosure laws reduce identity theft?
posted by GeeWhiz
Tuesday, July 29, 2008
7.28.2008
Air Force Cyber Command: Building the Infrastructure for High-Tech War Crimes - I am unashamedly liberal (in the Thomas Paine/Adam Smith way, not the nanny-state sort of way) but even I have to say that the author must be off his meds. Mr. Burghardt apparently thinks that it is better to engage an opponent with bombs and bullets than bits and bytes. If information warfare and operations (IW/IO) means fewer casualties of war, I am all for it. Numerous nations are already involved in non-stop, slow simmering information-based adversarialism. To not develop capabilities in this space would be to surrender the battleground. That said, it is important to ensure that the actions of the AFCC comply with the Constitution as well as the laws of the US, the States, and any applicable international agreements. To that end, I fully support the intent of the author. Democracy is noisy and loud and it means having to put up with all sorts of crackpot theories from both the left and the right.
posted by GeeWhiz
Monday, July 28, 2008
DE-ICE PenTest LiveCD disks "provide a safe and secure way to learn and practice Penetration Test skills" from Matt
posted by GeeWhiz
Monday, July 28, 2008
7.24.2008
Webinar: Dan Kaminsky's DNS Discovery: The Massive, Multi-Vendor Issue and the Massive, Multi-Vendor Fix
posted by GeeWhiz
Thursday, July 24, 2008
7.23.2008
DNS Cache Poisoning POC Released
posted by GeeWhiz
Wednesday, July 23, 2008
The Story Behind San Francisco's Rogue Network Admin - from Andrew
posted by GeeWhiz
Wednesday, July 23, 2008
NAT being added to IPv6
posted by GeeWhiz
Wednesday, July 23, 2008
7.22.2008
Kaminsky's DNS Issue Accidentally Leaked?
posted by GeeWhiz
Tuesday, July 22, 2008
Julie Amero Case Drags On
posted by GeeWhiz
Tuesday, July 22, 2008
7.18.2008
HSM - Home Security Methodology Vacation Guide
posted by GeeWhiz
Friday, July 18, 2008
7.17.2008
Researcher to demonstrate attack code for Intel chips
posted by Lance
Thursday, July 17, 2008
U.S. Fears Threat of Cyberspying at Olympics - While the threat is real (there will almost certainly be mass compromises during the Olympics), it is unfortunately an issue in both China and the US
posted by GeeWhiz
Thursday, July 17, 2008
BlackBerry Warns About PDF Distiller Flaw
posted by GeeWhiz
Thursday, July 17, 2008
The DEFCON Shoot Returns with Full-Auto, Class III Firearms
posted by GeeWhiz
Thursday, July 17, 2008
7.16.2008
Kon-Boot allows one to change the Linux kernel on the fly (while booting)
posted by GeeWhiz
Wednesday, July 16, 2008
7.15.2008
DHS Privacy Office - Privacy Workshops - Implementing Privacy Protections in Government Data Mining
posted by GeeWhiz
Tuesday, July 15, 2008
Are these people out of their minds? - Why stop at the airport gate?
posted by GeeWhiz
Tuesday, July 15, 2008
And you thought air travel could not get any worse. An official with the Department of Homeland Security says the U.S. should consider having airline passengers wear electronic bracelets that could track their movements, hold personal information and be triggered like a Taser to stun them into immobility.
posted by Theobromine
Tuesday, July 15, 2008
UK to Implement Biometric ID by 2009
posted by GeeWhiz
Tuesday, July 15, 2008
An Astonishing Collaboration - More on the BIND Bug from Dan Kaminski: "DJB was right. All those years ago, Dan J. Bernstein was right: Source Port Randomization should be standard on every name server in production use. There is a fantastic quote that guides a lot of the work I do: Luck is the residue of design. Dan Bernstein is a notably lucky programmer, and that’s no accident. The professor lives and breathes systems engineering in a way that my hackish code aspires to one day experience. DJB got “lucky” here — he ended up defending himself against an attack he almost certainly never encountered. Such is the mark of excellent design. Excellent design protects you against things you don’t have any information about. And so we are deploying this excellent design to provide no information."
posted by GeeWhiz
Tuesday, July 15, 2008
7.13.2008
TrackMeNot - a lightweight browser extension that helps protect web searchers from surveillance and data-profiling by search engines. From Tarik
posted by GeeWhiz
Sunday, July 13, 2008
7.11.2008
Dutch chipmaker sues to silence security researchers - from Anthony
posted by GeeWhiz
Friday, July 11, 2008
7.10.2008
Insomnia Security - Whitepaper Collection
posted by GeeWhiz
Thursday, July 10, 2008
The 2nd Annual Pwnie Awards - An annual awards ceremony celebrating and making fun of the achivements and failures of security researchers and the wider security community - Nominations close July 14th.
posted by GeeWhiz
Thursday, July 10, 2008
FBI Headquarters Not Cleared for Classified Intelligence - from Anthony
posted by GeeWhiz
Thursday, July 10, 2008
7.09.2008
Snuggly The Security Bear Presents "Constitutional Compromise"
posted by GeeWhiz
Wednesday, July 09, 2008
Multiple DNS implementations vulnerable to cache poisoning
posted by GeeWhiz
Wednesday, July 09, 2008
7.07.2008
Art and Practice of Deception
posted by GeeWhiz
Monday, July 07, 2008
Quick access to hidden **** browser passwords - Che'
posted by bxche
Monday, July 07, 2008
7.04.2008
Thieves steal millions from Citibank customers via 7-11 ATMs
posted by GeeWhiz
Friday, July 04, 2008
7.02.2008
Inside NSA Red Team
posted by GeeWhiz
Wednesday, July 02, 2008
VMware Infrastructure Earns Common Criteria EAL4+ Certification - from Chainman
posted by GeeWhiz
Wednesday, July 02, 2008
I know it's anathma to post stories from Slashdot, but PC Repair in Texas now requires a PI license?
posted by joat
Wednesday, July 02, 2008
7.01.2008
OpenBSD ICMPv6 Exploit from LMH
posted by GeeWhiz
Tuesday, July 01, 2008
6.30.2008
DPE - Default Password Enumeration
posted by GeeWhiz
Monday, June 30, 2008
6.28.2008
Malicious Code 2008
posted by GeeWhiz
Saturday, June 28, 2008
6.27.2008
Blizzard Implements Token Based Access Control System for World of Warcraft from Matt
posted by GeeWhiz
Friday, June 27, 2008
6.25.2008
BitBlaze - Binary Analysis for COTS Protection and Malicious Code Defense
posted by GeeWhiz
Wednesday, June 25, 2008
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
posted by GeeWhiz
Wednesday, June 25, 2008
IATAC Newsletter
posted by GeeWhiz
Wednesday, June 25, 2008
6.24.2008
New revision: NIST 800-61 Computer Security Incident Handling Guide
posted by GeeWhiz
Tuesday, June 24, 2008
6.18.2008
The Extended HTML Form attack revisited
posted by GeeWhiz
Wednesday, June 18, 2008
New DNSChanger Trojan variant targets routers - from Dave
posted by GeeWhiz
Wednesday, June 18, 2008
Tree Approach to Vulnerability Classification
posted by GeeWhiz
Wednesday, June 18, 2008
6.17.2008
Verizon 2008 Data Breach Investigations Report
posted by GeeWhiz
Tuesday, June 17, 2008
6.15.2008
Economics, Psychology, and Sociology of Security
posted by GeeWhiz
Sunday, June 15, 2008
Tracking the Trackers - Investigating P2P Copyright Enforcement
posted by GeeWhiz
Sunday, June 15, 2008
The ID Divide - Addressing the Challenges of Identification and Authentication in American Society
posted by GeeWhiz
Sunday, June 15, 2008
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
posted by GeeWhiz
Sunday, June 15, 2008
Built-in Windows commands to determine if a system has been hacked
posted by GeeWhiz
Sunday, June 15, 2008
Shops track customers via mobile phone
posted by GeeWhiz
Sunday, June 15, 2008
Compromising Reflections – or – How to Read LCD Monitors Around the Corner
posted by GeeWhiz
Sunday, June 15, 2008
6.14.2008
The NSF Grand Challenge: Unhackable Servers
posted by GeeWhiz
Saturday, June 14, 2008
6.13.2008
China denies hacking congressional computers - Che'
posted by bxche
Friday, June 13, 2008
6.12.2008
N.Y. attorney general forces ISPs to curb Usenet access
posted by GeeWhiz
Thursday, June 12, 2008
6.11.2008
Proof of Concept “carpet bombing” exploit released in the wild - from Anthony
posted by GeeWhiz
Wednesday, June 11, 2008
FreeType2 Heap Overflows in Parsing PFB and TTF Font Files Lets Remote Users Execute Arbitrary Code from Che
posted by GeeWhiz
Wednesday, June 11, 2008
6.10.2008
Credit, debit cards move to chip technology - from Cheryl
posted by GeeWhiz
Tuesday, June 10, 2008
6.09.2008
Military supercomputer sets record
posted by GeeWhiz
Monday, June 09, 2008
How safe is instant messaging? A security and privacy survey - from Anthony
posted by GeeWhiz
Monday, June 09, 2008
6.05.2008
Scientists Study Human Movements Through Secret Cell Phone Tracking . "The cell phone users who were the unwitting subjects of the study were reportedly based in an undisclosed country other than the United States, and they were tracked through the participation of an unnamed carrier. Because they were unaware that they were being tracked, however, the new research has generated a wave of discussion about the privacy implications."
posted by Theobromine
Thursday, June 05, 2008
Internet Scheme Used to Steal Micro-Deposits from Che
posted by GeeWhiz
Thursday, June 05, 2008
6.04.2008
Warning: Dangerous Web surfing ahead - from Luis
posted by GeeWhiz
Wednesday, June 04, 2008
Fortunately, Micah Sherr maintains a link to the EVEREST Report
posted by GeeWhiz
Wednesday, June 04, 2008
Full Disclosure and why Vendors Hate it
posted by GeeWhiz
Wednesday, June 04, 2008
E-Voting Flaw Gives Election Victory to Wrong Candidate Borked elections due to E-Voting flaws/errors have occurred before in Ohio at least Twice! Two brothers control nearly 100% of the E-Voting hardware used in the US . Bob Urosevich controls Diebold while his brother Todd controls ES&S [more ]. In a 2003 fund-raising e-mail, the then-CEO of Diebold, Walden O'Dell, promised to deliver Ohio's electoral votes to a given candidate in 2004. If you have not read the report issued by the Ohio Secretary of State Jennifer Brunner "Evaluation & Validation of Election-Related Equipment, Standards & Testing" AKA EVEREST , you should... it enumerated over 300 known issues with the current generation of E-Voting hardware . Despite the report, the Ohio Election Commissioners voted to do nothing about it . The next election may have already been decided.
posted by GeeWhiz
Wednesday, June 04, 2008
Bank loses tapes with data on 4.5M clients - Connecticut AG blasts BNY Mellon for failing to notify victims for three months
posted by GeeWhiz
Wednesday, June 04, 2008
Beware of Error Messages At Bank Sites
posted by GeeWhiz
Wednesday, June 04, 2008
6.03.2008
Core Security: The Academy
posted by GeeWhiz
Tuesday, June 03, 2008
6.02.2008
Phoenix Mars Lander Website Hacked
posted by GeeWhiz
Monday, June 02, 2008
6.01.2008
Privacy Impact Assessment for EINSTEIN 2
posted by GeeWhiz
Sunday, June 01, 2008
Privacy and the 2008 Olympic Summer Games - RFID tagged tickets to track passport details, address, and other personal data.
posted by GeeWhiz
Sunday, June 01, 2008
China's All-Seeing Eye - With the help of U.S. defense contractors, China is building the prototype for a high-tech police state. It is ready for export.
posted by GeeWhiz
Sunday, June 01, 2008
A Low-cost Attack on a Microsoft CAPTCHA
posted by GeeWhiz
Sunday, June 01, 2008
Motorola RAZR JPG Processing Stack Overflow Vulnerability
posted by GeeWhiz
Sunday, June 01, 2008
E-voting banned by Dutch government
posted by GeeWhiz
Sunday, June 01, 2008
5.31.2008
The Shmoocon 2008 videos are out! w00t!
posted by joat
Saturday, May 31, 2008
5.30.2008
The Last Hope - July 18-20
posted by GeeWhiz
Friday, May 30, 2008
US probes whether laptop copied on China trip
posted by GeeWhiz
Friday, May 30, 2008
5.29.2008
Comcast home page hacked - from Anthony
posted by GeeWhiz
Thursday, May 29, 2008
Risk report: Three years of Red Hat Enterprise Linux 4 Enterprise Linux 5.1 to 5.2 risk report
posted by GeeWhiz
Thursday, May 29, 2008
5.28.2008
Six hours to hack the FBI (and other pen-testing adventures)
posted by John
Wednesday, May 28, 2008
5.27.2008
NVbit : Accessing Bitlocker volumes from linux
posted by GeeWhiz
Tuesday, May 27, 2008
Bordering on insanity - Why you probably shouldn't bring any sensitive data across U.S. borders
posted by GeeWhiz
Tuesday, May 27, 2008
Google Adds to Search Engine Security from Mary
posted by GeeWhiz
Tuesday, May 27, 2008
posted by GeeWhiz
Tuesday, May 27, 2008
5.23.2008
Certifiable Linux Integration Platform defines a specific configuration of Security Enhanced Linux (SELinux) designed to provide the foundation for hosting secure applications.
posted by GeeWhiz
Friday, May 23, 2008
Inside an FBI Computer Forensics Lab
posted by John
Friday, May 23, 2008
5.22.2008
EFF : Release the Orphan Works!
posted by GeeWhiz
Thursday, May 22, 2008
5.21.2008
Permanent Denial-of-Service Attack Sabotages Hardware - from Anthony
posted by GeeWhiz
Wednesday, May 21, 2008
5.20.2008
Core Security IOS Rootkit
posted by GeeWhiz
Tuesday, May 20, 2008
5.16.2008
Uhoh! Looks like the NIC vendors are going to have to dance with the rest of them....
posted by joat
Friday, May 16, 2008
5.15.2008
More on the Debian OpenSSL Bug
posted by GeeWhiz
Thursday, May 15, 2008
Thinking Beyond the Ivory Towers by Dave Aitel
posted by GeeWhiz
Thursday, May 15, 2008
DSA-1571-1 openssl -- predictable random number generator
posted by GeeWhiz
Thursday, May 15, 2008
Google Oops - Create a Google Apps spreadsheet and hide some of the data fields. Highlight the whole spreadsheet and copy (ctrl+c). Open a spreadsheet app like Excel and paste. Oops. That data was not quite so hidden after all!
posted by GeeWhiz
Thursday, May 15, 2008
5.09.2008
FBI Fears Chinese Hackers and/or Government Agents Have Back Door Into US Government & Military Computer Networks - NY Times Article
posted by GeeWhiz
Friday, May 09, 2008
I have had a number of opportunities come up this week in both IT and IA: #1) General IT - When presented a project the candidate does not need to be an expert at the start. However, with some research and a little trial and error should be able to become an expert. A willingness to learn is key. Active Directory, TPC/IP, Networking; Routers, Firewalls, design, Windows XP, MACs, Some Linux exposure - 30k to 40k. #2 General helpdesk/desktop support with AD/server 2003 duties. Occasional Cisco work under supervision. Little to no management duties. $40-$50k - a little more w/ more experience. $4500 tuition support per year! #3 Local Blue Team positions (cooperative security assessment, evaluation, testing, and remediation)- 50-70% travel. Salary commensurate with experience. #4 Similar to #3 but for someone willing to move to Monterrey, CA. Salary commensurate with experience. If you are or someone you know is interested, qualified, and trustworthy, please send me a resume!
posted by GeeWhiz
Friday, May 09, 2008
5.07.2008
FBI Withdraws Unconstitutional National Security Letter After ACLU and EFF Challenge
posted by GeeWhiz
Wednesday, May 07, 2008
5.05.2008
California court posting SSNs and other personal data, privacy advocates charge
posted by arkng
Monday, May 05, 2008
5.03.2008
Is Red Hat Owned or Simply Offline?
posted by GeeWhiz
Saturday, May 03, 2008
4.30.2008
Microsoft COFEE - Just what we need.... more untrained amateurs gathering digital evidence.
posted by GeeWhiz
Wednesday, April 30, 2008
4.29.2008
How German Spies Eavesdropped on an Afghan Ministry
posted by GeeWhiz
Tuesday, April 29, 2008
4.28.2008
RIAA on the Defensive - from Keith
posted by GeeWhiz
Monday, April 28, 2008
4.27.2008
A Gift from the Islamic Faithful Network - Mujahedeen Secrets 2 Program
posted by GeeWhiz
Sunday, April 27, 2008
4.25.2008
Defcon Contests - Race to Zero
posted by GeeWhiz
Friday, April 25, 2008
4.24.2008
Denial of Service via Algorithmic Complexity Attacks
posted by GeeWhiz
Thursday, April 24, 2008
Crooks Rig ATM with Eee PC to Steal Credit Card Info from Steve
posted by GeeWhiz
Thursday, April 24, 2008
4.23.2008
Border Agents Can Search Laptops Without Cause, Court Rules.
posted by Theobromine
Wednesday, April 23, 2008
Thinkgeek's $1,589.99 Keyboard
posted by GeeWhiz
Wednesday, April 23, 2008
Lending Tree Compromised 2006~2008 - from Luis
posted by GeeWhiz
Wednesday, April 23, 2008
4.22.2008
NJ court blocks IP disclosure without a grand jury subpoena
posted by Theobromine
Tuesday, April 22, 2008
4.21.2008
Military Fellows Roundtable: Air Force Cyberspace Command: Protecting Against an Electronic Pearl Harbor
posted by GeeWhiz
Monday, April 21, 2008
Token Kidnapping by Cesar Cerrudo
posted by GeeWhiz
Monday, April 21, 2008
The 10,000 web sites infection mystery solved
posted by John
Monday, April 21, 2008
4.18.2008
One reason that security is so difficult to implement is because the end user is typically the weakest link. Although not network security related, this article does show that people "just don't get it" Ground Zero Blueprints Found in Trash
posted by Theobromine
Friday, April 18, 2008
GSM Cracking: Coming Soon to a Computer Near You via a Web Service
posted by GeeWhiz
Friday, April 18, 2008
4.15.2008
1st ACM Workshop on Virtual Machine Security (VMSec) - Call for Papers
posted by GeeWhiz
Tuesday, April 15, 2008
4.12.2008
Application-Specific Attacks: Leveraging the ActionScript Virtual Machine - Scrapped from the Dailydave - If you do not get it, you should
posted by GeeWhiz
Saturday, April 12, 2008
Security Concepts eBook
posted by GeeWhiz
Saturday, April 12, 2008
4.11.2008
ORNL: Adaptable, Intelligent Malfeasance Detection (AIMD) - "Indifference Detection"?!?
posted by GeeWhiz
Friday, April 11, 2008
E-Voting Versus Slot Machines - Which is more secure?
posted by GeeWhiz
Friday, April 11, 2008
4.10.2008
Windows Vista Source Code from Chainman
posted by GeeWhiz
Thursday, April 10, 2008
4.09.2008
Contribute to the Fund to End Software Patents - Software patents undermine "the progress of science and the useful arts ."
posted by GeeWhiz
Wednesday, April 09, 2008
4.08.2008
Dan Kaminski to Demonstrate How a Web Page Can Take Over a Router at the RSA Conference
posted by GeeWhiz
Tuesday, April 08, 2008
4.02.2008
Sguil Project Acquired by Cisco - Announces Plans to Start Randomly Dropping Packets
posted by GeeWhiz
Wednesday, April 02, 2008
4.01.2008
TCP/IP security vulnerability disclosed
posted by arkng
Tuesday, April 01, 2008
RFC 2844: The Transmission of IP Datagrams over the Semaphore Flag Signaling System (SFSS)
posted by GeeWhiz
Tuesday, April 01, 2008
Gmail introduces time travel service
posted by GeeWhiz
Tuesday, April 01, 2008
ZapCam - YouTube Tazer
posted by GeeWhiz
Tuesday, April 01, 2008
3.30.2008
From the CarolinaCon EULA - "the plural of anecdote is not data"
posted by GeeWhiz
Sunday, March 30, 2008
3.29.2008
Vista, MacBook Out--Only Linux Left in Hacking Contest - from Clyde
posted by GeeWhiz
Saturday, March 29, 2008
3.26.2008
International Journal of Bayesian Analysis
posted by GeeWhiz
Wednesday, March 26, 2008
Software Forensics: Extending Authorship Analysis Techniques to Computer Programs
posted by GeeWhiz
Wednesday, March 26, 2008
3.24.2008
Microsoft warns of targeted Word attack
posted by GeeWhiz
Monday, March 24, 2008
CanSecWest PWN2OWN 2008
posted by GeeWhiz
Monday, March 24, 2008
3.21.2008
FIPS 140-2 Certified Thumb Drives
posted by GeeWhiz
Friday, March 21, 2008
Hannaford hit by class-action lawsuits in wake of data-breach disclosure
posted by GeeWhiz
Friday, March 21, 2008
3.20.2008
[Off Topic] Support Tibet - Boycott the Beijing Olympics
posted by GeeWhiz
Thursday, March 20, 2008
3.19.2008
The A5 (GSM) Cracking Project [Video] CCC Camp07 GSM Software Project and A5 Cracking Talk [Paper] TULP2G – An Open Source Forensic Software Framework for Acquiring and Decoding Data Stored in Electronic Devices [Tool] TULP2G - forensic framework for extracting and decoding data Paraben - Cell/PDA Forensic Hardware and Software How Do You Intercept a Text Message ?
posted by GeeWhiz
Wednesday, March 19, 2008
Arrogance or Efficiency? A Discussion of the Microsoft Office Fluent User Interface
posted by GeeWhiz
Wednesday, March 19, 2008
3.17.2008
Trendmicr0wn3d?
posted by GeeWhiz
Monday, March 17, 2008
3.16.2008
All Usenix conference procedings made public !
posted by joat
Sunday, March 16, 2008
3.14.2008
Some viruses come preinstalled (so you wont have to install them yourself!) GW: This is called "pre0wned" hardware
posted by Theobromine
Friday, March 14, 2008
3.13.2008
First Look: KNOPPIX 5.3.0 - At CeBIT 2008! Downloaded Knoppix 5.3 here
posted by arkng
Thursday, March 13, 2008
3.12.2008
A Heart Device Is Found Vulnerable to Hacker Attacks A report from the Medical Device Security Center
posted by Lance
Wednesday, March 12, 2008
SPAM - Felony conviction upheld - from Clyde
posted by GeeWhiz
Wednesday, March 12, 2008
NPS Scholarship Program - "Free" Master's Degree!
posted by GeeWhiz
Wednesday, March 12, 2008
3.07.2008
Call for Papers First ACM Workshop on AI Security
posted by GeeWhiz
Friday, March 07, 2008
3.06.2008
Creating bootable USB drives for capturing the contents of memory
posted by Kyiv
Thursday, March 06, 2008
3.04.2008
Major banks, telecos top identity-theft chart Hack into a Windows PC - no password needed /Physical Access Attacks with Firewire (PDF) Vista volume activation cracked
posted by arkng
Tuesday, March 04, 2008
Coming to a watering hole near you: OLPC's mesh networking - from Bill
posted by GeeWhiz
Tuesday, March 04, 2008
3.03.2008
The CERT Virtual Training Environment (VTE) - A free resource for information assurance, incident response and computer forensic training - from Chainman
posted by GeeWhiz
Monday, March 03, 2008
OSSTMM V3.0 Introduction Video - from Chainman
posted by GeeWhiz
Monday, March 03, 2008
Group Demonstrates Security Hole in World's Most Popular Smartcard - Additional details available via Karsten Nohl's UVA Web Page - from Jennifer
posted by GeeWhiz
Monday, March 03, 2008
2.28.2008
Position Open for SCADA Analyst - Contact me if interested.
posted by GeeWhiz
Thursday, February 28, 2008
2.27.2008
Diebold Accidentally Leaks Results Of 2008 Election Early from John
posted by GeeWhiz
Wednesday, February 27, 2008
HP Application Security Resource Library
posted by Glen
Wednesday, February 27, 2008
2.25.2008
Invisible dots left by printers may breach EU privacy laws
posted by GeeWhiz
Monday, February 25, 2008
If you have not yet read the paper posted on 2-21 "Lest We Remember: Cold Boot Attacks on Encryption Keys" , at least check out this video .
posted by GeeWhiz
Monday, February 25, 2008
cDc Releases Goolag - from Jamie
posted by GeeWhiz
Monday, February 25, 2008
2.24.2008
Cisco confirms vulnerability in 7921 Wi-Fi IP phone
posted by GeeWhiz
Sunday, February 24, 2008
2.22.2008
Wiretapping GSM cellphones
posted by Jacob
Friday, February 22, 2008
2.21.2008
Lest We Remember: Cold Boot Attacks on Encryption Keys
posted by GeeWhiz
Thursday, February 21, 2008
Microsoft: Vista SP1 will break these programs
posted by John
Thursday, February 21, 2008
Design flaw in wireless VoIP handsets endanger the enterprise - Vendors skip verification of digital certificates "because of the processing overhead required"
posted by GeeWhiz
Thursday, February 21, 2008
2.20.2008
NTFS File System References [More ]
posted by GeeWhiz
Wednesday, February 20, 2008
Future of Japan's E-Voting in Doubt
posted by GeeWhiz
Wednesday, February 20, 2008
2.19.2008
Saboteurs may have cut Mideast telecom cables: UN agency In a completely unrelated story, where in the world is the USS Jimmy Carter ?
posted by GeeWhiz
Tuesday, February 19, 2008
2.18.2008
Shmoocon Notes: The Presentation by Sandy Clark (Mouse) on EVEREST (Evaluation and Validation of Election Related Equipment, Standards and Testing) was quite good. Unsurprisingly, the problems of E-Voting are as bad as ever.
posted by GeeWhiz
Monday, February 18, 2008
Flawfinder is a program that examines source code and reports possible security weaknesses (``flaws'') sorted by risk level. - From Dale
posted by GeeWhiz
Monday, February 18, 2008
Friendly 'worms' could spread software fixes - This is by no means new. Dave Aitel developed a framework for beneficial worms called Nematodes and HP researched beneficial worms in the early 00s (most evidence of which has disappeared). [Daily Dave ]
posted by GeeWhiz
Monday, February 18, 2008
2.14.2008
InsomniaShell is a tool for use during penetration tests, when you have ability to upload or create an arbitrary .aspx page. This .aspx page is an example of using native calls through pinvoke to provide either a reverse shell or a bind shell. It has the added advantage of searching through all accessible processes looking for a SYSTEM or Administrator token to use for impersonation.
posted by GeeWhiz
Thursday, February 14, 2008
2.13.2008
Airforce Cyber Command
posted by Jacob
Wednesday, February 13, 2008
2.12.2008
Adobe Reader and Acrobat JavaScript methods buffer overflow vulnerabilities - Adobe Reader EScript.api arbitrary code execution - Securing Your Web Browser
posted by GeeWhiz
Tuesday, February 12, 2008
NIST 500-267 - A Profile for IPv6 in the U.S. Government
posted by GeeWhiz
Tuesday, February 12, 2008
2.11.2008
NIST Budget Slashed
posted by GeeWhiz
Monday, February 11, 2008
2.08.2008
New Authentication Scheme Proposed
posted by n1nj4d3wd
Friday, February 08, 2008
2.06.2008
MayDay! Sneakier, More Powerful Botnet on the Loose - from John
posted by GeeWhiz
Wednesday, February 06, 2008
Diebold voting machine key copied using a photo from their website!
posted by Jacob
Wednesday, February 06, 2008
2.05.2008
Google Blamed For Indexing Student Test Scores & Social Security Numbers
posted by GeeWhiz
Tuesday, February 05, 2008
Carolinacon regional technology conference - Who needs an excuse to go to Chapel Hill?
posted by GeeWhiz
Tuesday, February 05, 2008
2.04.2008
Cyber Security and Information Intelligence Research Workshop
posted by GeeWhiz
Monday, February 04, 2008
2.03.2008
Universities fend off phishing attacks
posted by GeeWhiz
Sunday, February 03, 2008
2.02.2008
Who's Cutting the Cables?
posted by GeeWhiz
Saturday, February 02, 2008
2.01.2008
Italian Parliament To Mistakenly Legalize MP3 P2P [Original Italian ]
posted by GeeWhiz
Friday, February 01, 2008
DFRWS 2008 Forensics Challenge Overview
posted by GeeWhiz
Friday, February 01, 2008
1.31.2008
MS08-001 Explained by Halvar Flake, et al.
posted by Autonomous Coward
Thursday, January 31, 2008
1.30.2008
RIAA wants $1.5 million per CD copied
posted by Jacob
Wednesday, January 30, 2008
1.29.2008
The Société Générale Case - A Quest for Glory and a Bonus Ends in Disgrace
posted by GeeWhiz
Tuesday, January 29, 2008
MS08-001 Exploit Video (Immunity Canvas )
posted by GeeWhiz
Tuesday, January 29, 2008
1.28.2008
Uninformed Journal Vol 9
posted by GeeWhiz
Monday, January 28, 2008
1.27.2008
(267) Warner sues "playable search engine," tests DMCA safe harbor
posted by Lance
Sunday, January 27, 2008
1.26.2008
Markets and Monkeys - Interview: Dr. Michael Shermer
posted by GeeWhiz
Saturday, January 26, 2008
1.25.2008
Fighting SPAM - AKA Mother, May I
posted by GeeWhiz
Friday, January 25, 2008
EFF Action Alert - URGENT: Oppose Telecom Immunity and Tell Your Senator to Vote "No on Cloture"
posted by GeeWhiz
Friday, January 25, 2008
1.23.2008
Firm Seeks Trainable Network Geek - Understands layers 1, 2, and 3. Can describe problems such as layer 2 loop scenarios and potential remedies. Understands where OSPF and BGP are used and why. Contact me for more information.
posted by GeeWhiz
Wednesday, January 23, 2008
First case of "drive-by pharming" identified in the wild
posted by arkng
Wednesday, January 23, 2008
1.22.2008
Going Against The Gradient - from Dave Aitel
posted by GeeWhiz
Tuesday, January 22, 2008
CERT Secure Coding Standards
posted by GeeWhiz
Tuesday, January 22, 2008
RIAA Website Wiped Clean by “Hackers” - from JCB
posted by GeeWhiz
Tuesday, January 22, 2008
1.20.2008
OSSEC - Am Open Source, Multiplatform HIDS - from Michael
posted by GeeWhiz
Sunday, January 20, 2008
1.18.2008
CIA: Hackers to Blame for Power Outages - from the Dailydave
posted by GeeWhiz
Friday, January 18, 2008
1.17.2008
Kernel-Level Remote TCP/IP and IGMP Vulnerabilities affect XP SP2, Vista, and Server 2003MS08-001 (part 3) – The case of the IGMP network critical
posted by GeeWhiz
Thursday, January 17, 2008
North Dakota Man Charged for Spam Tracking / DNS Zone Transfer - from Ron
posted by GeeWhiz
Thursday, January 17, 2008
1.16.2008
NSA Backdoored Crypto AG Gear - Monitored Traffic for Years
posted by GeeWhiz
Wednesday, January 16, 2008
Excel 0-Day
posted by GeeWhiz
Wednesday, January 16, 2008
Fun with SSH - from Michael
posted by GeeWhiz
Wednesday, January 16, 2008
FBI takes biometrics database proposal to U.K. - from John
posted by GeeWhiz
Wednesday, January 16, 2008
1.15.2008
Flash attack could take over your router (UnPlug n Pray)
posted by Lance
Tuesday, January 15, 2008
1.14.2008
US Policy Would Allow Government Access to Any Email
posted by n1nj4d3wd
Monday, January 14, 2008
New Security Conference - SOURCE Boston 2008 - March 12-14
posted by GeeWhiz
Monday, January 14, 2008
1.11.2008
Retrospective: 10 Security Blunders
posted by Glen
Friday, January 11, 2008
The Sears "Community" Installation of ComScore - Sears admits to joining spyware biz - from Dan
posted by GeeWhiz
Friday, January 11, 2008
1.10.2008
Wireless Power at CES from Chris
posted by GeeWhiz
Thursday, January 10, 2008
Steal This WiFi - by Bruce Schneier
posted by n1nj4d3wd
Thursday, January 10, 2008
Rootkit hides in MBR from John - GW: Every technique that's old is new again. What's next? Boot Sector Worms Propagating via Flash Drives ?
posted by GeeWhiz
Thursday, January 10, 2008
Handy Diagram - How to Hack a Diebold E-Voting System Diebold E-Voting Posters
posted by GeeWhiz
Thursday, January 10, 2008
1.09.2008
A former systems administrator at Medco Health Solutions Inc. was sentenced to 30 months in federal prison today for planting a logic bomb that could have taken down a corporate network that held customer health care information. A proposed new RFID-enabled passport card intended for use by Americans frequently traveling to Canada, Mexico, Bermuda and the Caribbean poses serious security and privacy risks for users, the Center for Democracy and Technology (CDT) warned this week.
posted by Theobromine
Wednesday, January 09, 2008
New iPhone Trojan Spreading from John [More ]
posted by GeeWhiz
Wednesday, January 09, 2008
Computer Science Education: Where Are the Software Engineers of Tomorrow?
posted by GeeWhiz
Wednesday, January 09, 2008
1.07.2008
Island Hopping: The Infectious Allure of Vendor Swag
posted by Glen
Monday, January 07, 2008
Roundup from Dark Reading: Security's biggest train wrecks of 2007 The prank that could kill you Evil Bits: Go-to sites for threat monitoring Is Sears sending spyware to customers?
posted by Glen
Monday, January 07, 2008
1.06.2008
FAA: Boeing's New 787 May Be Vulnerable to Hack Attack from Jacob
posted by GeeWhiz
Sunday, January 06, 2008
According to Cary Sherman of the RIAA, SONY BMG's in-house lawyer Jennifer Pariser "Misspoke" when testifying during Capitol v. Thomas trial Capitol V Thomas was referenced in a previous NetSec post RIAA claims that ripping purchased CDs for personal use constitutes infringement - from Christopher
posted by GeeWhiz
Sunday, January 06, 2008
1.04.2008
One of our local agencies has an opening for a security / systems engineer. Drop me a line if you are interested.
posted by GeeWhiz
Friday, January 04, 2008
New phishing technique: Fast Flux
posted by Glen
Friday, January 04, 2008