NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

10.16.2004

 
Microsoft Product Support Security Incident Response Team Member Robert Hensing Scribbles About Why You Shouldn't Be Using Passwords

 
If you are not afraid to run IE for a few minutes, try this trick.



10.15.2004

 
Cybernightmare from Forbes

 
Free CISSP Lecture from Karen

 
A Shellcoding Tutorial and Nessus / Nmap Cheat Sheet from Anomalous Coward



10.14.2004

 
"Copyright Does Not Exist" a Hacker Culture Book by Linus Walleij. Irony being lost on Linus, he states in the preface that "At the moment it is not permissible to mass-distribute the book in printed form without my prior permission." It is incredible that he wants to retain intellectual property rights even though he views them as "armed robbery".



10.13.2004

 
Supreme Court Turns Down RIAA Appeal

 
Windows 2000 Warships - Threat to Humanity?

 
The Handbook for Information Security Management - Common Fallacies of the Computer Generation

Virus Bulletin - Independent AntiVirus Advice - Free Issue Available
Sent by cthulu

 
Virus Bulletin: Independent AntiVirus Advice from Tim

 
More Info on the Windows XP Winzip Stack Overflow Vulnerability (MS04-034) A zip archive containing a file with an 8000 character filename allows for a malicious zip to overwrite the exception handler and take control of EIP. Like the jpeg issue, this will likely be used for backdooring systems as opposed to creating the next big worm. The media gets excited about big noisy bugs. We should be more intimidated by bugs that tiptoe in the night.



10.12.2004

 
Colorado DMV Shut Down by Virus Infestation

 
CAIDA Analysis of the Slammer Worm

 
Milanese Engage in Virtual CyberActivism from Clyde

 
22 New flaws in M$ products (two articles to choose from):

Critical Flaws Found in Windows, Office

Microsoft warns of a score of security flaws

 
Hollywood Petitions Supreme Court to Overturn MGM V Grokster

 
Insecure Default Service DACL's in Windows 2003

 
9 Updates / 6 Critical / in Microsoft's October Security Bulletin

 
Squid Proxy Cache DOS - Flaw in ASN.1 Interpreter



10.11.2004

 
VirusTotal Offers a Free Malicious File Scanning Service

 
How to build detailed Network Usage Reports using RRDTool, flow-tools, FlowScan, and CUFlow from Ronnie

 
Malformed Word Doc Overflow Vlnerability

 
Details on the M$ ASP.NET Authentication Bypass Issue - More Issues Parsing "\" and "%5c". Here is a nifty summary of URL Obfuscation Techniques Used in Directory Transversal, Phishing and Auth Bypass Attacks.

 
20 Critical Flaws (Most Are Remotely Exploitable Buffer Overflows) in IBM DB2

 
DIY Phishing Kits Being Distibuted link from Ronnie. The AntiPhishing Working Group provides data reports on attack trends.





This page is powered by Blogger.


Site Meter Locations of visitors to this page