🔍

Posts with the tag Security...

0

SSH VPN

This is pretty cool. Check out this new feature in OpenSSH 4.3: * Add support for tunneling arbitrary network packets over a connection between an OpenSSH client and server via tun(4) virtual network interfaces. This allows the use of OpenSSH (4.3+) to create a true VPN between the client and server providing real network connectivity…

0

Your Privacy Online

There has been a growing grumbling on the internet about big sites like Google storing information about individuals’ usage. Jr Colin posted a well reasoned ballast to those concerns today. It is worth a read if you are concerned about your privacy online but don’t feel a need to wear a tin foil hat just…

0

Finally, Microsoft releases Security Patch

Chris told everyone that the flaw in the MS Windows XP operating system was serious. In fact, he was amazed at the seriousness of the flaw and how little Microsoft was doing to fix it. According to this AP article, Microsoft has finally released a patch (much later than other security entities). If our clients…

1

security

Check out this article. It’s pretty hilarious but also a little scary. It tells the story of three guys hired to assess the security of a Fortune 500 company. The ease with which these guys penetrated this company to its very core is truly frightening, and they didn’t require any ‘l33t 0-day exploits to do…

0

Typing Behaviour Authentication

This is an interesting security product. It relies on the fact that every person has a unique typing style as a signature for authentication purposes. Via Bruce Schneier.

1

US Municipalities Offering Free Wi-Fi

My hometown of Madison, WI has just announced that they’ll be rolling out a free Wi-Fi network to the whole city. They join just a few other cities nationwide (San Francisco and Philadelphia included) to move in this direction. While I’m all for the offering of free internet, I continue to be a little weary…

20

Tracking down the source of Referrer Spam

Referrer Spam is the bane of any blogger’s statistic tracking. These low-life people attempt to trick bloggers into ‘clicking’ their URLs because the blog software lists them as the top referrers to the blog. This, as with other types of spam, causes grief because it exists purely to deceive and ultimately wastes time. In the…

0

software firewalls part II

Securityfocus has part 2 of their series on software firewalls up, including a good intro to how LSP trojans can easily circumvent and piggyback on top of a software firewall’s protection.