compactnormal

security

There are also 46 stories about security that have not made it to the front page yet. Digg for stories to bring them to the top.

Alcohol and Daemon Tools Contain Rootkit

Both of these Popular emulation utilites contain a Rootkit, but unlike Sony this is to defeat DRM.

Use The Tools The NSA Uses

Open the story and click on the photo to enlarge it. Now go to http://securitywizardry.com/radar.htm . Look familiar? Found this info here: http://isc.sans.org/diary.php?storyid=1097

The mysteries of X-GOOGLE-TOKEN and why it matters

This article discusses about how Google Talk works and reverse engineering of the Google Authentication (X-GOOGLE-TOKEN).

Florida blogger picks up M4 and helps out US Army on a recent trip to Iraq.

This guy is a former green beret that went over to Iraq to get the real story. He lived there with them and followed them everywhere they went helping take care of wounded...But when the insurgents shot one of his buddies watch out! This man let them have it with an m16-A4 sub machine gun. Needless to say the army wasn't too happy.

How File Sharing Reveals Your Identity

Interesting article that explains how RIAA can trace you back in a P2P network and identify your IP as well as your identity. The MUTE techonolgy to prevent spy tactics is also presented. You can also find more details on an alternative P2P system called Konspire2b.

Congress Extends Patriot Act Another Five Weeks

"Lawmakers remain at loggerheads in attempting to renew 16 controversial provisions of the USA Patriot Act, voting to give the provisions a second five-week extension to continue negotiations."

Search Companys Reveal What They Know About You!

This is what they said through a survey by CNet. Interesting reading.

The wrong number scam!

This is a good warning from a government site about a new scam.

EMP Warhead Tested

"Britain, which has taken the lead in developing EMP (ElectroMagnetic Pulse) devices, is testing a new EMP warhead with the United States. This weapon is intended for use in cruise missiles or UAVs, for attacks on enemy command and control centers."

Bush Keeps Privacy Posts Vacant

The powerful Office of the Director of National Intelligence must have a civil liberties protection officer who is charged with ensuring that the "use of technologies sustain, and do not erode, privacy protections," according to the law. But the White House has yet to nominate anyone for the job.

EBay Buyers Want What’s In Your Hard Drive

TechWeb News quoted Garfinkel saying, "I think that many drives sell for more than their market value. He suggested the reason is people are looking for information.

Starforce claims to have squashed the 'rumors'

StarForce invited anyone tn to show up at their office and present in person the security issues that have been reported. If you could do so, then you'd be awarded $10,000. Where is there office? MOSCOW!!! They surely did not expect anybody to show up. Now they're declaring victory over allegations presented on this and other sites..

HOWTO: Tunneling HTTP over SSH with DD-WRT, DynDNS and Putty

I thought I would write up a tutorial for tunneling HTTP over SSH as it is a great way to increase security and privacy of web surfing. Here is how I set up an HTTP tunnel to my home network from work.

MS Refuses to Release Patch for Friday's Kama Sutra Worm In Time

Microsoft has a patch for a worm set to go off on friday that deletes office documents. Instead they're waiting for the next patch Tuesday. Its a heck of a time to keep protocol.

« Previous12345678910...5758Next »