It's a shampoo world anyway
 


Keep it simple, keep it secure

TaoSecurity compares Sun’s thin client solution Sun Ray with other thin client technologies and concludes that Sun’s approach is more secure, because Sun’s clients are very simple. Most of the work is done on the server, which can be maintained and patched on a central location. The clients hopefully don’t need a lot of patching due to their stripped down operating system.

To be honest, this sounds to me as if Sun has just reinvented the X-terminal.

... Link



Stay home, read 18 papers

At Maximilan Dornseif’s blog you can find a comprehensive (though obviously subjective) list of books and papers, which are considered by him and his colleagues to be the "Top 18 Papers in Information Security". It is a great collection with lots of food for thoughts. And it is fun to see "Smashing The Stack For Fun And Profit" in the same context as Shannon’s "A Mathematical Theory of Communication".

... Link



Housekeeping

Isn’t it kind of strange that Mircosoft has to buy a company to be able to release a tool to remove spyware from their own operating system? Shouldn’t they have enough expertise on Windows among their employees? They wrote the system after all. Therefore they should know, where and what the hooks and places are, that spyware uses to ensure that it is executed on every startup. And also they should understand the mechanisms which are employed by malicious code to hide itself...

This leaves me puzzled.

... Link



Backdoor politics

This article talks mainly about a small but fundamental security flaw in Microsoft’s ASP.NET. But check out how the author uses this topic to express his concerns about the USA Patriot Act.

... Link



More Honey

Creating wireless honeypots: www.securityfocus.com

... Link



How to cirumvent personal firewalls

A paper (in german language) worth reading on this topic: Wie Personal Firewalls ausgetrickst werden können [1].

[1] home.arcor.de

... Link



Google: A Hacker's Best Friend

Security-protocols.com runs an interessting article [1] describing methods to use Google to gain access to files you shouldn't be allowed to see or have access to. A broader and more in depth look at the same topic provides the site Serachlores.org [2].

[Update:] Slashdot [3] links to 2 additional articles about using Google (and the Google-cache) to retrieve confidential information.

[1] security-protocols.com [via SecurityBlog] [2] www.searchlores.org [3] slashdot.org

... Link



Know Your Enemy, Part II

Honeytokens: The Other Honeypot [1]. I allways liked honey.

[1] www.securityfocus.com

... Link



Know Your Enemy

Generation II Honeynets project.honeynet.org

... Link



Security

Surfen mit IE kann Festplatte formatieren: www.heise.de

... Link


 
online for 8219 Days
last updated: 09.04.14, 16:14
status
Youre not logged in ... Login
menu
... home
... topics

... antville home

Mai 2024
So.Mo.Di.Mi.Do.Fr.Sa.
1234
567891011
12131415161718
19202122232425
262728293031
Juni
about:
the shampoo world is
the personal weblog of Martin Johns.
recent

xml version of this page

Made with Antville
powered by
Helma Object Publisher




...welcome to the long tail...