Maddin, 19. Februar 2005 um 00:10:20 MEZ Keep it simple, keep it secure TaoSecurity compares Sun’s thin client solution Sun Ray with other thin client technologies and concludes that Sun’s approach is more secure, because Sun’s clients are very simple. Most of the work is done on the server, which can be maintained and patched on a central location. The clients hopefully don’t need a lot of patching due to their stripped down operating system. To be honest, this sounds to me as if Sun has just reinvented the X-terminal. ... Link Maddin, 4. Februar 2005 um 14:46:25 MEZ Stay home, read 18 papers At Maximilan Dornseif’s blog you can find a comprehensive (though obviously subjective) list of books and papers, which are considered by him and his colleagues to be the "Top 18 Papers in Information Security". It is a great collection with lots of food for thoughts. And it is fun to see "Smashing The Stack For Fun And Profit" in the same context as Shannon’s "A Mathematical Theory of Communication". ... Link Maddin, 28. Januar 2005 um 13:38:51 MEZ Housekeeping Isn’t it kind of strange that Mircosoft has to buy a company to be able to release a tool to remove spyware from their own operating system? Shouldn’t they have enough expertise on Windows among their employees? They wrote the system after all. Therefore they should know, where and what the hooks and places are, that spyware uses to ensure that it is executed on every startup. And also they should understand the mechanisms which are employed by malicious code to hide itself... This leaves me puzzled. ... Link Maddin, 23. Dezember 2004 um 10:25:50 MEZ Backdoor politics This article talks mainly about a small but fundamental security flaw in Microsoft’s ASP.NET. But check out how the author uses this topic to express his concerns about the USA Patriot Act. ... Link Maddin, 18. Februar 2004 um 10:42:40 MEZ More Honey Creating wireless honeypots:
www.securityfocus.com ... Link Maddin, 20. Oktober 2003 um 11:59:01 MESZ How to cirumvent personal firewalls A paper (in german language) worth reading on this topic: Wie Personal Firewalls ausgetrickst werden können [1]. [1] home.arcor.de ... Link Maddin, 18. Juli 2003 um 22:56:48 MESZ Google: A Hacker's Best Friend Security-protocols.com runs an interessting article [1] describing methods to use Google to gain access to files you shouldn't be allowed to see or have access to. A broader and more in depth look at the same topic provides the site Serachlores.org [2]. [Update:] Slashdot [3] links to 2 additional articles about using Google (and the Google-cache) to retrieve confidential information. [1] security-protocols.com [via SecurityBlog]
[2] www.searchlores.org
[3] slashdot.org ... Link Maddin, 18. Juli 2003 um 20:25:59 MESZ Know Your Enemy, Part II Honeytokens: The Other Honeypot [1]. I allways liked honey. ... Link Maddin, 17. April 2003 um 12:46:26 MESZ Know Your Enemy Generation II Honeynets
project.honeynet.org ... Link Maddin, 13. November 2002 um 13:28:54 MEZ Security Surfen mit IE kann Festplatte formatieren:
www.heise.de ... Link |
online for 8421 Days
last updated: 09.04.14, 16:14 Youre not logged in ... Login
click:
Martin Welt martinjohns.com Tumbling Nerd Alert Blogroll doomicile foobla simonox Podroll IT Conversations The Podcast about nothing |