Sunday, May 06, 2007

Weekend Reading

Hiding Inside a Rainbow

Steganography is the art of hiding messages so that uninitiated wouldn’t suspect the presence of a message. A rainbow table is a huge binary file used for password cracking. This is the first in a series of posts on research I’ve done on how to hide data in rainbow tables, and how to detect its presence.


[ This is a great read if you are into this stuff ] Take a look HERE.

==================================================================
Security's Biggest Train Wrecks

Think you've made security mistakes? All of them provide the kind of hard knocks required to school companies and other organizations on what to do with security - and what not to.

Take a look HERE.

==================================================================
Analyst's Diary

It’s that time of the month again – when a young man’s mind turns to browsing virus collections. Top 10 categories of malware for April.

Take a look HERE.

==================================================================
Rooting Out Rootkits

On a Windows system, rootkit refers to a process that subverts the operating system to hide its activities. If an antispyware program checks for the presence of a rootkit-hidden file using ordinary Windows functions, the rootkit intercepts the function call and changes the results, eliminating any reference to the malware's protected files. Similar techniques hide Registry entries, processes, network connections, and so on.

Take a look HERE.

==================================================================
OpenBSD 4.1

Released May 1, 2007

Take a look HERE.

==================================================================
UAC approach is so good, others should follow suit

Of course, that's not to say that I like UAC's prompts. But I'm not kidding myself: plenty of early Vista adopters loathe the feature. Microsoft doesn't, however. The company says that UAC and the approach it embodies is really the direction that all operating systems should be headed in, but to understand that argument, one must first understand what Microsoft means.

Read the article HERE.

==================================================================
The multi-monitor havens

A surprising number of readers have displayed a surprising amount of screen real estate on their desks, so this week we're featuring the coolest multi-monitor/multi-computer setups that readers have submitted so far.

Take a look HERE.

==================================================================
How can I tell if an e-mail or Web site is “suspicious” ?

Since this has turned out to be a regular thing, I’ve decided to give this feature an official name: Simple Security. Security discussions don’t have to require you to have a degree in computer science for them to be useful, even though they can certainly sound that way. I opted for the simplest, most approachable name since I’m aiming to provide you with explanations in the most simple, approachable terms.

Take a look HERE.

0 Comments:

Post a Comment

<< Home