Global Security Watch > August 31, 2005

Introduction to Firewalls

Networks and Securityhttp://www.thex.com/security [Networks and Security] In addition to the hardware firewall built into routers, there are also software applications called personal firewalls that you can run on your computer. These personal firewall applications monitor all incoming and outgoing communications on your computer as well as what services are trying to interact with what other services.

Read related posts for „ Introduction to Firewalls“.


 

Cryptographically-Secured Murder Confession

http://www.volubis.com/blog [InfoSec News Blog] Joseph Duncan III is a computer expert who bragged online, days before authorities believe he killed three people in Idaho, about a tell-all journal that would not be accessed for decades, authorities say.

Read related posts for „Cryptographically-Secured Murder Confession“.

Posted at 08:09 PM

August 31, 2005

Introduction to Firewalls

Networks and Securityhttp://www.thex.com/security [Networks and Security] In addition to the hardware firewall built into routers, there are also software applications called personal firewalls that you can run on your computer. These personal firewall applications monitor all incoming and outgoing communications on your computer as well as what services are trying to interact with what other services.

Read related posts for „ Introduction to Firewalls“.

Posted at 08:16 PM

Cryptographically-Secured Murder Confession

http://www.volubis.com/blog [InfoSec News Blog] Joseph Duncan III is a computer expert who bragged online, days before authorities believe he killed three people in Idaho, about a tell-all journal that would not be accessed for decades, authorities say.

Read related posts for „Cryptographically-Secured Murder Confession“.

Posted at 08:09 PM

Securing Sensitive Data: Understanding FIPS

[Computer Internet Security eLamb :: Main Page] FIPS are all the federal documents addressing how  sensitive data will be processed. Without these standards any government agency could use any kind of crypto they wanted with no regard of whether or not it is a SHA-1 that has just been cracked by the Chinese. 

Read related posts for „Securing Sensitive Data: Understanding FIPS“.

Posted at 08:06 PM

August 26, 2005

300,000 spyware URL's... (?)

CastleCopshttp://castlecops.com [CastleCops] discovered spyware writers are actively growing their distribution channels and entering new markets. Webroot reveals in the report that the number of websites distributing spyware has quadrupled since the beginning of 2005 to an astonishing 300,000 unique URLs.

Read related posts for „300,000 spyware URL's... (?)“.

Posted at 11:03 PM

New Cryptanalytic Results Against SHA-1

http://www.volubis.com/blog [InfoSec News Blog] Xiaoyun Wang, one of the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, announced new results against SHA-1 yesterday at Crypto's rump session. (Actually, Adi Shamir announced the results in their name...

Read related posts for „New Cryptanalytic Results Against SHA-1“.

Posted at 11:00 PM

Always Wear Protection!

[ WishX´s Blog] William Moyer, a 73-year-old war veteran from Kentucky, wears “bullshit protector” flaps over his ears in protest of a visit from George W.

Read related posts for „ Always Wear Protection!“.

Posted at 10:58 PM

August 25, 2005

A Matter of (Fading) Trust

http://www.robhyndman.com [ robhyndman.com] Gist: As a result, nearly two months after the disclosure that a tiny payment processor, CardSystems Solutions, exposed the personal information of more than 40 million cardholders - and even though Visa subsequently banned CardSystems from connecting to its operation - the system remains as vulnerable as ever. Only now, with their brands at stake, have Visa, MasterCard and the other major card companies begun to focus on their consumers’ main interests - ensuring that personal information is secure at all times.

Read related posts for „A Matter of (Fading) Trust“.

Posted at 02:40 PM

The right coprocessor can help with encryption

http://www.volubis.com/blog [InfoSec News Blog] Furthermore, encryption is algorithmically complex, requiring significant resources for implementation, and most often, significant hardware acceleration. In this sixth and final installment to the Big iron lessons series, you'll get a review of the modern history of crypto and the encoding hardware and software techniques developed for mainframes that can show you the way forward.

Read related posts for „The right coprocessor can help with encryption“.

Posted at 02:27 PM

Skype Hype

 8 Ways to Sunday[ 8 Ways to Sunday] The O’Reilly Network just put an end to my ignorance with the article “What is Skype,” by James Gaskin. Perhaps the coolest thing about this free telecommunications tool ”” aside from the fact that it’s free ”” is how secure it is.

Read related posts for „Skype Hype“.

Posted at 02:27 PM

August 22, 2005

#

http://safeandsecure.blogsome.com [Safe and Secure] The usual privacy concerns expressed with “nanny cams” involve the propriety of “spying” on your nanny. But it turns out there is a much more...

Read related posts for „#“.

Posted at 11:04 AM

Handywrite Writing System

Axodyshttp://axodys.com [Axodys] It works by writing English phonetically using a symbolic series of loops, lines and curves. I can see how it could be quite effective as a shorthand for taking notes once you’ve mastered it (I just noticed there is in fact a Handywrite shorthand that is even more condensed), but I think quite a bit of practice would be required before you could reach the point of writing faster than with the conventional alphabet.

Read related posts for „Handywrite Writing System“.

Posted at 11:01 AM

Ideal-to-Realized Security Assurance In Cryptographic Keys

http://www.volubis.com/blog [InfoSec News Blog] Everyone asks me encryption questions regarding key rotation, storage and destruction. WindowsSecurity.com has an article beginning the encryption key conversation.

Read related posts for „Ideal-to-Realized Security Assurance In Cryptographic Keys“.

Posted at 10:44 AM

Local story makes it onto Engadget

[NickStarr.com : Nick Starr dot com] Pay that bill On Time”¦ or your car won’t start Bad credit! No credit! We’re practically giving these things away”¦ but make sure you...

Read related posts for „Local story makes it onto Engadget“.

Posted at 10:40 AM

August 19, 2005

MSN Password Decrypter

http://www.volubis.com/blog [InfoSec News Blog] This tool will decrypt the MSN password stored by the Windows operating system.

Read related posts for „MSN Password Decrypter“.

Posted at 07:35 PM

Kemandirian Industri Militer

http://elangmaya.lensa.or.id [Elangmaya] Yang menjadi permasalahan adalah negara penjual senjata tentu saja tidak mau senjata yang dia jual akan dipergunakan oleh negara pembeli untuk menghalangi kepentingan-kepetingannya. Ada banyak contoh dalam hal ini misalnya F16 yang dimiliki Indonesia mungkin hanya bisa untuk berpatroli di wilayah Indonesia saja dan itupun mungkin tidak akan dapat mengejar pesawat negara lain yang dengan sengaja melewati wilayah udara Indonesia.

Read related posts for „Kemandirian Industri Militer“.

Posted at 07:33 PM

Darfur rebels' playing for time (again) costs countless lives and a fortune in aid

http://sudanwatch.blogspot.com [Sudan Watch] "We are now entering a critical stage of the talks."Note, the report says agreements with Darfur rebel group leaders have often been ignored by commanders on the ground, but Pronk said they now recognised the need for a deal to end the violence in Darfur. Oh yeah, sure.

Read related posts for „Darfur rebels' playing for time (again) costs countless lives and a fortune in aid“.

Posted at 07:31 PM

August 18, 2005

Bush extends national emergency by one year

http://www.ioerror.us [IO ERROR] Bush extends national emergency by one year Posted by IO ERROR under Politics, Homeland Stupidity, Internet, Privacy Leave a Comment You heard right...

Read related posts for „Bush extends national emergency by one year“.

Posted at 09:38 PM

Spring and encrypted DataSource passwords

Vinny Carpenter’s bloghttp://www.j2eegeek.com/blog [Vinny Carpenter’s blog] One of the limitations of using Spring outside of the traditional J2EE container is hard-coding database information inside the Spring configuration...

Read related posts for „Spring and encrypted DataSource passwords“.

Posted at 09:32 PM

Terrorists, Steganography, and False Alarms

http://www.volubis.com/blog [InfoSec News Blog] Bruce Schneier blogs that the worries about terrorists hiding messages in things such as images, documents, and television broadcasts are false...

Read related posts for „Terrorists, Steganography, and False Alarms“.

Posted at 09:26 PM

IDENTITY THEFT INSURANCE

[Identity Theft Blog] The burgeoning problem of identity theft is spurring new lines of insurance to cover the rising costs of consumers reclaiming their good names...

Read related posts for „IDENTITY THEFT INSURANCE“.

Posted at 09:24 PM

August 08, 2005

U.S. Crypto Export Controls

http://www.volubis.com/blog [InfoSec News Blog] Bruce Schneier reminds us that the rules on exporting cryptography outside the United States have been renewed: President Bush this week declared a...

Read related posts for „U.S. Crypto Export Controls“.

Posted at 03:55 PM

Bush declares "national emergency"

http://mcgath.blogspot.com [The Blog of M'Gath] Bush declares "national emergency" On August 2, President Bush declared that a so-called "national emergency" continued to exist and would be extended for another year. One might think that a national emergency would be big news, but just about the only story on the Web which mentions it is this one on CNET news.

Read related posts for „Bush declares "national emergency"“.

Posted at 03:54 PM

ID Theft: Meeting The Problem Head-On

[Identity Theft Blog] Sometimes, that last chapter has no ending. More than 1 of every 4 victims of identity fraud are unable to resolve their cases after a year of trying, according to a survey by Nationwide Mutual Insurance Co.

Read related posts for „ID Theft: Meeting The Problem Head-On“.

Posted at 03:52 PM

Malware: Help prevent the Infection

http://interneted.blogspot.com [Internet For People Like Us!] Anti-spyware software was rarely part of a standard computer package. If they were lucky enough to have XP (Gold or Service Pack 1) the internet connection firewall was often turned off by default.

Read related posts for „Malware: Help prevent the Infection“.

Posted at 03:50 PM

August 04, 2005

Secure Syndication Misconceptions

Joe Gregorio | BitWorkinghttp://bitworking.org [Joe Gregorio | BitWorking] Yes, bugs have been found in Greasemonkey, and it appears that some of the impetus came from people looking at how secure Secure Syndication was. I very much appreciate the effort that has gone into that review, and I am glad that those issues have been found and are being resolved, but none of the problems found so far have been flaws in the basic premise, but instead are bugs in Greasemonkey.

Read related posts for „Secure Syndication Misconceptions“.

Posted at 11:44 AM

Free SSL Certificate

http://elangmaya.lensa.or.id [Elangmaya] Dengan free email certificate dari thawte pemakai email bisa mendapatkan certificate secara gratis yang dapat digunakan untuk menandai email dan dapat menerima email yang sudah ter-enkripsi. Jika pemakai free email certificate tersebut mengikuti jaringan Web-of-Trust maka dimungkinkan identitasnya tercantum pada certificate yang dia miliki setelah memenuhi kriteria tertentu.

Read related posts for „Free SSL Certificate“.

Posted at 11:42 AM

Keep Your Home Wireless Network Secure

[Computer Internet Security eLamb :: Main Page] Another more recent method of securing your system is WI-FI Protected Access (WPA). Newer routers will have a wizard to assist users in setting up the WPA security. 

Read related posts for „Keep Your Home Wireless Network Secure“.

Posted at 11:40 AM

Steganography with Flickr

[The Daily ACK] I've just come across Keith McDuffee's article on Steganography with Flickr (via the Unofficial Apple Weblog) which looks interesting since, not only is your distribution channel is in plain sight and a broadcast medium at that, your content is disguised amongst a good deal of extraneous noise. Of course now that Flickr knows people are thinking about this, JPEG's which are "just a bit on the large side" for their actual pixel count might start getting flagged automatically by their software.

Read related posts for „Steganography with Flickr“.

Posted at 11:38 AM

God is my shield

[Fellow Servant .com] (Psalms 7:10 NLT) God is my shield, saving those whose hearts are true and right. Lord make my heart right.

Read related posts for „God is my shield“.

Posted at 11:37 AM

August 02, 2005

Don’t trust trusted computing: Microsoft’s Next Generation Secure Computing Base

http://www.ioerror.us [IO ERROR] Microsoft has begun implementation of its Next-Generation Secure Computing Base with the introduction of Secure Startup - Full-Volume Encryption in...

Read related posts for „Don’t trust trusted computing: Microsoft’s Next Generation Secure Computing Base“.

Posted at 11:56 AM

Encrypted VOIP Phone

http://www.volubis.com/blog [InfoSec News Blog] Phil Zimmermann (of PGP fame) is about to debut his encrypted VOIP phone project. I presume it will be free and open source, and that the cryptography will be strong enough for any application.

Read related posts for „Encrypted VOIP Phone“.

Posted at 11:54 AM

Grant unto me spiritual deafness, blindness and stupidity

[Fellow Servant .com] Psalms 34:7-8 KJV (7) The angel of the LORD encampeth round about them that fear him, and delivereth them. (8) O taste and see that the LORD is good:...

Read related posts for „Grant unto me spiritual deafness, blindness and stupidity“.

Posted at 11:51 AM