Latest posts

Page 218

Direct revenue talks to Newsweek

Oh man, I wish I had time to really blog on this.  But for now, read the article. One priceless comment: “I agree there is some frustration around Aurora. However, with our improved branding and disclosure, users should feel free to uninstall our ad client.  It seems to me there are still some people who […]

Continue reading

Test your phishing knowledge

Sascha over at Paretologic posted some tips on Phishing.  Good stuff. It reminded me, however, of a test that MailFrontier (a competitor of ours) did a while back. So I’m posting it for all the world to see. You’re going to be surprised by this one.  I did this quite a while back and it […]

Continue reading

Wireless security, the year of living dangerously

The National Association of State CIOs has issued a report on wireless security, entitled “The Year of Working Dangerously”. Link to the report here. While serious in nature, they paint a somewhat humurous analogy of past technology vs. current: “Jim, a state employee, checks the radio of his brand new 1985 Buick Riviera for a […]

Continue reading

Kids hack computers, go to jail?

This is nuts.  A dozen kids at Kutztown Area High School “hacked” into the school’s network.  Ok, it’s very wrong, but the clueless luddites at the high school are pressing felony charges.   From an editorial in the local newspaper.. “…Nobody is accused of altering grades or stealing personal information. The school district likens the tampering […]

Continue reading

Post war history of encryption

This is a fairly technical article, but for the cypto wonk, it’s heaven.  Originally seen on Slashdot. Alex Eckelberry 

Continue reading

Grokster madness continues!

After my last blog entry on Grokster, I got some interesting new things to look at. Eric Howes emailed me with this snippet: “Just tested the Grokster install on a Win2K machine: this thing drops the .NET install bomb on computers without .NET already (which may be why you didn’t see this). No surprise, really, given […]

Continue reading

Zotob? Relax, take the blue pill

Another example of how Microsoft can just make a blogger’s day.   Microsoft issued a statement on Zotob last night. “There are currently a number of press reports regarding an Internet worm called Zotob. News reports had indicated that there was potentially a new worm. We are not aware at this time of a new […]

Continue reading

Grokster is back with their ad-supported version

Grokster had pulled their adware advertising supported version, offering only a paid-for version.  Now, the adware advertising supported version is back, offering loads of fun for all users. I thought maybe Grokster got religion.  After all, they lost with the Supreme Court.  People have been upset about adware in Grokster for quite some time. Wrong. […]

Continue reading

What enterprise AV product is your favorite?

We did a SunPoll™ on “Which enterprise AV product is your favorite”?  SunPolls are completely unscientific, but you can see the results here:

Continue reading

HTTP request smuggling

“HTTP Request Smuggling works by taking advantage of the discrepancies in parsing when one or more HTTP devices/entities (e.g. cache server, proxy server, web application firewall, etc.) are in the data flow between the user and the web server. HTTP Request Smuggling enables various attacks – web cache poisoning, session hijacking, cross-site scripting and most […]

Continue reading