Bookmark
HOWTO: Encrypted directory with EncFS - Ubuntu Forums
ubuntuforums.org/showthread.php?t=148600, posted 2009 by peter in howto linux privacy security storage
This guide describes how to create encrypted directories. These can come in handy for laptop users, password lists and the like.
Bookmark
philosecurity » Blog Archive » Interview with an Adware Author
philosecurity.org/2009/01/12/interview-with-an-adware-author, posted 2009 by peter in advertising development distributed hack security windows
Matt Knox, a talented Ruby instructor and coder, talks about his early days designing and writing adware for Direct Revenue. (Direct Revenue was sued by Eliot Spitzer in 2006 for allegedly surreptitiously installing adware on millions of computers.)
Bookmark
Encoding data file within an ascii art!
pictureworthsthousandwords.appspot.com/, posted 2009 by peter in art design graphics hack security text
ASCII art is nothing new, but this takes it one step further by allowing you to embed another data file within the image!
The resulting ASCII art remains printable (i.e. no special unicode symbol) - this means you can print the image out, hang it on your wall, and have it look like an innocent ASCII art when it's hiding a secret document of your choice.
Bookmark
MySQL :: MySQL 5.0 Reference Manual :: 5.5.2 Adding New User Accounts to MySQL
dev.mysql.com/doc/refman/5.0/en/adding-users.html, posted 2009 by peter in development reference security sql
The following examples show how to use the mysql client program to set up new users.
Bookmark
Police set to step up hacking of home PCs - Times Online
www.timesonline.co.uk/tol/news/politics/article5439604.ece, posted 2009 by peter in eu fascism msm privacy security terrorism
Home Office has quietly adopted a new plan to allow police across Britain routinely to hack into people’s personal computers without a warrant.
Bookmark
[flexcoders] Re: Acegi/Spring/Flex authentication
www.mail-archive.com/flexcoders@yahoogroups.com/msg35921.html, posted 2008 by peter in development flex java security
Here are snippets from my Flex code, and my Acegi configuration. If you notice, what we did, was set up Acegi, so it's successful and unsucessful authentication url's point to XML documents that contains the result of the login.
Bookmark
Quick HOWTO : Ch21 : Configuring Linux Mail Servers - Linux Home Networking
www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch21_:_Configuring_Linux_Mail_Servers, posted 2008 by peter in howto linux messaging networking reference security
This chapter will show you how to use sendmail to create a mail server that will relay your mail to a remote user's mailbox or incoming mail to a local mail box. You'll also learn how to retrieve and send mail via your mail server using a with mail client such as Outlook Express or Evolution.
Bookmark
BBC NEWS | Technology | EU to search out cyber criminals
news.bbc.co.uk/1/hi/technology/7758127.stm, posted 2008 by peter in eu networking politics privacy security toread
Remote searches of suspect computers will form part of an EU plan to tackle hi-tech crime.
Bookmark
That grumpy BSD guy: A low intensity, distributed bruteforce attempt
bsdly.blogspot.com/2008/12/low-intensity-distributed-bruteforce.html, posted 2008 by peter in security toread
We have seen the future of botnets, and it is a distributed, low-key affair. Are sites running free software finally becoming malware targets?
Bookmark
Woman out $400K to 'Nigerian scam' con artists | KATU.com - Portland, Oregon | News
www.katu.com/news/34292654.html, posted 2008 by peter in email msm scam security
So how did this otherwise lucid, intelligent woman end up sending nearly half a million dollars to a bunch of con artists running what has to be one of the best-known Internet scams in the world?
|< First < Previous 181–190 (222) Next > Last >|