Bookmark
Windows passwords easily bypassed over Firewire
www.engadget.com/2008/03/04/windows-passwords-easily-bypassed-over-firewire/, posted 2008 by peter in mac security windows
Unlike those disk encryption attacks we saw that required a reboot, Boileu's attack works while the target computer is running, tricking Windows into allowing full write access to RAM and then corrupting the password protection code.
Bookmark
Lest We Remember: Cold Boot Attacks on Encryption Keys
citp.princeton.edu/memory/, posted 2008 by peter in privacy science security storage
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard.
Bookmark
FireWire Memory Dump of a Windows XP Computer: A Forensic Approach
www.friendsglobal.com/papers/FireWire%20Memory%20Dump%20of%20Windows%20XP.pdf, posted 2008 by peter in privacy science security storage
A firewire device can read (and write) to a computer’s main memory by accessing a system’s DMA controller, while the operating system, be it Windows, Mac OS, Linux, a Multiple Independent Levels of Security kernel, etc., is oblivious to the event.
Bookmark
Botnets, a free tool and 6 years of Linux/Rst-B
www.sophos.com/security/blog/2008/02/1062.html, posted 2008 by peter in free linux security software
If you don’t run anti-virus on your Linux boxes, we would like to invite you to run a tiny rudimentary scanner we have developed whose sole job is to look for Linux/Rst-B infections.
Bookmark
Mixminion: A Type III Anonymous Remailer
mixminion.net/, posted 2008 by peter in email free privacy security software toread
Mixminion is the reference implementation of the Type III Anonymous Remailer protocol.
Bookmark
TorK - Anonymity Online
www.anonymityanywhere.com/tork/, posted 2008 by peter in free kde privacy security
TorK is a powerful anonymity manager for the KDE Desktop on Linux and Unix systems. It first helps you to
install, configure and use Tor. It then reduces the task of anonymizing most applications to a single-click, including Firefox, Opera, Konqueror, Pi
Bookmark
HOWTO: Anonymous communication with Tor - some hints and some pitfalls
www.hermann-uwe.de/blog/howto-anonymous-communication-with-tor-some-hints-and-some-pitfalls, posted 2008 by peter in howto privacy security
I have checked every single of these configurations with Ethereal to ensure that the traffic is really anonymized. However, if you are paranoid, you shouldn't trust me, but rather test this stuff for yourself!
OpenDNS protects millions of people a day across hundreds of thousands of schools, businesses and homes as they navigate the Internet. We block phishing sites and give you the power to block adult sites, proxies and individual domains.
Bookmark
MUTE File Sharing
mute-net.sourceforge.net/, posted 2008 by peter in p2p privacy search security software
MUTE File Sharing is a peer-to-peer network that provides easy search-and-download functionality while also protecting your privacy.
ENTROPY is developed as a response to increasing censorship and surveillance in the internet. The program connects your computer to a network of machines which all run this software. The ENTROPY network is running parallel to the WWW and also other intern
|< First < Previous 211–220 (222) Next > Last >|