Wednesday, December 5, 2012
Labels:
fake generators
Read More
Fake Name Generator: For What Purpose?
I was reading another Lifehacker article in which the focus was how to remove your Internet trace as much as possible. A section of the article suggested that when signing up for future services to use fake details, and referenced fakenamegenerator.com.
I can see this service may have one or two straightforward uses, such as the one above, but it seems very oriented towards...
Tuesday, November 27, 2012
Labels:
Android
,
Google
,
Jelly Bean
Read More
Android 4.2 Security: App Signatures
It seems to be common knowledge now among security professionals that the Google Play Store is infiltrated with malware. In an attempt to control the malware surge, Google is stepping up its efforts to clean house via security updates in 4.2.
One central mechanism appears to be signature-based recognition of apk files. When an apk is loaded on a device, the app signature...
Sunday, November 25, 2012
Labels:
error handling
,
internet blueprint
,
secure code practices
Read More
Error Handling: Another Surface Attack Area to Minimize

Friends of mine know that I'm a huge Lifehacker.com fan, and in reading a recent article discussing how even though there's ample support for allowing people to rip their own DVDs to multiple devices, the U.S. Copyright Office still considers it illegal. On a quick side note, the...
Sunday, November 11, 2012
Labels:
Chrome
,
Extension
,
LifeHacker
Read More
Interesting Chrome Extension: "In My Words"
I just read about it on LifeHacker, but the function of In My Words is to replace words on the fly with words you specify as you browse the Internet. David Galloway, the author of the article, mentions using it as a tool to replace words you find annoying. If you're reading comments and are tired of seeing the words "OMG", "LoL", etc. this tool can replace those words...
Thursday, November 8, 2012
Labels:
Windows 8
,
Wireshark
Read More
Windows 8 Pain Point #2 - Erased, Wireshark Functions!
I wanted to look at a packet capture today, and realized I hadn't installed one of my favorite tools: Wireshark. For the uninitiated, Wireshark is dependent on the WinPCAP driver and when installing Wireshark you have to install the WinPCAP driver at the same time. Much to my dismay, the WinPCAP driver fails during installation due to "known compatibility issues"...
Labels:
hotkeys
,
Sony Drivers
,
Windows 8
Read More
Windows 8 Pain Point #1

Continued from Three great things about Windows 8 so far...
The hotkey driver was another matter. For starters, there
was no driver for it for the Windows 8 64-bit driver set listed on Sony's
website! For those that have ever loaded an OS from scratch, this will
immediately...
Labels:
ISO support
,
Windows 8
Read More
Three great things about Windows 8 so far
NOTE: I have not read about any features of Windows 8, so some of these items may already be old news.
I decided to go head and upgrade to Win8 and mess around with it for a week to see what's what. I figured that if it was bearable, I would just stick with it. So I installed Windows 8 Professional and my initial impression is that it's not vastly different than Windows...
Monday, November 5, 2012
Labels:
back track 5
,
firefox
,
flash plugin
Read More
Flash is broken in Back Track 5 R3: Here's the fix
**updated scripts links as of 1/30/2013
In preparation for the CyberLympics, I wanted to have all my tools updated to the most recent available versions, and as a result I loaded the latest 64-bit revision of Back Track 5 (revision 3). After registering and updating Nessus, I tried to log in through the web interface but kept getting an error that flash wasn't installed.
First,...
Saturday, November 3, 2012
Labels:
Cyber (InfoSec) Competitions
,
global cyberlympics
,
UMUC
Read More
Global CyberLympics Results
UMUC Takes Second
The UMUC team has returned home from Miami as heroes! Representing North America, we out-maneuvered six other teams from Hungary, Brazil, Australia, Nigeria, and Sri Lanka to take 2nd place. The defending champions, hack.ers (Netherlands), were slow to start, but soon out-paced everyone in obtaining points and maintaining that lead. The gap between...
Thursday, September 6, 2012
Labels:
Cyber (InfoSec) Competitions
,
cyber challenges
,
dc3
,
global cyberlympics
,
mdc3
Read More
Another way to enhance your tech skills: Cyber Challenges
In the past year, I've been lucky enough to participate in three or four Cyber Challenge competitions including MDC3 (2011 and now 2012), the Global CyberLympics, and DC3.
MDC3
The MDC3 is a competition with three levels of entry:
High School
Collegiate
Professional
From the website:
What is the Challenge?
Teams within each level will battle it out in a series of “hackathons”—exciting,...
Wednesday, August 29, 2012
Labels:
JTR
,
password cracking
Read More
Linux JTR is better
As an IT professional, I constantly research for troubleshooting information or to leverage the experience of others who've gone before me down dimly lit paths. Frustratingly, during this research I typically find bread crumbs along the trail until I find enough that I'm able to make proper sense of things. So, I'm going to leverage Google+ as a repository for the things I discover,...
Subscribe to:
Posts
(
Atom
)