Ryan Naraine over at eweek.com has come up with an interesting list of the top 15 most influential people in Computer Security. 1. Tavis Ormandy, Google Security Team’ 2. Ivan Krstic, One Laptop Per Child’ 3. Chris Paget, IOActive’ , Google 4. Bunnie Huang, Bunnie Studios’ 5. Michal Zalewski, Google’ 6. Window Snyder, Mozilla 7. […]
Continue ReadingAuthor: Ajit Gaddam
Microsoft Windows 7 Feature Request List
Microsoft seems like it is on track to release the next generation or the next version of Windows, Windows 7 to be tentatively released in 2009. An indicator of what users wish to see in this next version of Windows has surfaced recently. Following is the full list of these features requested, and it is […]
Continue ReadingBastille Linux
Besides manual security hardening of a Linux OS, let’s check out a free open-source tool to automate and simplify the process. Bastille will disable unnecessary services and install operating system updates as well as configure a firewall, enforce password policies, create a second root-level account and more. What’s nice is that Bastille leads the user […]
Continue ReadingThe History of Hacking
Discovery Channel played a very interesting documentary titled “The History of Hacking”. This goes into the whole history of hacking starting with phone phreaking and Blue boxes and to the present state of hacking. However, a significant portion of this documentary tackles Social Engineering especially the most famous or rather infamous social engineer of all, […]
Continue ReadingYahoo! CAPTCHA Cracked
A CAPTCHA is a type of challenge-response test used in computing to determine whether the user is human. The process involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because computers are unable to solve the CAPTCHA, any user entering a correct […]
Continue Reading