Blog

Aug 31st

2005

By scotsts_admin
Category: Wireless Security

Mobile phone virii

Bluetooth adverts spark virus fears – vnunet.com Story discussing a new advertising technique whereby content is transmitted directly to bluetooth phones, and pointing out the risks of getting users in the habit of accepting content beamed to them. The comments from the company making the advertising mechanism are interesting. They seem to be saying it’s […]

Aug 23rd

2005

By scotsts_admin
Category: Security Policy

17799 User Group

ISO 17799 and BS7799 User Group A useful source of information about 17799.

Aug 5th

2005

By scotsts_admin
Category: Wireless Security

Mobile Phone Tracking

BBC NEWS | Technology | Tracking a suspect by mobile phone A decent description of the ease with which people can be tracked, based on their mobile phones. In this case used to track down a terrorist suspect. Also describes potential methods of phone tapping used by the police.

Jul 26th

2005

By scotsts_admin
Category: Misc.

Interesting Story about DDoS attacks

How a Bookmaker and a Whiz Kid Took On an Extortionist and Won – CSO Magazine – May 2005 The story recounts the efforts of one company to resist an extortion attempt based on DDoS of the targets website. This seems to be an increasing trend at the moment, and is additional evidence that the […]

Jul 24th

2005

By scotsts_admin
Category: Misc.

Thought provoking post on terrorism and statistics

The Musings of Harry: Let’s not loose our heads This is a very interesting post. “Harry” has done some work looking at the number of deaths from terrorism as opposed to other causes, in the UK and asks some questions about the level of emphasis and spending on those topics. It’s pretty obvious that a […]

Jul 24th

2005

By scotsts_admin
Category: Networking

ToR

Nitesh Dhanjani Post about using ToR to launch attacks (or in this case vulnerability scanners). Using this it appears that you can be more or less anonymous on the Internet, at a network level anyway. Only the entry point to the ToR network will know the origin of your traffic. Of course if you get […]

Jul 12th

2005

By scotsts_admin
Category: Uncategorized

Some tips on secure wireless networks

Building Secure Wireless Networks @ LinuxWorld Good articles from the guys who wrote Wi-Foo on some tools to help build secure wireless networks.

Jun 27th

2005

By scotsts_admin
Category: Penetration Testing
Comments 0

Excellent presentation on Web Application Security Testing Tools

There’s a great presentation on Web Application Security Testing tools over at OWASP . It breaks the available tools down into sensible categories and also has some quite comprehensive lists of available tools for each category.

Jun 26th

2005

By scotsts_admin
Category: Programming

Perl plugin for Eclipse

EclipsePlugins : ratings for the EPIC – Eclipse Perl Integration Eclipse plugin (Languages) I’ve been looking for a free perl IDE for a while now, to help my infrequent programming efforts. This seems to work quite well with eclipse….

Jun 26th

2005

By scotsts_admin
Category: Vulnerability Management
Comments 0

Demo of Reverse engineering of MS Patches

SABRE Security An interesting demo of a MS patch being reversed engineered to make creation of an exploit simple. This shows an good reason for installing any security patches as soon as possible…..