If you're learning the ins and outs of Metasploit (one of the most underrated and underused tools in our field) but don't have the software to exploit in a test environment, check out www.securinfos.info/old-softwares-vulnerable.php. Also don't forget about any old copies of Windows, etc. CDs you have lying around....Just load them up on a test machine, VMWare image, or similar and off you go. I can't imagine a more cost-effective ...
Continue Reading...Well it's our big day here in the U S of A. The Messiah has become our new leader. Let the four years of us being talked down to with "charisma" and "captivation" begin. Time for the use of the government as an instrument of plunder to grow beyond our wildest imaginations. An era where we push aside our selfish desires for individuality and all become "one".I suspect when he's ...
Continue Reading...From the recent CVE 2008-5754 alert:Stack-based buffer overflow in BulletProof FTP Client allows user-assisted attackers to execute arbitrary code via a .bps file (aka Session-File) with a long second line, possibly a related issue to CVE-2008-5753. Notice anything ironic?Moral of the story: keep your marketing people reigned in....
Continue Reading...Henry Ford put it nicely when he said "It is not the employer who pays wages - he only handles the money. It is the product that pays wages." A good quote to remember when it comes to tweaking the quality of your work and proving your value to others....
Continue Reading...In this age, we're all concerned about the well-being of our companies and especially the viability of our jobs. Things are certainly not looking up for at least the foreseeable future in '09. I hear it, I read about it - everyone seems to be concerned. All of this and there's one thing that STILL blows my mind. It's people goofing off on the job.I do a fair portion of ...
Continue Reading...Welcome to the first real (i.e. productive) week back in the New Year. These have been stacking up a bit while I've been out fighting this sinus junk that everyone seems to have. So here you go.First off, here's an article I wrote for SearchSoftwareQuality.com:Five predictions for Web security trends and changes for 2009And here's an article I wrote for SearchEnterpriseDesktop.com:Building credibility and getting others on your sideFinally, here's a ...
Continue Reading...Here's a really good quote that complements my post on setting goals rather than those silly New Year's resolutions very nicely:"In the absence of clearly-defined goals, we become strangely loyal to performing daily trivia until ultimately we become enslaved by it." -Robert HeinleinSo, sit down - even if it's just for 10 minutes - and set some real goals. Once you get the ball rolling and hold yourself accountable you'll ...
Continue Reading...During a recent security assessment I was reviewing some application development standards my client had in place. One of the requirements was for developers to never use the "try" construct in their programming to make logic decisions. This struck a chord with me. I realized this is no different in real life.As Yoda once said: "Do or do not, there is no try." I absolutely love that saying. In fact, ...
Continue Reading...Welcome back and Happy New Year!!We've all got job security on our minds as much as information security going into 2009. With that today is a big day. Not because of all the emails, meetings, and gargantuan to-do lists we have to start working on. That's all little stuff.Today's a big day because it's the perfect day to scrap that nasty habit of creating those pie-in-the-sky New Year's resolutions that ...
Continue Reading...OK, I'm a bit late to the punch on this one but just in case you don't know, the awesome Sysinternals tools (a must-have for every security pro) are now available online for immediate access here. No more downloading, unzipping, etc. - just click and run...assuming you can get past your Web browser controls. ;)...
Continue Reading...