Select Page

How to break Windows.

Exploiting design flaws in the Win32 API for privilege escalation. Or… Shatter Attacks – How to break Windows. By Foon – ivegotta [at] tombom.co [dot] uk http://security.tombom.co.uk/shatter.html Introduction This paper presents a new generation of...

Thanks..

Thanks to everyone who attended the FOIB party tonight in Vancouver. For those who didn’t, you missed a good one and we’ll see you next year. As for me, I’m very tipsy, and happy to see so many friends meeting each other, talking, and sharing ideas....

RealNames Goes titsup.com

RealNames is the company that attempted to usurp DNS by embedding their keyword mapping tool into Microsoft Internet Explorer, and of course selling those keywords (as does AOL) to unfortunate web site owners who couldn’t afford the prices EJW wanted to charge...

SSH on Your BlackBerry…

http://www.idokorro.com/products.html If you are like most IT managers you must provide 24/7 support of networks and servers, including mission critical applications. Downtime as a result of server issues or failure can occur at any time and critical applications are...

Conference Bike…

Totally, completely, strange: http://www.conferencebike.com/Conference/Newmodel/NewModel.htm -Ian. ———–

IBM buys PWC Consulting

…just so you don’t think I wasn’t paying attention. This is a pretty big deal considering the environment. It prevents PWC Consulting from having to IPO in order to raise operating capital to meet its independence requirements from PWC LLC, the...