Category: Security
-
Shoot to kill policy fundamentally flawed
The recently exposed UK “shoot to killâ€? policy appears to have been discreetly introduced into anti-terrorist procedures in 2003, after then-Metropolitan Police Commissioner Lord Stevens sent teams to both Israel and Sri Lanka to study how they dealt with suicide bombers. On Sunday, Lord Stevens said in the News of the World: There is only…
-
Mrs ESTHER ROBERTS – is a scammer!
I received the following 419 scam email yesterday: From:Mrs ESTHER ROBERTS Address:Avenue 44 Rue 12 Treichtown Lot 87 Marcory Cocody 1863 Abidjan,Cote D’Ivoire,West Africa Respectfull one, Good a thing to write you. I have a proposal for you-this however is not mandatory nor will I in any manner compel you to honour against your will.…
-
Out of Office reply policies
I saw a post on David Smalley’s blog about Microsoft Exchange Server Out of Office Replies. In his post David mentions that in Exchange server 2000, Out of Office Replies (OOR’s) are not sent outside of the Exchange organisation, and he goes on to explain how you can configure Exchange to allow OOR’s to go…
-
Apple to move to Intel x86 architecture?
I spotted a story on news.com this morning which said that Apple are going to move away from IBM PowerPC chips to Intel supplied x86 chips for their computers. The article goes on to say that this will be officially announced at Apple’s Worldwide Developer Conference in San Francisco on Monday by Steve Jobs. Robert…
-
How to pick any lock in seconds
Lockpicking is the art of opening a lock without damaging it or using a key – and recently lockpicking has become a sport with clubs and championships. Who knew? One such club is TOOOL (The Open Organisation of Lockpickers). One of the founding members of this organisation is Barry Wels whose video on how to…
-
Apple releases Tiger update 10.4.1
There has been a lot of hysteria about a theoretical exploit for Apple’s latest OS – Tiger (OS X 10.4). The exploit was only theoretical, because no exploit has emerged as yet. Apple have released an update for Tiger updating it to 10.4.1 – this update addresses that potential vulnerability. It also includes improvements for:…
-
Web browser forensics
I spotted a very interesting article on web browser forensics linked to on David’s blog. The article is in two parts and documents the investigation of the browser logs on a fictitious user’s PC. The article includes downloadable browser logs to allow the article reader to take part in the investigation. The article also includes…