• new SSL Vulnerabilities – how they work and what they mean

    Updated: 2009-11-24 10:04:13
    You may have heard about the latest SSL vulnerabilities over the last month, but how do they work and what does it mean to you (or your users)? When I earlier described how SSL works, I glossed over two SSL functions: session resumption and re-negotiation. These two functions allow a client or server to renegotiate [...]

  • Netwox – The Network Toolbox

    Updated: 2009-11-20 04:50:05
    I don’t think it’s possible to have too many network security toolkits. Netwox is probably not as common some of the other toolsets included in some security-oriented live CD distros. However, it can certainly hold its own when it comes to capability and flexibility. Netwox stands for the Network Toolbox and the software includes over 222 [...]

  • Analysis of a Forged Email

    Updated: 2009-10-21 05:33:00
    A few days ago, a friend of mine asked me how emails are forged. Instead of directing them to Google, I figured it’d be more fun to explain it to them. So in the interest of sharing, my explanation to them was as follows… Email forgery is made possible due to the way email servers accept [...]

Last Months Items