Permanent Denial-of-Service Attack Sabotages Hardware

Tuesday, May 20th, 2008

You don’t have to take an ax to a piece of hardware to perform a so-called permanent denial-of-service (PDOS) attack. A researcher this week will demonstrate a PDOS attack that can take place remotely. A PDOS attack damages a system so badly that it requires replacement or reinstallation of hardware. Unlike ...

How To Run Linux From A USB Flash Drive

Tuesday, May 20th, 2008

Most of the time, Linux is run from either an installation on a hard drive or a live CD/DVD distribution. The first is fast, but not very portable; the second can be run anywhere you have a computer and a CD drive with boot access, but typically isn't very fast. ...

High-Security Flash Storage

Monday, May 5th, 2008

If you think of flash memory, people typically think of USB memory sticks or memory cards for digital cameras and camcorders. But the potential applications for flash have expanded tremendously. The media started off as non-volatile memory for firmware on PCs and consumer electronics devices. It then became an ultra-portable ...

Malicious Flash on LiveJournal.com

Tuesday, April 22nd, 2008

Sounds more of an annoyance than it does "malicious" but the folks over at Spyware Sucks has an interesting post about a bad flash banner being posted on Livejournal.com.  I just thought I'd share.

The Snare Of Unauthorized Requests

Monday, April 21st, 2008

Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...