Cryogenically frozen RAM bypasses all disk encryption methods

Saturday, March 8th, 2008

Computer encryption technologies have all relied on one key assumption that RAM (Random Access Memory) is volatile and that all content is lost when power is lost. That key assumption is now being fundamentally challenged with a $7 can of compressed air and it’s enough to give every security professional ...

Data Driven Attacks Using HTTP Tunneling

Saturday, March 8th, 2008

While many systems administrators are turning to firewalls and routers to control content on port 80, HTTP (hypertext transfer protocol), as well as intrusion detection and prevention, attackers can use HTTP tunneling to bypass access control restrictions. Tunneling involves encapsulating traffic in HTTP headers; a tunneling program receives the HTTP ...

Prevent Browser Hijacking

Saturday, March 8th, 2008

Mike Healan March 23, 2004 If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...

HTTP Error Codes

Saturday, March 8th, 2008

Part of Hypertext Transfer Protocol -- HTTP/1.1 RFC 2616 Fielding, et al. 10 Status Code Definitions Each Status-Code is described below, including a description of which method(s) it can follow and any metainformation required in the response. 10.1 Informational 1xx This class of status code indicates a provisional response, consisting only of ...

VMM32.VXD

Friday, March 7th, 2008

An InfiniSource TechFile By Roy Lehrer Everything in this article applies to all versions of Windows 9X including the recently released Windows 98 Second Edition versions. Rumors: Before I go into the details of telling you how to rebuild a corrupt vmm32.vxd file, let me first say with very strong emphasis that ...