Blizzard’s Two-Factor Authentication

Tuesday, July 1st, 2008

Blizzard's announcement of two-factor authentication for World of Warcraft is more significant than people realize. Passwords are obsolete. They are broken. We all recognize this, yet we aren't quite ready to give up on passwords because we haven't an easy alternative. World of Warcraft (WoW) is a good test case. It is ...

Detecting SSH tunnels

Tuesday, July 1st, 2008

Italian researchers have published a paper on the Detection of Encrypted Tunnels across Network Boundaries. I came across it in a google search because I’ve been thinking of writing a program which does something similar. It doesn’t seem like anyone else has picked up on this research yet so I ...

Securing Cross Site XMLHttpRequest

Monday, June 23rd, 2008

As I mentioned in my post on Cross Document Messaging, client side cross domain request is an important area of interest for AJAX developers looking for ways to avoid expensive server side proxying calls. While Cross Document Messaging is useful for allowing third party components or gadgets embedded in a ...

Cain & Abel v4.9.15 released

Saturday, June 21st, 2008

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...

Successful 802.1X Every Time

Friday, June 20th, 2008

It’s not rocket science, but any time we mingle and intertwine four or five different pieces of technology, there’s always the potential for a mess… or at least a misconfiguration or two along the way. Don’t know what 802.1X is? Check out the recent 802.1X technology primer. If you’re planning to, ...