Blog Archives

Wikileaks – NeoNazi Forum Dumps

Wikileaks has data from several Neo Nazi forums. The information includes user lists, private message histories, forum posts, etc. I’ve been pouring over the data since yesterday. They seem to be using SMF and phpBB primarily between the sites –

Posted in Computer Science, Digital Forensics, Hacks, Cracks, and Attacks Tagged with: , , , ,

<>< [Phish / Fish] ing attacks are still viable

Fairly uninteresting from a technical point of view, but worth noting as a perpetual problem. The Register reports on a recent fishing attack against hotmail and other web based email users. Phishing, Fishing, <><, all refer to what is known

Posted in Hacks, Cracks, and Attacks Tagged with: , ,

Respondus LockDown Browser

The Respondus LockDown Browser is an application designed to “lock down” a system for the duration of an exam. It claims to display a full screen browser that cannot be minimized, prevents task switching, stops “over 400 screen capture, messaging,

Posted in Computer Science, Hacks, Cracks, and Attacks Tagged with: , , ,

Microsoft Office RC4 Decryption

Microsoft Office has several available cryptographic options for encrypting office documents. In the 97-2003 doc format the RC4 stream cipher with 40bit key is used by default. The 40 bit key was chosen at a time when export restrictions on

Posted in Computer Science, Hacks, Cracks, and Attacks Tagged with:

Cyber Attacks on Power Grid? Maybe, Maybe Not

I was debating posting something about this since I thought it was very chicken little, but it made it to slashdot again so my hopes of it dying quietly in the night are broken. The Wall Street Journal had a

Posted in Hacks, Cracks, and Attacks Tagged with: , ,