Michal Wegrzyn informed me about new and interesting project on http://vsl.sourceforge.net/. That is new steganographic tool. Name of tool is Virtual Steganographic Laboratory (VSL). It is a graphical block diagramming tool that allows complex using, testing and adjusting of methods … Continued
After quite some time of silence regarding my work on Wireless Intrusion Detection and Prevention Systems (WIDS / WIPS), I’m considering continuing that work. In past I have done research, published couple of papers on this topic at conferences and journals and also created concept, basic architecture and design of system and products. This possible “reactivating” of work is particularly pushed by recent interest of companies, organizations and institutions including commercial, government etc, and requirements of many production environments.
This is just brief description. If you are interested in more details or want to consider contribution or investment into this development send me e-mail.
There is new poll on this blog. Question is “Which antivirus software do you use?”
Thank you for voting.
Google released Ratproxy – passive web application security assessment tool. It is released under terms and conditions of the Apache License, version 2.0. Here is Google’s description of tool: Ratproxy is a semi-automated, largely passive web application security audit tool. … Continued
Microsoft IPsec Diagnostic Tool assists Network administrators with troubleshooting network related failures, focusing primarily on IPsec. It is applicable on Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008. This tool download is available to customers running genuine Microsoft … Continued
Insecure.org has Top 100 Network Security Tools list. Author says: Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also … Continued
If you think your passwords are strong enough, think twice. They are probably not. Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with … Continued
Application Verifier is nice tool, designed in Microsoft, specifically to detect and help debug memory corruptions and critical security vulnerabilities. It makes it easier to create reliable applications by monitoring an application’s interaction with the Windows operating system, profiling its … Continued
IEEE Security and Privacy, issue July/August 2007 (Vol. 5, No. 4), has interesting article Encryption: Security Considerations for Portable Media Devices (subscription required). Abstract With the proliferation of removable media devices, such as iPods and USB drives, large amounts of an … Continued
Michael Howard’s talks about SDL Crypto Code Review at his blog. He says: When I review code for security bugs I basically do the following: 1) Run static analysis tools and compile with /W4 to see which source code files … Continued