Smart Security Shop

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 28 November 2005

What is Blogging ?

Posted on 16:09 by Unknown
Hi,

Well many people asked me of what is this blogging all about...
And this is how I can define for you all...
Comments are always welcome..!!

Blogging
A blog is essentially a web application which contains periodic posts on a common webpage.
Blogging combines a personal web page with tools to allow comments to be left and to make linking to other pages and blogs and ‘trackbacks’ – a system that allows a blogger to see who has seen the original post and has written another entry concerning it.
Read More
Posted in Security | No comments

Failure to comply W3C...

Posted on 02:15 by Unknown
Hi,

The vast majority of public service websites in Europe are failing to meet international e-accessibility standards.

That's according to a report released by the UK EU presidency, which shows that a mere three per cent of public service websites are fully meeting the terms of the minimum accessibility requirements as stated by World Wide Web Consortium (W3C) guidelines.

Most of the websites fell down in the area of providing suitable text alternatives for images on their sites, with a large number of websites also failing to fully explain the relationship between frames on a website.

Seems, there is a trade-off somewhere ...

Regards,
Dharmesh.

Read More
Posted in Security | No comments

ISSAF Draft o.2 to be released soon...

Posted on 02:08 by Unknown
HI All folks,

As a part of ISSAF, it's nice to tell you all that the ISSAF (Information System Security Assessment Framework) Draft 0.2 will be available to you soon.

Watch out at http://www.oissg.org

My contribution includes the Web Application Security Assessments....:)

WRegs,

Dharmesh.


Read More
Posted in Security | No comments

Thursday, 24 November 2005

Free Software Foundation to take Gates to task...

Posted on 22:37 by Unknown

The Free Software Foundation Europe (FSFE) has filed a request with the European Union asking to get involved in an EU antitrust suit against Microsoft.

The Linux and Samba developer group has filed its request for leave to intervene in the case saying Microsoft's fiscal might is skewing the fight unfairly.

Georg Greve, president of FSFE, said in a statement: "The more Microsoft is able to purchase its opponents' solidarity, the more important FSFE's commitment to freedom and interoperability is."

Conversely, Microsoft has also been lobbying for new supporters in the case, asking big business to intervene on its side. Several opponents of Redmond, including the Computer and Communications Industry Association and Novell, dropped their objections following payouts from Microsoft.

Read More
Posted in Security | No comments

Friday, 18 November 2005

Myself....

Posted on 17:16 by Unknown



Read More
Posted in Security | No comments

New Sober Virus

Posted on 05:48 by Unknown
There are at least three new variants of the Sober worm spreading across the internet via email messages. The viruses are activated once a user clicks on an infected attachment.

Sober can hijack a Windows-based computer and force it to send spam emails. The continuous emailing can lead to overloaded servers and reduced network performance.
Read More
Posted in Security | No comments

Tuesday, 15 November 2005

Free desktop apps from Microsoft

Posted on 21:43 by Unknown
Microsoft is planning to to offer free, ad-supported versions of some of its desktop products.

Does it it make sense to release ad-supported versions of products such as Works, Money, or even the Windows operating system itself ?
Read More
Posted in Security | No comments

Monday, 14 November 2005

Google Analytics

Posted on 21:22 by Unknown
To track user behaviour to determine which features keep visitors on the site and which ones make them click away

Google Inc. plans to give away a set of analytic tools allowing Web developers, administrators and advertisers to fine-tune their sites including advertising.

The tools are intended to address a key aspect of successful Web sites, which is the ability to track user behaviour to determine which features keep visitors on the site and which ones make them click away.

Read More
Posted in Security | No comments

Apple versus Microsoft

Posted on 00:05 by Unknown
Running Microsoft Vista Beta 2, if I launch the QuickTime player, all applications running on the system lost their glass effect until I quit QuickTime.

Guess would be spite on the part of Steve Jobs...
Read More
Posted in Security | No comments

Sunday, 13 November 2005

ASP.NET __VIEWSTATE issues

Posted on 23:45 by Unknown

ASP.NET's extremely popular __VIEWSTATE functionality provides an automatic, uniform method for storing current state of all webpage "controls" (including form fields, database views, etc), so that user-entered data auto-magically persists and is populated across newly rendered HTML, and so that current selections of displayed database records are cached and do not need to be looked up again after every operation.


The data is by "typically" stored on client side as base64-encoded, hidden POST form field. By default, the field is protected from tampering by being "signed" using SHA1 with machine-specific key and - although not discussed by Microsoft - presumably either target .aspx filename or other file ID parameter.

The ASP.NET's __VIEWSTATE field has been found to be prone to replay attacks as well as denial of service vulnerabilities.

Read More
Posted in Security | No comments

internet Usage in India ??

Posted on 22:50 by Unknown
Looking at the figures in other countries like UK where the tech-savvy people (most of students and shoppers) have crossed the European countries in internet usage, I was wondering where would India rank in terms of people using internet.

Just over 60 per cent of Britons are now making use of the internet. While the UK beat the European average for internet usage, which stands at 47 per cent, it is far behind the Nordic digital leaders – both Iceland and Sweden boast an 82 per cent average.

Any idea what percentage of Indians use internet ?
Read More
Posted in Security | No comments

Friday, 11 November 2005

Information Systems Security Assessment Framework (ISSAF)

Posted on 00:46 by Unknown
I was looking for Security Assessment on Web and came across another Open Community called OISSG (Open Information Systems Security Group).

The ISSAF is OISSG's flagship project. It is an effort to develop an end-to-end framework for security assessment. The ISSAF aims to provide a single point of reference for professionals involved in security assessment; it reflects and addresses the practical issues of security assessment.

Being a member of OWASP Mumbai, I decided to participate in OISSG also. And I am looking forward to contribute at my best.

Regards,
Dharmesh.
Read More
Posted in Security | No comments

Thursday, 10 November 2005

Password hash lookup

Posted on 03:20 by Unknown
Came across this site: http://www.rainbowcrack-online.com

Rainbow Crack provide access to a huge db of hashes to common encryption and protocol functions (e.g. MD5, LANMAN etc) allowing the quicker retrival of plain text from hash values.

Im not too sure of its viability as a business model but what it does illustrate is the importance of salting hash values and considering 2 factor authentication.

Read More
Posted in Security | No comments

Wednesday, 9 November 2005

Alas !! The Creation of Smart Security Blog

Posted on 03:09 by Unknown
Finally, the creation of my new blog called "smartsecurity".
Hope to get it up soon...

Regards,
Dharmesh.
Read More
Posted in Security | No comments
Newer Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Preventing SQL Injection in Oracle
    There are three kinds of SQL literal: text, datetime, and numeric. Each deserves separate attention. Ensuring safety of Datetime literal Use...
  • Registrations for OWASP Mumbai Meet [31st July 15:00hrs]
    Hi All, Everyone is welcome to join us at our next chapter meet to be held on Monday , 31 st of July. Registrations for the eve...
  • Spam - It also impacts the environment
    McAfee has released The Carbon Footprint of Email Spam Report . The study looks at the global energy expended to create, store, view, and fi...
  • SQL Injection in Stored Procedure
    Let us examine SQL Injection in Stored Procedure. This would be 1 of the vulnerable cases. The Server Side Code would be something like: oCm...
  • OTP adoption from India to the US?
    One Time Password (OTP) is a password that is valid for only one login session. It is a popular authentication mechanism in India. It is ess...
  • Free Web Proxy List
    A web proxy is becoming more and more important in todays internet. Schools and Companys tend to block sites pretty quickly nowadays, especi...
  • How do you use RSA for both authentication and secrecy?
    RSA is based upon public key/private key concept. For authentication one can encrypt the hash (MD5/SHA) of the data with a private key. This...
  • SQL Injection in Stored Procedure : 2nd Case Study
    Stored procedure with dynamic SQL and embedded parameters The Stored Procedure Create proc authenticate (@uid nvarchar(25),@pwd nvarchar(25)...
  • New Rogue Security Product: Smart Antivirus 2009
    Smart Antivirus 2009 is a new rogue security product and a near clone of AntiSpyware 2008 Smart Antivirus 2009 Home page Typical fake/Scare ...
  • Does the code use MapPath?
    Review code for the use of MapPath. MapPath should be used to map the virtual path in the requested URL to a physical path on the server to ...

Categories

  • Account Lockout
  • Anti-XSS
  • Antivirus
  • Application Security
  • AppSec Conference
  • ASP.NET
  • Attacks
  • Authentication
  • Banks
  • Botnets
  • Break
  • Broadband
  • Browsers
  • Change Management
  • Citibank
  • Clear Text Secrets
  • Computer Performance
  • Computer Security
  • Credit Card
  • Cyber Security
  • Cyber Terrorism and Economy
  • Data Validation
  • Database Security
  • Defragmentation
  • Design
  • Developer Training
  • Development Tools
  • DSS
  • eCrime
  • Education
  • Encryption
  • Ettercap
  • Exchange 2007
  • facebook
  • Frauds
  • Google Hacking
  • Hacking
  • ICICI Bank
  • India Leaders
  • Internet
  • IRCTC
  • Java
  • Legal
  • Live Demo
  • Load Testing
  • Mail Security
  • Malware
  • Mastek
  • Message Security
  • Mobile Security
  • Money Laundering
  • News
  • one time password
  • Online
  • Oracle
  • OWASP
  • PC Errors
  • PCI
  • Performance Testing
  • Phishing
  • Popular Posts
  • Punishment
  • Requirement Engineering
  • Retail
  • Rouge
  • Routers
  • Rugged
  • Security
  • Security Industry
  • Security Management
  • Security Requirements
  • Security Tools
  • Sensitive Data
  • Sniffing
  • Social Networking
  • Software Industry
  • Solutions Community
  • Spams
  • SQL Injection
  • SSL
  • Sudhakar Ram
  • Summer of Code
  • SUN
  • Technology
  • Testing
  • Thick Client Security
  • Third Wave
  • Times of India
  • Typo Squatting
  • UI Security
  • University Programs
  • Virtual Keyboard
  • Virtualization
  • WCF 3.5
  • Web 2.0
  • Web Applications
  • Web Security
  • Web Services
  • WiFi
  • Windows
  • Workshops
  • X.509 Certificates
  • XSS

Blog Archive

  • ►  2011 (5)
    • ►  September (1)
    • ►  July (2)
    • ►  March (2)
  • ►  2010 (5)
    • ►  November (1)
    • ►  June (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2009 (19)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  May (1)
    • ►  April (4)
    • ►  March (2)
    • ►  February (2)
    • ►  January (2)
  • ►  2008 (29)
    • ►  December (7)
    • ►  November (2)
    • ►  September (3)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (3)
    • ►  January (4)
  • ►  2007 (29)
    • ►  December (2)
    • ►  November (3)
    • ►  October (11)
    • ►  September (5)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2006 (36)
    • ►  December (1)
    • ►  November (3)
    • ►  October (6)
    • ►  September (3)
    • ►  August (4)
    • ►  July (3)
    • ►  June (1)
    • ►  May (5)
    • ►  April (2)
    • ►  March (4)
    • ►  February (1)
    • ►  January (3)
  • ▼  2005 (20)
    • ►  December (6)
    • ▼  November (14)
      • What is Blogging ?
      • Failure to comply W3C...
      • ISSAF Draft o.2 to be released soon...
      • Free Software Foundation to take Gates to task...
      • Myself....
      • New Sober Virus
      • Free desktop apps from Microsoft
      • Google Analytics
      • Apple versus Microsoft
      • ASP.NET __VIEWSTATE issues
      • internet Usage in India ??
      • Information Systems Security Assessment Framework ...
      • Password hash lookup
      • Alas !! The Creation of Smart Security Blog
Powered by Blogger.

About Me

Unknown
View my complete profile