-
LSYiPDT: Download Torrents to your home server from anywhere!
Really this needs no introduction more than this video can provide! One of the first products of the Android Bounty program hosted by Androidandme this not only blows the iPhone’s torrent (download to local storage) program out of the water but just shows the power of open source! And to think the bounty the developer…
-
Pen Testing with RUBY
It was in 2006 that the language known as RUBY was fully accepted as a standard language. The self described “open source programming language with a focus on simplicity and productivity” is one of the more powerful languages in use today. The folks over at Matasano Security (not affiliated with “matz” Y.Matsumoto the creator of…
-
LSYiPDT: Biometric Security Software
While the concept is pretty clear the development team is having some issue with resources ($$). You can read more about the concept first shown in the Android Dev Challenge at Androidandme.com. You can also show your support for the dev team by voting for them to help get some funding here. I am pretty…
-
New Category Added to SecurityPimp “LSYiPDT”
As an avid user of the Google Phone, and someone who LOVES the Android OS. We have added a new section to the site “LSYiPDT” or Let’s see your iPhone do this. Now it would be easy to point out the obvious tasks like run background apps, cut/paste, scan barcodes, last longer than 24hrs w/o…
-
Hack-A-Day: S-Video on your Atari 2600
Those cool guys at Hack-A-Day have a fun article on how to hack your old atari system to make it S-Video compatible thus making it actually usable without that old TV slider switch. I think this will be a good reference to perform a similar hack on my ancient Tandy PC that I really want…
-
Conflicted by Conflicker
As posted in the “Waiting for the Worms” article below the conflicker worm was MIA on April 1st along with all the Gloom N Doom forecasted by the IT security industry. There is an interesting article posted by SearchSecurity.com that talks about not only possible reasons for the fizzle of the worm but also the…
-
Article: How to evaluate and manage UTM for network security
Unified threat management (UTM) is a promising approach to consolidating security controls, including firewalls, intrusion prevention, anti-virus, content filtering, and reporting. Read More Here
-
SUN Java Runtime (JRE) Vulnerabilities
“Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.” Find out More Here
-
Waiting for the Worms
As anyone who have heard any news media source lately may already know. Today is April Fool’s Day, and also “worm” day. For those that are unfamiliar the worms first started back in 1988 and was released by accident (so the story goes) by a researcher named Robert Morris. Today this has evolved quite a…
-
Excerpt from “The Truth About Identity Theft”
It is common to read about various social engineering attack scenario’s in many of today’s IT security based books. None the less just like the need to constantly drill this information into the minds of the non tech users of many organizations. It makes for a better story when the scenario can be drawn from…