Blog Archives

IE Chart

Here is a great chart that show the Internet Explorer Vulnerabilities in 2006. Weather you are a IE hater or a lover this is a very interesting chart Check it out.

Posted in Security

Secure Passwords

These two comics are a very good example of how people do not pick very good passwords. Thank you

Posted in Computers, Security Tagged with:

SHA-1 cracked

An article in the Epoch Times (a Chinese newspaper) about a brilliant Chinese professor who has cracked her fifth encryption scheme in ten years. She and her team have cracked the SHA-1 scheme. As a result, the U.S. government and

Posted in Hacking, Security Tagged with:

Hacking Traffic Lights

I found this article on SC Magazine that reminded me of Hackers the movie because in the movie the hackers hack into the street lights so they have all green lights. Here is the article that can be found at

Posted in Hacking, Security

Gmail Security Issue

Google was using javascript to store Gmail address books while the user was logged in. As a result if a user is logged into Gmail, a malicious website could request your Gmail addressbook.Google has resolved this flaw, but it does point out the danger

Posted in Security Tagged with:

Top 100 Network Security Tools

I have read that you need to know security tools if you are going to break into the IT/ Network Security field. I have found this website The site ranks and updates the top 100 network security tools. This

Posted in Hacking, Security

Gmail Tips

I found this great little website that has 55 tips for Gmail. Check it out.

Posted in General, Security Tagged with:

Hacking Gift Cards

I read a recent post that detailed how to hack gift cards. The post shocked me how insecure the gift cards are. I hope the release of posts detailing how to hack gift cards will bring about a change in

Posted in Hacking, Security

Internet Anonymity

I have been playing with the TOR (the onion router) network for a while now. I like the anonymity that TOR provides but my problem was always portablity. The download you get from TOR you always had to install TOR, Vidalia,

Posted in Security

Bush’s Faith Based Firewall

Bush Proposes Faith-BasedFirewalls for Government Computers By Brian Briggs Washington D.C.’President Bush announced that by 2008 all government computers should be protected from outside attacks by the faith-based firewall called Protection From Above (PFA) from Houston-based software developer Christisoft. “For

Posted in Computers, Security