Infosec Blog

Information Security, Tips and Tricks

Friday, November 8, 2013

Adobe user database leak

›
While the media has been talking abuzz about Adobe data leak, the figure is staggering 153.9 million user ids. To be exact, the number is :...
2 comments:
Sunday, October 13, 2013

Do not trust Chinese routers, especially D-LINK – As they contain backdoor!

›
A group of researchers found a backdoor in a set of D-LINK routers. Well, not a news but expected and good to be uncovered. Does it call for...
3 comments:
Tuesday, February 12, 2013

Password creation – Tips and Myths

›
Not all use complex password. Us humans tend to use simple (read very simple) words for passwords (such as password) for most non critical l...
Friday, November 19, 2010

Diving into windows registry for forensic data

›
As a forensic examiner, looking at a cloned system for possible timestamps of a drive-by-download attack, windows registry has some small fo...
Wednesday, September 8, 2010

Installing IE8 without the usual update process, scanning and et all!

›
I recently had a requirement where I had to test an application in Internet Explorer 8, but the rig had only Windows XP SP2 with IE6. When ...
Wednesday, July 21, 2010

Truecrypt 7.0 gets Hardware Acceleration and more

›
Truecrypt - The free open source encryption tool which gives many commercial encryption tool providers to run for their money has once agai...
Tuesday, July 13, 2010

Netsparker provides Free Web Application Vulnerability Scanner! No strings attached!!

›
While companies charge a hefty amount for web vulnerability scanners, Netsparker has made a difference by offering one of the best vulnerabi...
11 comments:
›
Home
View web version
Powered by Blogger.