Wastholm.com

Unlike those disk encryption attacks we saw that required a reboot, Boileu's attack works while the target computer is running, tricking Windows into allowing full write access to RAM and then corrupting the password protection code.

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard.

A firewire device can read (and write) to a computer’s main memory by accessing a system’s DMA controller, while the operating system, be it Windows, Mac OS, Linux, a Multiple Independent Levels of Security kernel, etc., is oblivious to the event.

If you don’t run anti-virus on your Linux boxes, we would like to invite you to run a tiny rudimentary scanner we have developed whose sole job is to look for Linux/Rst-B infections.

Mixminion is the reference implementation of the Type III Anonymous Remailer protocol.

TorK is a powerful anonymity manager for the KDE Desktop on Linux and Unix systems. It first helps you to

install, configure and use Tor. It then reduces the task of anonymizing most applications to a single-click, including Firefox, Opera, Konqueror, Pi

I have checked every single of these configurations with Ethereal to ensure that the traffic is really anonymized. However, if you are paranoid, you shouldn't trust me, but rather test this stuff for yourself!

Bookmark

OpenDNS

www.opendns.com/, posted 2008 by peter in free privacy security

OpenDNS protects millions of people a day across hundreds of thousands of schools, businesses and homes as they navigate the Internet. We block phishing sites and give you the power to block adult sites, proxies and individual domains.

MUTE File Sharing is a peer-to-peer network that provides easy search-and-download functionality while also protecting your privacy.

ENTROPY is developed as a response to increasing censorship and surveillance in the internet. The program connects your computer to a network of machines which all run this software. The ENTROPY network is running parallel to the WWW and also other intern

|< First   < Previous   211–220 (222)   Next >   Last >|