Welcome to weblogs.com.pk Sign in | Join | Help

fakeGeek

Geek-ol-o-gy (n). See Geekology

May 2005 - Posts

Is Yare Programming better than eXtreme programming!!!!!!!
XP is a manipulative myth whileYare programming is interesting..doing woderfully well in Academia and industry as well..Following are Garfinkel's comments.. ".........YP is one step better than XP, just as Y follows X. It's the style of programming being Read More...

Posted Monday, May 30, 2005 8:13 AM by fakeGeek | 0 Comments

Filed under:

Bad guys are winning!!!
BusinessWeek has published an interesting article. Following are some interesting excerpts..... ".......There's a clear reason for this newfound collaboration: The bad guys are winning. They're stealing more money, swiping more identities, wrecking more Read More...

Posted Monday, May 30, 2005 8:07 AM by fakeGeek | 0 Comments

Filed under:

Interesting exploit and Little bit about Kerchoff's Principle!!!
Scammers are now trying to scam Microsoft Windows users...Exploit first finds text files on user's PC and then scrambles the text files by using unkown (Only known to attackers...) encryption method. Though this is not a secure and smart attack, because Read More...

Posted Tuesday, May 24, 2005 8:08 AM by fakeGeek | 0 Comments

Filed under:

A good Phishing paper....
Here is a good phishing paper that describes techniques and tools used by phishers. Read More...

Posted Monday, May 23, 2005 3:24 AM by fakeGeek | 0 Comments

Filed under:

Confused Xp
Windows XP might get confused if it is surrounded with multiple wireless networks...XP connects to the wireless network with the strongest signal...However XP is not that confused , you can make it work as you desire:) no flames.........Here is the lin Read More...

Posted Friday, May 20, 2005 3:40 AM by fakeGeek | 0 Comments

Interesting stats about Insider Attacks i.e. potential attackers within organization...
Interesting stats about potential insider attacks( Attacker wiithin organization..) can be found here . I have copied some interesting yet some overlooked issues as following i)-Part of that "unusual behavior" was no doubt a result of the employee trying Read More...

Posted Friday, May 20, 2005 3:22 AM by fakeGeek | 0 Comments

Filed under:

MySQL Hash Algorithm Suspicions....
There are on-going suspicisions in Security and Crypto communities about MySQL strange and mad implementation of hashing algorithm.....They have used their own algorithm which is pretty insane and a very bad idea by designers of an application that is Read More...

Posted Thursday, May 19, 2005 3:22 AM by fakeGeek | 0 Comments

Filed under:

Common Sense is common at google labs!!!!
Gmail has taken the world by storm. It has number of cool features. One of them is to report Phishing Attacks. Phishing attacks are kind of attacks if someone tries to manipulate as if he is a legitimate employee of some online/offline cooperation and Read More...

Posted Wednesday, May 18, 2005 3:55 AM by fakeGeek | 0 Comments

Strongest man in the world happens to be the weakest :)
In Sundays newspaper i read an interesting article. There is an interesting event that happened in the recent past in USA. President Bush had to attend Annual White House Correspondents Association Dinner alongwith her wife Laura Bush. Following are the Read More...

Posted Wednesday, May 18, 2005 1:43 AM by fakeGeek | 0 Comments

aint it funny??????????
i just came across James Gosling's Blog and found this Read More...

Posted Tuesday, May 17, 2005 3:27 AM by fakeGeek | 0 Comments

Charismatic Bio-Computing
I have just read a very interesting article here . People at MIT are doing impeccable research and this is what you call research, if you know what i mean. Anyways its a very interesting idea. I have copied key and interesting issues of the paper as following Read More...

Posted Tuesday, May 17, 2005 3:17 AM by fakeGeek | 0 Comments

Filed under:

SPIT ( Spam over Internet Telephony)
Schneier has published a thought provking article about SPIT. Here are the key issues "Spit has the potential to completely ruin VoIP. No one is going to install the system if they're going to get dozens of calls a day from audio spammers. Or, at least, Read More...

Posted Monday, May 16, 2005 3:20 AM by fakeGeek | 0 Comments

Filed under:

Hyper threaded model is harmful
A paper will be presented in Canada that would reveal a serious flaw in Hyper-Threaded Model. Paper can be found here . According to the author "Hyper-Threading, as currently implemented on Intel Pentium Extreme Edition, Pentium 4, Mobile Pentium 4, and Read More...

Posted Monday, May 16, 2005 2:47 AM by fakeGeek | 1 Comments

Filed under:

Attacks on IPSec
Attack applies to IPSec with ESP in tunnel mode if encryption is enabled and integrity check is disabled. Another applies to AH for some settings. In result, attacker can retreive some plaintext data using ICMP messages. Severity is high, details can Read More...

Posted Monday, May 16, 2005 2:30 AM by fakeGeek | 0 Comments

Filed under:

Microsoft Programming team Easter Egg!!!
There are few people who know cool things about their favourite operating system. While reading a book, Maximum security, i came across the following excerpt The Microsoft programming team easter egg: The Microsoft programming team easter egg is a program Read More...

Posted Sunday, May 15, 2005 5:52 PM by fakeGeek | 0 Comments

Filed under:

Self-Reproducing programs....
Self reproducing programs are those that take no input, and on compiling they output the sourcecode. What do you think :) Winner is the one who writes a program that can deceive the compiler producing no warnings and no program language violations. Program Read More...

Posted Sunday, May 15, 2005 4:03 AM by fakeGeek | 0 Comments

500-pound Gorilla named Google
Google is doing a whole lot of things. Gmail is a stroke of marketing genious, i mean look at the buzz invite-only feature has created. Google has also acquired Dodgeball , i think they have plans to incorporate this with Orkut. However, i can be wrong. Read More...

Posted Sunday, May 15, 2005 3:45 AM by fakeGeek | 0 Comments

Hack II6.0
If you think you have what it takes, jump on this bandwagon :)..You can win a free Xbox :) Read More...

Posted Friday, May 13, 2005 4:50 PM by fakeGeek | 0 Comments

Voice-enabled Passwords by Microsoft
Microsoft has come up with a good password security idea ( though it rarely happens :)...)...Security gurus Like Schneier think that this is a clever idea. Idea is to use Microsoft Speech Server and .NET framework to help resolve the problem of forgotten Read More...

Posted Friday, May 13, 2005 4:39 PM by fakeGeek | 1 Comments

Hashing Fucntions--MD5 or SHA
I am writing about Hashing Algorithms because someone recently posted a good article about Authentication. Most of the industry practioners do not take security seriously at all for no good reason. I think majority of the people store plaintext passwords Read More...

Posted Friday, May 13, 2005 2:00 AM by fakeGeek | 0 Comments

Hi all
Hi all, I was eager to join this great place where people can learn/share. It will be great fun to be a part of this profound learning center. Have fun. Read More...

Posted Friday, May 13, 2005 1:21 AM by fakeGeek | 1 Comments

 
Powered by Community Server (Personal Edition), by Telligent Systems