A quick write-up by Steven Hill of Covert Systems Research on several types of vulnerabilities in programs written in C and similar languages - stack/heap/function pointer overwrite, format string exploitation, return-to-libc. Announced in Steven's message to the vuln-dev mailing list.
Via Ask's Notes, a curious attempt at a font made out of corporate logos.
This is already nearly a month old, but still:
BOSTON (Reuters) - Facing stiff competition from nationwide coffee shop chains, one Maine businessman wants to offer more than just a regular cup of cappuccino to perk up his customers -- so he's hiring topless waitresses.
Steve Friedl gets his hands on a beta of Microsoft's Windows XP Service Pack 2, and says he likes it. Judging from his analysis, I think I'm going to like it too, when I get around to reading the whitepaper - but this is *not* going to happen at 11:50pm the day before I get to be best man at yet another friend's wedding :)
PS. Is this notes blog actually turning into my security-related stuff blog?
A nice write-up by The Register.
In a little-observed civil lawsuit involving tracking of magazine subscriptions, a federal court in Manhattan issued a ruling last week that could theoretically result in prosecutors going after people who use another person's password and userid with their permission, but without the permission of the issuer.