An article in Bulgarian by sheib, outlining the basics of some of the most common attacks against PHP applications and ways to protect against them. Mentioned in the Network Security course forum.
A quick write-up by Steven Hill of Covert Systems Research on several types of vulnerabilities in programs written in C and similar languages - stack/heap/function pointer overwrite, format string exploitation, return-to-libc. Announced in Steven's message to the vuln-dev mailing list.
Via Ask's Notes, a curious attempt at a font made out of corporate logos.
A comment at a Linux.com article on shell scripting for newbies led me to what looks like a nice shell scripting tutorial, albeit bash-oriented.
This is already nearly a month old, but still:
BOSTON (Reuters) - Facing stiff competition from nationwide coffee shop chains, one Maine businessman wants to offer more than just a regular cup of cappuccino to perk up his customers -- so he's hiring topless waitresses.
The full story from Reuters, via VarChars.
Steve Friedl gets his hands on a beta of Microsoft's Windows XP Service Pack 2, and says he likes it. Judging from his analysis, I think I'm going to like it too, when I get around to reading the whitepaper - but this is *not* going to happen at 11:50pm the day before I get to be best man at yet another friend's wedding :)
PS. Is this notes blog actually turning into my security-related stuff blog?
A nice write-up by The Register.
In a little-observed civil lawsuit involving tracking of magazine subscriptions, a federal court in Manhattan issued a ruling last week that could theoretically result in prosecutors going after people who use another person's password and userid with their permission, but without the permission of the issuer.
An article from The Register, which pretty much mirrors my thoughts on the general public's blissful ignorance and irresponsibility regarding even the most trivial IT security issues.