On reading about the new Asus N10J, it seems that it allows you to log in using your face:
Smart Technology – Quick Logons through Facial Recognition
Continuing with the tradition of breaking tradition, ASUS introduces a whole new way in which users logon to their computers—through facial recognition. The SmartLogon system detects the user’s face and … Read more »
Two pieces of malicious software affecting Apple’s Mac OS X appeared this week: a Trojan horse with the ability to download and install malicious code of an attacker’s choice, and a hacker tool for creating backdoors, according to security vendors.
The Trojan — called ‘OSX.RSPlug.D’ by Intego, the Mac security specialist that discovered the threat … Read more »
Following on from my post yesterday about reacting to critical updates…
It seems that no more than a day after Microsoft released a Critical Security update, someone’s released a Trojan into the wild that exploits the vulnerability.
Given the “exploit potential”, this one sounds relatively tame. I suspect it’ll only be a matter of time before the … Read more »
Yesterday evening, at 6pm BST, Microsoft released an ‘Emergency’ Security Update MS08-67, for Windows-based Operating Systems. The update plugs a hole in Windows that could allow a Virus/Worm to automatically infect a Windows PC without any user intervention.
I thought I’d document what actions I took, in case it helps out anyone in the future. I’d also be … Read more »
Using CentOS 5.2 or Red Hat Enterprise Linux 5, install and run Wireshark (formerly Ethereal) over the command line.
<kbd>yum install wireshark</kbd>
Run a capture:
<kbd>tethereal -i eth1 -w ~/mycapture.pcap</kbd>
This command will run Wireshark/Ethereal, capture on the eth1 interface and output the data to /yourhomedir/mycapture.pcap
Why would you want to do this? If you want to capture packets from a headless or remote Linux … Read more »