No Featured Image

Logging in through Facial Recognition…

On reading about the new Asus N10J, it seems that it allows you to log in using your face:

Smart Technology – Quick Logons through Facial Recognition
Continuing with the tradition of breaking tradition, ASUS introduces a whole new way in which users logon to their computers—through facial recognition. The SmartLogon system detects the user’s face and … Read more »

No Featured Image

If you buy a Mac because you think they can’t be infected…

Think again:
Two pieces of malicious software affecting Apple’s Mac OS X appeared this week: a Trojan horse with the ability to download and install malicious code of an attacker’s choice, and a hacker tool for creating backdoors, according to security vendors.
The Trojan — called ‘OSX.RSPlug.D’ by Intego, the Mac security specialist that discovered the threat … Read more »

No Featured Image

Security: Why it pays to be proactive

Following on from my post yesterday about reacting to critical updates…
It seems that no more than a day after Microsoft released a Critical Security update, someone’s released a Trojan into the wild that exploits the vulnerability.
Given the “exploit potential”, this one sounds relatively tame. I suspect it’ll only be a matter of time before the … Read more »

No Featured Image

Reacting to Super-Critical Updates (MS08-67)

Yesterday evening, at 6pm BST, Microsoft released an ‘Emergency’ Security Update MS08-67, for Windows-based Operating Systems. The update plugs a hole in Windows that could allow a Virus/Worm to automatically infect a Windows PC without any user intervention.
I thought I’d document what actions I took, in case it helps out anyone in the future. I’d also be … Read more »

No Featured Image

Install and run Wireshark on the command line (CentOS 5.2)

Using CentOS 5.2 or Red Hat Enterprise Linux 5, install and run Wireshark (formerly Ethereal) over the command line.
Install Wireshark:

Run a capture:

This command will run Wireshark/Ethereal, capture on the eth1 interface and output the data to /yourhomedir/mycapture.pcap
Why would you want to do this? If you want to capture packets from a headless or remote Linux … Read more »