root labs rdist - Nate Lawson blog
http://rdist.root.org/ blog by Nate Lawson, a good blog to follow if you are interested in InfoSec
http://rdist.root.org/ blog by Nate Lawson, a good blog to follow if you are interested in InfoSec
http://justanothergeek.chdir.org/2011/01/linux-security-one-year-later.html review of the security related things that happened in the linux kernel circles in 2010.
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf Most complete research on stuxnet comes from Symantec in a form of their paper called “W32.Stuxnet Dossier”.
http://www.symantec.com/connect/blog-tags/w32stuxnet Blog posts from Symantec tagged as ‘stuxnet’ – most current research on the topic usually announced there.
http://www.immunityinc.com/products-canvas.shtml Immunity Debugger, vulns, sploits, and other good stuff
http://vrt-sourcefire.blogspot.com/2010/09/introduction-to-clamavs-low-level.html [some notes on] How to use clamav built-in JIT byte-code interpreter to create new viri signature definitions.
http://n3on.org/projects/reCAPTCHA/ A paper [presented @ DEFCON 2010] describing algorithm to solve reCAPTCHA ( http://reCAPTCHA .net )
http://recursion.com/interpolique.html in 3 lines Dan’s method is:
http://erratasec.blogspot.com/2010/06/cyberwar-is-fiction.html “The conflicts between nation states in cyberspace are nothing like warfare, and the tools hackers use are nothing like weapons. However, this fiction is what is driving national policy, and that worries me a lot. I feel this cluelessness is a bigger danger to cyberspace than foreign hackers.” , by Robert Graham
http://panopticlick.eff.org/index.php?action=log&js=yes a project from Electronic Frontier Foundation. Tests your web browser’s signature by checking user-agent string, browser plug-ins, HTT_ACCEPT, etc