Errata Security: Cyberwar is fiction

http://erratasec.blogspot.com/2010/06/cyberwar-is-fiction.html “The conflicts between nation states in cyberspace are nothing like warfare, and the tools hackers use are nothing like weapons. However, this fiction is what is driving national policy, and that worries me a lot. I feel this cluelessness is a bigger danger to cyberspace than foreign hackers.” , by Robert Graham

Panopticlick | How unique is your browser?

http://panopticlick.eff.org/index.php?action=log&js=yes a project from Electronic Frontier Foundation. Tests your web browser’s signature by checking user-agent string, browser plug-ins, HTT_ACCEPT, etc

[ENG ]Xen vs. KVM security architecture comparison [from forum.opennet.ru - "Qubes - новая безопасная операционная система на базе Linux ..."]

http://www.opennet.ru/openforum/vsluhforumID3/65661.html#23 Notes (exert) from Joanna Rutkowska recent paper comparing KVN and XEN architectures from security and design standpoint

robtex- swiss army knife internet network information tool

http://www.robtex.com/ websites that provides a lot of useful info, like RBL (Relay Black Lists ), DNS, AS, BGP, etc

Running 10M nodes linxu network for malware research /Security [LWN.net] artcile /

http://lwn.net/Articles/377391/ Article covers SCALE8x presentation from Ronald Minnich /Scandia Nat. Labs/ about issues involved running large scale networks [ >10M nodes ] . Article contains a lot of useful links, recommended reading.

GreenSQL | Open Source Database Security, SQL Injection Prevention

http://www.greensql.net/ SQL-proxy/filtering software for MySQL and PostgreSQL databases, used to prevent SQL-injection-like attacks, filter-out dangerous SQL, etc

CCC-TV - 26C3: Here be Dragons (1/3)

http://media.ccc.de/browse/congress/2009/index.html Video archive for Chaos Communications Congress 2009 (CCC - a well-knows security conference )

Default Password List

http://www.phenoelit-us.org/dpl/dpl.html default passwords list for various hardware devices

Understanding the TLS Renegotiation Attack - Educated Guesswork

http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html explains Marsh Ray’s attack in details, pls patch to fix the TLS protocol

Electric Alchemy: Cracking Passwords in the Cloud: Breaking PGP on EC2 with EDPR

http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html article tells you that using elcomsoft tools, you can brute-force PGP pass-phrase in ~120 days for ~$9K on 10 EC2 instances.