Victor's Blog about the Web, Security and Life

The web for me is a hobby where standards and best practices are daily bread. Security is a concern that everybody must be aware of its details for IT in general, and the web in particular, to be a safer place. My life, on the other hand, is that of a regular Lebanese citizen where politics and social issues are discussed on a daily basis. I hope you enjoy reading my blog and make sure to drop me a comment about any topic you find interesting.

Category: Security

Bird Flu Abuse: A Broken Trust Chain Problem

As the bird flu problem gets closer and closer to Lebanon, I have been informed of some people making use of the safeless state that people are going through to achieve success in other illegal actions such as theft, drug abuse, rapes, etc. This message is of two parts: The first is...

How Does the Visual Code work?

Another interesting question that I received was about how the Visual Code protection works? I will try to explain it here in brief for the curious researcher.   (More)

Is Spamming a Security Breach?

I received some interest emails from readers regarding the relation between Spamming and Security breaches. In summary, some of these emails thought about spamming comments as a security breach related to Denial of Service attacks where the space is "filled" up by bogus messages. I...

A Nice Try Dangerous for Security Beginners!

Many emails are sent daily claiming that a certain website is another website. This usually occurs the most with Paypal.com (a website that I sometimes use to accept payments). Intruders will send emails holding Paypal logos asking users to verify their account. The link (a normal HTML link)...

OSSTMM

The open source security testing methodology manual can be download from here .

Common Criteria

The common criteria redbook can be found here: http://www.commoncriteriaportal.org/ The latest official version can be found here . The latest unoffical release is still pending for public consulation (non-standard) and can be found by clicking on the download link .

Hacking the Papal Election

This is an amazing article by my favourite Bruce Schneier sent in his April's CryptoGram Newsletter. The rules for papal elections are steeped in tradition, and were last codified on 22 Feb 1996. The document is well-thought-out, and filled with details. The article elaborates on the...
«Previous   1 2 3 4  Next»
 
Accessible and Valid XHTML 1.0 Strict and CSS