tssci security

Dell and Linux - Survey

Thanks to the amount of feedback on Ideastorm, Dell is seriously considering pre-installing Linux on desktop systems. Having had the chance to play with the Core 2 Duo systems Dell puts out, I can definitely say they are pimpin'. I want one, but my main concern is Linux hardware compatibility. I would like a stable desktop that runs Linux for a primary workstation, and these Dell's are my top choice.

Go to Dell.com/linuxsurvey and fill out the short survey to give them a better idea in what you're looking for in a Linux Desktop. If anything, giving average customers the option of choosing between "Windows Vista ($100)" or "Ubuntu Linux (free)" would greatly help spread mainstream Linux adoption.

Worst captcha - how about an insulting one?

I laughed when I saw the Worst Captcha Ever and just had to show the one I came across a couple months ago that was featured on the DailyWTF (now known as Worse Than Failure).

Too funny!

phx-owasp recap

Last night I attended my first Phoenix-OWASP meeting hosted at UAT. There were around 30 people in attendance from all backgrounds, including independent researchers, government agencies, private sector, and academia. Andre Gironda had a cool presentation (available in PDF) Reflections on Trusting the Same-Origin Policy. Adam Muntner, also in attendance is now a Trusted Catalyst/contributor to The Security Catalyst and starts off with a bang with 5 Questions to Ask Your Web Application Vendor

I enjoyed last nights meeting, getting to know a couple people, and look forward to meeting them again at ShmooCon and at the March 26 Arizona Security Practioner's Forum.

VERT Challenge #1 Progress

The folks at nCircle Blog have posted a VERT Challenge, and hopefully more to come. You can check out the details at their blog, but I'll be posting my progress here and we'll see how far I can get before I either a.) give up, or b.) someone else gets it, or c.) hopefully win!

Anyways the requirements are as so:

What you need to provide in order to win:

I have located both versions 1 and 2 of the the p2p software... I'll begin working on identifying them on the network soon. Stay tuned for further progress and good luck to anyone else participating.

OWASP-Phoenix Chapter Meeting

From the Owasp-phoenix mailing list:

This month we have an exciting technical talk discussing the Same-Origin Policy and attacks that attempt to break/circumvent these controls by security researcher Andre Gironda. The details of this month's meeting are below:

Where:

UAT - University of Advancing Technology (Entrance at the back of the building) 2625 West Baseline Road Tempe, Arizona 85283-1056

When:

6:30PM, Thursday, March 8th

Agenda:

6:30 to 6:45 News & Introductions 6:45 to 7:45 (1 hour): Reflections on Trusting the Same-Origin Policy – and other web+network trust issues – Andre Gironda, Independent Vulnerability Assessor / Researcher

In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin". It was designed to protect browsers from executing code from external websites, which could be malicious.

XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break?

7:45 to 8:00: Wrap up

8:00 Happy Hour/Social: Tilted Kilt 650 West Warner Road, Tempe AZ Google Maps

For more information on the OWASP-Phoenix chapter, check out Phoenox - OWASP Wiki entry

« Newer entries — 42 — Older entries »

blog comments powered by Disqus