I guess I'm back to this blogging thing- I mean, many people ask for certain sites or just simply ask "where the hell did you find that?". I mean, I browse the web relatively lot and run across a bunch of things that may interest also many of my friends. (And besides, who can remember those long URL's anyway).
I just noticed that every cookie that is accecpted by your computer goes to C:\Windows\Temporary Internet Files\ (by using the default installation). IBM short FAQ about cookies states that they're not considered to be dangerous. Maybe so, what exactly what information does a cookie include? (You know, I've never looked that up).
And while we're talking about surveilance, take a look of legal software called Spector that monitors the typed words, url's and basically everything you do on a workstation. Pretty frightening, huh?
I'm currently interested about computer security issues. Using my firewall I noticed that certain machines in my network tend to send me UDP packages. I asked should this be considered as attack attempt, and the answer was: "it depends". Usually these packages are sent by misconfiguration of Windows and they're seeking network printers etc. If it is a broadcast- type message, it is not to be considered a attempted port abuse.
I'd like to try some of the hacking tools, since you have to know how to steal in order to prevent it, yet trying those tools out in my network could cause me a lot of trouble, so I think I'll have to build my own network and hack my own computers to learn how this stuff works and how it is done.
I just noticed that every cookie that is accecpted by your computer goes to C:\Windows\Temporary Internet Files\ (by using the default installation). IBM short FAQ about cookies states that they're not considered to be dangerous. Maybe so, what exactly what information does a cookie include? (You know, I've never looked that up).
And while we're talking about surveilance, take a look of legal software called Spector that monitors the typed words, url's and basically everything you do on a workstation. Pretty frightening, huh?
I'm currently interested about computer security issues. Using my firewall I noticed that certain machines in my network tend to send me UDP packages. I asked should this be considered as attack attempt, and the answer was: "it depends". Usually these packages are sent by misconfiguration of Windows and they're seeking network printers etc. If it is a broadcast- type message, it is not to be considered a attempted port abuse.
I'd like to try some of the hacking tools, since you have to know how to steal in order to prevent it, yet trying those tools out in my network could cause me a lot of trouble, so I think I'll have to build my own network and hack my own computers to learn how this stuff works and how it is done.
