Monthly Archives: December 2004

Netcraft Releases Anti-Phishing Toolbar

Netcraft Releases Anti-Phishing Toolbar
Posted by michael on Thursday December 30, @10:40AM
from the safety-first dept.

AgainstHate writes “Netcraft has released an Anti-Phishing Toolbar that provides detailed information about the website you are visiting (sites’ hosting location, country, longevity and popularity) at all times to help users to validate fraudulent URLs. It also natively traps cross site scripting and other suspicious URLs. The toolbar also enables users to report phishing attacks to Netcraft, thus blocking any other unsuspecting users from being harmed (Netcraft supervisor validation is used to contain the impact of any false reporting). Currently the toolbar is only available for IE but a Firefox version is under development.”

Slashdot article
Netcraf Toolbar

The Definitive Guide to Plone

A company without a Web site is unthinkable — and most companies and organizations have more than one site. Whether it’s an external site for communicating with clients, an intranet for employees to use, or a site for direct client communication and feedback, all Web sites have a common problem — how to manage the content on them. This is a challenge that can often cost organizations large amounts of time and effort. Producing a powerful yet flexible system for these sites that meets ever-changing requirements while growing to meet your company’s emerging needs isn’t easy.

The Definitive Guide to Plone by Andy McKay

SuprNova dead – long live SuprNova

http://www.theregister.co.uk/2004/12/19/suprnova_stops_torrents/

but

http://www.slyck.com/news.php?story=616

The BitTorrent tracker, similar to a central server, has been the great weakness of any P2P network. Although BitTorrent trackers do not operate identically to indexing servers, they still act like traffic cops – directing traffic to their intended destination. SuprNova.org, while not a tracker per se, still operates as a impromptu tracker as it points traffic to the actual tracker. Regardless, the bandwidth consumption remains enormous. This equates to prolonged searches, lengthy load times and other typical slow downs associated with the World Wide Web.
Continue reading

RSSCalendar

RSSCalendar is an exciting new way for individuals and organizations to share their calendars with family, friends, and co-workers – utilizing the latest in “Really Simple Syndication” (RSS) technology, including RSS channel creation and aggregation. Not only is RSSCalendar easy to use but it is also easy to administer, and setup is a snap. RSSCalendar is well-suited for a variety of uses.

http://www.rsscalendar.com/

Well spotted Simon.

another fine mess…

IT: New Spoofing Vulnerability in IE

Posted by CowboyNeal on Thursday December 16, @07:57PM
from the url-b-gone dept. (slashdot.org)

Jimmy M. writes “A new vulnerability has been announced in Internet Explorer, also affecting XP SP2, which can very easily be exploited by a malicious web site to completely spoof the address bar. The vulnerability is very similar to another vulnerability disclosed just about a year ago called the ‘%00’ vulnerability, which also was widely exploited by phishers. A demonstration is also available.”

http://secunia.com/

Web Tools Freeware

In our Webmaster Stuff section you will find free online tools and webmaster articles and tips. Also, we have, Freeware for webmasters and a recently added section which gives details and examples of the Free content such as games, cartoons and articles which you can add to your web site.

http://janim.net/

A CD based on Cygwin for X Windows forwarding via ssh

XLiveCD allows users of Microsoft Windows to connect to remote Unix computers, run graphical applications and have the graphics displayed on their desktops. The software runs from the CD without being installed. XLiveCD was prepared by University Technology Services to facilitate use of research Unix systems at Indiana University by Windows users on campus.

http://xlivecd.indiana.edu/

Tor: an anonymous Internet communication system

Tor is a toolset for a wide range of organizations and people who want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Your traffic is safer when you use Tor because communications are bounced around a distributed network of servers called onion routers — this makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor’s technology aims to provide Internet users with protection against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.

http://tor.freehaven.net/

Trusted Computing Group & Active Counter Measures

18:30 (onwards) Arrive (Cabot, Building 3, HP Labs)

18:45 Buffet available

19:30 Introduction
Martin Sadler, Director, Trusted Systems Lab, HP Labs.

19:35 Talk 1
Graeme Proudler, Trusted Systems Lab, HP Labs Bristol, and Trusted
Computing Group. Graeme is the Chair of the TCG Technical Committee and
a leading authority on the work of the Trusted Computing Group and the
development of the TCG (formally TCPA) specification for the Trusted
Platform Module. Graeme will be introducing concepts related to trusted
computing.

20:15 Talk 2
Richard Smith, Trusted Systems Lab, HP Labs Bristol.
Network Security
Rich will be talking about some of the new network security initiatives
being pursued in Labs intended to counter latest threats and system
vulnerabilities. Rich will include a review of HP’s Active
Countermeasures and Corporate Immune System.

21:00 Q&A Session followed by wrap-up

http://www.hpl.hp.com/research/