Netcraft Releases Anti-Phishing Toolbar

Netcraft Releases Anti-Phishing Toolbar
Posted by michael on Thursday December 30, @10:40AM
from the safety-first dept.

AgainstHate writes “Netcraft has released an Anti-Phishing Toolbar that provides detailed information about the website you are visiting (sites’ hosting location, country, longevity and popularity) at all times to help users to validate fraudulent URLs. It also natively traps cross site scripting and other suspicious URLs. The toolbar also enables users to report phishing attacks to Netcraft, thus blocking any other unsuspecting users from being harmed (Netcraft supervisor validation is used to contain the impact of any false reporting). Currently the toolbar is only available for IE but a Firefox version is under development.”

Slashdot article
Netcraf Toolbar

The Definitive Guide to Plone

A company without a Web site is unthinkable — and most companies and organizations have more than one site. Whether it’s an external site for communicating with clients, an intranet for employees to use, or a site for direct client communication and feedback, all Web sites have a common problem — how to manage the content on them. This is a challenge that can often cost organizations large amounts of time and effort. Producing a powerful yet flexible system for these sites that meets ever-changing requirements while growing to meet your company’s emerging needs isn’t easy.

The Definitive Guide to Plone by Andy McKay

SuprNova dead – long live SuprNova

http://www.theregister.co.uk/2004/12/19/suprnova_stops_torrents/

but

http://www.slyck.com/news.php?story=616

The BitTorrent tracker, similar to a central server, has been the great weakness of any P2P network. Although BitTorrent trackers do not operate identically to indexing servers, they still act like traffic cops – directing traffic to their intended destination. SuprNova.org, while not a tracker per se, still operates as a impromptu tracker as it points traffic to the actual tracker. Regardless, the bandwidth consumption remains enormous. This equates to prolonged searches, lengthy load times and other typical slow downs associated with the World Wide Web.
Continue reading

RSSCalendar

RSSCalendar is an exciting new way for individuals and organizations to share their calendars with family, friends, and co-workers – utilizing the latest in “Really Simple Syndication” (RSS) technology, including RSS channel creation and aggregation. Not only is RSSCalendar easy to use but it is also easy to administer, and setup is a snap. RSSCalendar is well-suited for a variety of uses.

http://www.rsscalendar.com/

Well spotted Simon.

another fine mess…

IT: New Spoofing Vulnerability in IE

Posted by CowboyNeal on Thursday December 16, @07:57PM
from the url-b-gone dept. (slashdot.org)

Jimmy M. writes “A new vulnerability has been announced in Internet Explorer, also affecting XP SP2, which can very easily be exploited by a malicious web site to completely spoof the address bar. The vulnerability is very similar to another vulnerability disclosed just about a year ago called the ‘%00’ vulnerability, which also was widely exploited by phishers. A demonstration is also available.”

http://secunia.com/

Web Tools Freeware

In our Webmaster Stuff section you will find free online tools and webmaster articles and tips. Also, we have, Freeware for webmasters and a recently added section which gives details and examples of the Free content such as games, cartoons and articles which you can add to your web site.

http://janim.net/

A CD based on Cygwin for X Windows forwarding via ssh

XLiveCD allows users of Microsoft Windows to connect to remote Unix computers, run graphical applications and have the graphics displayed on their desktops. The software runs from the CD without being installed. XLiveCD was prepared by University Technology Services to facilitate use of research Unix systems at Indiana University by Windows users on campus.

http://xlivecd.indiana.edu/

Tor: an anonymous Internet communication system

Tor is a toolset for a wide range of organizations and people who want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Your traffic is safer when you use Tor because communications are bounced around a distributed network of servers called onion routers — this makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor’s technology aims to provide Internet users with protection against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.

http://tor.freehaven.net/

Trusted Computing Group & Active Counter Measures

18:30 (onwards) Arrive (Cabot, Building 3, HP Labs)

18:45 Buffet available

19:30 Introduction
Martin Sadler, Director, Trusted Systems Lab, HP Labs.

19:35 Talk 1
Graeme Proudler, Trusted Systems Lab, HP Labs Bristol, and Trusted
Computing Group. Graeme is the Chair of the TCG Technical Committee and
a leading authority on the work of the Trusted Computing Group and the
development of the TCG (formally TCPA) specification for the Trusted
Platform Module. Graeme will be introducing concepts related to trusted
computing.

20:15 Talk 2
Richard Smith, Trusted Systems Lab, HP Labs Bristol.
Network Security
Rich will be talking about some of the new network security initiatives
being pursued in Labs intended to counter latest threats and system
vulnerabilities. Rich will include a review of HP’s Active
Countermeasures and Corporate Immune System.

21:00 Q&A Session followed by wrap-up

http://www.hpl.hp.com/research/

PING! Open Source Federated Identity Management

Ping Identity Pre-Announces Hostile Takeover of Microsoft in 2050

The plan, as laid bare by Ping’s CEO Andre Durand, is as follows:

1. Hit a yearly revenue of $100 million
2. Grow that to a yearly revenue of $1 billion
3. Grow that to a yearly revenue of $100 billion (and go public somewhere in there).
4. Assume that Microsoft’s star has faded some and launch takeover efforts.”

http://www.andredurand.com/
http://www.sourceid.org/

Visual Thinking

Some people produce characteristic, recurring writing problems as a result of inappropriately applying visual thinking to writing. This paper proposes that the writing problems of such visual thinkers derive from three factors:

a lack of words,
unfamiliarity with the kind of analysis that leads to the logical sequencing of prose, and
difficulty understanding that context must be communicated.

http://www.longleaf.net/ggrow/WriteVisual/WriteVisual.html
Continue reading

Bush for president? You bet!

Bush for president? You bet!

By James Arnold
BBC News business reporter

The polls were off-beam, the pundits were caught napping, the press didn’t cover itself in glory – did anyone confidently predict the result of the US election?

The gambling community, perhaps. A glance at the returns of some of the world’s biggest betting exchanges shows that President George W Bush remained a clear favourite with punters right down to the wire.

On the Iowa Electronic Markets (IEM), run by the University of Iowa as a forum for experimental online betting, participants gave Mr Bush a 51.2% chance of re-election on the eve of the poll – a score that tallied precisely with his eventual share of the popular vote, at the last count.

Indeed, electronic gambling is proving so uncanny a predictor of everything from oil prices to football results, that experts reckon it could be harnessed for more wholesome purposes than making money.

http://news.bbc.co.uk/1/hi/business/3982073.stm

Iowa Electronic Markets (IEM)

http://www.tradesports.com/

Beat spam using hashcash

If they want to send spam, make them pay a price
Level: Intermediate

David Mertz, Ph.D. (mertz@gnosis.cx)
Developer, Gnosis Software, Inc.
09 Nov 2004

Built on the widely available SHA-1 algorithm, hashcash is a clever system that requires a parameterizable amount of work on the part of a requester while staying “cheap” for an evaluator to check. In other words, the sender has to do real work to put something into your inbox. You can certainly use hashcash in preventing spam, but it has other applications as well, including keeping spam off of Wikis and speeding the work of distributed parallel applications. In this article, you’ll meet David’s own Python-based hashcash implementation.

HashCash article continued

HashCash

Circling the wagons: the net politics of exclusion

By Will Davies
Published Monday 8th November 2004 18:36 GMT

Election 2004 Here’s a fable. In summer 2004, a vacancy comes up in a London office, and the manager sets about recruiting. He interviews a blue man and a green man. The blue man has impeccable qualifications and very good experience. The green man’s qualifications are weak, and he is under-experienced – but he’s witty and he gets on well with the manager.

After more background research, the manager reflects on their qualifications and experience, and he also reflects on their personalities and reputations. He decides that although the blue candidate is clearly better on paper, that he got on so well with the green candidate, that he will give him the job. He reckons he’ll fit in well, despite the fact that he isn’t an especially strong candidate. That’s the politics of groups for you.

http://www.theregister.co.uk/2004/11/08/net_politics_of_exclusion/

Open Source Currency

Or, how mobile phones can break the money monopoly.

In the midst of discussing wireless data business plans, cell phone technology developments, and the moment-to-moment success of the mobile media industry, it’s sometimes easy to forget the bigger picture. Just as early Internet enthusiasts seemed to focus on ad banners and animated GIFs instead of what turned out to be the much more momentous power of blogs to influence the direction of culture, those of us covering mobile data may have also taken our eyes off the bigger prizes in store for this new medium.

http://www.thefeature.com/article?articleid=101119

PayCircle

Int’l Jrnl o Community Currency Research

Case ID – 199-Eye WF 213 589. 199

This transcript is produced from the teletext subtitles that are generated live for Newsnight. It has been checked against the programme as broadcast, however Newsnight can accept no responsibility for any factual inaccuracies. We will be happy to correct serious errors.

Has someone been sitting on the FBI? 6/11/01

GREG PALAST:
The CIA and Saudi Arabia, the Bushes and the Bin Ladens. Did their connections cause America to turn a blind eye to terrorism?

UNNAMED MAN:
There is a hidden agenda at the very highest levels of our government.

JOE TRENTO, (AUTHOR, “SECRET HISTORY OF THE CIA”):
The sad thing is that thousands of Americans had to die needlessly.

PETER ELSNER:
How can it be that the former President of the US and the current President of the US have business dealings with characters that need to be investigated?

PALAST:
In the eight weeks since the attacks, over 1,000 suspects and potential witnesses have been detained. Yet, just days after the hijackers took off from Boston aiming for the Twin Towers, a special charter flight out of the same airport whisked 11 members of Osama Bin Laden’s family off to Saudi Arabia. That did not concern the White House.

Their official line is that the Bin Ladens are above suspicion – apart from Osama, the black sheep, who they say hijacked the family name. That’s fortunate for the Bush family and the Saudi royal household, whose links with the Bin Ladens could otherwise prove embarrassing. But Newsnight has obtained evidence that the FBI was on the trail of other members of the] Bin Laden family for links to terrorist organisations before and after September 11th.

This document is marked “Secret”. Case ID – 199-Eye WF 213 589. 199 is FBI code for case type. 9 would be murder. 65 would be espionage. 199 means national security. WF indicates Washington field office special agents were investigating ABL – because of it’s relationship with the World Assembly of Muslim Youth, WAMY – a suspected terrorist organisation. ABL is Abdullah Bin Laden, president and treasurer of WAMY.
Continue reading

Letters Only LM Hash Database

Posted by CmdrTaco on Tuesday November 02, @12:19PM
from the need-new-security dept.
Peter Clark writes “Disk storage has increased tremendously in the past 5 years and the blatant insecurities in the antiquated LM hashing technique have not gone away; though functionality has been added to disable LM hashes, this is not set by default. With some help from Elcomsoft, simple flat files have been created that hold every combination of LM hash for letters only passwords. Jesko has coded a server application which allows you to access this database. Simply telnet to: beginningtoseethelight.no-ip.org on port 2501 and paste in a LM hash. So how does this differ from Rainbow tables? Well this will return a password 100% of the time, using minimal processor power, in approximately less than 0.2 seconds.”

http://it.slashdot.org/it/04/11/02/1523212.shtml?tid=93

Distributed Universal Number Discovery

DUNDi is a peer to peer system for locating Internet gateways to telephony services. Unlike traditional centralized services (such as the remarkably simple and concise ENUM standard), DUNDi is fully distributed with no centralized authority whatsoever.

DUNDi is not itself a Voice over IP signalling or media protocol. Instead, it publishes routes which are in turn accessed via industry standard protocols such as IAX, SIP and H.323.

http://www.dundi.com/

UK rings up new ‘real phone’ VoIP service

By Tim Richardson
Published Wednesday 13th October 2004 12:55 GMT

A German company has launched a new internet telephony service in the UK which offers cheap calls and uses “geographical” numbers.

The Sipgate service is now available in ten UK cities – Belfast, Birmingham, Cardiff, Edinburgh, Glasgow, Leeds, London, Liverpool, Manchester and Newcastle – using existing area codes. Sipgate is also planning to make the service available in other area code regions over the next six months.

In full here:
theregister