<?xml version="1.0"?>
<rss version="2.0" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:yt="http://gdata.youtube.com/schemas/2007" xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
      <title>Belgian Security Blognetwork</title>
      <description>A mashup of Belgian security blogs on the net.</description>
      <link>http://pipes.yahoo.com/pipes/pipe.info?_id=847cda2247953262b75989c050f59eee</link>
      <atom:link rel="next" href="http://pipes.yahoo.com/pipes/pipe.run?_id=847cda2247953262b75989c050f59eee&amp;_render=rss&amp;page=2"/>
      <pubDate>Thu, 01 Oct 2015 23:05:22 +0000</pubDate>
      <generator>http://pipes.yahoo.com/pipes/</generator>
      <item>
         <title>Dump Tools: Cut Cut Cut … [Didier Stevens]</title>
         <link>http://blog.didierstevens.com/2015/09/29/dump-tools-cut-cut-cut/</link>
         <description>I added a new option to my different dump tools (oledump, emldump, base64dump, zipdump and the new rtfdump): the cut option. And I will also release a standalone cut tool. This option allows you to cut out a part of a data stream. For example to extract a PE file hidden in a byte stream. [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=blog.didierstevens.com&amp;#038;blog=264765&amp;#038;post=4283&amp;#038;subd=didierstevens&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://blog.didierstevens.com/?p=4283</guid>
         <pubDate>Tue, 29 Sep 2015 00:00:04 +0000</pubDate>
         <content:encoded><![CDATA[<p>I added a new option to my different dump tools (oledump, emldump, base64dump, zipdump and the new rtfdump): the cut option. And I will also release a standalone cut tool.</p>
<p>This option allows you to cut out a part of a data stream. For example to extract a PE file hidden in a byte stream.</p>
<p>The first updated tool to get published is oledump:</p>
<p><a rel="nofollow" target="_blank" href="http://didierstevens.com/files/software/oledump_V0_0_18.zip">oledump_V0_0_18.zip</a> (<a rel="nofollow" target="_blank" href="https://didierstevens.com/files/software/oledump_V0_0_18.zip">https</a>)<br />
MD5: 88C9999726C0157267E2FF31E137D66C<br />
SHA256: 1FC9EE7A0BB5A016339C73CBE5DE2F2C0A9C006BC924A5F9346F9F4EDE060939</p>
<p>Here I demo the &#8211;cut option in a new video:</p>
<p><span class='embed-youtube' style='text-align:center;display:block;'></span></p><br />  <a rel="nofollow" target="_blank" href="http://feeds.wordpress.com/1.0/gocomments/didierstevens.wordpress.com/4283/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/didierstevens.wordpress.com/4283/"/></a> <img alt="" border="0" src="http://pixel.wp.com/b.gif?host=blog.didierstevens.com&#038;blog=264765&#038;post=4283&#038;subd=didierstevens&#038;ref=&#038;feed=1" width="1" height="1"/>]]></content:encoded>
         <media:content medium="image" url="http://2.gravatar.com/avatar/b7ca17d338918a19d656f79b0b16057f?s=96&amp;amp;d=http%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96">
            <media:title type="html">didierstevens</media:title>
         </media:content>
      </item>
      <item>
         <title>PDF + DOC + VBAs Videos [Didier Stevens]</title>
         <link>http://blog.didierstevens.com/2015/09/21/pdf-doc-vbas-videos/</link>
         <description>I produced videos showing how I created my &amp;#8220;Test File: PDF With Embedded DOC Dropping EICAR&amp;#8221; and how to change the settings in Adobe Reader to mitigate this.&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=blog.didierstevens.com&amp;#038;blog=264765&amp;#038;post=4278&amp;#038;subd=didierstevens&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://blog.didierstevens.com/?p=4278</guid>
         <pubDate>Mon, 21 Sep 2015 10:46:44 +0000</pubDate>
         <content:encoded><![CDATA[<p>I produced videos showing how I created my <a rel="nofollow" target="_blank" href="http://blog.didierstevens.com/2015/08/28/test-file-pdf-with-embedded-doc-dropping-eicar/">&#8220;Test File: PDF With Embedded DOC Dropping EICAR&#8221;</a> and how to change the settings in Adobe Reader to mitigate this.</p>
<p><span class='embed-youtube' style='text-align:center;display:block;'></span></p> 
<p><span class='embed-youtube' style='text-align:center;display:block;'></span></p><br />  <a rel="nofollow" target="_blank" href="http://feeds.wordpress.com/1.0/gocomments/didierstevens.wordpress.com/4278/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/didierstevens.wordpress.com/4278/"/></a> <img alt="" border="0" src="http://pixel.wp.com/b.gif?host=blog.didierstevens.com&#038;blog=264765&#038;post=4278&#038;subd=didierstevens&#038;ref=&#038;feed=1" width="1" height="1"/>]]></content:encoded>
         <media:content medium="image" url="http://2.gravatar.com/avatar/b7ca17d338918a19d656f79b0b16057f?s=96&amp;amp;d=http%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96">
            <media:title type="html">didierstevens</media:title>
         </media:content>
      </item>
      <item>
         <title>Wireshark Wifi and Lua Training – Brucon 2015 [Didier Stevens]</title>
         <link>http://blog.didierstevens.com/2015/09/07/wireshark-wifi-and-lua-training-brucon-2015/</link>
         <description>I teach a 2 day training &amp;#8220;Wireshark Wifi and Lua Training&amp;#8221; at Brucon. More details here.&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=blog.didierstevens.com&amp;#038;blog=264765&amp;#038;post=4276&amp;#038;subd=didierstevens&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://blog.didierstevens.com/?p=4276</guid>
         <pubDate>Mon, 07 Sep 2015 00:00:30 +0000</pubDate>
         <content:encoded><![CDATA[<p>I teach a 2 day training &#8220;Wireshark Wifi and Lua Training&#8221; at Brucon. More <a rel="nofollow" target="_blank" href="http://2015.brucon.org/index.php/Training_2015_-_Wireshark_WiFi_and_Lua-Packet_Class">details here</a>.</p>
<p><span class='embed-youtube' style='text-align:center;display:block;'></span></p><br />  <a rel="nofollow" target="_blank" href="http://feeds.wordpress.com/1.0/gocomments/didierstevens.wordpress.com/4276/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/didierstevens.wordpress.com/4276/"/></a> <img alt="" border="0" src="http://pixel.wp.com/b.gif?host=blog.didierstevens.com&#038;blog=264765&#038;post=4276&#038;subd=didierstevens&#038;ref=&#038;feed=1" width="1" height="1"/>]]></content:encoded>
         <media:content medium="image" url="http://2.gravatar.com/avatar/b7ca17d338918a19d656f79b0b16057f?s=96&amp;amp;d=http%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96">
            <media:title type="html">didierstevens</media:title>
         </media:content>
      </item>
      <item>
         <title>[BruCON]</title>
         <link>http://feedproxy.google.com/~r/Brucon/~3/pcKs_bcyldU/good-evening-brucon-followers-we-just.html</link>
         <description>Good evening Brucon Followers !
We just thought we'd drop a quick update on some of the happenings/logistics for Brucon this year.
Training Updates:-----------------
* Colin Ames will replace Russ...&lt;br/&gt;
&lt;br/&gt;
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=pcKs_bcyldU:IWQ14j65arY:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=pcKs_bcyldU:IWQ14j65arY:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=pcKs_bcyldU:IWQ14j65arY:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=pcKs_bcyldU:IWQ14j65arY:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=pcKs_bcyldU:IWQ14j65arY:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=pcKs_bcyldU:IWQ14j65arY:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=pcKs_bcyldU:IWQ14j65arY:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Brucon/~4/pcKs_bcyldU&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Matt</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-2318320171672925744.post-5588249662369953250</guid>
         <pubDate>Thu, 03 Sep 2015 21:38:00 +0000</pubDate>
      </item>
      <item>
         <title>nsrl.py: Using the Reference Data Set of the National Software Reference Library [Didier Stevens]</title>
         <link>http://blog.didierstevens.com/2015/09/01/nsrl-py-using-the-reference-data-set-of-the-national-software-reference-library/</link>
         <description>When I scan executables on a Windows machine looking for malware or suspicious files, I often use the Reference Data Set of the National Software Reference Library to filter out known benign files. nsrl.py is the program I wrote to do this. nsrl.py can read the Reference Data Set directly from the ZIP file provided [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=blog.didierstevens.com&amp;#038;blog=264765&amp;#038;post=4266&amp;#038;subd=didierstevens&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://blog.didierstevens.com/?p=4266</guid>
         <pubDate>Tue, 01 Sep 2015 00:00:19 +0000</pubDate>
         <content:encoded><![CDATA[<p>When I scan executables on a Windows machine looking for malware or suspicious files, I often use the Reference Data Set of the <a rel="nofollow" target="_blank" href="http://www.nsrl.nist.gov/">National Software Reference Library</a> to filter out known benign files.</p>
<p>nsrl.py is the program I wrote to do this. nsrl.py can read the Reference Data Set directly from the ZIP file provided by the NSRL, no need to unzip it.</p>
<p><img class="alignnone size-full wp-image-4267" src="https://didierstevens.files.wordpress.com/2015/08/20150831-230251.png?w=1012&#038;h=698" alt="20150831-230251" width="1012" height="698"/></p>
<p>Usage: nsrl.py [options] filemd5 [NSRL-file]<br />
NSRL tool</p>
<p>Options:<br />
&#8211;version             show program&#8217;s version number and exit<br />
-h, &#8211;help            show this help message and exit<br />
-s SEPARATOR, &#8211;separator=SEPARATOR<br />
separator to use (default is ; )<br />
-H HASH, &#8211;hash=HASH  NSRL hash to use, options: SHA-1, MD5, CRC32 (default<br />
MD5)<br />
-f, &#8211;foundonly       only report found hashes<br />
-n, &#8211;notfoundonly    only report missing hashes<br />
-a, &#8211;allfinds        report all matching hashes, not just first one<br />
-q, &#8211;quiet           do not produce console output<br />
-o OUTPUT, &#8211;output=OUTPUT<br />
output to file<br />
-m, &#8211;man             Print manual</p>
<p>Manual:</p>
<p>nsrl.py looks up a list of hashes in the NSRL database and reports the<br />
results as a CSV file.</p>
<p>The program takes as input a list of hashes (a text file). By default,<br />
the hash used for lookup in the NSRL database is MD5. You can use<br />
option -H to select hash algorithm sha-1 or crc32. The list of hashes<br />
is read into memory, and then the NSRL database is read and compared<br />
with the list of hashes. If there is a match, a line is added to the<br />
CSV report for this hash. The list of hashes is deduplicated before<br />
matching occurs. So if a hash appears more than once in the list of<br />
hashes, it is only matched once. If a hash has more than one entry in<br />
the NSRL database, then only the first occurrence will be reported.<br />
Unless option -a is used to report all matching entries of the same<br />
hash. The first part of the CSV report contains all matching hashes,<br />
and the second part all non-matching hashes (hashes that were not<br />
found in the NSRL database). Use option -f to report only matching<br />
hashes, and option -n to report only non-matching hashes.</p>
<p>The CSV file is outputted to console and written to a CSV file with<br />
the same name has the list of hashes, but with a timestamp appended.<br />
To prevent output to the console, use option -q. T choose the output<br />
filename, use option -o. The separator used in the CSV file is ;. This<br />
can be changed with option -s.</p>
<p>The second argument given to nsrl.py is the NSRL database. This can be<br />
the NSRL database text file (NSRLFile.txt), the gzip compressed NSRL<br />
database text file or the ZIP file containing the NSRL database text<br />
file. I use the &#8220;reduced set&#8221; or minimal hashset (each hash appears<br />
only once) found on <a rel="nofollow" target="_blank" href="http://www.nsrl.nist.gov/Downloads.htm">http://www.nsrl.nist.gov/Downloads.htm</a>. The second<br />
argument can be omitted if a gzip compressed NSRL database text file<br />
NSRLFile.txt.gz is stored in the same directory as nsrl.py.</p>
<p><a rel="nofollow" target="_blank" href="http://didierstevens.com/files/software/nsrl_V0_0_1.zip">nsrl_V0_0_1.zip</a> (<a rel="nofollow" target="_blank" href="https://didierstevens.com/files/software/nsrl_V0_0_1.zip">https</a>)<br />
MD5: 5063EEEF7345C65D012F65463754A97C<br />
SHA256: ADD3E82EDABA7F956CDEBE93135096963B0B11BB48473EEC2C45FC21CFB32BAA</p><br />  <a rel="nofollow" target="_blank" href="http://feeds.wordpress.com/1.0/gocomments/didierstevens.wordpress.com/4266/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/didierstevens.wordpress.com/4266/"/></a> <img alt="" border="0" src="http://pixel.wp.com/b.gif?host=blog.didierstevens.com&#038;blog=264765&#038;post=4266&#038;subd=didierstevens&#038;ref=&#038;feed=1" width="1" height="1"/>]]></content:encoded>
         <media:content medium="image" url="http://2.gravatar.com/avatar/b7ca17d338918a19d656f79b0b16057f?s=96&amp;amp;d=http%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96">
            <media:title type="html">didierstevens</media:title>
         </media:content>
         <media:content medium="image" url="https://didierstevens.files.wordpress.com/2015/08/20150831-230251.png">
            <media:title type="html">20150831-230251</media:title>
         </media:content>
      </item>
      <item>
         <title>Test File: PDF With Embedded DOC Dropping EICAR [Didier Stevens]</title>
         <link>http://blog.didierstevens.com/2015/08/28/test-file-pdf-with-embedded-doc-dropping-eicar/</link>
         <description>Over at the SANS ISC diary I wrote a diary entry on the analysis of a PDF file that contains a malicious DOC file. For testing purposes, I created a PDF file that contains a DOC file that drops the EICAR test file. The PDF file contains JavaScript that extracts and opens the DOC file [&amp;#8230;]&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=blog.didierstevens.com&amp;#038;blog=264765&amp;#038;post=4262&amp;#038;subd=didierstevens&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <guid isPermaLink="false">http://blog.didierstevens.com/?p=4262</guid>
         <pubDate>Fri, 28 Aug 2015 09:30:52 +0000</pubDate>
         <content:encoded><![CDATA[<p>Over at the SANS ISC diary I wrote a <a rel="nofollow" target="_blank" href="https://isc.sans.edu/forums/diary/PDF+maldoc1+maldoc2/20079/">diary entry</a> on the analysis of a PDF file that contains a malicious DOC file.</p>
<p>For testing purposes, I created a <a rel="nofollow" target="_blank" href="https://www.virustotal.com/en/file/86a96ec03ba8242c1486456d67ee17f919128754846dbb3bdf5e836059091dba/analysis/1440750741/">PDF file</a> that contains a DOC file that drops the EICAR test file.</p>
<p>The PDF file contains JavaScript that extracts and opens the DOC file (with user approval). The DOC file contains a VBA script that executes upon opening of the file, and writes the EICAR test file to a temporary file in the %TEMP% folder.</p>
<p><img class="alignnone size-full wp-image-4264" src="https://didierstevens.files.wordpress.com/2015/08/20150828-00751.png?w=1024&#038;h=978" alt="20150828-00751" width="1024" height="978"/></p>
<p>You can download the PDF file here. It is in a password protected ZIP file. The password is eicardropper, with eicar written in uppercase: EICAR.</p>
<p>This will generate an anti-virus alert. Use at your own risk, with approval.<br />
<a rel="nofollow" target="_blank" href="http://didierstevens.com/files/data/pdf-doc-vba-eicar-dropper.zip">pdf-doc-vba-eicar-dropper.zip</a> (<a rel="nofollow" target="_blank" href="https://didierstevens.com/files/data/pdf-doc-vba-eicar-dropper.zip">https</a>)<br />
MD5: 65928D03CDF37FEDD7C99C33240CD196<br />
SHA256: 48258AEC3786CB9BA032CD09DB09DC66E0EC8AA19677C299678A473895E79369</p><br />  <a rel="nofollow" target="_blank" href="http://feeds.wordpress.com/1.0/gocomments/didierstevens.wordpress.com/4262/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/didierstevens.wordpress.com/4262/"/></a> <img alt="" border="0" src="http://pixel.wp.com/b.gif?host=blog.didierstevens.com&#038;blog=264765&#038;post=4262&#038;subd=didierstevens&#038;ref=&#038;feed=1" width="1" height="1"/>]]></content:encoded>
         <media:content medium="image" url="http://2.gravatar.com/avatar/b7ca17d338918a19d656f79b0b16057f?s=96&amp;amp;d=http%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96">
            <media:title type="html">didierstevens</media:title>
         </media:content>
         <media:content medium="image" url="https://didierstevens.files.wordpress.com/2015/08/20150828-00751.png">
            <media:title type="html">20150828-00751</media:title>
         </media:content>
         <category>PDF</category>
      </item>
      <item>
         <title>Hak4Kidz at Brucon [BruCON]</title>
         <link>http://feedproxy.google.com/~r/Brucon/~3/E88vayphCmw/hak4kidz-at-brucon.html</link>
         <description>Hak4Kidz is an event by ethical hackers and Information Security professionals dedicated to bring the educational and communal benefits of whitehat hacking conferences to children and young adults....&lt;br/&gt;
&lt;br/&gt;
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=E88vayphCmw:JlFCmy09ybk:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=E88vayphCmw:JlFCmy09ybk:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=E88vayphCmw:JlFCmy09ybk:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=E88vayphCmw:JlFCmy09ybk:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=E88vayphCmw:JlFCmy09ybk:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=E88vayphCmw:JlFCmy09ybk:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=E88vayphCmw:JlFCmy09ybk:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Brucon/~4/E88vayphCmw&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Matt</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-2318320171672925744.post-4049103132035477658</guid>
         <pubDate>Wed, 19 Aug 2015 22:26:00 +0000</pubDate>
      </item>
      <item>
         <title>BruCON 0x07 Training track complete [BruCON]</title>
         <link>http://feedproxy.google.com/~r/Brucon/~3/UFB7aXH7-2E/brucon-0x07-training-track-complete.html</link>
         <description>We are proud to present to you our complete training track for this 0x07 edition of BruCON.&amp;nbsp;

The line-up! :&amp;nbsp;
Practical Malware Analysis: Rapid Introduction&amp;nbsp;by &amp;nbsp;Andrew Honig (3...&lt;br/&gt;
&lt;br/&gt;
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UFB7aXH7-2E:n9RGx77poG4:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UFB7aXH7-2E:n9RGx77poG4:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UFB7aXH7-2E:n9RGx77poG4:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=UFB7aXH7-2E:n9RGx77poG4:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UFB7aXH7-2E:n9RGx77poG4:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=UFB7aXH7-2E:n9RGx77poG4:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UFB7aXH7-2E:n9RGx77poG4:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Brucon/~4/UFB7aXH7-2E&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Tom</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-2318320171672925744.post-4653953794310252259</guid>
         <pubDate>Wed, 03 Jun 2015 11:05:00 +0000</pubDate>
      </item>
      <item>
         <title>BruCON 0x07 Line-up and Early Bird Registrations [BruCON]</title>
         <link>http://feedproxy.google.com/~r/Brucon/~3/IkX4VL0iI_g/brucon-0x07-line-up-and-early-bird.html</link>
         <description>Hello there BruCONneers!
Over the past month we have been chewing over the CFP submissions. We received really great proposals and had to make some tough choices. And finally, white smoke!
We are...&lt;br/&gt;
&lt;br/&gt;
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=IkX4VL0iI_g:e5h6qxeA9xg:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=IkX4VL0iI_g:e5h6qxeA9xg:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=IkX4VL0iI_g:e5h6qxeA9xg:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=IkX4VL0iI_g:e5h6qxeA9xg:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=IkX4VL0iI_g:e5h6qxeA9xg:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=IkX4VL0iI_g:e5h6qxeA9xg:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=IkX4VL0iI_g:e5h6qxeA9xg:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Brucon/~4/IkX4VL0iI_g&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Clément Herssens</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-2318320171672925744.post-744617718204218275</guid>
         <pubDate>Sat, 16 May 2015 01:00:00 +0000</pubDate>
      </item>
      <item>
         <title>Brucon 2015 CFP Extension [BruCON]</title>
         <link>http://feedproxy.google.com/~r/Brucon/~3/UId6uhV2DoA/brucon-2015-cfp-extension.html</link>
         <description>Greetings all
As you may know already (or know now for certain) the Brucon 2015 CFP has been extended by two weeks. This means it will close for good on Wednesday the 15th of April at midnight...&lt;br/&gt;
&lt;br/&gt;
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UId6uhV2DoA:zPHiQUrALAs:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UId6uhV2DoA:zPHiQUrALAs:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UId6uhV2DoA:zPHiQUrALAs:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=UId6uhV2DoA:zPHiQUrALAs:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UId6uhV2DoA:zPHiQUrALAs:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?i=UId6uhV2DoA:zPHiQUrALAs:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Brucon?a=UId6uhV2DoA:zPHiQUrALAs:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Brucon?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Brucon/~4/UId6uhV2DoA&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Matt</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-2318320171672925744.post-712532532046774892</guid>
         <pubDate>Thu, 02 Apr 2015 20:52:00 +0000</pubDate>
      </item>
      <item>
         <title>Unwanted or wanted toolbars, when to detect.. [miekiemoes]</title>
         <link>http://feedproxy.google.com/~r/MiekiemoesBlog/~3/15d205RvAzQ/unwanted-or-wanted-toolbars-when-to.html</link>
         <description>This is a follow up on a previous blogpost of me: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://miekiemoes.blogspot.be/2012/01/unwanted-toolbars.html&quot;&gt;http://miekiemoes.blogspot.be/2012/01/unwanted-toolbars.html&lt;/a&gt;&lt;br /&gt;I received a lot of feedback on this (mainly via mail) which was an eye-opener....&lt;br /&gt;&lt;br /&gt;We can't ignore the fact that more and more free software is bundled with an additional toolbar or software to cover the costs. After all, developing &amp;amp; have the bandwith available for downloading the software isn't free, so it's understandable they need some sort of coverage for the costs. The affiliate who offers the most is obviously being used more frequently into bundled installs.  In most (almost all) cases, when a user installs the software, they are presented with options whether they want - or do not want to install this additional certain software bundle. Since, in most (almost all) cases, this is pre-selected by default, people don't bother with the install screens, don't read and just click &quot;next&quot; and &quot;next&quot;. Then, in the end, they are complaining about an additional toolbar/startpage/searchpage they never wanted.&lt;br /&gt;&lt;br /&gt;This is exactly why I can't stress enough to read &quot;install screens&quot; while you're installing a program. If you don't want the additional crap, just unselect from the install screens. In case you have installed it already, in most cases, it's easy to uninstall them again. Most of these affiliates have additional uninstall/remove instructions on their site.&lt;br /&gt;&lt;br /&gt;Alot of these toolbars or additional software is harmless though - you can basically compare them with the &quot;google&quot; - or &quot;yahoo&quot; toolbar (although there are some exceptions).&lt;br /&gt;This is why I would love to hear your thoughts on this. Should an AV-Vendor detect such (harmless) toolbars or not? Basically, when to detect - or when not to detect?&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=15d205RvAzQ:um2b10iSXKk:nQ_hWtDbxek&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=nQ_hWtDbxek&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=15d205RvAzQ:um2b10iSXKk:dnMXMwOfBR0&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=dnMXMwOfBR0&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=15d205RvAzQ:um2b10iSXKk:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/MiekiemoesBlog/~4/15d205RvAzQ&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>noreply@blogger.com (miekiemoes)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-674153917791542448.post-5365841302985291510</guid>
         <pubDate>Sat, 16 Feb 2013 17:26:00 +0000</pubDate>
      </item>
      <item>
         <title>Toys for Xmas [miekiemoes]</title>
         <link>http://feedproxy.google.com/~r/MiekiemoesBlog/~3/-NP8pkSoPwU/toys-for-xmas.html</link>
         <description>I've listed some &quot;must have&quot; goodies for the geeks among us for 2013. Probably, most of you have these goodies already, but in case you don't, it may be a good idea to put on your Xmas list.  &lt;blockquote&gt;&lt;/blockquote&gt;* USB3 &amp; USB3 &amp; more USB3 &lt;blockquote&gt;&lt;/blockquote&gt;If you're planning to buy a new PC or laptop or anything else with USB ports, please make sure you have at least 1 or 2 USB3 ports.  While USB3 was released in November 2008 already, we now start to see more units with USB3 ports/support.  USB3 is much faster than USB1 or USB2 and they are still backwards compatible with older USB ports. Basically, it's almost 10 times faster than USB2.  If you want to buy a flash drive, get a USB3 flash drive. It's still more expensive than USB2, but it's really worth the price (which will drop soon anyway). Ofcourse, you gain most from this if you connect from a USB3 port. Most (if not all) new units are supported/have USB3 ports now anyway, so this is one of the reasons why you should stop buying USB2 flash drives or anything else USB2-ish :D  &lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-tCrrn7QrCRU/UNCw8F5x3YI/AAAAAAAABh0/vvlr655JS_k/s1600/usb3ab.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; width=&quot;320&quot; src=&quot;http://4.bp.blogspot.com/-tCrrn7QrCRU/UNCw8F5x3YI/AAAAAAAABh0/vvlr655JS_k/s320/usb3ab.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;    * Replace old drives with an SSD (Solid State Drive).  &lt;blockquote&gt;&lt;/blockquote&gt;Many of you probably have old PCs/laptops and you want to give it some boost/power. Adding RAM is a good option, but you may want to consider to replace your HDD with an SSD.  Solid State Drives are faster than conventional spinning drives because they have no moving parts. The storage on an SSD is handled by flash memory chips.  Advantages are less power usage, higher reliability and faster access to your data. They are also less resistant to shocks and vibration. &lt;blockquote&gt;&lt;/blockquote&gt;In general, when you install an SSD, the first immediate benefits are faster application load time and faster boot time. SSDs aren't cheap, but really worth the price. Disadvantage is, you have less data storage than a conventional HDD (comparison size/price with HDD), but if storage isn't a real problem for you - then you really might want to consider an SSD. After all, you can still combine it with an internal or external HDD to store your data. SSDs have dropped in price to the point where it's affordable to replace your laptop or PC HDD. Normally, a 128GB SSD should suffice your storage needs (just compare with the current storage you need/have) - but a 256GB SSD is even better. You can have larger SSDs as well ofcourse. You can read more about SSDs here: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://en.wikipedia.org/wiki/Solid-state_drive&quot;&gt;http://en.wikipedia.org/wiki/Solid-state_drive&lt;/a&gt; and here: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://lifehacker.com/5932009/the-complete-guide-to-solid+state-drives&quot;&gt;http://lifehacker.com/5932009/the-complete-guide-to-solid+state-drives&lt;/a&gt;&lt;blockquote&gt;&lt;/blockquote&gt;You can also easily migrate your Windows installation from an HDD to an SSD without losing any data or reinstalling Windows. There are a lot of tutorials on the net for that.But I personally prefer to start from scratch to avoid any issues. In either way, there's a good tutorial here: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://lifehacker.com/5837543/how-to-migrate-to-a-solid+state-drive-without-reinstalling-windows&quot;&gt;http://lifehacker.com/5837543/how-to-migrate-to-a-solid+state-drive-without-reinstalling-windows&lt;/a&gt; &lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-_tr2cwW5FUM/UNCxC6O6OyI/AAAAAAAABiA/omZEuo6Ceeo/s1600/ssd_sf.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; width=&quot;320&quot; src=&quot;http://4.bp.blogspot.com/-_tr2cwW5FUM/UNCxC6O6OyI/AAAAAAAABiA/omZEuo6Ceeo/s320/ssd_sf.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;    * Get a docking station for your SATA drives with USB support &lt;blockquote&gt;&lt;/blockquote&gt;This is really a MUST HAVE!  I am sure many of you have come in situations where your HDD wouldn't boot, or you want to mount a drive that has failed. &lt;blockquote&gt;&lt;/blockquote&gt;For many (inluding me), it's a hassle to mess around with adding the drive as a slave to your PC in order to get access to the data and transfer/alter/delete. This is exactly one of the reasons why I bought this. Just slide in your SATA hard drive, connect via USB to your PC/Laptop and power on in order to see it as an external drive. You have them in all types and flavours - support for 2,5&quot; drives AND/OR 3,5&quot; drives, SSD, dual docking SATA station (for quick/easy cloning)... Ofcourse, I also recommend to get one with USB3 ports/support.   &lt;div class=&quot;separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-M7CcwKJPbyA/UNCxJ-97ipI/AAAAAAAABiM/FMMSdzdoCkA/s1600/SATA-QP-duo_new-rev.jpg&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; width=&quot;320&quot; src=&quot;http://1.bp.blogspot.com/-M7CcwKJPbyA/UNCxJ-97ipI/AAAAAAAABiM/FMMSdzdoCkA/s320/SATA-QP-duo_new-rev.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt; If you have any other MUST-HAVE! for Xmas, please let me know - I still haven't decided yet what to get (I have above already) :) &lt;blockquote&gt;&lt;/blockquote&gt;&lt;i&gt;images courtesy of http://blog.laptopmag.com, http://www.sharkoon.com, http://www.datapro.net&lt;/i&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=-NP8pkSoPwU:L-F3Jw3lTHQ:nQ_hWtDbxek&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=nQ_hWtDbxek&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=-NP8pkSoPwU:L-F3Jw3lTHQ:dnMXMwOfBR0&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=dnMXMwOfBR0&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=-NP8pkSoPwU:L-F3Jw3lTHQ:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/MiekiemoesBlog/~4/-NP8pkSoPwU&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>noreply@blogger.com (miekiemoes)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-674153917791542448.post-3488011310257901444</guid>
         <pubDate>Tue, 18 Dec 2012 18:19:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://4.bp.blogspot.com/-tCrrn7QrCRU/UNCw8F5x3YI/AAAAAAAABh0/vvlr655JS_k/s72-c/usb3ab.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>New PGP key [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/cdLUGaZWchc/new-pgp-key.html</link>
         <description>&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://imgs.xkcd.com/comics/security.png&quot;&gt;&lt;img style=&quot;cursor:pointer;cursor:hand;width:448px;height:274px;&quot; src=&quot;http://imgs.xkcd.com/comics/security.png&quot; alt=&quot;&quot; border=&quot;0&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Just a short notice that I updated my PGP key. Barely anyone ever used my key and sent me encrypted email. But as I'm lately getting more involved in CERT/CSIRT related activities and communication with teams around the world, there was a need for starting encrypting my mails again.&lt;br /&gt;&lt;br /&gt;My key can be found on the usual keyserver(s) and the fingerprint is: 16BD 01DD DD08 1144 48DF  4464 D3FB 8E48 B68C F245&lt;br /&gt;&lt;br /&gt;I'm not sure if I'll pick up blogging again soon, but don't unsubscribe just yet. My move to Japan was very interesting and the adventure has only just started!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;font-size:85%;&quot;&gt;(Cartoon courtesy of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.xkcd.com/538/&quot;&gt;XKCD)&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=cdLUGaZWchc:QNoRxl-ftQs:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=cdLUGaZWchc:QNoRxl-ftQs:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=cdLUGaZWchc:QNoRxl-ftQs:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/cdLUGaZWchc&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-8511113145701722699</guid>
         <pubDate>Mon, 27 Feb 2012 17:01:00 +0000</pubDate>
      </item>
      <item>
         <title>Unwanted Toolbars [miekiemoes]</title>
         <link>http://feedproxy.google.com/~r/MiekiemoesBlog/~3/R1f9cjGLwJA/unwanted-toolbars.html</link>
         <description>While I know this is old news and has been blogged/posted about a thousand times already - I still notice a lot of users having problems with an overload of toolbars they don't want/need.&lt;br /&gt;&lt;br /&gt;More and more software (mainly free software) bundle their software package with a toolbar since it's an extra source of income.&lt;br /&gt;While in some cases, a toolbar *can* be necessary or useful, always ask yourself if you really need/want this toolbar.&lt;br /&gt;&lt;br /&gt;Additional Toolbars can slow down your browser since it takes longer to start them up, can interfere with certain webpages you want to view, can have compatibility issues with other toolbars/add-ons already installed or can even crash your entire browser.&lt;br /&gt;Apart from a toolbar/BHO, some toolbars also add additional loading points (run key, service, appinit_dlls..) which may cause an extra slowdown of your computer in general.&lt;br /&gt;Toolbars also take up extra space in your browser, leaving you with less content of the webpage you want to view.&lt;br /&gt;&lt;br /&gt;Do you really want your browser to look like this?&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-7K_KnhMWNMw/TwWaIiVDteI/AAAAAAAABhQ/sC6mw1RrBb8/s1600/toolbars.jpg&quot;&gt;&lt;img style=&quot;display:block;margin:0px auto 10px;text-align:center;cursor:pointer;cursor:hand;width:320px;height:225px;&quot; src=&quot;http://1.bp.blogspot.com/-7K_KnhMWNMw/TwWaIiVDteI/AAAAAAAABhQ/sC6mw1RrBb8/s320/toolbars.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5694126775324620258&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;font size=&quot;1&quot;&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;If the answer is Yes, then I suggest you check with your eye specialist or stay away from computers and find another hobby.&lt;/span&gt;&lt;/font&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Also, not all toolbars are as harmless as they look. Do you want them to monitor your browser activities? What sites you visit? Collect other info from your computer?&lt;br /&gt;Do you want them to redirect searches? Change your startpage? Display Advertisements (targetted Ads)? If the answer is No, then uninstall them or don't install them in the first place.&lt;br /&gt;In most cases, legit software with a toolbar bundled, offers the user the option to uncheck the toolbar during install. Too bad most have these toolbars pre-checked already, so many users who install the software just click through the installation screens (next) in a hurry and end up with toolbars they don't want or need. &lt;br /&gt;And that's still the biggest mistake users make.&lt;br /&gt;&lt;br /&gt;That's why it is always a good practice to read every part of the installation screens the software displays, so you don't miss the option where you can uncheck the toolbar or other junk during install.&lt;br /&gt;Also, it's a good practice to always read the EULA/Privacy Policy when you want to install certain software.&lt;br /&gt;&lt;br /&gt;Example:&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://4.bp.blogspot.com/-Fe2H44qua3A/TwWbD6KVGdI/AAAAAAAABhc/H4m-HRLRACA/s1600/asktb.jpg&quot;&gt;&lt;img style=&quot;display:block;margin:0px auto 10px;text-align:center;cursor:pointer;cursor:hand;width:320px;height:250px;&quot; src=&quot;http://4.bp.blogspot.com/-Fe2H44qua3A/TwWbD6KVGdI/AAAAAAAABhc/H4m-HRLRACA/s320/asktb.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5694127795334355410&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately, not every software bundled with a toolbar/other junk offers this option to uncheck during install. This is bad practice and such software should be avoided in the first place.&lt;br /&gt;&lt;br /&gt;In case you have (accidentally) installed a toolbar you didn't want/need in the first place, use the Windows’ built-in &quot;Add/Remove Programs&quot; in the Control Panel (&quot;Programs and Features&quot; in Vista/Win7) and look if it's listed there so you can uninstall it.&lt;br /&gt;Or, in case it's not listed there, you can disable or remove them them via your browser: &lt;br /&gt;For Internet Explorer: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://technet.microsoft.com/en-us/magazine/dd364987.aspx&quot;&gt;http://technet.microsoft.com/en-us/magazine/dd364987.aspx&lt;/a&gt; or &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://mintywhite.com/windows-7/7security/5-easy-ways-uninstall-toolbars-internet-explorer-8/&quot;&gt;http://mintywhite.com/windows-7/7security/5-easy-ways-uninstall-toolbars-internet-explorer-8/&lt;/a&gt;&lt;br /&gt;For Firefox: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://kb.mozillazine.org/Uninstalling_toolbars&quot;&gt;http://kb.mozillazine.org/Uninstalling_toolbars&lt;/a&gt;&lt;br /&gt;For Google Chrome: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://support.google.com/chrome/bin/answer.py?hl=en&amp;answer=113907&quot;&gt;http://support.google.com/chrome/bin/answer.py?hl=en&amp;answer=113907&lt;/a&gt;&lt;br /&gt;For Opera: Click Tools &amp;gt; Preferences &amp;gt; Advanced Tab &amp;gt; Toolbars (listed on the left). There you can select and delete the toolbar.&lt;br /&gt;&lt;br /&gt;In general, if you don't use/need toolbars, uninstall them or don't install them in the first place.&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=R1f9cjGLwJA:EUX9RhrWbWw:nQ_hWtDbxek&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=nQ_hWtDbxek&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=R1f9cjGLwJA:EUX9RhrWbWw:dnMXMwOfBR0&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=dnMXMwOfBR0&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=R1f9cjGLwJA:EUX9RhrWbWw:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/MiekiemoesBlog/~4/R1f9cjGLwJA&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>noreply@blogger.com (miekiemoes)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-674153917791542448.post-1304213905068227024</guid>
         <pubDate>Thu, 05 Jan 2012 12:38:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-7K_KnhMWNMw/TwWaIiVDteI/AAAAAAAABhQ/sC6mw1RrBb8/s72-c/toolbars.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>ABN AMRO Phishing mail [miekiemoes]</title>
         <link>http://feedproxy.google.com/~r/MiekiemoesBlog/~3/hd-pQlkUYk4/abn-amro-phishing-mail.html</link>
         <description>Another phishing mail I received today. Looks like my mailbox attracks phishing mails this week...&lt;br /&gt;This certainly gives me a reason to blog more often again ;-)&lt;br /&gt;&lt;br /&gt;This one is targeting Dutch ABN AMRO bank account users.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-34_Je-6kuf4/TtX2ssP7_VI/AAAAAAAABg4/q17zbN-3EYU/s1600/abn_mail.png&quot;&gt;&lt;img style=&quot;display:block;margin:0px auto 10px;text-align:center;cursor:pointer;cursor:hand;width:320px;height:299px;&quot; src=&quot;http://1.bp.blogspot.com/-34_Je-6kuf4/TtX2ssP7_VI/AAAAAAAABg4/q17zbN-3EYU/s320/abn_mail.png&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5680717752650431826&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;------&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Geachte ABN-Amro klant,&lt;br /&gt;&lt;br /&gt;® Op dit moment is ABN-Amro bezig met het vernieuwen van de systeembeveiligingen. Hierbij vragen wij u om uw persoonsgegevens opnieuw in te vullen door op de onderstaande link te klikken&lt;br /&gt;&lt;br /&gt;Wij zullen de gegevens verifieren en als het nodig is de aanpassingen opnieuw in het systeem opnemen. Hierna wordt telefonisch contact met u opgenomen om de gegevens te beveiigen. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;------&lt;br /&gt;&lt;br /&gt;This one is sent from the spoofed mailaddress ABN AMRO NV customercare @ abnamro.nl&lt;br /&gt;When you click the Log in button, it redirects you to a phishing page where it asks you to fill in your bank account and passnumber.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-PBQJs3OG8mQ/TtX38fz49-I/AAAAAAAABhE/WZ5JgrAPhp8/s1600/abn_phish_page.png&quot;&gt;&lt;img style=&quot;display:block;margin:0px auto 10px;text-align:center;cursor:pointer;cursor:hand;width:320px;height:190px;&quot; src=&quot;http://1.bp.blogspot.com/-PBQJs3OG8mQ/TtX38fz49-I/AAAAAAAABhE/WZ5JgrAPhp8/s320/abn_phish_page.png&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5680719123701102562&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It looks like there are a lot of similar phishing mails going around lately to target ABN AMRO bank account users and I fear a lot of new ones will follow. &lt;br /&gt;In case you have received a similar mail from ABN AMRO, please report it via their website:&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.abnamro.nl/nl/overabnamro/f_aanvragen.html&quot;&gt;https://www.abnamro.nl/nl/overabnamro/f_aanvragen.html&lt;/a&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=hd-pQlkUYk4:e0Ommy_yX_g:nQ_hWtDbxek&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=nQ_hWtDbxek&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=hd-pQlkUYk4:e0Ommy_yX_g:dnMXMwOfBR0&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=dnMXMwOfBR0&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=hd-pQlkUYk4:e0Ommy_yX_g:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/MiekiemoesBlog/~4/hd-pQlkUYk4&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>noreply@blogger.com (miekiemoes)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-674153917791542448.post-86778685426934053</guid>
         <pubDate>Wed, 30 Nov 2011 09:22:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/-34_Je-6kuf4/TtX2ssP7_VI/AAAAAAAABg4/q17zbN-3EYU/s72-c/abn_mail.png" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Beware Telenet.be users - Telenet.be phishing scam going around [miekiemoes]</title>
         <link>http://feedproxy.google.com/~r/MiekiemoesBlog/~3/Gk7P2hkfiag/beware-telenetbe-users-telenetbe.html</link>
         <description>First of all - WOW! It has been ages I have blogged here ! I really should start to blog more often again. Work &amp; life has kept me real busy lately, so unfortunately there's not much extra free time left over anymore.&lt;br /&gt;If only there were 36 hours in a day, so much I still want to do and learn...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Anyway, Just received the following in my mailbox today:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Dear 'pandora.be' E-mail User,&lt;br /&gt; &lt;br /&gt;We are currrently upgrading our database and all account need to be verified.To complete your account activation with us, you are required to reply&lt;br /&gt;to this message and enter your password in the space provided (********) you are required to do this before the next 48 hours of the receipt of this email or your database will be de-activated from our database.You are required to reply this message to telenet.be helpdesk database office on their email address: help-desk@email.com&lt;br /&gt;&lt;br /&gt;Full Name:&lt;br /&gt;username:&lt;br /&gt;Password:&lt;br /&gt;Thank you for using pandora.be. &lt;br /&gt;Copyright 2011 © pandora.be web Team.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Stacy Williams&lt;br /&gt;PANDORA.BE HELP DESK OFFICE&lt;br /&gt;Hosting: Telenet Operaties N.V.&lt;br /&gt;IP Address: 195.130.144.20&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-_omyCvXwo9s/TtD3Qu79tlI/AAAAAAAABgs/TSjlCc9H6R0/s1600/telenet-alert.jpg&quot;&gt;&lt;img style=&quot;display:block;margin:0px auto 10px;text-align:center;cursor:pointer;cursor:hand;width:320px;height:146px;&quot; src=&quot;http://2.bp.blogspot.com/-_omyCvXwo9s/TtD3Qu79tlI/AAAAAAAABgs/TSjlCc9H6R0/s320/telenet-alert.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5679310996963702354&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Telenet.be (Pandora.be is controlled by telenet.be) is one of the biggest ISPs here in Belgium&lt;br /&gt;Above is a fake email and in no way associated with Telenet.be. &lt;br /&gt;This mail is designed to steal your telenet.be credentials. &lt;br /&gt;Telenet.be would never ask for your credentials via email, nor would any other company.&lt;br /&gt;As a matter of fact, &lt;span style=&quot;font-weight:bold;&quot;&gt;never&lt;/span&gt; ever give your passwords/credentials via mail, no matter who the company claims to be.&lt;br /&gt;&lt;br /&gt;If you received this mail, delete it - certainly do not respond to it.&lt;br /&gt;In case you have become a victim of this mail already and responded to it, change your password asap.&lt;br /&gt;For telenet.be users, see &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://onlinesupport.telenet.be/content/hoe-kan-ik-het-wachtwoord-van-mijn-mailbox-website-mijn-telenet-aanpassen&quot;&gt;here&lt;/a&gt;.&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=Gk7P2hkfiag:iV4nz3F-zHs:nQ_hWtDbxek&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=nQ_hWtDbxek&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=Gk7P2hkfiag:iV4nz3F-zHs:dnMXMwOfBR0&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=dnMXMwOfBR0&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?a=Gk7P2hkfiag:iV4nz3F-zHs:yIl2AUoC8zA&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/MiekiemoesBlog?d=yIl2AUoC8zA&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/MiekiemoesBlog/~4/Gk7P2hkfiag&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>noreply@blogger.com (miekiemoes)</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-674153917791542448.post-7991879885030450006</guid>
         <pubDate>Sat, 26 Nov 2011 14:25:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://2.bp.blogspot.com/-_omyCvXwo9s/TtD3Qu79tlI/AAAAAAAABgs/TSjlCc9H6R0/s72-c/telenet-alert.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>The unofficial BruCON party guide (plz RT) [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/eQhCUixHCy8/unofficial-brucon-party-guide-plz-rt.html</link>
         <description>&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/images/d/dd/I-will-hack-for-beer.png&quot;&gt;&lt;img style=&quot;cursor:pointer;cursor:hand;width:150px;height:89px;&quot; src=&quot;http://2011.brucon.org/images/d/dd/I-will-hack-for-beer.png&quot; alt=&quot;&quot; border=&quot;0&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The third edition of BruCON is about to happen and I'm really looking forward to it. This is an attempt to the Hitchhikers Guide to the... euhm... fun bits of BruCON. Besides the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/Schedule&quot;&gt;workshops, presentations and training of BruCON&lt;/a&gt;, there are also some social events you can attend. So here we go.&lt;br /&gt;&lt;br /&gt;First is &lt;span style=&quot;font-weight:bold;&quot;&gt;SushiCon&lt;/span&gt;, the&lt;span style=&quot;font-weight:bold;&quot;&gt; pre-BruCON get-together at a Japanese restaurant&lt;/span&gt;. Details &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/Events&quot;&gt;here&lt;/a&gt;. After dinner we'll head for the Belgian beer heavens. You can just join us for a beer later as well. Check Twitter for last minute movements.&lt;br /&gt;&lt;br /&gt;Second main event is of course the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/Events&quot;&gt;BruCON party @ Havana Club&lt;/a&gt; on Monday evening! Feel free to throw some events of your own and list them on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/Events&quot;&gt;wiki&lt;/a&gt;. For ad-hoc meetings, follow the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/#%21/search/%23brucon&quot;&gt;#brucon hashtag&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The BruCON wiki also has a small &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/Places_to_see&quot;&gt;list of bars / restaurants&lt;/a&gt; (plus recommendations of beer) etc you can explore! It's far from complete so please expand this page based on what you know or discover!!&lt;br /&gt;&lt;br /&gt;Now what about Travel aka&lt;span style=&quot;font-weight:bold;&quot;&gt; How to get around&lt;/span&gt;? Apart from the basic &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2011.brucon.org/index.php/travel&quot;&gt;BruCON Travel page&lt;/a&gt;, here are some tips:&lt;br /&gt;&lt;br /&gt;Once in the city, the metro/tram will probably be your main mode of transportation! The metro connects the BruCON hotel (Ibiz) with the city center (Grand place) and the BruCON Venue @ VUB. Check out this awesome Google map with all of the known BruCON (party) locations.&lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://g.co/maps/fkm5y&quot; class=&quot;external free&quot;&gt;http://g.co/maps/fkm5y&lt;/a&gt; (hat tip to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.twitter.com/5M7X&quot;&gt;@5M7X&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Metro Stops&lt;/span&gt;: Here is the network map of the Metro: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.mivb.be/netplan-plan-reseau.html?l=en&quot;&gt;http://www.mivb.be/netplan-plan-reseau.html?l=en&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Payment:&lt;/span&gt; You can get a pre-paid 10-journey card at newsstands and vending machines at the stations: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.mivb.be/10-voyages-ritten.html?l=en&quot;&gt;http://www.mivb.be/10-voyages-ritten.html?l=en&lt;/a&gt; (if they sell the MOBIB one, it's &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.security4all.be/search?q=mobib&quot;&gt;RFID based on Calypso&lt;/a&gt;). The difference between the MOBIB and the JUMP card is that the JUMP also allows you to take the train between the different Brussels stations (but not beyond Brussels).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Getting from Ibiz hotel to Grand Place: &lt;/span&gt;&lt;br /&gt;Take Tramway route 4 direction GARE DU NORD. At 8:08, get off at stop BOURSE (5 min.) or alternatively, you can walk for +-25 minutes.&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Getting from VUB (BruCON) to Grand Place: &lt;/span&gt;&lt;br /&gt;Walk to stop DELTA (3 min.). Take Metro route 5 direction ERASME. Get off at stop GARE CENTRALE (12 min.) and walk to Grand Place. (check &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://g.co/maps/fkm5y&quot;&gt;Google map&lt;/a&gt;)&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Getting from Ibiz hotel to VUB:&lt;/span&gt;&lt;br /&gt;This &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.vub.ac.be/downloads/bereikbaarheidsficheMIVB_campusEtterbeek.pdf&quot;&gt;PDF map from VUB&lt;/a&gt; explain all the possible transits from all major stations (South (Midi), Central and North)&lt;br /&gt;&lt;br /&gt;So I hope this helps. Have fun but keep it safe! See you all at BruCON!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;UPDATE&lt;/span&gt;: First new event on Saturday already popped up (hat tip to Andreas):&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight:bold;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight:bold;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight:bold;font-style:italic;&quot;&gt;Moeder Lambic feat. Stone Brew Co. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.moederlambic.net/events/en/events&quot; class=&quot;external free&quot;&gt;http://www.moederlambic.net/events/en/events&lt;/a&gt; 30 Belgian beers on tap, 30 US specialty beers from Stone Brewing Co on  tap, and to finish it off, the Cantillon Zwanze will be served on  saturday. Historic event not to miss for any beer geek. &lt;b&gt;Date:&lt;/b&gt; Saturday, 17th @19:00&lt;/blockquote&gt;Keep checking the events page for updates!!&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=eQhCUixHCy8:4DvB9qipznI:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=eQhCUixHCy8:4DvB9qipznI:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=eQhCUixHCy8:4DvB9qipznI:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/eQhCUixHCy8&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-3757172603529430541</guid>
         <pubDate>Fri, 16 Sep 2011 07:36:00 +0000</pubDate>
      </item>
      <item>
         <title>Help improve the CISSP community. Support Wim. [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/qOhrUbDGfrw/help-improve-cissp-community-support.html</link>
         <description>&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.ladybrillenigeria.com/wp-content/uploads/2010/06/yes-we-can.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer;cursor:hand;width:319px;height:297px;&quot; src=&quot;http://www.ladybrillenigeria.com/wp-content/uploads/2010/06/yes-we-can.jpg&quot; alt=&quot;&quot; border=&quot;0&quot;/&gt;&lt;/a&gt;
&lt;br /&gt;
&lt;br /&gt;My blog kinda died down after being involved with BruCON and I wasn't really planning on blogging again unless I had some good (original) content. Since I'm going for the JLPT1 certification in the next years, this may take a while. BUT I'll make an exception today to support Wim.
&lt;br /&gt;
&lt;br /&gt;A lot of us in the infosec community have a CISSP. The first reason is to bypass the HR checklist filters but is there really an added value besides it? I hear &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.infosecisland.com/blogview/15450-My-Canons-on-ISC-Ethics-Such-as-They-Are.html&quot;&gt;a lot of the people in this community being more critical&lt;/a&gt; with the years. Especially the CISSP code of ethics is something I think is too black and white.
&lt;br /&gt;
&lt;br /&gt;But why only complain about it? Why not TRY to change things for the better. This is why &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.remes-it.be/petition.html&quot;&gt;Wim Remes&lt;/a&gt; has decided to try for a board election. I know him personally and I can vouch a 100% for him. Here are some of his points:
&lt;br /&gt;&lt;blockquote style=&quot;font-style:italic;&quot;&gt;&lt;ul&gt;&lt;li&gt;A closer collaboration with the information security community at large. This means recognition of what is currently considered to be an outlawish community but what I consider as a treasure trove of knowledge and capability that remains untapped. Either because we are afraid of what we don't understand or because hackers are still suffering from a bad image. Not in my book!&lt;/li&gt;&lt;li&gt;  A review of the certification requirements for the flagship (ISC)2 certification, the CISSP, in order to bring it back to the level it once was on. Ideally with the incorporation of more in-depth requirements on a technical level, requirements in soft skills and, possibly, the addition of a written paper requirement that would show the knowledge the candidate has acquired during the learning process. This last requirement would feedback into the community becoming a valuable resource for security professionals globally.&lt;/li&gt;&lt;li&gt;  I am from Europe. I still feel that many of the subject covered by (ISC)2 and other organizations are focused on the US. My goal is to widen the efforts to a global approach that brings communities from different continents together instead of seperating them further. While there is a different in laws, culture, etc.  across continents, I firmly belief that we have more in common and there needs to be a better collaboration in order to address the security challenges we have coming at us.&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt; &lt;p&gt;Check out more details &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.remes-it.be/petition.html&quot;&gt;here&lt;/a&gt;. Or listen to the latest &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.eurotrashsecurity.eu/index.php/Episodes#Microtrash_Epsiodes&quot;&gt;Eurotrashsec podcast&lt;/a&gt; where he explains more about his views.
&lt;br /&gt;&lt;/p&gt;For the latest updates, follow the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/#%21/search/%23wim4board&quot;&gt;#wim4board&lt;/a&gt; hashtag on Twitter
&lt;br /&gt;&lt;p&gt;Don't just take my word for it. I can also &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.c22.cc/2011/08/25/make-your-voice-heard-change-isc%c2%b2-for-the-good/&quot;&gt;see&lt;/a&gt; that I am &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.andrewhay.ca/archives/1783&quot;&gt;not&lt;/a&gt; the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.mckeay.net/2011/08/25/support-change-at-the-isc2/&quot;&gt;only&lt;/a&gt; one who &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.liquidmatrix.org/blog/2011/08/25/put-wim-remes-on-the-isc2-board/&quot;&gt;thinks&lt;/a&gt; this is a good idea. He has the support of a lot of good people.&lt;/p&gt;&lt;p&gt;You don't have the certificate? Then give out a shout to him online and throw up a blogpost!
&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Got for it Wim!!!
&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=qOhrUbDGfrw:NOxl0v91gZE:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=qOhrUbDGfrw:NOxl0v91gZE:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=qOhrUbDGfrw:NOxl0v91gZE:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/qOhrUbDGfrw&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-6270587222810730786</guid>
         <pubDate>Mon, 29 Aug 2011 18:28:00 +0000</pubDate>
      </item>
      <item>
         <title>How to follow #Blackhat / #Defcon / #BsidesLV without being there (2011 edition) [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/scx9g61SKjI/how-to-follow-blackhat-defcon-bsideslv.html</link>
         <description>&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/_hKfJbfbBxMU/Sm48TbBLYTI/AAAAAAAACuI/TVDIUkwlJ4Q/s1600-h/2371165319_4c29d22227.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer;width:320px;height:320px;&quot; src=&quot;http://1.bp.blogspot.com/_hKfJbfbBxMU/Sm48TbBLYTI/AAAAAAAACuI/TVDIUkwlJ4Q/s320/2371165319_4c29d22227.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5363290510612717874&quot; border=&quot;0&quot;/&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Note: update of my similar older posts&lt;br /&gt;&lt;br /&gt;Well, I'm one of the poor souls who couldn't make it to the Blackhat/Defcon / SecurityBsides fun. There are some ways to follow the events in Vegas (real time). ;-)&lt;br /&gt;&lt;br /&gt;The first tool is to use twitter and follow the hashtags #defcon, #blackhat and #bsideslv. If you have a twitter account, I would recommend installing tweetdeck and setting up 3 search columns. For those without a twitter account, you can use the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://search.twitter.com/search?q=%23blackhat+OR+%23defcon+OR+%23bsideslv&quot;&gt;Twitter search&lt;/a&gt; (and import it through &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://search.twitter.com/search.atom?lang=en&amp;amp;q=%23blackhat+OR+%23defcon+OR+%23bsideslv&quot;&gt;RSS&lt;/a&gt;) or even better: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://twitterfall.com/&quot;&gt;twitterfall.com&lt;/a&gt; which is more interactive. Alternatively, give &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.monitter.com/&quot;&gt;monitter&lt;/a&gt; also a try. Has a more Tweetdeck column &quot;feel&quot;. I like it.&lt;br /&gt;&lt;br /&gt;Keep an eye on the Security Bloggers Network (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/SecurityBloggersNetwork&quot;&gt;RSS&lt;/a&gt;). A lot of security bloggers will be covering the event.&lt;br /&gt;&lt;br /&gt;You can also monitor Flickr for the tag '&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://api.flickr.com/services/feeds/photos_public.gne?tags=defcon19&amp;amp;lang=en-us&amp;amp;format=rss_200&quot;&gt;defcon19&lt;/a&gt;' (RSS). And this site collects all the @blackhat and @defcon pictures from twitter: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://hashalbum.com/blackhat&quot;&gt;http://hashalbum.com/blackhat&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://hashalbum.com/defcon&quot;&gt;http://hashalbum.com/defcon&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This social media aggregator also looks nice: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://twubs.com/bsideslv&quot;&gt;http://twubs.com/bsideslv,&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://twubs.com/defcon&quot;&gt;http://twubs.com/defcon&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://twubs.com/blackhat&quot;&gt;http://twubs.com/blackhat&lt;/a&gt; (all your tweets and twitpics are belong to us!) ;-)&lt;br /&gt;&lt;br /&gt;I think that's more then enough to follow the event except for a live video stream. And in a limited way, for Blackhat there is one: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.blackhat.com/html/bh-us-11/bh-us-11-uplink.html&quot;&gt;https://www.blackhat.com/html/bh-us-11/bh-us-11-uplink.html&lt;/a&gt;. Giving it a go as we speak.&lt;br /&gt;&lt;br /&gt;If you have more tips, feel free to mention them in the comments.&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=scx9g61SKjI:wvud7rdeerU:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=scx9g61SKjI:wvud7rdeerU:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=scx9g61SKjI:wvud7rdeerU:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/scx9g61SKjI&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-5411880990086892167</guid>
         <pubDate>Wed, 03 Aug 2011 21:09:00 +0000</pubDate>
         <media:thumbnail height="72" url="http://1.bp.blogspot.com/_hKfJbfbBxMU/Sm48TbBLYTI/AAAAAAAACuI/TVDIUkwlJ4Q/s72-c/2371165319_4c29d22227.jpg" width="72" xmlns:media="http://search.yahoo.com/mrss/"/>
      </item>
      <item>
         <title>Are you a pentester? Then read this! [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/HRAO-_K7-aA/are-you-pentester-then-read-this.html</link>
         <description>If you work in a Redteam, then the following &quot;project&quot; is certainly one to take note of!!!&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.securityaegis.com/the-open-pentest-bookmarks-collection/&quot;&gt;The Open Penetration Testing Bookmarks Collection&lt;/a&gt;  …is just that, a collection of handy bookmarks I initially collected that aid me in my day to day work or I find in the course of research. They are not all inclusive and some sections need to be parsed but they are all good reference materials. I find having this Hackery folder in Firefox an easy way to reference syntax, tricks, methods, and generally facilitate and organize research. Hopefully the initial set will grow and expand.  Opening it up to everyone will facilitate a knowledge transfer.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;Speaking of Pentesting, a lot of people have been complaining about the difference of quality and the lack of a standard for Pentesting assignments. So here we have it: the &quot;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://pentest-standard.org/index.php?title=FAQ&quot;&gt;Penetration Testing Execution Standard&lt;/a&gt;&quot; has been kicked off by some experienced people from the field! It's far from finished but I expect some good things to come from it. Check it out!!!&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=HRAO-_K7-aA:ZC3dtQ0Hlxw:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=HRAO-_K7-aA:ZC3dtQ0Hlxw:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=HRAO-_K7-aA:ZC3dtQ0Hlxw:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/HRAO-_K7-aA&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-7276098472831416543</guid>
         <pubDate>Thu, 24 Feb 2011 13:26:00 +0000</pubDate>
      </item>
      <item>
         <title>The Dutch National Cyber Security Strategy [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/tBlgroUaElg/dutch-national-cyber-security-strategy.html</link>
         <description>Our Dutch neighbors will start a National Cyber Security Center. GoverCERT.nl will play a major role and published the strategy document this week. A lot of non-brainers are in there like the need for more international collaboration etc... There is an English version so you can read it yourself.&lt;br /&gt;&lt;br /&gt; Download &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.govcert.nl/binaries/live/govcert/hst%3Acontent/actueel/nieuws/nationale-cyber-security-strategie-gepresenteerd/national&quot;&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;They did mention the need for more individual responsibility but apart from awareness campaigns, I'm not sure how they will achieve this. A lot of reports show that 30-50% (some even more) of consumers are infected with some kind of malware and this is certainly a problem that we need to tackle.&lt;br /&gt;&lt;br /&gt;There was one little detail in the report that sparked my interest: &quot;International Watch and Warning Network (IWWN)&quot;. I never heard about this before so please excuse me while I'll go Google it! &lt;br /&gt;&lt;br /&gt;Does your country have a strategy? Link it below! ;-)&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=tBlgroUaElg:plwtSK3kA30:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=tBlgroUaElg:plwtSK3kA30:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=tBlgroUaElg:plwtSK3kA30:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/tBlgroUaElg&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-5630568638250601866</guid>
         <pubDate>Wed, 23 Feb 2011 19:29:00 +0000</pubDate>
      </item>
      <item>
         <title>When a CERT has to break the law [Security4all]</title>
         <link>http://feedproxy.google.com/~r/Security4all/~3/6BfqEin2Vlc/when-cert-has-to-break-law.html</link>
         <description>I spotted an interesting article on ZDnet Australia today: &quot;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.zdnet.com.au/fraudsters-escape-as-laws-bind-auscert-339310118.htm&quot;&gt;Fraudsters escape as laws bind AusCERT&lt;/a&gt;&quot;.&lt;br /&gt;&lt;p style=&quot;font-style:italic;&quot;&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p style=&quot;font-style:italic;&quot;&gt;AusCERT head Graham Ingram said the logs were previously viewable in plain text, but are now stored in a protected MySQL format.&lt;/p&gt;  &lt;p style=&quot;font-style:italic;&quot;&gt;&quot;They are encrypted and we can't break that by law,&quot; he told an  audience at the National Security Australia conference in Sydney  yesterday.&lt;/p&gt;&lt;/blockquote&gt;&lt;p style=&quot;font-style:italic;&quot;&gt;&lt;/p&gt;This was the part that caught my eye. Is this a new trend? Is this a legal issue limited to Australia? At least I hope so. There have been many examples on police getting exempt from certain security laws like the &quot;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://blog.security4all.be/2009/01/police-hacking-laws-moving-from-germany.html&quot;&gt;police trojans&lt;/a&gt;&quot; (Germany). I have mixed feelings about such actions but I totally support a CERT or forensics team bypassing &quot;protected&quot; parts of a system if crimeware is involved. I'm just wondering if the malware writers had this legal issue in mind when they 'protected' the info or if they were just protecting their assets against competitors?&lt;br /&gt;&lt;br /&gt;Speaking of CERTs, CERT Polska published a really interesting article today on the new Zeus malware involving banking trojans that infect Blackberries and Android phones. Check it out &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.cert.pl/news/3193/langswitch_lang/en&quot;&gt;here&lt;/a&gt;. Now that banks are gearing towards dual authentication through phones and/or mobile apps, the threat landscape just followed. Where there is money, there is.....&lt;div class=&quot;feedflare&quot;&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:V_sGLiPBpWU&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=6BfqEin2Vlc:jdlydBdcyiE:V_sGLiPBpWU&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:I9og5sOYxJI&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=I9og5sOYxJI&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:Jwdi1b3fU3Q&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=Jwdi1b3fU3Q&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:qj6IDK7rITs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=qj6IDK7rITs&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:F7zBnMyn0Lo&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?i=6BfqEin2Vlc:jdlydBdcyiE:F7zBnMyn0Lo&quot; border=&quot;0&quot;&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.feedburner.com/~ff/Security4all?a=6BfqEin2Vlc:jdlydBdcyiE:YwkR-u9nhCs&quot;&gt;&lt;img src=&quot;http://feeds.feedburner.com/~ff/Security4all?d=YwkR-u9nhCs&quot; border=&quot;0&quot;&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src=&quot;http://feeds.feedburner.com/~r/Security4all/~4/6BfqEin2Vlc&quot; height=&quot;1&quot; width=&quot;1&quot; alt=&quot;&quot;/&gt;</description>
         <author>Bkay</author>
         <guid isPermaLink="false">tag:blogger.com,1999:blog-6437907677349484188.post-4364226687609064342</guid>
         <pubDate>Wed, 23 Feb 2011 19:07:00 +0000</pubDate>
      </item>
   </channel>
</rss>
<!-- fe5.yql.bf1.yahoo.com compressed/chunked Thu Oct  1 23:05:20 UTC 2015 -->
