<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-12671547</id><updated>2024-03-14T06:14:00.736+08:00</updated><title type='text'>My Humble Blogworld</title><subtitle type='html'>To be, or not to be: that is the question:&#xa;Whether &#39;tis nobler in the mind to suffer&#xa;The slings and arrows of outrageous fortune&quot;&#xa;William Shakespeare, &quot;Hamlet&quot; (1600-01)</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>42</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-12671547.post-177364742448794268</id><published>2008-05-13T09:06:00.001+08:00</published><updated>2008-05-13T09:06:05.965+08:00</updated><title type='text'>Your invitation from Krishnan Rajagopal is about to expire</title><content type='html'>&lt;p&gt;   Krishnan Rajagopal sent you an invitation to connect as business contacts on Pulse on April 8.  That invitation will expire soon! Follow this link to accept Krishnan&#39;s invitation.&lt;/p&gt;  &lt;p&gt;   &lt;a href=&quot;http://pulse.plaxo.com/pulse/invite?i=18315167&amp;k=1742949688&amp;l=en_my&amp;src=email&amp;et=24&amp;est=business&amp;el=en_my&quot;&gt;     http://pulse.plaxo.com/pulse/invite?i=18315167&amp;k=1742949688&amp;l=en_my  &lt;/a&gt; &lt;/p&gt;   &lt;p&gt;   Plaxo is free, easy to use and takes only a minute to join.  Come see what Krishnan wants to share.&lt;/p&gt;  &lt;p&gt;   Thanks!&lt;br&gt;   The Pulse team&lt;/p&gt; &lt;hr style=&quot;height: 1px; border: 0; border-top: 1px solid #999999;&quot;&gt;  &lt;div style=&quot;color: #999; padding: 0; margin: 0;&quot;&gt;   &lt;p style=&quot;font-size: 11px; font-weight: bold;&quot;&gt;     More than 20 million people use Plaxo to keep in touch with the people they care about.  &lt;/p&gt;      &lt;p style=&quot;font-size: 11px;&quot;&gt;       Don&#39;t want to receive emails from Plaxo any more? Go to:    &lt;a href=&quot;http://www.plaxo.com/stop?src=email&amp;et=24&amp;est=business&amp;el=en_my&quot;&gt;http://www.plaxo.com/stop&lt;/a&gt;     &lt;/p&gt; &lt;/div&gt;    </content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/177364742448794268/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/177364742448794268' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/177364742448794268'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/177364742448794268'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2008/05/your-invitation-from-krishnan-rajagopal.html' title='Your invitation from Krishnan Rajagopal is about to expire'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-4013710026147065682</id><published>2008-04-08T22:20:00.001+08:00</published><updated>2008-04-08T22:20:50.708+08:00</updated><title type='text'>Krishnan Rajagopal added you as a business connection on Pulse</title><content type='html'>&lt;p&gt;   I&#39;d like to keep in touch with you on Plaxo Pulse.&lt;/p&gt;   &lt;p&gt;   Click here to learn more:&lt;br&gt;   &lt;a href=&quot;http://pulse.plaxo.com/pulse/invite?i=18315167&amp;k=1742949688&amp;l=en&amp;src=email&amp;et=1&amp;est=business&amp;etv=nnic3&amp;el=en&quot;&gt;     http://pulse.plaxo.com/pulse/invite?i=18315167&amp;k=1742949688&amp;l=en  &lt;/a&gt; &lt;/p&gt;  &lt;p&gt;   Thanks,&lt;br&gt;   Krishnan&lt;/p&gt;  &lt;hr style=&quot;height: 1px; border: 0; border-top: 1px solid #999999;&quot;&gt;  &lt;div style=&quot;color: #999; padding: 0; margin: 0;&quot;&gt;   &lt;p style=&quot;font-size: 11px; font-weight: bold;&quot;&gt;     More than 20 million people use Plaxo to keep in touch with the people they care about.  &lt;/p&gt;      &lt;p style=&quot;font-size: 11px;&quot;&gt;     Don&#39;t want to receive emails from Plaxo any more? Go to:    &lt;a href=&quot;http://www.plaxo.com/stop?src=email&amp;et=1&amp;est=business&amp;etv=nnic3&amp;el=en&quot;&gt;http://www.plaxo.com/stop&lt;/a&gt;   &lt;/p&gt; &lt;/div&gt;   </content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/4013710026147065682/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/4013710026147065682' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/4013710026147065682'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/4013710026147065682'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2008/04/krishnan-rajagopal-added-you-as.html' title='Krishnan Rajagopal added you as a business connection on Pulse'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-114686081482105162</id><published>2006-05-06T04:23:00.000+08:00</published><updated>2007-04-02T20:30:49.206+08:00</updated><title type='text'>Abandoning blogger for iWeb</title><content type='html'>For anyone out there who reads this blog, I will no longer be maintaining it. I have created a website/blog called Krishna&#39;s Blogsphere using Apple&#39;s new iWeb application. Here is the link:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://web.mac.com/srimadhava&quot;&gt;http://web.mac.com/srimadhava&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;See you there guys and gals !&lt;br /&gt;&lt;br /&gt;The grass is just greener there !</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/114686081482105162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/114686081482105162' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/114686081482105162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/114686081482105162'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2006/05/abandoning-blogger-for-iweb.html' title='Abandoning blogger for iWeb'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-113060327162382320</id><published>2005-10-30T00:27:00.000+08:00</published><updated>2005-10-30T00:27:51.800+08:00</updated><title type='text'>On my way back</title><content type='html'>After a long trip away from home conitnuously, Im gonna be leaving back to Malaysia tomorrow ! &lt;br /&gt;&lt;br /&gt;Oh boy ! Am i glad !&lt;br /&gt;&lt;br /&gt;I hope to see my family and friends in the coming holiday of Deepavali and Eid !&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/113060327162382320/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/113060327162382320' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/113060327162382320'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/113060327162382320'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/10/on-my-way-back.html' title='On my way back'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112846419989563931</id><published>2005-10-05T06:15:00.000+08:00</published><updated>2005-10-05T06:16:39.913+08:00</updated><title type='text'>SpreadFirefox Busted again...</title><content type='html'>The Mozilla Foundation&#39;s community marketing site Spread Firefox has been hacked for the second time in less than three months. According to an email sent to registered users of the site, unknown remote attackers exploited a vulnerability in the TWiki wiki software, which was installed on the server but not actually used by the public website. The TWiki software has now been disabled. The Spread Firefox Team does not believe that any sensitive data was taken but they have shut down the site as a precaution. Only Spread Firefox was affected by the security breach; no other Mozilla Foundation or Mozilla Corporation sites have been hacked and the flaw does not affect users of Mozilla software.&lt;br /&gt;&lt;br /&gt;PS : Oh boy Oh boy ....</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112846419989563931/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112846419989563931' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112846419989563931'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112846419989563931'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/10/spreadfirefox-busted-again.html' title='SpreadFirefox Busted again...'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112399731172117054</id><published>2005-08-14T13:27:00.000+08:00</published><updated>2005-08-14T13:28:31.726+08:00</updated><title type='text'>Back to KL</title><content type='html'>Im back to KL.. finally..&lt;br /&gt;&lt;br /&gt; I will type more when i have the energy too.. i hope tomorrow.&lt;br /&gt;&lt;br /&gt; Sky.. Sky.. please be clear ?</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112399731172117054/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112399731172117054' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112399731172117054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112399731172117054'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/08/back-to-kl.html' title='Back to KL'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112342314009217324</id><published>2005-08-07T21:58:00.000+08:00</published><updated>2005-08-07T21:59:00.096+08:00</updated><title type='text'>WGA Cracked</title><content type='html'>Microsoft Corporation requires users of it&#39;s flagship operating system,&lt;br /&gt;Windows XP, to verify the authenticity of their software installation&lt;br /&gt;before downloading patches and updates from Microsoft&#39;s website. The&lt;br /&gt;validation tool, called Windows Genuine Advantage (WGA), can easily be&lt;br /&gt;cracked without much trouble. This allows users of pirated copies of&lt;br /&gt;Microsoft Windows to verify their installation and receive the extra&lt;br /&gt;bennies offered from the manufacturer.&lt;br /&gt;&lt;br /&gt;Although Microsoft has not confirmed that the crack works, details are well&lt;br /&gt;publicized, and it appears that the crack is popular, at least amongst&lt;br /&gt;nefarious users.&lt;br /&gt;&lt;br /&gt;Previously, JavaScript tricks were required to bypass the WGA requirement;&lt;br /&gt;however, now it appears that it&#39;s as simple as running the WGA application&lt;br /&gt;in Windows 2000 compatibility mode.</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112342314009217324/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112342314009217324' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112342314009217324'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112342314009217324'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/08/wga-cracked.html' title='WGA Cracked'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112324983735079297</id><published>2005-08-05T21:41:00.000+08:00</published><updated>2005-08-05T21:50:37.356+08:00</updated><title type='text'>Veritas Backup Exec - Remote Registry Vulnerability</title><content type='html'>Now tis the season for Veritas and Arcserve ! *smile*&lt;br /&gt;&lt;br /&gt;A vulnerability exist in Veritas Backup Exec for Windows, which can be exploited by remote attackers to get unauthorized access. The problem lies with some access validation error within some RPC handlers in &quot;beserver.exe&quot; (port 6106), which can be used by remote attackers to gain &quot;administrator&quot; privileges.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Okay, im goin back to sleep.. To muuch bro...too much ...</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112324983735079297/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112324983735079297' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112324983735079297'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112324983735079297'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/08/veritas-backup-exec-remote-registry.html' title='Veritas Backup Exec - Remote Registry Vulnerability'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112307710276816230</id><published>2005-08-03T21:33:00.000+08:00</published><updated>2005-08-03T21:56:16.276+08:00</updated><title type='text'>Cisco and ISS sues Blackhat !</title><content type='html'>Now , since were at the topic of utter dumbness , here is another go at it..&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;stDeck&quot;&gt;&lt;blockquote&gt;   &lt;p class=&quot;stBodyText&quot;&gt; The networking giant and Internet Security Systems jointly filed a request Wednesday for a temporary restraining order against Michael Lynn and the organizers of the Black Hat security conference. The motion came after Lynn showed in a presentation how attackers could take over Cisco routers — a problem that he said could bring the Internet to its knees.&lt;/p&gt;    &lt;p class=&quot;stBodyText&quot;&gt;   &lt;/p&gt;    &lt;p class=&quot;stBodyText&quot;&gt; The filing in US District Court for the Northern District of California asks the court to prevent Lynn and Black Hat from &quot;further disclosing proprietary information belonging to Cisco and ISS,&quot; said John Noh, a Cisco spokesman.&lt;/p&gt; &lt;/blockquote&gt;&lt;/span&gt;&lt;br /&gt;Now this is interesting, is this a reality or a farce ? Now if its true, Oh thank you C &amp;amp; I for a whole load of pure , crap !&lt;br /&gt;&lt;br /&gt;Where do ya guys get ideas such as this ? How about playing around with someone your size , who &quot;reverse engineered &quot; your product ? Not willing to ? To scared of the super powers ?&lt;br /&gt;&lt;br /&gt;Ah Cry Babies !&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://news.zdnet.co.uk/internet/security/0,39020375,39211011,00.htm&quot;&gt;Read more here&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112307710276816230/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112307710276816230' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112307710276816230'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112307710276816230'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/08/cisco-and-iss-sues-blackhat.html' title='Cisco and ISS sues Blackhat !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112299485682699702</id><published>2005-08-02T22:54:00.000+08:00</published><updated>2005-08-02T23:00:56.833+08:00</updated><title type='text'>ActiveSync Blooper !</title><content type='html'>Now this is got to be interesting, A recent Activesync vulnerability reported by a Russian Group.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; Microsoft  ActiveSync  is  widely used to synchronies Windows based PDAs&lt;br /&gt; and  smartphones  with  desktop  computer.  PDA  can  connect  to PC via&lt;br /&gt; COM/USB/IR  or  LAN.  Before  synchronization  user  on  PC  must  setup&lt;br /&gt; &quot;partnership&quot;  to  allow  synchronization.  If  PDA  is  protected  with&lt;br /&gt; password  user  on  PC  should provide password before he can access the&lt;br /&gt; device.&lt;br /&gt;&lt;br /&gt; Synchronization over LAN has some design weakness.&lt;br /&gt;&lt;br /&gt; 1. All data, including initial &quot;authentication&quot;, is transmitted in clear&lt;br /&gt; text.   This  is  OK  in  case  COM/USB  and  other  physical  protected&lt;br /&gt; communication,  but  LAN  (Wi-Fi  in  most  cases) is very sensitive for&lt;br /&gt; sniffing.&lt;br /&gt; 2. Even if PDA is password protected, ActiveSync doesn&#39;t ask password in&lt;br /&gt; case of network synchronization. I’m not sure, what is it - security bug&lt;br /&gt; or feature, because password is transmitted in clear text over USB.&lt;br /&gt; 3.  ActiveSync doesn&#39;t use any form of authentication for server (PC) or&lt;br /&gt; client (PDA), so fake server or fake client attack is possible.&lt;br /&gt;&lt;br /&gt; Discover Activesync with LAN synchronization allowed&lt;br /&gt;&lt;br /&gt; nmap -p 5679 192.168.0.*&lt;br /&gt;&lt;br /&gt; Fake server&lt;br /&gt;&lt;br /&gt; It is easy to build fake server attack without special software. All you&lt;br /&gt; need are ActiveSync, sniffer and any MitM condition.&lt;br /&gt;&lt;br /&gt; 1. Install ActiveSync on fake server. Enable network synchronization&lt;br /&gt; 2. Realize MitM condition.&lt;br /&gt; 3. Launch you favorite sniffer and set filter to save TCP packets on port 5679.&lt;br /&gt; 4. Wait for PDA connection.&lt;br /&gt; 5. Open sniffer and check second data packet from PDA. At offset 0x14 and 0x18 you can see partnerships ids. Activesync can support up to 2 PC and as you can see, PDA send both IDs in the &quot;handshake&quot;&lt;br /&gt; 6. Import template in registry. Change key HKEY_CURRENT_USER\Software\Microsoft\Windows CE Services\Partners\&lt;partnerhsip&gt; to sniffed partnership id.&lt;br /&gt; 7. Wait for another connection and check ActiveSinc, device should be connected as &quot;guest&quot;. Even if you got &quot;Synchronization Error&quot;, try to click &quot;Explore&quot; button on the toolbar.&lt;br /&gt;&lt;br /&gt; Fake Client&lt;br /&gt;&lt;br /&gt; Is  very  similar to the fake server, but you don&#39;t need MitM conditions&lt;br /&gt;to   accomplish  this  attack.  All  you  need  it  a  name  of  PC  and&lt;br /&gt; corresponding &quot;partnership id&quot;.&lt;br /&gt;&lt;br /&gt; 1. Launch your favorite registry editor for Windows Mobile.&lt;br /&gt; 2. Navigate to HKLM\Software\Microsoft\Windows CE Services\Partners\P1&lt;br /&gt; 3. Create string value  PName = &lt;pc_name&gt;&lt;br /&gt; 4. Create DWORD value PId = &lt;partnership&gt;&lt;br /&gt; 5. Launch  active  sync on PDA and try to connect. If everything is ok,&lt;br /&gt; synchronization will occur.&lt;br /&gt;&lt;br /&gt; Mitigating factors&lt;br /&gt; 1. LAN synchronization disabled by default&lt;br /&gt; 2. To implement &quot;fake client&quot; you should know Partnership ID. It’s hard&lt;br /&gt; to  guess  (2^32),  but  because  ActiveSync accept 2 partnership ID per&lt;br /&gt; connection, actually we need (2^31) connections for bruteforce.&lt;br /&gt;&lt;br /&gt; &lt;a href=&quot;http://www.security.nnov.ru/Fnews64.html&quot;&gt;Read More here &lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112299485682699702/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112299485682699702' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112299485682699702'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112299485682699702'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/08/activesync-blooper.html' title='ActiveSync Blooper !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112255672979908982</id><published>2005-07-28T21:12:00.000+08:00</published><updated>2007-02-21T16:56:43.266+08:00</updated><title type='text'>SANS Reports New Vulnerabilities</title><content type='html'>&lt;span style=&quot;font-family:verdana;&quot;&gt; &lt;/span&gt;&lt;pre wrap=&quot;&quot;&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;The SANS Institute reports that 422 new vulnerabilities were discovered&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;in the second quarter of 2005. This is an 11 percent increase over the &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;previous quarter. The increase in the number of security vulnerabilities &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;stems from malicious crackers changing focus from attacking operating &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;systems to webbrowser and other connected applications, such as digital &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;music applications.&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;In addition to the online applications, backup software systems received &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;much attention from crackers seeking to access corporate and personal data, &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;possibly for resale. Detailed warnings were published in SANS Top 20 Q2 &lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: georgia;font-family:verdana;font-size:100%;&quot;  &gt;2005 Critical Vulnerability Update.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sans.org/top20/q2-2005update/&quot;&gt;SANS Top 20 Q2 2005 - Click Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://photos1.blogger.com/blogger/1421/1085/1600/sans-logo.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;http://photos1.blogger.com/blogger/1421/1085/320/sans-logo.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/pre&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112255672979908982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112255672979908982' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112255672979908982'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112255672979908982'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/07/sans-reports-new-vulnerabilities.html' title='SANS Reports New Vulnerabilities'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112054409051532035</id><published>2005-07-05T14:14:00.000+08:00</published><updated>2007-03-04T21:13:42.746+08:00</updated><title type='text'>Skype phone</title><content type='html'>Hi Guys !&lt;br /&gt;&lt;br /&gt;Here is an interesting article of a Skype &quot;hack&quot; , making your own Skype phone using cheap parts !&lt;br /&gt;&lt;br /&gt;Check this out, very interesting, and let me know if anyone of you tried it out !&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&quot;You have a computer, your friend has a&lt;br /&gt;computer, you both have a broadband connection, and you make use of Skype or&lt;br /&gt;like the voice chat in MSN or something like this - And - you’re sick and tired&lt;br /&gt;to sit by the computer all the time when you talk. And you might even sit with&lt;br /&gt;one of these ridiculous headset (hmm, yes I also have one) on your head just&lt;br /&gt;because the echo cancellation feature isn’t that great in reality.&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.grynx.com/index.php/projects/siemens-skype/&quot;&gt;Wireless Skype phone&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112054409051532035/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112054409051532035' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112054409051532035'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112054409051532035'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/07/skype-phone.html' title='Skype phone'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112039145288781822</id><published>2005-07-03T19:50:00.000+08:00</published><updated>2005-07-05T14:06:26.720+08:00</updated><title type='text'>Unpatched IE Vulnerability / Exploit</title><content type='html'>Micro$oft IE bloopers again ! A javaprxy.dll COM Remote Vulnerability was identified in Micro$oft IE, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to an error in the &#39;javaprxy.dll&#39; COM Object when instantiated in Internet Explorer via a specially crafted HTML tag, which could be exploited via a malicious Web page to compromise and take complete control of a vulnerable system.</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112039145288781822/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112039145288781822' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112039145288781822'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112039145288781822'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/07/unpatched-ie-vulnerability-exploit.html' title='Unpatched IE Vulnerability / Exploit'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112016457630956329</id><published>2005-07-01T04:49:00.000+08:00</published><updated>2005-07-01T04:49:36.313+08:00</updated><title type='text'>Critical Windows SMB Exploit - Popular</title><content type='html'>A recent surge in port 445 scanning activity could herald impending hack attacks, and industry experts have warned firms to take &#39;immediate steps&#39; to ensure that the affected Windows ports are secure.&lt;br /&gt;&lt;br /&gt;Gartner pointed to recent reports that security vulnerability sensors have noted an increase in activity on TCP port 445, which is associated with Microsoft&#39;s Windows Server Message Block (SMB) protocol.&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/MS05-027.mspx&quot;&gt;&lt;br /&gt;Microsoft Security Post - MS-05-027&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112016457630956329/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112016457630956329' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112016457630956329'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112016457630956329'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/07/critical-windows-smb-exploit-popular.html' title='Critical Windows SMB Exploit - Popular'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-112016406172619550</id><published>2005-07-01T04:31:00.000+08:00</published><updated>2005-07-01T04:41:01.733+08:00</updated><title type='text'>Sorry buddies !</title><content type='html'>Sorry for the &quot;MIA&quot; for 10 days, long trip..&lt;br /&gt;&lt;br /&gt;Im here with my thoughts on Micro$oft and its Longhorn again...&lt;br /&gt;&lt;br /&gt;Last week, as Micro$oft released its statement, about integrating RSS into its Longhorn OS and IE, it raised many security professional&#39;s eyebrows , on its strength and hardness against combatting against hackers. With the current available &quot;oh-so-many&quot; ways of exploiting &#39;Windoze&#39; OS, what would the scene be, with RSS integrated right into its Operating System ?&lt;br /&gt;&lt;br /&gt;Krishna starts wondering... What a wonderful world it would be....&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&quot;When Microsoft laid out its plans last week for building RSS -- Real&lt;br /&gt;Simple Syndication -- into Longhorn, it didn&#39;t say anything about how it might&lt;br /&gt;secure the automated feeds.Nor has really anyone, said Gartner research director&lt;br /&gt;John Pescatore, the research firm&#39;s resident security analyst.&#39;What inevitably&lt;br /&gt;happens with any new protocol, especially the ones with the word &quot;simple&quot; in&lt;br /&gt;them, is that developers try to come up with a way to easily communicate data,&#39;&lt;br /&gt;said Pescatore. &#39;Only at the end do they say, &#39;let&#39;s sprinkle some security on&lt;br /&gt;it.&#39; RSS is like that.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.techweb.com/wire/security/164302249&quot;&gt;RSS security&lt;/a&gt;&lt;br /&gt;-- or insecurity -- is hardly new. A possible way to deliver malicious code and&lt;br /&gt;spam via the protocol was highlighted two years ago by Mark Pilgrim, a writer of&lt;br /&gt;several technical and programming books, such as &quot;Diving Into Python.&quot;&lt;br /&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;&lt;blockquote&gt;&lt;/blockquote&gt;With all this, the chances of hackers and spammers turning to Windows mainstream , to look for weaknesses , seems to bring up more light.&lt;br /&gt;&lt;br /&gt;Krishna turns back to his dark world of security, &quot;Life&#39;s good.&quot;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.techweb.com/wire/security/164903095&quot;&gt;RSS: Safe At Any Feed?&lt;br /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/112016406172619550/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/112016406172619550' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112016406172619550'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/112016406172619550'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/07/sorry-buddies.html' title='Sorry buddies !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111923943995260164</id><published>2005-06-20T11:45:00.000+08:00</published><updated>2005-06-20T11:50:39.956+08:00</updated><title type='text'>GooglePAL ?</title><content type='html'>Now this is something very interesting, i thought to myself, I had to blog about !&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Google, the leading search engine company in search of itself has again&lt;br /&gt;added a new service to its eclectic portfolio. Later this year, Google&lt;br /&gt;plans to offer an electronic payment service that will compete directly&lt;br /&gt;with PayPal, owned by eBay. Services will, reportedly, include processing&lt;br /&gt;payments using consumer credit cards and checking accounts, the mainstay of&lt;br /&gt;PayPal&#39;s service !&lt;br /&gt;&lt;br /&gt;Should Google enter the payment processing market, PayPal will have to&lt;br /&gt;dance with the wolf, and catch up quickly, if it wants to remain in business.&lt;br /&gt;E-business helps to flatten the world, and Google is taking full advantage of&lt;br /&gt;of its global presence and name.&lt;br /&gt;&lt;br /&gt;Before you go any further read this: &lt;a href=&quot;http://www.paypalsucks.com/&quot;&gt;Paypal Sucks&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://online.wsj.com/article_email/0,,SB111905141149263168-IdjgINhlaN4oJyobIKHbK2Bm4,00.html&quot;&gt;Google Plans Online Payment Service&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111923943995260164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111923943995260164' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111923943995260164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111923943995260164'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/googlepal.html' title='GooglePAL ?'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111913438805225063</id><published>2005-06-19T06:36:00.000+08:00</published><updated>2006-05-06T12:08:55.980+08:00</updated><title type='text'>ISO 7799  - 2005 !</title><content type='html'>Hi everyone !&lt;br /&gt;&lt;br /&gt;Sorry for the silence, havent had the opportunity to be online for some time.&lt;br /&gt;&lt;br /&gt;Travels have taken up space and prioritised over these areas :(&lt;br /&gt;&lt;br /&gt;The latest revision of ISO 17799, has been under development for&lt;br /&gt;several years, is now available. It introduces a number of fundamental&lt;br /&gt;changes to the standard.&lt;br /&gt;&lt;br /&gt;ISO 17799 now contains eleven &#39;core&#39; chapters, as opposed to the&lt;br /&gt;previous ten, with existing chapters also being re-organized. The new&lt;br /&gt;setup is as follows:&lt;br /&gt; &lt;p&gt;- Security Policies&lt;br /&gt;- Organizing Information Security&lt;br /&gt;- Asset Management&lt;br /&gt;- Human Resources Security&lt;br /&gt;- Physical and Environmental Security&lt;br /&gt;- Information Security Incident Management&lt;br /&gt;- Communications and Operations Management&lt;br /&gt;- Access Control&lt;br /&gt;- Information Systems Acquisition, Development and Maintenance&lt;br /&gt;- Business Continuity Management&lt;br /&gt;- Compliance.&lt;br /&gt;&lt;/p&gt; ISO 17799 2005 also introduces controls to address security related&lt;br /&gt;issues not previously covered. These include  outsourcing provision,&lt;br /&gt;patch management and others. Other issues have been extended or&lt;br /&gt;re-written (eg: employment termination, and mobile comms).&lt;br /&gt;&lt;br /&gt;On the overall, the document itself is much more user friendly !&lt;br /&gt;&lt;br /&gt;&lt;p&gt;OFFICIAL SOURCES&lt;br /&gt;The following official outlet (via BSI) has been updated to provide&lt;br /&gt;downloads of the new standard:&lt;br /&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.standardsdirect.org/iso17799.htm&quot;&gt;http://www.standardsdirect.org&lt;wbr&gt;/iso17799.htm&lt;/a&gt;&lt;br /&gt;&lt;/p&gt; The ISO 17799 Toolkit, the standard&#39;s support kit, has also been&lt;br /&gt; updated to include the 2005 version:&lt;br /&gt; &lt;a target=&quot;_blank&quot; href=&quot;http://www.17799-toolkit.com&quot;&gt;http://www.17799-toolkit.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111913438805225063/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111913438805225063' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111913438805225063'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111913438805225063'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/iso-7799-2005.html' title='ISO 7799  - 2005 !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111889659441463954</id><published>2005-06-16T12:35:00.000+08:00</published><updated>2005-06-16T12:36:34.416+08:00</updated><title type='text'>New lyrics to Beatles Song</title><content type='html'>Write in C&#39; (Let it be)&lt;br /&gt;&lt;br /&gt;When I find my code in tons of trouble,&lt;br /&gt;Friends and colleagues come to me,&lt;br /&gt;Speaking words of wisdom,&lt;br /&gt;&quot;Write in C.&quot;&lt;br /&gt;&lt;br /&gt;As the deadline fast approaches,&lt;br /&gt;and bugs are all that I can see&lt;br /&gt;Somewhere, someone whispers:&lt;br /&gt;&quot;Write in C.&quot;&lt;br /&gt;&lt;br /&gt;Write in C, Write in C,&lt;br /&gt;Write in C, oh, Write in C.&lt;br /&gt;Logo&#39;s dead and buried,&lt;br /&gt;Write in C.&lt;br /&gt;&lt;br /&gt;I used to write a lot of FORTRAN.&lt;br /&gt;For science it worked flawlessly.&lt;br /&gt;Try using it for graphics!&lt;br /&gt;Write in C.&lt;br /&gt;&lt;br /&gt;If you&#39;ve just spent nearly 30 hours,&lt;br /&gt;Debugging some assembly.&lt;br /&gt;Soon you will be glad to&lt;br /&gt;Write in C.&lt;br /&gt;&lt;br /&gt;Write in C, Write in C.&lt;br /&gt;Write in C, oh, Write in C.&lt;br /&gt;BASIC&#39;s not the answer.&lt;br /&gt;Write in C.&lt;br /&gt;&lt;br /&gt;Write in C, Write in C.&lt;br /&gt;Write in C, oh, Write in C.&lt;br /&gt;Pascal won&#39;t quite cut it.&lt;br /&gt;Write in C.</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111889659441463954/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111889659441463954' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111889659441463954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111889659441463954'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/new-lyrics-to-beatles-song.html' title='New lyrics to Beatles Song'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111814901318575457</id><published>2005-06-07T20:56:00.000+08:00</published><updated>2005-06-07T21:05:49.930+08:00</updated><title type='text'>Kaspersky Privilege Escalation</title><content type='html'>Users of Kaspersky !  Here is something to take note. Yet another &quot;unpatched&quot; vulnerability.&lt;br /&gt;This time around its with the Kaspersky Labs Antivirus Program.&lt;br /&gt;&lt;br /&gt;Those who are running Kaspersky Antivirus on Windows 2000, you&#39;re affected. A vulnerability was identified in Kaspersky AntiVirus, which can be exploited by attackers to execute privilege escalation attacks. This flaw is due to a bug in the &quot;klif.sys&quot; driver where insecure functions calls are made from the user level, which may be exploited by local users to execute arbitrary commands with kernel privileges .&lt;br /&gt;&lt;br /&gt;This leads to my theory, which i repeat time, and time again. An antivirus, is JUST and antivirus. It ain&#39;t a god sent program ! Often end-users are made to think, &quot;If you&#39;ve got an antivirus, then you&#39;re all fine buddy !&quot; ... Now... Think again.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.akati.com/exp/kav-klif.c&quot;&gt;PoC Code&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/img/247/5596/320/kasp_logo.jpg&quot;&gt;&lt;img class=&quot;phostImg&quot; src=&quot;http://photos1.blogger.com/img/247/5596/200/kasp_logo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111814901318575457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111814901318575457' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111814901318575457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111814901318575457'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/kaspersky-privilege-escalation.html' title='Kaspersky Privilege Escalation'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111809812865177537</id><published>2005-06-07T06:48:00.000+08:00</published><updated>2005-06-07T11:20:24.740+08:00</updated><title type='text'>Windows 2000 Finale</title><content type='html'>Micro$oft has recently announced that as early as next week , the LONG awaited security update rollup for Windows 2000 would be released.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;The Update Rollup, which replaces Windows 2000 SP5 (Service Pack 5), is a cumulative set of hot fixes, security patches and critical updates packaged together for easy deployment.&lt;/blockquote&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;The Update Rollup comes just one month before mainstream support for Windows  2000 client and server releases expires on June 30. Micro$oft divides its  support lifecycle into two phases: mainstream and extended. Once a product  enters the extended support period, Micro$oft charges for support.&lt;/blockquote&gt;&lt;br /&gt;So , Here it comes the final awaited finale of Windows 2000. I&#39;m sure we&#39;d see a lot corporates who are stuck with a Windows 2000 Server , and with no updates, being victims of &quot;new&quot; hacking tricks.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/rollup.asp&quot;&gt;Microsoft Announces Security Rollup &lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111809812865177537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111809812865177537' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111809812865177537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111809812865177537'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/windows-2000-finale.html' title='Windows 2000 Finale'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111769319201097540</id><published>2005-06-02T14:15:00.000+08:00</published><updated>2005-06-02T14:26:36.170+08:00</updated><title type='text'>No Internet Explorer for Windows 2000</title><content type='html'>Well all those of you who have been die hard supporters of Internet Explorer from Micro$oft , here&#39;s another blow...&lt;br /&gt;&lt;br /&gt;&quot;With Internet Explorer 7 Beta 1 set to debut next month, Microsoft has quietly closed the door on Windows 2000 users planning to adopt the new Web browser. IE7 will require Windows XP Service Pack 2 due to internal security changes that rely on Microsoft&#39;s latest operating system release.&quot;&lt;br /&gt;&lt;br /&gt;IE program manager Christopher Vaughn said , &quot;It should be no surprise that we do not plan on releasing IE7 for Windows 2000. One reason is where we are in the Windows 2000 lifecycle. Another is that some of the security work in IE7 relies on operating system functionality in XPSP2 that is non-trivial to port back to Windows 2000.&quot;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://blogs.msdn.com/ie/archive/2005/05/27/422721.aspx&quot;&gt;Read more here : IE weblog&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Oh gosh ! Oh gosh ! There goes the ticker of sarcasm for Micro$oft again !&lt;br /&gt;&lt;br /&gt;My thoughts on this ?&lt;br /&gt;&lt;br /&gt;This spells bad news for governments across the globe, as Windows 2000 is the predominant operating system in use today on these networks. With the hundreds of bugs and vulnerabilites on IE 6, users of Windows 2000 would eventually be forced to find alternative browsers (such as Firefox or Opera), or abandon the Windows operating system completely.&lt;br /&gt;&lt;br /&gt;As for the geniuses who thought about IE7, CMYAZZ.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.slackwaregallery.com/albums/userpics/10006/thumb_internet_explorer.jpg&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111769319201097540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111769319201097540' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111769319201097540'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111769319201097540'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/no-internet-explorer-for-windows-2000.html' title='No Internet Explorer for Windows 2000'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111755854302670359</id><published>2005-06-01T00:53:00.000+08:00</published><updated>2005-06-01T00:55:43.030+08:00</updated><title type='text'>XSS - NS@?</title><content type='html'>Well, Here is something for u to laugh ...&lt;br /&gt;A simple XSS attack on a website.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.nsa.gov/notices/notic00003.cfm?Address=%22%3E%3Cscript%3Ealert%28%22We%20love%20our%20XSS%22%29%3C/script%3E&quot;&gt;www.nsa.gov&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Not even the NS@ can get it right !</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111755854302670359/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111755854302670359' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111755854302670359'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111755854302670359'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/06/xss-ns.html' title='XSS - NS@?'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111753621580409400</id><published>2005-05-31T18:30:00.000+08:00</published><updated>2007-02-20T14:36:41.586+08:00</updated><title type='text'>Windoze again..</title><content type='html'>Well i just got a couple of emails recently requesting me to comment on the vulnerability released sometime ago on Micro$oft&#39;s COM and OLE storage vulnerability.&lt;br /&gt;&lt;br /&gt;Well many of us know of this as a infamous MS05-012 bug, but, however ... i think theyre loads of people out there who are still VULNERABLE. This is because, simple... when they tried the updates , it caused &quot;unexpected results&quot; *smile* on their machine, and thus having them to rollback the update.&lt;br /&gt;&lt;br /&gt;Well there is 2 parts to this problem / vulnerability.&lt;br /&gt;&lt;br /&gt;The first flaw exists in the way , affected Os&#39;es and programs access memory when they process COM structured storage files, which allows attackers to gain elevated privileges. The second problem exists in OLE because of the way it handles input validation, and may be exploited by by constructing a malicious document that could potentially allow remote code execution.&lt;br /&gt;&lt;br /&gt;Affected Products :-&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Microsoft Windows 2000 Service Pack 3&lt;br /&gt;Microsoft Windows 2000 Service Pack 4&lt;br /&gt;Microsoft Windows XP Service Pack 1&lt;br /&gt;Microsoft Windows XP Service Pack 2&lt;br /&gt;Microsoft Windows XP 64-Bit Edition Service Pack 1&lt;br /&gt;Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)&lt;br /&gt;Microsoft Windows Server 2003&lt;br /&gt;Microsoft Windows Server 2003 for Itanium-based Systems&lt;br /&gt;Microsoft Exchange 2000 Server Service Pack 3&lt;br /&gt;Microsoft Exchange Server 2003&lt;br /&gt;Microsoft Exchange Server 2003 Service Pack 1&lt;br /&gt;Microsoft Exchange Server 5.0 Service Pack 2&lt;br /&gt;Microsoft Exchange Server 5.5 Service Pack 4&lt;br /&gt;Microsoft Windows 98&lt;br /&gt;Microsoft Windows 98 Second Edition (SE)&lt;br /&gt;Microsoft Windows Millennium Edition (ME)&lt;br /&gt;Microsoft Office XP Service Pack 3&lt;br /&gt;Microsoft Office XP Service Pack 2&lt;br /&gt;Microsoft Office XP&lt;br /&gt;Microsoft Office 2003 Service Pack 1&lt;br /&gt;Microsoft Office 2003&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.akati.com/exp/ms05-12.c&quot;&gt;PoC Code  available here .&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Solution ?&lt;br /&gt;&lt;br /&gt;Well you could try to take a look at this.. in my definitions, i dont consider this as a solution *smile*&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms05-012.mspx&quot;&gt;Microsoft Technet Solution&lt;br /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111753621580409400/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111753621580409400' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111753621580409400'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111753621580409400'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/05/windoze-again.html' title='Windoze again..'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111747951184433395</id><published>2005-05-31T02:57:00.000+08:00</published><updated>2005-05-31T02:58:31.846+08:00</updated><title type='text'>Look straight in here , ma&#39;am !</title><content type='html'>&quot;International travelers should get used to having their fingerprints taken or their irises scanned because traditional airport security tests are outdated and open to abuse, a leading U.S. official said Thursday.&lt;br /&gt;&lt;br /&gt;&#39;As a general principle, certainly in the area of international travel, biometrics is the way forward in virtually every respect,&#39; said Michael Chertoff, Homeland Security secretary.&lt;br /&gt;&lt;br /&gt;&#39;When we screen based on names, we&#39;re screening on the most primitive and least technological basis of identification -- it&#39;s the most susceptible to misspelling, or people changing their identity, or fraud.&lt;br /&gt;&lt;br /&gt;Krishna&#39;s views : I remembered the facial recognition systems in the US airports which i personally felt was much more of a farce than an actual effective solution. I said to myself, what next ? &quot; Body movement recognition ? - Ah there he goes ! He walks just like a terrorist, so he has to be a terrorist ! &quot;&lt;br /&gt;&lt;br /&gt;But this step forward with retina and thumbprint scans are something commendable.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&#39;Biometrics is the way ahead.&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;a href=&quot;http://news.independent.co.uk/uk/politics/story.jsp?story=641731&quot;&gt;US wants to be able to access Britons ID cards&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111747951184433395/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111747951184433395' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111747951184433395'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111747951184433395'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/05/look-straight-in-here-maam_31.html' title='Look straight in here , ma&#39;am !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12671547.post-111747441007738367</id><published>2005-05-31T01:29:00.000+08:00</published><updated>2005-05-31T01:33:30.080+08:00</updated><title type='text'>Wordpress Bug !</title><content type='html'>For all you bloggers out there on Wordpress, be careful ! If youre still using version 1.5 and prior , then you may be at risk.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;A vulnerability was identified in WordPress, which may be exploited by remote attackers to execute arbitrary SQL commands. This flaw is due to an input validation error in the &quot;template-functions-category.php&quot; script that does not properly filter the &quot;cat_ID&quot; parameter, which may be exploited by remote users to conduct SQL injection attacks.&lt;/blockquote&gt;Solution ?&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://wordpress.org/download/&quot;&gt;Upgrade to the newest version of Wordpress version 1.5.1.2&lt;/a&gt;&lt;span style=&quot;font-size: 8pt;font-family:Verdana;&quot; &gt;&lt;span style=&quot;font-size: 8pt;font-family:Verdana;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://srimadhava.blogspot.com/feeds/111747441007738367/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12671547/111747441007738367' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111747441007738367'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12671547/posts/default/111747441007738367'/><link rel='alternate' type='text/html' href='http://srimadhava.blogspot.com/2005/05/wordpress-bug.html' title='Wordpress Bug !'/><author><name>Srimadhava</name><uri>http://www.blogger.com/profile/17428902002631932634</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='28' src='http://photos1.blogger.com/img/247/5596/640/prof-pic.jpg'/></author><thr:total>0</thr:total></entry></feed>