<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-22172187</atom:id><lastBuildDate>Sun, 01 Sep 2024 05:43:57 +0000</lastBuildDate><category>hacks</category><category>links</category><category>security</category><category>security tools</category><category>python</category><category>events</category><category>blog news</category><category>crypto</category><category>holiday</category><category>lyrics</category><category>ruby</category><category>security guides</category><category>vulnerabilities</category><category>articles</category><category>network tools</category><category>php</category><title>My Ideas, Thoughts, Hacks, Bookmarks</title><description></description><link>http://theriyanto.blogspot.com/</link><managingEditor>noreply@blogger.com (Tedi Heriyanto)</managingEditor><generator>Blogger</generator><openSearch:totalResults>82</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8879456051826293489</guid><pubDate>Fri, 30 Mar 2007 04:24:00 +0000</pubDate><atom:updated>2007-03-30T11:34:09.512+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blog news</category><title>Goodbye IT World !</title><atom:summary type="text">Today, I am going to leave the IT world and entering another field.Many great things has come to me in the IT world, I also enjoy great relationship with many friends during my days in the IT world. But things change, I am going to pursue another things outside the IT world.I will be entering &quot;silent&quot; mode in blogging. You may not see new blog from me. I will try my best to write a blog entry </atom:summary><link>http://theriyanto.blogspot.com/2007/03/goodbye-it-world.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-932108779982463684</guid><pubDate>Wed, 28 Mar 2007 04:33:00 +0000</pubDate><atom:updated>2007-03-28T11:35:15.516+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">lyrics</category><title>When You Believe</title><atom:summary type="text">Many nights we&#39;ve prayedWith no proof anyone could hearIn our hearts a hopeful songWe barely understoodNow we are not afraidAlthough we know there&#39;s much to fearWe were moving mountains longBefore we knew we couldThere can be miracles, when you believeThough hope is frail, it&#39;s hard to killWho knows what miracles you can achieveWhen you believe, somehow you willYou will when you believeIn this </atom:summary><link>http://theriyanto.blogspot.com/2007/03/when-you-believe.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-4092267096692220472</guid><pubDate>Wed, 28 Mar 2007 04:22:00 +0000</pubDate><atom:updated>2007-03-28T11:33:13.803+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">lyrics</category><title>I Will Win, I Will Lose</title><atom:summary type="text">In the dreams I dreamed as a childI lived my life as a kingMy days were filled with sunshineAnd there was never any painsI will win, I will loseI will live my lifeI will have to make my way on my ownI will win, I will loseI will create my own pathI will play the game of lifeI&#39;ve had brief moments of joyEndless moments of boredomI&#39;ve had days full of sunshineI know what pain is...I will win, I </atom:summary><link>http://theriyanto.blogspot.com/2007/03/i-will-win-i-will-lose.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8149988852725480262</guid><pubDate>Mon, 26 Mar 2007 03:55:00 +0000</pubDate><atom:updated>2007-03-26T10:57:12.240+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacks</category><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Upgrading TrueCrypt</title><atom:summary type="text">On March 19, 2007, TrueCrypt version 4.3 is released. There are many new features, improvements and bug fixes in this release, so I think it is the time to upgrade my installation.I downloaded the TrueCrypt package, but they only provide for OpenSUSE 10.2 system. Last time I used the RPM version, it complained about kernel mismatch. But this time it didn&#39;t complain.Unfortunately, I already have </atom:summary><link>http://theriyanto.blogspot.com/2007/03/upgrading-truecrypt.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-1644013110510981561</guid><pubDate>Mon, 26 Mar 2007 03:52:00 +0000</pubDate><atom:updated>2007-03-26T10:54:07.803+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Computer Virtualization in Java</title><atom:summary type="text">Researchers at Oxford have built an x86 emulator that runs purely on Java, making it ideal for security researchers who want to analyze and archive viruses, host honeypots and defend themselves against buggy or malicious software without hosing their machines. The JPC also emulates a host of other environments, giving technophiles the ability to play Asteroids and other software that&#39;s sat on </atom:summary><link>http://theriyanto.blogspot.com/2007/03/computer-virtualization-in-java.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-7820514193582105119</guid><pubDate>Tue, 20 Mar 2007 02:48:00 +0000</pubDate><atom:updated>2007-03-20T12:37:19.606+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><title>Situs Presiden SBY &quot;Dibobol&quot; ?</title><atom:summary type="text">Saya mengetahui informasi tentang &quot;dibobolnya&quot; situs Presiden SBY melalui sebuah televisi swasta pada hari Sabtu, 17 Maret 2007. Informasi tersebut saya peroleh dari newsline yang berjalan, dengan judul &quot;Situs Presiden SBY di-hack&quot;. Detik telah pula menurunkan berita ini dengan judul &quot;Situs Presiden SBY Dibobol&quot;.Kemudian saya bertanya kepada beberapa orang rekan mengenai kebenaran berita ini, dan</atom:summary><link>http://theriyanto.blogspot.com/2007/03/situs-presiden-sby-dibobol.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8773446659376033944</guid><pubDate>Tue, 20 Mar 2007 02:43:00 +0000</pubDate><atom:updated>2007-03-20T09:45:10.128+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><title>Intrusion Detection RFCs</title><atom:summary type="text">There are now three RFCs regarding Intrusion Detection :RFC 4765: The Intrusion Detection Message Exchange Format (IDMEF)RFC 4766: Intrusion Detection Message Exchange RequirementsRFC 4767: The Intrusion Detection Exchange Protocol (IDXP)</atom:summary><link>http://theriyanto.blogspot.com/2007/03/intrusion-detection-rfcs.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-5452286531886127208</guid><pubDate>Thu, 15 Mar 2007 07:36:00 +0000</pubDate><atom:updated>2008-12-09T23:02:32.928+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacks</category><title>Upgrading to PHP 5.2.x</title><atom:summary type="text">I have been planning to upgrade my PHP to version 5.2.1 since several weeks ago, but I couldn&#39;t find spare time to do that until last night.I upgraded the following packages (libedit is a new install) :# rpm -Uvh php5-5.2.1-15.1.i586.rpm apache2-mod_php5-5.2.1-15.1.i586.rpm php5-gd-5.2.1-15.1.i586.rpm php5-mysql-5.2.1-15.1.i586.rpm php5-zlib-5.2.1-15.1.i586.rpm php5-pdo-5.2.1-15.2.i586.rpm </atom:summary><link>http://theriyanto.blogspot.com/2007/03/upgrading-php-to-php-52x.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9VDf0a6L_oerA-vkHWSP2V5n7gTnBmpx4IFB8mi_goQm40WfX1tY4PLYVEoOUCJ3mDl2K3spLh7NptSDC6skV_HCRSDRBcupSCc3PeYv2_Hr805eBJW79zh4foo5q1XgIygHOdw/s72-c/php-1.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8054524947461061616</guid><pubDate>Thu, 15 Mar 2007 03:04:00 +0000</pubDate><atom:updated>2007-03-15T10:08:17.518+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><title>Paper : Case of Mistaken Identity</title><atom:summary type="text">A University of Washington researchers Kris Erickson and Philip Howard have an interesting new paper out, &quot;A Case of Mistaken Identity? News Accounts of Hacker and Organizational Responsibility for Compromised Digital Records, 1980–2006.&quot;  This is a great survey of the dramatic explosion in reports of breaches.  A couple of great quotes:  One important outcome of the legislation is improved </atom:summary><link>http://theriyanto.blogspot.com/2007/03/paper-case-of-mistaken-identity.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8461504243232959809</guid><pubDate>Tue, 13 Mar 2007 09:00:00 +0000</pubDate><atom:updated>2008-12-09T23:02:33.434+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacks</category><title>Running A Linux System on A Windows Machine</title><atom:summary type="text">If you want to run a Linux system on Windows platform but you  don&#39;t want to deal with partitioning and formatting the harddisk, fortunately you can do so with QEMU.Here is an official information about QEMU : QEMU is a generic and open source machine emulator and virtualizer.  When used as a machine emulator, QEMU can run OSes and programs made for one machine (e.g. an ARM board) on a different </atom:summary><link>http://theriyanto.blogspot.com/2007/03/running-linux-system-on-windows.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix-0MKSc8SwS6I1q2ECwDu998hWueBw8wbfaJa9ITWnhMlLpuzhAFaNt5KPhE3Bl_yBYfJ5vPLhmTW9pFtjyqOf-B2rThAFkqWhc4Tb8HgCGTGPda_GSyCLsaAaNwEtM-KVsLeLw/s72-c/qemu-win-1a.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-9050125196180909035</guid><pubDate>Tue, 13 Mar 2007 06:55:00 +0000</pubDate><atom:updated>2007-03-13T14:07:03.793+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><title>BlackHat DC 2007 Presentations</title><atom:summary type="text">Presentations and whitepapers of BlackHat DC 2007 are now available.You can find them here.Don&#39;t forget to download several presentations that have made news lately :- Practical 10 Minute Security Audit: The Oracle Case- Data Seepage: How to Give Attackers a Roadmap to Your Network- Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case)- Danger From Below: The Untold </atom:summary><link>http://theriyanto.blogspot.com/2007/03/blackhat-dc-2007-presentations.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-6450675224594417441</guid><pubDate>Fri, 09 Mar 2007 05:37:00 +0000</pubDate><atom:updated>2007-03-09T12:40:18.831+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><title>Pictures from Information Security Awareness Day 2007</title><atom:summary type="text">I&#39;ve uploaded several pictures taken by Pak Marsel during the Information Security Awareness Day (March 7, 2007) at BPPT building.You can view the pictures here.Enjoy the view.</atom:summary><link>http://theriyanto.blogspot.com/2007/03/pictures-from-information-security.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-1287660358760731216</guid><pubDate>Fri, 09 Mar 2007 02:02:00 +0000</pubDate><atom:updated>2007-03-09T12:32:44.662+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Hardware-based rootkit detection proven unreliable</title><atom:summary type="text">From ZDNet :For years, we&#39;ve been convinced by companies like Komoku and BBN Technologies that hardware-based RAM acquisition is the most reliable and secure way to sniff out the presence of a sophisticated rootkit on a compromised machine.Joanna Rutkowska, a security researcher at COSEINC Malware Labs, an elite hacker who specializes in offensive rootkit research, has found several ways to </atom:summary><link>http://theriyanto.blogspot.com/2007/03/hardware-based-rootkit-detection-proven.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-7813781411456852060</guid><pubDate>Thu, 08 Mar 2007 02:54:00 +0000</pubDate><atom:updated>2007-03-08T10:19:03.730+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">network tools</category><title>Experiment Computer Networking using Netkit</title><atom:summary type="text">Yesterday, a friend of mine, under the name of &quot;Olyx&quot;, inform me about a cool networking tool called Netkit. At that time, he didn&#39;t give much information about it. He just gave me the information about Netkit.After arrive home from a meeting, I read the Netkit introduction document. Finally, I figured-out that Netkit is a tool to create computer networking environment. Netkit is using User Mode </atom:summary><link>http://theriyanto.blogspot.com/2007/03/experiment-computer-networking-using.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-691987810172875900</guid><pubDate>Tue, 06 Mar 2007 08:16:00 +0000</pubDate><atom:updated>2007-03-06T15:28:57.343+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><title>Vista Research Papers</title><atom:summary type="text">Symantec has released the first three of six technical research papers evaluating Windows Vista security components.The research papers cover a range of Vista security mechanisms in-depth, from its Address Space Layout Randomization (ASLR) technology designed to thwart heap overflows and certain malware attack methods, to buffer overflow protection in Vista&#39;s Visual Studio C++ compiler and an </atom:summary><link>http://theriyanto.blogspot.com/2007/03/vista-research-papers.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-2357927245106762382</guid><pubDate>Tue, 06 Mar 2007 02:11:00 +0000</pubDate><atom:updated>2007-03-06T15:24:54.125+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><title>Threats from Within</title><atom:summary type="text">From DarkReading :Enterprises are leaking an increasing amount of data from the inside, and they aren&#39;t sure what to do about it.  Those are the conclusions of two new studies -- one from the Ponemon Institute and one from Enterprise Strategy Group -- being published today. Both of the reports suggest that enterprises should be shifting their security attention from the outside to the inside. The</atom:summary><link>http://theriyanto.blogspot.com/2007/03/threats-from-within.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8838494501590860109</guid><pubDate>Tue, 06 Mar 2007 02:03:00 +0000</pubDate><atom:updated>2007-03-06T15:25:39.396+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Ferret : A Data Seepage Tool</title><atom:summary type="text">David Maynor from Errata Security has just released a tool called Ferret for data seepage at BlackHat DC 2007.According to the Ferret&#39;s page, data seepage are bits of benign data that people willingly broadcast to the world (as opposed to &quot;leakage&quot;, which is data people want to hide from the world).Examples of data seepage is what happens when you power-on your computer. It will broadcast to the </atom:summary><link>http://theriyanto.blogspot.com/2007/03/ferret-data-seepage-tool.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-2730835136265017931</guid><pubDate>Fri, 02 Mar 2007 03:21:00 +0000</pubDate><atom:updated>2007-03-06T15:26:22.147+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">vulnerabilities</category><title>MOPB Has Begun</title><atom:summary type="text">Starting from March 1, 2007, the Month of PHP Bugs has begun. Here is an excerpt about this project :     This initiative is an effort to improve the security of PHP. However we will not                 concentrate on problems in the PHP language that might result in insecure PHP                  applications, but on security vulnerabilities in the PHP core. During March 2007                  old</atom:summary><link>http://theriyanto.blogspot.com/2007/03/mopb-has-begun.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-3777880466432677889</guid><pubDate>Thu, 01 Mar 2007 03:08:00 +0000</pubDate><atom:updated>2007-03-06T15:27:06.603+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Learning Security using DamnVulnerableLinux</title><atom:summary type="text">If you want to learn security by doing the actual &quot;hacking&quot;, there is a good news for you.Thorsten Schneider of the International Institute for Training, Assessment, and Certification (IITAC) and Secure Software Engineering (S²e) in cooperation with Kryshaam from the French Reverse Engineering Team has released Damn Vulnerable Linux (DVL).Here is the description about DVL : Damn Vulnerable Linux </atom:summary><link>http://theriyanto.blogspot.com/2007/03/learning-security-using.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-8236339129840485009</guid><pubDate>Thu, 01 Mar 2007 02:48:00 +0000</pubDate><atom:updated>2007-03-06T15:28:01.493+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Tool to Steal Browser History</title><atom:summary type="text">pdp has designed a new tool to steal browser history, it&#39;s called Noscript HScan. The interesting thing about this tool is it doesn&#39;t need Javascript to be turn-on.Up until now we thought that by disabling Javascript, we&#39;ll be safe. But apparently, that&#39;s no longer sufficient, now we need to disable CSS too. :D</atom:summary><link>http://theriyanto.blogspot.com/2007/03/tool-to-steal-browser-history.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-1343063201345386423</guid><pubDate>Wed, 28 Feb 2007 04:03:00 +0000</pubDate><atom:updated>2007-02-28T11:23:33.133+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><title>Open Source Web App Security</title><atom:summary type="text">I read a blog posting by Ed Finkler &quot;Do Open Source Devs Get Web App Security?  Does Anybody?&quot;.In it he described disturbing statements contained in one of Open Source Content Management System :A colleague of mine who is dealing with Plone, a CMS system built atop Zope, pointed me to a rather disturbing documents in the Plone Documentation system, one that I feel is indicative of a much larger </atom:summary><link>http://theriyanto.blogspot.com/2007/02/open-source-web-app-security.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-4356643462519707047</guid><pubDate>Fri, 23 Feb 2007 06:08:00 +0000</pubDate><atom:updated>2007-02-23T13:11:30.917+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security guides</category><title>The OWASP Testing Guide v2 is now published</title><atom:summary type="text">I just found out that OWASP has released &quot;The OWASP Testing Guide v2&quot; on February 10, 2007.You can read the guide online at Testing Guide v2 Wiki or you can download it in PDF format.</atom:summary><link>http://theriyanto.blogspot.com/2007/02/owasp-testing-guide-v2-is-now-published.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-3794506326000252602</guid><pubDate>Fri, 23 Feb 2007 05:09:00 +0000</pubDate><atom:updated>2007-02-23T12:14:25.183+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security tools</category><title>Nessus 3.2 beta available for testing</title><atom:summary type="text">Tenable has released Nessus 3.1.2 for Linux, FreeBSD and Solaris which is a beta version of  the upcoming Nessus 3.2.Nessus 3.2 contains the following new features :- Experimental IPv6 support- Improved bandwidth throttling- Extended nessusd.rules to add support for ports and plugins- New command &#39;nessuscmd&#39; which lets you do a quick command-line scan- Improved NASL engine- Easy-update : Nessus </atom:summary><link>http://theriyanto.blogspot.com/2007/02/nessus-32-beta-available-for-testing.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-4612358653857097768</guid><pubDate>Thu, 22 Feb 2007 09:16:00 +0000</pubDate><atom:updated>2007-02-22T16:18:57.386+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">security guides</category><title>NIST Publication on IDS and IPS technology</title><atom:summary type="text">NIST have released a new publication (SP800-94) that covers just about everything you can think of when it comes to IDS and IPS. The report is titled &quot;Guide to Intrusion Detection and Prevention Systems (IDPS)&quot;.</atom:summary><link>http://theriyanto.blogspot.com/2007/02/nist-publication-on-ids-and-ips.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-22172187.post-5203621439719795737</guid><pubDate>Thu, 22 Feb 2007 05:12:00 +0000</pubDate><atom:updated>2007-02-22T12:16:45.176+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">articles</category><category domain="http://www.blogger.com/atom/ns#">links</category><title>Why blurring sensitive information is a bad idea</title><atom:summary type="text">Dheera Venkatraman has published an article describing how to attack blurring image to conceal information.In the article, he describes :Undoubtedly you have all seen photographs of people on TV and online who have been blurred to hide faces.For the most part this is all fine with peoples&#39; faces as there isn&#39;t a convenient way to reverse the blur back into a photo so detailed that you can </atom:summary><link>http://theriyanto.blogspot.com/2007/02/why-blurring-sensitive-information-is.html</link><author>noreply@blogger.com (Tedi Heriyanto)</author><thr:total>0</thr:total></item></channel></rss>