RSS
 

Archive for April, 2006

The Internet Hash Project!!

25 Apr

Are they jocking or what!!

(( http://www.nethash.org )) 

I doubt that they can deceive many people… It’s quite funny though! :mrgreen:

——————————————————————————————

 

Infosecurity Europe 2006 is in London next week!

22 Apr

InfoSecurity Europe 2006 commences in London next week (25th to 27th of April) with good number of educational and industrial presentations and more than 300 exhibitors…
InfoSecurity Europe is the “Europe’s most comprehensive convergence of information security professionals”..
I’ll be there :)

 

Infosecurity Europe 2006

—————————————————————————————–

 
 

!!رئيس سلطة النقل في لندن: لن نعتمد أجهزة فحص الركاب في مترو الأنفاق

22 Apr

صرح رئيس سلطة النقل في العاصمة لندن مؤخرا بأنه شخصيا لا يميل أبدا إلى اعتماد أجهزة فحص الركاب في محطات متروا الأنفاق لأسباب تبدو منطقية.. إلا أن هذا الخبر في رأيي هو بمثابة “بشرى” سارة للإرهابيين للأسف … أجهزة الفحص هذه تم اقتراحها من قبل الحكومة البريطانية بعد أحداث السابع من يوليو الدامية .. و تقوم هذه الأجهزة بفحص دقيق بالأشعة السينية لإكتشاف المواد المتفجرة.. و تمت تجربتها في محطة بادنغتون في العاصمة لندن، كما تمت تجربتها في مطار هيثرو الشهير.. و كانت تعمل بنظام الفحص الذكي و هو نظام يعتمد على اختيار أشخاص محددين للفحص و ليس جميع الركاب

:الحجج التي ساقها رئيس سلطة النقل لرفض نظام الفحص تتمثل في ثلاثة نقاط
 هذه الأجهزة ليست عملية!! .. الناس يستخدمون المترو بحثا عن السرعة و هذه الأجهزة تعطل حركتهم -
لا يوجد مكان كافي في كل المحطات لاحتواء هذه الأجهزة التي تعتبر ضخمة نوعا ما -
وضع هذه الأجهزة سيخلق مشكلة أمنية جديدة… فطوابير المنتظرين للفحص قد تشكل هدفا -
لعملية إرهابية!!.. و هذه نقطه هامة في رأيي

و أخيرا يبدو أن البقاء على إستخدام الكلاب المدربة لإكتشاف المواد المتفجرة هو الحل الأمثل لدى رئيس سلطة النقل في الوقت الحالي

رابط الخبر: إضغط هنا

——————————————————————————————

 
 

Do you believe in “good-guy hackers”!?!

21 Apr

In my opinion there is nothing like “good-guy hackers” or “ethical hacking”!!
there is a naming crisis!!… Hacking is hacking!! just like stealing is stealing and killing is killing… there is nothing ethical about it!!

We don’t use terms like “ethical-killing” instead of “execution” in the death penalty context!! we don’t use terms like ”ethical-stealing” for instance.. do we?!
I think we must be careful naming such activities, or we will face a massive number of “hackers” claiming they are good guys!!
It’s said that many people became thieves after Robin Hood’s death… claiming they are well-intention thieves!! :mrgreen:

 

Anyway, check out this article: Press Here

—————————————————————————————–

 

Bruce Schneier & The National ID Cards!

16 Apr

OK, I know that this topic has been over-consumed; however I really found this article written by “the” Bruce Schneier quite interesting!

Again, why does Bruce disapprove of any intentions to construct a National ID Cards scheme in the U.S.?!
He says: “…
my primary objection isn’t the totalitarian potential of national IDs, nor the likelihood that they’ll create a whole immense new class of social and economic dislocations. Nor is it the opportunities they will create for colossal boondoggles by government contractors. My objection to the national ID card, at least for the purposes of this essay, is much simpler.
It won’t work. It won’t make us more secure. In fact, everything I’ve learned about security over the last 20 years tells me that once it is put in place, a national ID card program will actually make us less secure.
” !!

I have to admit that as a security specialist I find his arguments confessing and logical!!
Once again, I do agree with Bruce…
The Article:
Press Here

—————————————————————————————

 

!!هل انت متخصص في أمن المعلومات؟ إذا عليك أن تدرس علوم الأحياء

15 Apr

نشرت يوم أمس Bob Brown في مقالة للسيد
حث خبراء أمن المعلومات بالإستفادة من طريقة عمل نظام المناعة في الكائنات الحية لتحصين أنظمتهم ضد الفيروسات … السيد بروان و نقلا عن البروفيسورة ستيفن فورست أستاذة أمن المعلومات في جامعة نيو ميكسيكو في الولايات المتحدة الأمريكية.. يدعي أنه من أهم أسباب نجاة الكائنات الحية من ضربات الفيروسات المميته هو أن أجهزتها المناعية تختلف.. حتى داخل نفس الفصيلة من الكائنات الحية.. مثلا عندما يضرب فايرس قاتل منطقة ما و يصاب به عدد كبير من الأشخاص.. فإنه ليس من الضروري أن يموتوا جميعا.. و ذلك يرجع لإختلاف أجهزتهم المناعية .. و لهذا فالسيد براون يرى أن كون الأجهزة المناعية في أغلب الأجهزة حول العالم متشابهة و المقصود هنا هي أنظمة الحماية ضد الفايروسات، فإن تأثير الفايروسات سريعة الإنتشار كفايرس البلاستر مثلا يصيب معظم الأجهزة بالشلل أو يقضي عليها

و جهة نظر تستحق الوقوف عندها
إضغط هنا : المقالة

——————————————————————————————–

 

New version of (Windows Defender)

10 Apr

Lately, a newer version of the (free) Windows anti-spyware (Windows Defender) has been released.. I’d recommend trying it…
You can find (Windows Defender) here:
http://www.microsoft.com/athome/security/spyware/default.mspx

——————————————————————————————–

 
 

The Top 10 Information Security Myths!

05 Apr

Joanne VanAuken has come-up with 10 concluded points which he called (Information Security Myths)… I liked them actually, and I do agree with most of them, especially the last one!!

MYTH #1: Organizations are more secure now than they were a year ago.

MYTH #2: The presence or absence of regulations greatly matters when it comes to protecting customer data.

MYTH #3: External consultants know more about information security than in-house personnel do.

MYTH #4: Information security must be managed as a separate business unit to be effective.

MYTH #5: Complex, frequently changed passwords will make my enterprise secure.

MYTH #6: The padlock icon present during an SSL session means my data is safe.

MYTH #7: Migrating from Internet Explorer to Firefox will make my enterprise secure.

MYTH #8: Increased security spending results in greater security.

MYTH #9: Wireless networks aren’t secure.

MYTH #10: Dumping Windows for Linux will increase security.

The article: Press Here

———————————————————————————————

 

Again… Google!!

04 Apr

I wrote days ago about how severe is what I called “Google Phenomenon” in terms of protecting internet users privacy..
Today I’ve read this article which claims that there are “legal implications” of using (Google Desktop)!!
Press Here

———————————————————————————————

 

Firewall the movie…!

01 Apr

Yesterday I watched the new Harrison Ford’s movie ”Firewall” …
Despite some few “irrational” events in the movie; it raised a serious issue –> What about the safety of the security people!!!.. they know the passwords (or at least they can reset them!!), the systems specifications and mostly how to breach them!!
Security specialists working in critical positions should be paid for the risk they’re in!!

the film is good, however after watching it I think I should consider switching to another major!! :mrgreen:

———————————————————————————————

 

Royal Holloway’s ISG and The Da Vinci Code!!

01 Apr

I’ve just read this “old” article published in THE GUARDIAN… I’d agree that mentioning “Royal Holloway’s ISG” in the “best seller” novel (The Da Vinci Code) gave boosts to Royal Holloway.. but I think it gave boosts to the novel itself too!!

  

THE GUARDIAN
Donald MacLeod – Thursday August 7, 2003
Bestseller Gives Boost To Royal Holloway
A London university is basking in its reputation as a training ground for top sleuths after enthusiastic mentions in a new conspiracy thriller.

Following glowing references in The Da Vinci Code, which currently tops the US bestseller lists, Royal Holloway, University of London is hoping for an increase in student applications.

In the book, author Dan Brown reveals that his heroine, French cryptographer Sophie Neveu, was trained at what he calls “the Royal Holloway” – and evidently learnt her stuff, to judge by the praise she gets from her fellow spook, the impeccable Brit, Sir Leigh Teabing.

While the dialogue may sound unconvincing to British readers – Sir Leigh, a historian of the Knights Templar, remarks at one point “Help yourself to tea and savoury snacks” – Brown has done his research.

Royal Holloway really does have an internationally rated cryptogophy group of academic researchers. The Information Security Group of computer scientists and mathematicians, led by Professor Fred Piper, won the Queen’s Anniversary Prize in 1998 and is one of the largest academic security groups in the world. Their work on cryptographic algorithms is of great interest to e-commerce and organisations using smart cards – as well as thriller writers.

The Da Vinci Code is currently giving Royal Holloway a lot more profile than a Queen’s award. Described by Guardian reviewer Mark Lawson as “450 pages of irritatingly gripping tosh,” the book features a “young Parisian dechiffreuse who had studied cryptography in England at the Royal Holloway”.

As she gets involved in helping Sir Leigh solve the convoluted conspiracy, he remarks: “Your English is superb.”

“Thank you. I studied at the Royal Holloway.”

“So, then, that explains it.” Teabing hobbled lower through the shadows. “Perhaps Robert told you I schooled just down the road at Oxford.”

In a later scene Royal Holloway’s teaching standards get a ringing endorsement.

“There’s an easier way,” Sophie said, taking the pen from Teabing. “It works for all reflectional substitution ciphers, including the Atbash. A little trick I learned at the Royal Holloway.”

Sophie wrote the first half of the alphabet from left to right and then, beneath it, wrote the second half, right to left. “Cryptanalysts call it the fold-over. Half as complicated. Twice as clean.” Teabing eyed her handiwork and chuckled.

“Right you are. Glad to see those boys at the Holloway are doing their job.”

What better publicity to launch Royal Holloway’s e-masters in information security, which will be available next month on through the University of London external programme?

Not wishing to steal all the limelight, Royal Holloway’s press officer Katie Price does concede that Sophie Neveu does drop into King’s College London as the plot thickens to make use of a theological database which provides further vital clues.

———————————————————————————————