1. Fuzzy Overdrive.

    (Image was http://www.0x000000.com/images/overdrive_crash.gif)

    While working on my new ActiveX fuzzer I needed a break and wrote another html/css fuzzer called fuzzy overdrive. It's a basic concept tool born out of boredom that generates all sorts of HTML and CSS intended to trigger a …

    read more
  2. Never Trash Your Mail.

    I am always excited by new ideas of defeating spam one way or the other. But, just like captcha's the ultimate sollution isn't there yet. Even worse, some methods can open up a whole new can of worms all together. Somewhere in my mind I always compare defeating spam and …

    read more
  3. Opera Arioso II

    Alright, I had a couple of spare moments to work on my new version of Opera Arioso. For those who missed it, it's a User Script written for Opera that behaves like a firewall inside Opera. Unlike other plugins or User scripts, Arioso can detect and block malicious activity before …

    read more
  4. "Mozilla Malware Part I: Hide it."

    I think this is a fun idea to play with, since it surely will happen mainstream sometime, might as well talk about it here.

    Over the coming time I will be writing a couple of articles about Mozilla malware, on how to write it and how to detect it. In …

    read more
  5. ESP Game.

    Apparently this is a online game, but a weird one at it. Taken form their website it says:

    When you play a game at Gwap, you aren't just having fun. You're helping the world become a better place. By playing our games, you're training computers to solve problems for humans …

    read more
  6. Inspire.

    You know, I tend to do different things here on my website mainly because I think that if you want to change something, you have to do something different. Sounds reasonable I guess? Today I have a video I like you to show from Micheal Angelo Batio. He has been …

    read more
  7. Schneier On Chinese Hackers.

    Just after lunch I read an article published by Discovery[1] where Bruce Schneier talks about the "The truth about Chinese hackers"[2]. While reading it I didn't have the impression that it gave a clear answer about the truth. Because I guess you only know the truth if you …

    read more
  8. More MSIE 6 Mayhem.

    update: I got a couple of questions from readers about this find, and they are correct. Sorry guys and girls, I did not verify my results and it seems that it was disclosed before by various bug hunters which I did not know about in a different but similar way …

    read more
  9. Attacking ColdFusion.

    Abstract

    ColdFusion is an application server and software development framework used for the development of web-based applications[1]. ColdFusion is a similar product to Microsoft ASP.NET, JavaServer Pages or PHP. It's syntax is tag- based, and almost resembles HTML or XML like-structure which is very easy to learn and …

    read more
  10. Manipulating Communication.

    Manipulation is all around us in everyday life. By far, everyone can be manipulated in doing something that does not stem form someone's own thoughts. They are influenced thought leading to controlled behavior. Psychology deals with this in a great deal, and has many insights on why people do conform …

    read more

« Page 2 / 53 »