Rank2Traffic is a rather nice service to compare local newspapers or check network traffic trends for public sites over time.
A practical guide to privacy online
In respect of privacy on internet there are a lot of tools and techniques available to minimize your traces. Tor Browser is one such “tool” if you like to appear anonymous while browsing the web.
Privacy tools.ic has made a rather nice list of VPN providers, browsers, configurations, ad-ons, even OS do’s and don’ts. Check it out here.
By the way, if you don’t use it yet, test Firefox with Web Developer ad-on, or all extensions for Chrome that can be used to show what sites you visit can see and not.
Can’t fint the password for Windows Homegroup file sharing?
Had an issue with Windows 10 file sharing in my home network the other day. The issue was that when I was to connect one of my Windows machines to the Homegroup, all of them were saying “USER on PC has created a homegroup on the network”, where USER and PC listed on one machine was the one of the other on the network. That was fine, until I were to connect and was promped to enter a password – WHAT PASSWORD?
The reason was aparently that when multiple machines had created a Homegroup for file and printer sharing, none of them showed the Homegroup password to be used.
The solution was apparently (after fidling with it for a while) to turn all machines off, start one of them over again and finally I could establish a Homegroup and got the password required for the other machines to use.
Here is Microsofts response to the issue.
How not to do Information Security
Nice blog post from Lenny Zeltser about mistakes to avoid working with Information Security. Most are probably obvious for many of you, but still… How many do just “Ban the use of external USB drives while not restricting outbound access to the Internet”? 🙂
Whaling against the c-suite
Phishing is noicy if you know what you are after, whaling is more targeted. What would your C*O do with a sophisticated whaling attack?
Interesting article reflecting on whaling trends.
A quick peek into mainframe security in Insecure magazine
The magazine is free here.
Tor visualized
SlemBunk, yet another trojan app targeting those “stupid” users
Again, for this one to work, even on Android they need user interactions. And what is more clever than making it a drive-by exploit pushing apks on porno sites.
However I like the effort for hiding the malicious code: “This “dropper” app is using a packing technique to hide some functions that generate code on the fly and save it to another temporary APK in the device’s storage…” Read more here.
Simple file recovery
Have been out travelling in south america, and guess what. Corrupted camera memory cards are rather common. Used the simple recovery tool Recuva from Piriform to crawl a friends photos and videos from a corrupted and later formatted memory card. Worked perfectly and best of all it has a great user interface, compared to all those command line forensic toolkits such as Skalpel and Foremost.
Check it out here
Just Spotted an Airplane Glory
I was out flying the other day, coming home from a weekend at the west coast of Norway. In the air, sitting at the window I spotted this Glory phenomenon. I found it very exciting and took a few photos. The phenomenon is covered in this Wikipedia site. Continue reading “Just Spotted an Airplane Glory”