Winpcap 4.1.2 Released

Published by hirantha at 11:12 PM under Networking

Check it out here : http://www.winpcap.org/install/default.htm

  [Twitter] [Digg] [Facebook] [Google] [StumbleUpon]



E-mail | Permalink | Trackback | Post RSSRSS comment feed 0 Responses


VMware ESX/ESXi Updates

Published by hirantha at 9:43 AM under VMWare | Security

VMWare released a security update pertaining to ESX/ESXi which addresses a number of security vulnerabilities (43 or so) in ESX/ESXi 4.0.

Complete update can be found here : http://lists.vmware.com/pipermail/security-announce/2010/000093.html

resource for hardening vShere : http://blogs.vmware.com/security/2010/04/vsphere-40-hardening-guide-released.html

  [Twitter] [Digg] [Facebook] [Google] [StumbleUpon]

Tags: ,


E-mail | Permalink | Trackback | Post RSSRSS comment feed 0 Responses


How Unique is your web Browser ?

Published by hirantha at 8:05 PM under Security | Internet Explorer | Firefox | Chrome | Opera

Electronic Frontier Foundation (EFF) has published a paper on browsers being tracked by it's unique fingerprint. It turns out our browsers are more unique than we would like to think they are so it is possible for websites to track users around using the unique fingerprint. While it may not be possible to know the exact user's identity, tracking from one web location to another is definitely a possibility. User agent string, system fonts, screen resolutions and much more of the computer attributes all contributes to the unique fingerprint of computer + browser combination. Disabling Javascript and active contents help with this a little bit but you need to decide whether privacy is worth losing the ability to view the active content.

To test how unique your computer + browser combination, goto https://panopticlick.eff.org/ and click on the "Test Me" button.


Full paper can be found at https://panopticlick.eff.org/browser-uniqueness.pdf

  [Twitter] [Digg] [Facebook] [Google] [StumbleUpon]

Tags: , , , ,


E-mail | Permalink | Trackback | Post RSSRSS comment feed 0 Responses


Microsoft Security Advisory – IE6 and IE7

Published by hirantha at 1:21 PM under Security | Microsoft | Internet Explorer

This Microsoft advisory outlines a vulnerability in Internet Explorer 6 and 7, which could allow remote code execution.  While there are some mitigations available for IE7 (the Enhanced Security Mode) in Server 2003 and Server 2008, the best advice is to upgrade to Internet Explorer 8, which is not vulnerable.

Microsoft Security Advisory (981374)

  [Twitter] [Digg] [Facebook] [Google] [StumbleUpon]

Tags: , ,


E-mail | Permalink | Trackback | Post RSSRSS comment feed 0 Responses


Bluetooth Pairing with Windows Mobile

Published by hirantha at 11:01 AM under Bluetooth | Microsoft

I have been trying to pair my windows mobile device with Mercedes Bluetooth unit. For some reason, the Mercedes Bluetooth unit could see the phone, but wasn't successful paring with it. I've been looking around internet for a while now trying to find a solution to the this issue, and have finally found a solution. This is just a combination of instructions from various  sources and I’ve put them together.

It's actually probably not the Bluetooth devices fault. Bluetooth devices identify themselves as a certain type of unit. For example, headsets as headsets, phones as phones. Interestingly, Windows mobile units identify themselves as PDA's not phones.  This need to be changed for the Bluetooth unit to recognize the phone. But this needs editing the registry of the Windows Mobile phone.

If you're not comfortable with editing the registry, don't do it. It can and will mess up your phone if done wrong. 

1. download and install CeReg editor (http://ceregeditor.mdsoft.pl/) on a Desktop PC. Its a simple registry editor for windows mobile.

2. Connect the windows mobile unit using USB and Open the registry using CeReg.

3. Edit the following value

"COD"=dword:52020C (hex)


4. Change the value to 1048852 (Decimal)


5. Reset the phone

6. If the device is already paired, delete the pairing, and start from scratch. This time it should work as the accessory is seeing the device as a phone, not a PDA.

  [Twitter] [Digg] [Facebook] [Google] [StumbleUpon]

Tags: , ,


E-mail | Permalink | Trackback | Post RSSRSS comment feed 0 Responses