Wednesday, September 27, 2006

Thursday, September 07, 2006

Tuesday, August 29, 2006

Monday, July 17, 2006

Red thread factsheet

Red thread factsheet: "RED THREAD ON TURFGRASS"

Red thread occurs in the spring and fall during humid periods when the air temperatures are between 16°C and 24°C (60°F and 75°F). The disease is especially severe on slow-growing nitrogen-deficient turf. Bluegrasses (Poa sp.), fescues (Festuca sp.), ryegrasses (Lolium sp.), and bentgrasses (Agrostis sp.) can be affected. Fine-leaved fescues and some ryegrasses are particularly susceptible.

Wednesday, July 05, 2006

Jameser's Tech Tips: Tip #6: Recovering Deleted Files

Today's tip is on recovering deleted files from your hard drive... Accidentally deleting files is something we all try to avoid, but it can happen on occasion...
Jameser's Tech Tips: Tip #6: Recovering Deleted Files

Wednesday, June 14, 2006

Gmail - Nmap 4.10 Released

Hello everyone,

I am pleased to announce the release of Nmap 4.10. The 10 Google SoC students are hard at work and have already produced some interesting patches. And I'm itching to make some big changes as well. So I decided to produce a release before destabalizing the tree with all of this development work. Especially since 4.10 includes many important changes that deserve to go out ASAP. For example, we have integrated all of your version detection submissions (about a thousand) for Q1, bringing the DB up to 3,441 signatures representing 401 protocols! The output format has been changed a bit to allow multiple ignored port states. So if you scan a machine with thousands of ports in both the filtered and closed states, your terminal will no longer be flooded with pages of output. Meanwhile the ICMP rate limit detection algorithms have been tweaked for better performance. Oh, and we're putting out a call for ASCII artists. ./configure for details. Read on for dozens of other changes.

As always, Nmap is available from:
http://www.insecure.org/nmap/download.html

Gmail - Nmap 4.10 Released

Tuesday, June 06, 2006

Hack Attack: Turn your $60 router into a $600 router - Lifehacker

Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular old $60 router into a powerful, highly configurable $600 router. The router has an interesting history, but all you really need to know is that the special sauce lies in embedding Linux in your router. I found this project especially attractive because: 1) It’s easy, and 2) it’s totally free.
Hack Attack: Turn your $60 router into a $600 router - Lifehacker

Inside the Linux boot process

The process of booting a Linux® system consists of a number of stages. But whether you're booting a standard x86 desktop or a deeply embedded PowerPC® target, much of the flow is surprisingly similar. This article explores the Linux boot process from the initial bootstrap to the start of the first user-space application. Along the way, you'll learn about various other boot-related topics such as the boot loaders, kernel decompression, the initial RAM disk, and other elements of Linux boot.
Inside the Linux boot process

Wednesday, May 31, 2006

Schneier on Security: Data Mining Software from IBM

In the long term, corporate data mining efforts are more of a privacy risk than government data mining efforts. And here's an off-the-shelf product from IBM:

IBM Entity Analytic Solutions (EAS) is unique identity disambiguation software that provides public sector organizations or commercial enterprises with the ability to recognize and mitigate the incidence of fraud, threat and risk. This IBM EAS offering provides insight on demand, and in context, on "who is who," "who knows who," and "anonymously."

Schneier on Security: Data Mining Software from IBM