Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 30 declined, 0 accepted (30 total, 0.00% accepted)

+ - Windows XP added security. ASLR,SEH,FSVulnerabilit->

Submitted by iiiears
iiiears writes: wehntrust.codeplex.com â" WehnTrust is a Host-based Intrusion Prevention System (HIPS) for Windows 2000, XP, and Server 2003. It includes support for exploit mitigations that are designed to make exploitation more difficult by preventing the use of specific exploitation techniques and by making exploitation unreliable. ASLR,SEH,FSVulnerability Prevention. Source code Available
Link to Original Source
Privacy

+ - Forensics: "File System Spoofing." ->

Submitted by iiiears
iiiears writes: Currently, Casper may select fake root file system image on evidentiary media (e.g. HDD), because there are no authenticity checks performed (except optional UUID check for a possible live file system), and this fake root file system image may be used to execute malicious code during the boot with root privileges.
Link to Original Source
Security

+ - Hardware Threat BIOS Rootkit. "Mebromi"->

Submitted by iiiears
iiiears writes: Mebromi and contains a bit of everything: a BIOS rootkit specifically targeting Award BIOS, a MBR rootkit, a kernel mode rootkit, a PE file infector and a Trojan downloader. At this time, Mebromi is not designed to infect 64-bit operating system and it is not able to infect the system if run with limited privileges.
Link to Original Source

The last person that quit or was fired will be held responsible for everything that goes wrong -- until the next person quits or is fired.

Working...