TrueCrypt – not as secure as I thought.
On Wednesday, I wrote about TrueCrypt, and the requirement to create a Rescue Disk if you were going to use System Encryption. I looked into that, as I was setting…
On Wednesday, I wrote about TrueCrypt, and the requirement to create a Rescue Disk if you were going to use System Encryption. I looked into that, as I was setting…
Update: TrueCrypt 7 and later will allow you to bypass this check. TrueCrypt, the freeware open source disk encryption product, allows you to encrypt your whole hard drive. TrueCrypt calls…
Five Pervasive Myths About Older Software Developers I recently celebrated my 40th birthday. A friend joked to me, “Hey, guess that means you’re too old to program anymore!” I laughed…
At work, I’m working on a registry key permission error. Something which worked on Windows 2000, now doesn’t work on Windows XP. It’s security related, hope to solve it today.…
Dealing with VMs, Snapshots and the dreaded broken security channel The problem with that perfect world is that you might want to snapshot a single machine to perform a what-if…
This is a small script I wrote many years ago to uninstall security patches. I customise it when I need it. In this example, I’ve customised it for MS09-032, but…
It was a Microsoft Word (VBA) application written back in 2001. Essentially what it does is: user selects a letter type. the user then enters some customer reference numbers. the…
Imagine this. You are a power generating company (PGC). You have a virus outbreak on your network. It infects your SCADA PCs. WTF?!? SCADA. Supervisory Control And Data Acquisition. In…
One thing I have noticed is that the shelf-life of a Ralph modem seems rather limited. So, for your consideration, this is a screenshot from an “inappropriate software report”. Now,…
Had a customer IT Security Team, let’s call them FREDNET, ask me for some advice on graphical desktop sharing and control system. Think VNC, Dameware, PC Anywhere. Here is what…