Thursday, February 07, 2008
Thursday, January 24, 2008
"How Do I?" Videos for Security from MSDN - Amazing Resource
ZIP WMV iPod MP4 3GP Zune PSP
Audio Downloads:
AAC WMA MP2 MP3 MP4
Some Interesting Videos |
Posted by
Chinmay
at
Thursday, January 24, 2008
0
comments
Labels: .Net
Why Google Group should still be in BETA!!!
Many a times people blame me to be a "M$ and rest of the world", while upto certain extent it is true, but then I like to be truthful, I love to go and get the best. For people who don't know me well, my default search engine is Google. Also, after my corporate M$ Exchange A/C, it's Gmail and blogging site I use is Blogger. In discussion groups I use Google Groups and sometimes.. yes sometimes 'cause this is something that keeps hitting me in the face since we have started. The UI is simple..true..but what good is UI if its not working at all? Apart from other dirty problems I face, one thing I must tell you guys is the search within the group, it sucks...so much I don't have words.(Infact, I have but I cant use them here. :P).
Today, I was looking for an old article I wrote on Security on Gmail and Browsers. And out of curiosity instead of having a right term, I put google and then it all started, all the first result sets are...check out the attached video for the surprise. High-Res Video is available here.
Posted by
Chinmay
at
Thursday, January 24, 2008
0
comments
Thursday, December 27, 2007
Windows Scripting : A Starter Pack
I've been in love with scripts since a long time and I've got a lot of resources. Depending upon your area of interest and expertise on Scripting,
Here are some starting points you can choose from :
Sr. No. | Link | Comments |
1 | My personal favourite | |
2 | TechNet Script Center | |
3 | http://www.microsoft.com/technet/scriptcenter/guide/sas_vbs_overview.mspx?mfr=true | VB Script Primer |
4 | http://www.microsoft.com/technet/scriptcenter/guide/sas_wsh_overview.mspx?mfr=true | WSH Primer |
Posted by
Chinmay
at
Thursday, December 27, 2007
0
comments
Labels: Microsoft
Saturday, December 22, 2007
Book Info : The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick
After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.
Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.
Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency--an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is "Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera--and carry more insurance. --Steve Patient, amazon.co.uk
From Publishers Weekly
Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security. It's not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it's a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it's a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick's descriptions of how he actually hacked into systems. As a manual for a would-be hacker, it's dated and nonspecific better stuff is available on the Internet but it teaches the timeless spirit of the hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxicating sense of power that comes only from stalking and spying.
Posted by
Chinmay
at
Saturday, December 22, 2007
0
comments
Friday, December 14, 2007
NET Web Product Roadmap (ASP.NET, Silverlight, IIS7)
Also, Web Developers and Wanna-Bes should check IIS 7.0.
Posted by
Chinmay
at
Friday, December 14, 2007
0
comments
Sunday, November 25, 2007
Visual Studio 2008 and .NET Framework 3.5 Training Kit on MSDN
Posted by
Chinmay
at
Sunday, November 25, 2007
0
comments
Thursday, October 18, 2007
What's Going On My Side
Posted by
Chinmay
at
Thursday, October 18, 2007
0
comments
Tuesday, October 02, 2007
Brand New Cool Hotmail Domains
Posted by
Chinmay
at
Tuesday, October 02, 2007
0
comments