Rodney Campbell's Blog

2007.01.17 Daily Security Reading

by on Jan.18, 2007, under Security

Rainbow table targets Word, Excel crypto

Swiss information-technology firm Objectif Sécurité announced last week that its latest pre-generated list of passwords and their hashes, known as a rainbow table, can now crack the standard encryption on Word and Excel documents in about 5 minutes on average.

The first HD DVD movie has made its way onto BitTorrent

The pirates of the world have fired another salvo in their ongoing war with copy protection schemes with the first release of the first full-resolution rip of an HD DVD movie on BitTorrent. The movie, Serenity, was made available as a .EVO file and is playable on most DVD playback software packages such as PowerDVD. The file was encoded in MPEG-4 VC-1 and the resulting file size was a hefty 19.6 GB.

DRM is not really about piracy

In a nutshell: DRM’s sole purpose is to maximize revenues by minimizing your rights so that they can sell them back to you… Like all lies, there comes a point when the gig is up; the ruse is busted. For the movie studios, it’s the moment they have to admit that it’s not the piracy that worries them, but business models which don’t squeeze every last cent out of customers.

Malware creates new challenges for anti virus vendors

Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines on high risk infectors we are still seeing an increasing overall number of malware infections, it is this new breed of malware that is costing industry millions every year – yet no-one seems to know about them.

Rootkit Basics

Malicious Intrusion Techniques – A Review of Rootkits, Bots, Trojan Horses, and Remote Access Trojans (RATs) (pdf)

If a computer virus or email worm has ever infected your company, the PCs within your environment are prime candidates for further attacks. To protect your company, you should become familiar with these types of vulnerabilities, how they work, and how to detect and prevent these nuisances.

Do Away With HTML Based E-mail

Last week, Microsoft issued a patch to fix an extremely dangerous flaw in Windows that cyber crooks could use to break into your computer just by getting you to open an e-mail.

Review of 6 Rootkit Detectors

This issue became big last year when Sony released some music CDs which came with a rootkit that silently burrowed into PCs. This review looks at how you can block rootkits and protect your machine using F-Secure Backlight, IceSword, RKDetector, RootkitBuster, RootkitRevealer, and Rookit Unhooker.

Loading Facebook Comments ...

1 Comment for this entry

  • Tim

    r.e. DRM is not really about piracy.

    Another example of this is the Apple iPod DRM system. For the most part Apple isn’t so much concerned that customers may play pirated music on their iPods, but keen to prevent iPod customers migrating to alternative players once they get around to replacing their iPods.

    By building up and purchasing a library of Apple i-Tunes purchased and DRM protected music, the customer is more or less forced to buy a second iPod . Either that or repurchase all your old tunes.

    …and the easy-to-scratch surface of iPods only helps speed up the replacement cycle too.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.