IT Security

Here’s how to delete all of the data from your old BlackBerry after you’ve upgraded to a new one, or whatever.

Options > Security > General settings > Click on the Password field > Select Wipe Handheld.

 You will be asked to type in ‘blackberry’ in order for the procedure to commence. Within 2 minutes, your BlackBerry should be clean as a whistle.


Libya is buying 1.2 million laptops for its children. The agreement for the purchase is through the One Laptop per Child project, which is run by Nicholas Negroponte, brother of John Negroponte.

I have a two things to say to this purchase:

  1. Hooray for Libya! Hooray for Libya’s kids!
  2. WTF USA? WTF England, France, Germany, Canada, et al? Way to take care of your kids.

More on OLPC later. I have opinions on that I urgently want to share, but not to day.

Think that $250 million is a lot of money even to a G-8 country? $250 million represents almost exactly what Halliburton was reimbursed when the U.S. Army decided, in February 2006, not to dispute the company’s cost accounting, even though the Pentagon’s own auditors had identified those costs as potentially excessive.

Alright. The world is ending. I’m tired of giving my blog the silent treatment. And Internet Explorer 7 is expected to be pushed out to all Windows Update and Microsoft Update subscribers tonight.

Can I just say that IE 7 was kind of a bear to deal with when blogging because of the safety features? Oh well. I’ve committed now. I’ll continue to show Lebenzeichen.

AWW! Crapola. IE 7 doesn’t come with tonight’s smorgasbord. Rather it’s coming later in October. or something.

I’ve been playing around with Tor and Vidalia for a while now. Tor is a tool for hiding browsing information and Vidalia is the management tool for the “onion skin” routers that one bounces through when using Tor.

The Tor/Vidalia and, now, Torpark, remind me a little bit of TriangleBoy, which was a tool developed in the to anonymously surf the web. TriangleBoy was developed with money from the NSA.

Anyway, Torpark is really cool in that it is less of a hassle than Tor/Vidalia bundle. I will give a more thorough review later, but for now there seems to be a few sites that have picked up on its release.

2600‘s summer 2006 edition contains these highlights:

  1. An interesting article on account security on T-mobile and Cingular phones;
  2. Ways to get downloads from Warner Brothers Records, legally;
  3. Facebook hacking;
  4. How to get around GPOs on Windows machines;
  5. How to bypass the program security (i.e., MCX) in Mac OS X.

At Black Hat 2006, David Maynor and John Ellch showed off wireless hacking of a MacBook. Windows and Linux also show vulnerabilities, of course, but attacking a Mac was just too tempting, apparently.

There’s a video of the demo on the site. And a follow up post.

Black Hat 2006

Black Hat 2006 USA starts tomorrow in Los Vegas and has an interesting schedule, with sponsors including Microsoft and Cisco. Apparently, Microsoft is showing off the security of Internet Explorer 7 and Vista at the show.

I would love to go to the conference. Perhaps next year…

If you’re interested in a taste, there are copies of the Power Point presentations from Black Hat 2006 Europe and Fed available, with audio archives forthcoming.

If you for some reason think that this is only for illegitimate root kiddies, think again. It can become an important part of your skillset, if you take the time.

Next Page »