I have updated my iptables scripts today, mostly minor improvements and documentation updates in fw_laptop. I also added a new script called fw_blockall, which literally blocks everything (incoming, outgoing, and forwarded packets, packet from/to localhost, pings). This might be useful sometimes.
Any comments and suggestions for improvements are highly welcome!
You thought that after the International Obfuscated C Code Contest, the Obfuscated Perl Contest, the International Obfuscated Ruby Code Contest and even the Obfuscated V contest nothing could surprise you anymore? Think again.
The goal of the annual Underhanded C Contest is to
write innocent-looking C code implementing malicious behavior. In many ways this is the exact opposite of the Obfuscated C Code Contest: in this contest you must write code that is as readable, clear, innocent and straightforward as possible, and yet it must fail to perform at its apparent function. To be more specific, it should do something subtly evil.
This year's challenge: covert fingerprinting. Write a program that performs some basic image-processing operation, but hides a unique fingerprint in the image it outputs.
The submission deadline is July 10th, 2005.
(via Bruce Schneier)
why the lucky stiff (of Why's (Poignant) Guide to Ruby fame) has some very helpful insights on how the Ruby garbage collector works and when it is invoked. This knowledge will come very handy when you try to optimize your Ruby programs.
Read his article The Fully Upturned Bin for all the gory details.
I'm currently trying to reduce the backlog regarding my Debian work. Today I packaged the new upstream release of Crimson Fields, a turn-based strategy game in the tradition of Battle Isle (tm).
Expect more updated packages and a few ITPs (Intent To Package) soon.
There will be multiple lectures on a broad range of security topics as well as several hours per day where the students will be hacking and researching "offensive information warefare".
The course itself is free, but you have to pay and organize your hotel etc. yourself.
The FAQ, the homepage from last year's summerschool and the paper "An Offensive Approach to Teaching Information Security" (PDF) by the organizers provide more information.
I'd like to go, but I'm not sure whether I will find some hotel which is cheap enough for a poor student like me ;-) We'll see.
(via disLEXia 3000)