Friday, February 08, 2002

ABI- CODER
This free file encryption software uses a 448 bit Blowfish and 168 bit 3DES encryption algorithms. ABI- CODER allows you to encrypt files and folders with just a click of the mouse. ABI- CODER also allows you to create self-decrypting files that allow you to send or transfer encrypted files to people that do not have our software installed on their computers. ABI- CODER is extremely easy to use. It even changes the icons of encrypted files allowing you to easily see which files are secured. The best part is that ABI- CODER is FREE- No Cost, No Nags, No Limits.

Internet anonymity for Windows power users
Our previous article, "Do-it-yourself Internet anonymity" was targeted towards average Windows users. It generated a startling number of e-mail requests for some advanced tactics, which I'm happy to supply. However, power user or not, I'd recommend at least skimming the earlier article if you haven't read it, just to ensure that you're not forgetting something obvious and useful. I'm not going to re-cap much of it here.

Thursday, February 07, 2002

Microsoft's Really Hidden Files: A New Look At Forensics
There are folders on your computer that Microsoft has tried hard to keep secret. Within these folders you will find two major things: Microsoft Internet Explorer has not been clearing your browsing history after you have instructed it to do so, and Microsoft's Outlook Express has not been deleting your e-mail correspondence after you've erased them from your Deleted Items bin. (This also includes all incoming and outgoing file attachments) And believe me, that's not even the half of it.

When I say these files are hidden well, I really mean it. If you don't have any knowledge of DOS then don't plan on finding these files on your own. I say this because these files/folders won't be displayed in Windows Explorer at all -- only DOS. (Even after you have enabled Windows Explorer to "show all files.") And to top it off, the only way to find them in DOS is if you knew the exact location of them. Basically, what I'm saying is if you didn't know the files existed then the chances of you running across them is slim to slimmer.

It's interesting to note that Microsoft does not explain this behavior
adequately at all. Just try searching on microsoft.com.

Wednesday, February 06, 2002

Australasian Information Security Evaluation Program
The products in the following section have been accepted into the Australasian Information Security Evaluation Program (AISEP) run by the Defence Signals Directorate. The AISEP is a commercial program in which evaluations are performed by licensed commercial facilities, known as AISEFs (Australasian Information Security Evaluation Facilities).
While there is no guarantee that products in the following section will complete evaluation successfully, acceptance into the program indicates that both the AISEF performing the evaluation and DSD believe that the product has a reasonable likelihood of meeting the requirements of the target evaluation level.

Monday, February 04, 2002

Public Configuration Documents
Here are several links to general configuration documents.