Monthly Archives: Feb 2008

Change the default search in the Flock Browser

I really enjoy using the Flock browser, but for one HUGE annoyance. Why oh Why did they have to use Yahoo as the default search engine and then making it stupid to change. You would assume that changing the default under Search preferences that it would change it when using the URL bar to search, but no. I found instructions by aRugus Chang not using Yahoo of course but Google. To do it takes 5 steps

  1. Open a new tab and type “about:config” in the URL bar
  2. Type
  3. Double click the entry and change to “Google”
  4. Type keyword.url
  5. Double click the entry and enter “”

This will change searches to use as this is the url for South Africa, but you could use for Google UK or what ever the tld is for your Google search. You can also change this to Live search, if you really want seeing is it is better than Yahoo. To do this use “Live” in step 3 and “”

Disk encryption may not be secure enough, new research finds – CNET

Disk encryption may not be secure enough, new research finds | The Iconoclast – politics, law, and technology – CNET

Computer scientists have discovered a novel way to bypass the encryption used in programs like Microsoft’s BitLocker and Apple’s FileVault and then view the contents of supposedly secure files.

In a paper (PDF) published Thursday that could prompt a rethinking of how to protect sensitive data, the researchers describe how they can extract the contents of a computer’s memory and discover the secret encryption key used to scramble files.

“There seems to be no easy remedy for these vulnerabilities,” the researchers say. “Simple software changes are likely to be ineffective; hardware changes are possible but will require time and expense; and today’s Trusted Computing technologies appear to be of little help because they cannot protect keys that are already in memory. The risk seems highest for laptops, which are often taken out in public in states that are vulnerable to our attacks. These risks imply that disk encryption on laptops may do less good than widely believed.”

Scary stuff, what frightens me even more is they figures out how to remove the RAM from a machine without it loosing it’s state

Well, not so fast. Another interesting technique that Thursday’s paper describes is how to supercool the RAM chips with a can of compressed air held upside-down. Then the cooled memory can be physically extracted and inserted in another computer owned by the attacker. (If the memory is permanently affixed to the motherboard, there are still other methods [PDF] that can be used.)

The paper states:

Contrary to the expectation that DRAM loses its state quickly if it is not regularly refreshed, we found that most DRAM modules retained much of their state without refresh, and even without power, for periods lasting thousands of refresh intervals. At normal operating temperatures, we generally saw a low rate of bit corruption for several seconds, followed by a period of rapid decay. We obtained surface temperatures of approximately ?50 degrees C with a simple cooling technique: discharging inverted cans of “canned air” duster spray directly onto the chips. At these temperatures, we typically found that fewer than 1% of bits decayed even after 10 minutes without power. To test the limits of this effect, we submerged DRAM modules in liquid nitrogen (ca. ?196 degrees C) and saw decay of only 0.17% after 60 minutes out of the computer.

Gutmann, the New Zealand computer scientist, previewed this kind of attack in a 1996 paper that said: “To extend the life of stored bits with the power removed, the temperature should be dropped below -60 degrees C. Such cooling should lead to weeks, instead of hours or days, of data retention.”

Holy crap. Wish I had the time to actually try this, would be involving a good amount of hackery.

Translation: If you use an encrypted file-system and want privacy and security when you’re not using your computer, you need to shut down your computer and wait a few minutes for the RAM contents to vanish. Another option for sensitive files is to use an encrypted volume like a PGP disk and unmount it as soon as you’re done.

Something very important to take away from this is Sleep/Hibernate is very BAD. This makes me laugh at all those Apple fanboys that keep on saying I never turn of my machine, just put my Mac to sleep and when I need open it again. I will says thanks to Microsoft for the unreliabilty of their sleep technology I never (well almost never) use the sleep function if I am in motion. The only time I use sleep is when at home with my Macbook close by, not out of sight

I will be looking for some tools that can assist with wiping memory to prevent these “exploits” from actually working.

Me being clever: I doubt whether “Use Secure Virtual Memory” will help as that only works for the “Virtual Memory”, not RAM. What is needed is something that can encrypt the RAM before going to sleep and then put the machine in Deep Sleep with its suspend file encrypted. To wake up in this case should require dual authentication like biometric, smart card, usb dongle and a user/password maybe.

Eastern Cape Government website hacked?

Found this out a while ago, just never posted. Hackers with a sense of humour 🙂


Sorry….but the page you are looking for cannot be found This could happen for several reasons:

1. The page may have been reached in error.

2. The page may have moved.

3. The page may no longer exist.

4. The page is on holiday and will be out of the office until next week or when it feels like coming back.

5. The page was considered redundant and was given a raise so it now works even less.

6. The page performed an illegal operation and was promoted to vice-president.

7. The page was on strike. We are busy negotiating with the unions now for better wages so it can come online.

8. The page is running late. This could be because the taxi’s need to collect at least another 404 passengers.

9. The page is sleeping . After all, this is African time we are talking about.

Was a great lol