Blog - Title

March, 2004

  • Peter Torr's Blog

    Balancing Security and Usability

    • 14 Comments
    I'm often tempted to write about viruses and what I think the next "innovation" might be, but then I get scared that I might get put in jail (or deported) should any of my ideas ever see the light of day. (Not that I think the virus writers need any help...
  • Peter Torr's Blog

    The horse has already bolted

    • 13 Comments
    A while ago (yes, I'm very slow) Ivan had a couple of blogs about removing the ability to turn off CAS in the runtime ( here and here ). Whilst I am sure the CLR team has some good reasons for doing so, many of the comments on the entries exhibit a common...
  • Peter Torr's Blog

    I want my Burnout 3

    • 7 Comments
    This post has nothing to do with code or security. Move along ;-) One of my current favourite XBox games is Burnout 2: Point of Impact . It's not a new game -- I originally acquired it mid last year -- but I just started playing it again because...
  • Peter Torr's Blog

    Crash

    • 7 Comments
    The other day I wrote about Burnout . Well there’s a cool kind-of related video up on the new Microsoft XNA web site called “Crash.” You should check it out .
  • Peter Torr's Blog

    Developing as Non-Admin

    • 4 Comments
    Keith Brown writes a comment in one of my older posts about a chapter in his book dealing with developing code as a non-Admin . A great read if you're still one of those people running as an Administrator because you think you need to in order to do programming...
  • Peter Torr's Blog

    Evidence is important, even if it grants no permissions

    • 4 Comments
    In a comment to my old VSTO security blog entry, Enrico Sabbadin asks why we can't just remove the Zone evidence from an assembly before creating the AppDomain. Good question, and Siew Moi bugged me about blogging this a long time ago as well, so I guess...
  • Peter Torr's Blog

    Leaking names

    • 2 Comments
    A short blog tonight. There are many pieces of information that can be useful to an attacker when they are trying to gain access to your organisation or when they are already "in" and want to do some damage. Two things that may not be immediately...
  • Peter Torr's Blog

    Windows XP SP 2

    • 2 Comments
    I'm running Windows XP SP 2 RC1 now, and I've already logged a handful of bugs -- mostly against the new IE security settings :-) -- but I haven't had any problems yet. (Well, my tablet froze on me last night, but it hasn't happened again so I don't know...
  • Peter Torr's Blog

    Strange Japanese Television Shows

    • 1 Comments
    I just finished my last blog entry , which prompted me to visit the PSB website to see what was new. Well whadayaknow, the video to their next killer single "Flamboyant" is on the website. But I'm not just gushing about the 'Boys in this blog entry -...
Page 1 of 1 (9 items)