And where does this come from?

Do you know where this came from:

Matasano Port Forwarding Interceptor

Do you ever find yourself in a protocol sniffing situation where you wish you had the ability to sneak a peak at a TCP stream as it happens? Do you find Wireshark--while certainly a powerful and robust tool--too clunky for quick protocol analysis? Do you have a need to intercept, pause, modify, and resend TCP streams? If so, the folks from Matasano have released the perfect tool for you!

Eve

While stomping around the cDc blog, I came across the Eve. Eve is a network traffic analyzer which gifts its users with a 3D visual representation of the network traffic as it is happening. To be honest the moment I read this a little part of me screamed for joy. I rushed through the site and downloaded the trial version.

Visual Studio 2005 Express

I would just like to once again express how unequivocally pleased I am that Microsoft has produced free versions of their Visual Studio IDE, aptly titled Visual Studio Express. A product such as this is a boon to both the software megalith and individual developers alike. It allows would-be developers the freedom to explore the options at hand, without the moral dilemma of pirating software.

LogMeIn Hamachi

Ever wanted to access files on your home computer from work? Wish you could host a online game with your buddies, but hate the hassle of dealing with routers and firewalls? Desire a little more security in your web-browsing?

Decompilation gets real...scary

Ilfak Guilfanov of DataRescue Inc (the people behind IDA Pro) has posted an entry on his Hex Blog titled Decompilation Gets Real. In it he announces the beta testing of a tool which, when given a binary file, produces accurate and well formatted C code. The immediate consequence of such a tool is the further reduction of the level of knowledge which a would-be hacker must have. Since compilers and assemblers have a distinct optimization fingerprint, it should not be long before automated tools, build from this code regeneration tool, will provide reverse-engineers and crackers with the ability to quickly and efficiently scrub through code for security weaknesses; buffer overflow, format string attacks, and any number of other exploits will be trivial to discover.