Author Archives: Konstantinos Xynos

Do you own a Sony Vaio Laptop?

This blog entry can also be considered as a survey. Along with my other computers I own a Sony Vaio also. It came to my attention that the Windows(R) installation that comes with the Vaio laptop contains among others an … Continue reading


A Forensics blog

I happened to come across a blog on computer forensics ‘Computer Forensics Blog – Notes on computer forensics’ [].   There is interesting information like: How to enumerate members of a group out of the SAM with a hex editor … Continue reading

Leave a comment

iDefense API logger (updated version)

While analysing some Malware I was introduced to SysAnalyzer []. SysAnalyzer comes with many programs one of which was of immediate interest, the api_logger. This program can be run on its own, and provides the basic API calls made by a … Continue reading

Leave a comment

Careful with those encryption keys or it is a few years in jail

‘The Regulation of Investigatory Powers Act (RIPA) has had a clause activated which allows a person to be compelled to reveal a decryption key. Refusal can earn someone a five-year jail term.’ ‘Section 49 of Part III of RIPA compels … Continue reading


Beware of the Sleeping Mountain (Windows Vista)

Beware of Windows Vista and its sleeping ways. I have come across students who have found PCs asleep and when powered on they are back into the previous users account. This means open web pages (like email accounts, facebook, myspace … Continue reading


Feel more secure this academic year

A new academic year has just started and on behalf of the Information Security Research Group (ISRG) at the University of Glamorgan, I would like to welcome everyone. Our experience [National coverage for forensic research –] has shown that security … Continue reading

Leave a comment

Beware of the byte-ing advert

For those of you who think that surfing the web and not downloading anything still ensures that your machine will not be infected by a virus/malware, here is the truth. As the article points out [1] (once again) malware is … Continue reading

1 Comment

Does the paper make the reference or the reference make the paper?

Part of writing an academic paper involves reading related work in the related field (no way Sherlock, you say). Well I was doing just that when I encountered a problem. A journal paper referenced by another paper stated that the … Continue reading


A look at the interview between a MPack Developer and R. Lemos

It is not often you come across a news article that is accompanied by the actual interview transcript. There is an interesting interview between Robert Lemos of SecurityFocus and one of the MPack Support Team (Aka DreamCoders Support) members [interview … Continue reading

1 Comment

Transformers hacked the world (Hollywood America, sorry)

I went and saw Transformers on Friday (and Sunday, it was that good!). What has this got to do with computer security? Well in the movie you have a bunch of alien robots trying to find a cube. The humans … Continue reading