<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>argg the day job attacks!</title>
                            <pubDate>Fri, 27 Apr 2007 10:54:33 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/717/argg_the_day_job_attacks!</link>
                                        <author>JxT &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Wow, so I haven't had much time for anything other than the daily routine lately.&amp;nbsp;&amp;nbsp;I finally have some down time coming up so I can start catching up with all the great posts and articles again!&amp;nbsp;&amp;nbsp; w00t!</description>
                    </item>
                <item>
            <title>Unbreakable software</title>
                            <pubDate>Thu, 08 Jun 2006 20:59:32 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/320/Unbreakable_software</link>
                                        <author>JxT &lt;email-suppressed@example.com&gt;</author>
                                                    <description>I often wonder what companies think when they market their products as 'unbreakable.'&amp;nbsp;&amp;nbsp;I recently ran across GreenBorder and their virtualization product.&amp;nbsp;&amp;nbsp;I also noticed there was a post on FD regarding their product.&amp;nbsp;&amp;nbsp;They state the following:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With GreenBorder Pro, NOTHING CAN BREAK INTO YOUR PC from the Web.&amp;nbsp;&amp;nbsp;You can:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;</description>
                    </item>
                <item>
            <title>HIPS thoughts</title>
                            <pubDate>Mon, 29 May 2006 22:36:45 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/312/HIPS_thoughts</link>
                                        <author>JxT &lt;email-suppressed@example.com&gt;</author>
                                                    <description>I've spent the last few years dabbling in and researching HIPS products, and have seen quite a few products come and go.&amp;nbsp;&amp;nbsp;I'm currently spending my time comparing some of the big players in the HIPS market like Cisco, Entercept, ISS, and a few others.&amp;nbsp;&amp;nbsp;It's interesting how diverse each product really is.&amp;nbsp;&amp;nbsp;I hope to finish up a paper on HIPS evasion based off of this research, it's been a blast, and I've learned alot about what companies say, and what the respective product actually will and will not do. Interestingly enough, when you start to figure out that the buffer overflow protection is incredibly limited, it kind of puts that whole snake oil spin on a given vendor for such poor implementations.&amp;nbsp;&amp;nbsp;Anyways, just a few thoughts for the evening.&amp;nbsp;&amp;nbsp;I read through Halvars blog, and have to agree, the next couple of years I believe also, Apple and the others are going to get slammed with vulns.&amp;nbsp;&amp;nbsp;It will be interesting to see!&lt;br /&gt;
&lt;br /&gt;
Cheers!</description>
                    </item>
            </channel>
</rss>
