I've been using Chrome for some time now and my conclusion is: it doesn't matter what browser you use, as long as it is a reasonably new one. Thins I've liked:
- resizable textboxes
- HTTPS warnings (the UI seems much nicer)
- the separation in processes makes killing of errant pages / plugins and recovery much easier
WinZip password collision. WinZip (or more precisely: zip) supports many encryption methods, some of them very weak (like the original one described here) and some of them industry grade (AES). The drawback of this diversity is that not all zip/unzip programs support all of the algorithms, so (IMHO) you are better off using unencrypted zips or something like 7zip (Open Source and free) when encryption is needed.
Via Joel Esler's blog: who would win?
See on Souriz's blog: examples of reverse engineering syllabuses. I would recommend such courses to every programmer / sysadmins so that they can more accurately judge the threats which are out there.
From spl0it.org comes the User Agent lookup script. In the same spirit: the fact that there are no FORM's on your webpage doesn't mean that its not accepting input from the user. Remember: the user controls also the headers (and implicitly the cookies). Also, they can control the result of the reverse DNS lookup...
From stackoverlow, funny: suggest additions to the C preprocessor :-):
#dogma, basically there to counteract all the pragmatic stuff creeping into modern C and get back to basics.
#karma, to override (run over) the #dogma
From Gadi Evron: Introducing yourself. This was always a problem for me. How do you explain m malware researcher to a lay person?