How to work with wikileaks and what NOT to do


Read this before working with wikileaks because wikileaks can only protect documents, not sources if they haven't protected themselves enough

Permalink | |  Print |  Facebook | | | | Pin it! |

Wikileaks publishes full contract zesde zintuig


First release of parts this document in Belgian daily De Morgen, 13/12/08. First release of the whole document: here and now.

2. This is a type-contract that every participant was obliged to sign if he or she wanted to participate in tv-realityshow 'Het Zesde Zintuig'. This is an international tv-format with a contest for most developed "sixth sence". This document shows how every participant is obliged to promise that he/she will never talk about what happened off screen, when camera's were off. The contract shows us that this goes on for 5 years and metions a penalty of 250.000 euro...

3. People love this kind of programs, they love to be fooled. This kind of programs makes them believe in all kinds of magic.

4. The TV Company, that produced "Het Zesde Zintuig" on VTM (Flemish Television) never contested the authenticity of this contract, it sued the newspaper because it published info that was supposed to kept secret. The authenticity can be checked via the TV Company.

5. It was leaked because at least one of the participants considered he or she was fooled by the whole organisatio

Permalink | |  Print |  Facebook | | | | Pin it! |

Wikileaks publishes UN auditing reports about operations and services

Permalink | |  Print |  Facebook | | | | Pin it! |


Presentations about e-health in Belgium

from the boss himself, Mr Robben  :)

Information session of the National Institute for Sickness and Incapacity Insurance - Brussels - January 15, 2009

Het eHealth-platform: doel, organisatie, stand van zaken en prioriteiten - La plate-forme eHealth: objectifs, organisation, situation actuelle et priorités


European Commission - i2010 subgroup on eHealth - Brussels - January 15, 2009

The new Belgian legal framework for eHealth


Ceremony 5th Covidien Awards for excellence in hospital management - Vilvoorde - December 11, 2008

eHealth met respect voor privacy en beroepsgeheim - eHealth avec respect de la vie privée et du secret professionnel


Conference of the Centre for Scientific Development of Pharmacists on "What can we expect from pharmacists in a patient-centric healthcare IT environment ?" - Brussels - November 27, 2008

Mogelijke ondersteuning van het elektronisch farmaceutisch dossier door het eHealth-platform


General Assembly UNAMEC - Brussels - November 26, 2008

Het eHealth-platform: doel, stand van zaken en prioriteiten - La plate-forme eHealth: objectifs, situation actuelle et priorités


eHealth Congres of TMAB and Agoria ICT - Brussels - November 18, 2008

Overview of some on-going eHealth projects in Belgium

Permalink | |  Print |  Facebook | | | | Pin it! |


Belnet day presentations online


Moderator : Elke Dierckens


14.00Steven Van Kerckhove (BELNET) & Stijn De Weirdt (UGent), High bandwidth point-to-point services
14.40Guy Van Den Bergh (BELNET), Authentication/Federations
15.15Coffee break
15.45David Groep - Grid Computing: enabling scientific collaboration in Europe and beyond



Christian Van Heurck (BELNET), Security Services



Moderator: Koen Schelkens


14.00Erik Buelinckx (Kikirpa), Collaboration within art history : online media databank
14.40John Chevers (DANTE), What can GÉANT2 do for you?
15.15Coffee break
15.45Leen Van Rentergem (KULeuven), Toledo, connecting communities



Prof. Dr. Luc Boullart (UGent), Distant and continous education streaming live on the Internet

Permalink | |  Print |  Facebook | | | | Pin it! |


proceeding LISA Large Installed System Administration Congress

Proceedings Front Matter: Title Page | Conference Organizers and External Reviewers | Table of Contents | Index of Authors | Message from the Program Chair

Tech Sessions: Wednesday, November 12 | Thursday, November 13 | Friday, November 14 | Invited Talk Speakers

Permalink | |  Print |  Facebook | | | | Pin it! |


Google Hacking enormous list of search terms

All Google Hacking Keywords

Get your own at Scribd or explore others:
comment : it stays handy work because Google will block automated searches even if you have a Google API.

Permalink | |  Print |  Facebook | | | | Pin it! |


Complete cheat sheet collection to download

Cheat Sheets collection - The only one you need.

Permalink | |  Print |  Facebook | | | | Pin it! |


birthdaylink : where to get ebooks (only today link)

this link is only for today

where does someone get good ebooks ?

http://www.pdfchm.com  You have to become member and you can download two books a day. Sometimes it is a hassle with all the numbers but the choice is rather refreshing and good.

http://www.scribd.com You have to become member and when there are good ebooks you have to go fast because they don't always stay up that long.

http://avaxhome.ws/ebooks You have to become member but this is a goldmine

http://www.dbebooks.com You have rogue antispyware that will pop up and scan your computer (strange my antivirus let it pass) and a lot of porn as introduction but the books make it worth it. You have to become member

and our bookshop off course if your Boss gives you money to spend on books and you may spend it on Amazon, do it through us, it is for the good cause :)

These links are only for educational purposes and may only be used to have a copy of books already purchased.

Permalink | |  Print |  Facebook | | | | Pin it! |

Free courses on the web, organised

  • Statistics Course
  • Casual and Statistical Reasoning Course
  • Logic and Proofs Course
  • Economics
  • Computers and Computer Systems
  • Representing and Manipulating Data in Computers
  • Data and Processes in Computing
  • Introduction to Programming
  • Concepts of Information Technology
  • Introduction to Marketing Course

    or by University

    Permalink | |  Print |  Facebook | | | | Pin it! |


    Innovation in Flanders, online text of an US symposium

    To help U.S. policymakers become more aware of these developments, a committee of the National Academies' Board on Science, Technology, and Economic Policy undertook a review of the goals, concept, structure, operation, funding levels, and evaluation efforts of significant innovation programs around the world. As a part of this effort, the committee identified Flanders, a region of Belgium with substantial autonomy, which is recognized for its comprehensive approach to innovation. Based on initial meetings in Washington and Brussels, and with the endorsement of Flanders Vice Minister-President Fientje Moerman, it was agreed to organize a conference that would review regional innovation policies in the context of the policies and programs of the Flanders government, and their interaction with those of the European Union. This book provides a summary of that symposium.

    I INTRODUCTION & Innovative Flanders: Innovation Policies for the Twenty-first Century1-32(skim)
    II PROCEEDINGS & Welcome33-35(skim)
    Remarks on Behalf of the U.S. Delegation36-36(skim)
    Session I: Perspectives on the Flemish Innovation System37-45(skim)
    Session II: Perspectives on the U.S. Innovation System46-57(skim)
    Keynote Address58-63(skim)
    Session III: Cooperative Research and Global Competition in Semiconductors64-79(skim)
    Session IV: Innovation Through Knowledge Diffusion80-89(skim)
    Session V: Meeting the Early-stage Finance Challenge90-115(skim)
    Session VI: Flemish Strategic Research Centers116-124(skim)
    III: RESEARCH PAPER--Innovative Flanders: Innovation Policies for the Twenty-first Century125-150(skim)

    there are some interesting companies in Flanders that are innovative in the IT and the ITsecurity business.

    Permalink | |  Print |  Facebook | | | | Pin it! |


    Presentations HITBsecConf 2008 (also the clickjacking one)

    The presentations from Hack in the Box Malaysia are now online and available to download on the HITBSecConf2008 Malaysia Conference page. All the presentations are in one directory, so it is easy download them all with something like wget or httrack. But for those that like direct links from this site, here they are:

    Permalink | |  Print |  Facebook | | | | Pin it! |


    Documents 2008 Conference on Email and Anti-Spam

    Permalink | |  Print |  Facebook | | | | Pin it! |


    targeted attacks : some reading stuff

    Changing Battleground Security Against Targeted Low Profile Attacks

    Detecting Targeted Attacks Using Shadow Honeypots

    Microsoft's "Very Limited, Targeted Attacks"

    Network robustness to targeted attacks. The interplay of ...

    Analysis of targeted attack and recent malware

    Targeted Attacks. There�s a new threat emerging on the internet ...

    Collaborative Response to Targeted Attacks

    Countering Targeted File Attacks Using Location Keys

    Permalink | |  Print |  Facebook | | | | Pin it! |


    combatting insider misuse

    Peter Neumann one of the godfathers of computer security has updated some documents he made since 1999 about insider misuse. As this problem, headache is now troubling the many banks and international institutions that are restructurering and going broke, we will publish them.



    Permalink | |  Print |  Facebook | | | | Pin it! |

    European Report on internet traffic

    2008 Report on European IXPs

    This report has been compiled by the European Internet Exchange Association (Euro-IX) in an attempt to get a better picture of the past and current situation in regards to the number of Internet Exchange Points (IXPs) operating in Europe, the amount of traffic being exchanged at these IXPs, the number of connected parties peering there, as well as other relevant statistics and trends that are now appearing in the European IXP market.

    In an effort for us to better design future reports to suit community needs we would very much appreciate if you could let us know that you have downloaded this report and of course any comments or feedback would be more than welcome.

     Download 2008 Report

    Permalink | |  Print |  Facebook | | | | Pin it! |


    Nederlandse Crisismanagementsbrochure voor burgemeesters

    Voor burgemeesters bestaat sinds kort een nieuwe handreiking Bestuurlijk handelen bij crises. Deze richt zich op de rol van de bestuurder en zijn/haar aandachtsgebieden tijdens een crisis. Van het crisismanagement in het beleidsteam en binnen het gemeentehuis, tot de rol van burgervader en boegbeeld richting lokale samenleving en media. Dus dit lijkt ook ‘verplichte kost’ voor de communicatieadviseurs en woordvoerders die met de burgemeester samenwerken

    De handreiking is opgesteld door het Nederlands Genootschap van Burgemeesters (NGB). In het boekwerkje zijn de ervaringen verwerkt van crises in de afgelopen jaren. Zo krijgen de burgemeesters in totaal 94 tips en aandachtspunten. De belangrijkste lessen zijn ingedeeld volgens een aantal fasen van de crisisbeheersingsketen: preparatie-, respons- en nazorgfase, de alarmeringsfase en de omgang met de media. 

    comment : niet erg praktisch, maar goed misschien bestaan die praktische documenten en guidelines ergens anders

    Permalink | |  Print |  Facebook | | | | Pin it! |


    TCP/IP flaw Good document about security of the internet protocol

    Permalink | |  Print |  Facebook | | | | Pin it! |

    Cyber threats 2009 report

    Emerging Cyber Threats Report for 2009

    Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond

    On October 15, 2008, the Georgia Tech Information Security Center (GTISC) hosted its annual summit on


    and the webcast

    emerging security threats and countermeasures affecting the digital world. At the conclusion of the event, GTISC released this Emerging Cyber Threats Report—outlining the top five information security threats and challenges facing both consumer and business users in 2009. This year’s summit participants include security experts from the public sector, private enterprise and academia, reinforcing GTISC’s collaborative approach to addressing information security technology and policy challenges.


    Permalink | |  Print |  Facebook | | | | Pin it! |


    Internet drafts : selection of new ones 29 sept - 15th october

    .draft-ietf-dhc-option-guidelines-03.txt     Guidelines for Creating New DHCP Options    14/10/2008
    .draft-ietf-idnabis-defs-00.txt     Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework    14/10/2008
    ..draft-ietf-isms-tmsm-14.txt     Transport Subsystem for the Simple Network Management Protocol (SNMP)    14/10/2008
    draft-templin-autoconf-dhcp-17.txt     Virtual Enterprise Traversal (VET)    14/10/2008
    .draft-krishnan-ipv6-exthdr-06.txt     An uniform format for IPv6 extension headers    14/10/2008
    .draft-ietf-rohc-hcoipsec-09.txt     Integration of Robust Header Compression (ROHC) over IPsec Security Associations    14/10/2008
    .draft-ietf-rohc-ikev2-extensions-hcoipsec-07.txt     IKEv2 Extensions to Support Robust Header Compression over IPsec (ROHCoIPsec)    14/10/2008
    .draft-ietf-ecrit-location-hiding-req-01.txt     Location Hiding: Problem Statement and Requirements    12/10/2008
    .draft-ietf-ecrit-specifying-holes-01.txt     Specifying Holes in LoST Service Boundaries    12/10/2008
    .draft-ietf-isms-radius-usage-04.txt     Remote Authentication Dial-In User Service (RADIUS) Usage for Simple Network Management Protocol (SNMP) Transport Models    12/10/2008
    .draft-nir-ike-qcd-03.txt     A Quick Crash Detection Method for IKE    12/10/2008
    .draft-arkko-eap-aka-kdf-06.txt     Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')    12/10/2008
    .draft-ietf-krb-wg-anon-10.txt     Anonymity Support for Kerberos    10/10/2008
    .draft-ietf-mext-firewall-admin-00.txt     Guidelines for firewall administrators regarding MIPv6 traffic    10/10/2008
    .draft-ietf-mext-firewall-vendor-00.txt     Guidelines for firewall vendors regarding MIPv6 traffic    10/10/2008
    .draft-irtf-asrg-dnsbl-07.txt     DNS Blacklists and Whitelists    10/10/2008
    .draft-kucherawy-sender-auth-imap-00.txt     IMAP Annotation for Indicating Message Authentication Status    10/10/2008
    .draft-brusilovsky-pak-07.txt     Password-Authenticated Diffie-Hellman Exchange (PAK)    09/10/2008
    .draft-ietf-rserpool-mib-07.txt     Reliable Server Pooling: Management Information Base using SMIv2    09/10/2008
    .draft-freed-sieve-ihave-03.txt     Sieve Email Filtering: Ihave Extension    09/10/2008
    .draft-ietf-smime-ibearch-09.txt     Identity-based Encryption Architecture and Supporting Data Structures    09/10/2008
    draft-ietf-ancp-security-threats-06.txt     Security Threats and Security Requirements for the Access Node Control Protocol (ANCP)    07/10/2008
    draft-ietf-idnabis-rationale-03.txt     Internationalized Domain Names for Applications (IDNA): Definitions,Background and Rationale    07/10/2008
    draft-ietf-isms-secshell-12.txt     Secure Shell Transport Model for SNMP    07/10/2008
    draft-ietf-isms-transport-security-model-09.txt     Transport Security Model for SNMP    07/10/2008
    draft-hajjeh-tls-identity-protection-07.txt     Credential Protection Ciphersuites for Transport Layer Security (TLS)    06/10/2008
    draft-liao-smimeheaderprotect-03.txt     Header Protection for S/MIME    06/10/2008
    draft-ietf-pkix-ta-format-00.txt     Trust Anchor Format    06/10/2008
    draft-ietf-pkix-tamp-00.txt     Trust Anchor Management Protocol (TAMP)    06/10/2008
    draft-ietf-sip-domain-certs-02.txt     Domain Certificates in the Session Initiation Protocol (SIP)    06/10/2008
    draft-ietf-smime-3850bis-08.txt     Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Certificate Handling    06/10/2008
    draft-iab-ip-config-08.txt     Principles of Internet Host Configuration    04/10/2008
    draft-ietf-dna-simple-03.txt     Simple procedures for Detecting Network Attachment in IPv6    03/10/2008
    draft-turner-deviceowner-attribute-00.txt     Device Owner Attribute    03/10/2008
    draft-hoeper-proxythreat-00.txt     Threat Model for Networks Employing AAA Proxies    03/10/2008
    draft-ietf-sip-xcapevent-04.txt     An Extensible Markup Language (XML) Configuration Access Protocol (XCAP) Diff Event Package    03/10/2008
    draft-ietf-mext-rfc3775bis-02.txt     Mobility Support in IPv6    01/10/2008
    draft-montemurro-gsma-imei-urn-02.txt     A Uniform Resource Name Namespace For The GSM Association (GSMA) and the International Mobile station Equipment Identity(IMEI)    01/10/2008
    draft-marinov-syslog-snmp-02.txt     Mapping Simple Network Management Protocol (SNMP) Notifications to SYSLOG Messages    01/10/2008
    draft-sharhalakis-httptz-04.txt     Timezone Information in HTTP    01/10/2008
    draft-sakane-dhc-dhcpv6-kdc-option-02.txt     Kerberos Option for DHCPv6    01/10/2008
    draft-keromytis-keynote-x509-01.txt     X.509 Key and Signature Encoding for the KeyNote Trust Management System    01/10/2008
    draft-endo-v6ops-dnsproxy-01.txt     Translator Friendly DNS Proxy    01/10/2008
    draft-keromytis-tls-authz-keynote-01.txt     Transport Layer Security (TLS) Authorization Using KeyNote    01/10/2008
    draft-elwell-sip-identity-handling-ua-00.txt     Identity Handling at a Session Initiation Protocol (SIP) User Agent    01/10/2008
    draft-weaver-dnsext-fr-comprehensive-00.txt     Comprehensive DNS Resolver Defenses Against Cache Poisoning    30/09/2008
    draft-weaver-dnsext-comprehensive-resolver-00.txt     Comprehensive DNS Resolver Defenses Against Cache Poisoning    30/09/2008
    draft-ietf-nsis-nslp-natfw-19.txt     NAT/Firewall NSIS Signaling Layer Protocol (NSLP)    30/09/2008
    draft-ietf-pcn-architecture-07.txt     Pre-Congestion Notification (PCN) Architecture    30/09/2008

    Internet Drafts - Title List sorted by date

    Permalink | |  Print |  Facebook | | | | Pin it! |

    1 2 3 4 5 Next