The next generation of TOR: I2P

If you’ve studied with me, you’ve heard about TOR (The Onion Router), an anonymous-browsing protocol that lets you use the Web through a series of encrypting routers that make your real origin (theoretically) impossible to determine. TOR is a heck of a tool, which comes packaged with BackTrack and can be installed as an add-on to Firefox on any platform. But it does have a flaw: when your traffic emerges from an end-point, the operator of that end-point can capture that traffic.

The “onion” concept is still quite good, however. Now there’s an open-source project that aims to “TOR-ify” all traffic, not just port 80 (Web). And it uses a new architecture, encrypting all traffic computer-to-computer, rather than router-to-router. Obviously, Young Jedi, these powers can be used for either evil or good. Use them only for good. See the article here:

Applying Trust Analysis to Dropbox

While I’m talking about ISECOM and its founder Pete Herzog, here’s a recent notice he sent out about Trust Analysis, and an article using trust metrics to determine just how safe it is to trust Dropbox, the popular file-sharing service:


A new article on Drop box insecurity and risk uses the ISECOM Trust Metrics to approach risk assessment in an easy and practical way:

Enno does an excellent job with the article and he’s just scratching the surface of what you can do with the trust metrics in business and risk.



Trust Analysis is a very different take on how to practice security, one that promises to provide a much more valid way to assess and implement security. Every security practitioner should take a good, close look at this idea.

ISECOM’s Hacker High School

I’ve spoken with many students, faculty and consulting clients about ISECOM‘s Hacker High School. Now no less an organization than IEEE has published a great article on Hacker Highschool:

Hacker High School is a program for (you guessed it) high school students. The curriculum is free/open source, and is used all over the world. It’s an especially popular program in South America, though it’s been run in the US and Europe as well.

The goal is not to raise a generation of hackers (though considering China’s Blue Army, we could use such a thing). Instead, it’s to educate some of our most voracious consumers of the Internet about how people try to hack them, how their trust is exploited, and how to be a smarter Web user. Check it out, and ISECOM and the OSSTMM as well. You’ll be amazed at the resources they offer.

For The Record: Voting machines are easily hacked, and elections are easily stolen

Don’t take my word for it:

This report and video come from ZDNet’s Government blog. Now you have to decide if you a) believe it, and/or b) can trust ZDNet. Are they an authority? Do they have an axe to grind? Do they stand to profit from any potential alarm? Personally I feel a lot more warm and fuzzy toward them than I do toward, say, Diebold.

If you give a sh*t about IT, security and our democracy, you need to watch this video.

Terrific Excel templates

Now here is one of the more interesting sites for business users of Excel:

They offer free and for-pay versions of a large assortment of Excel templates, including a very nice Invoice template to replace the one that disappeared from newer versions of Excel. Why buy Project when you can get a great project-management Gantt-chart template for Excel? Why buy billing software when you can manage accounts so well in Excel?

Thanks and a Dove chocolate to Herbbie for another great tip.

Intermediate (X)HTML

58112 (X)HTML: Intermediate, Section A

Class Description: Increase your practical knowledge of (X)HTML, including using tables to create imaginative webpage layouts. Learn to add forms to your website, and explore more of CSS’s uses, including its ability to format every page in a website with a single style sheet, and an introduction to CSS positioning properties. Finally, gain an overview of Web technologies such as JavaScript, DHTML, XML, and PHP. Prerequisite: 58111.


1. Getting Started

Introductions and announcements

About browsers

Sample files

Viewing page source

Using Wordpad or Textedit

To Do: Open the Resources link above in another tab.

2. Tables [Ch 16, p 227]

Tables are used for two main purposes

• data presentation: laying out tabular data, as in a spreadsheet (this is a good use)

• page layout: dividing your page up with tables for the purpose of layout (this is no longer a good use)

While the role of tables in page layout will decrease with the increasing use of CSS, they are a critical component of many web operations.

Tables require three tags:


Establishes the fundamental structure of the table. Among others, <table> takes the following attributes:

width: values expressed in pixels or percentages

<table width=”500″>
<table width=”75%”>

cellpadding: defines distance from the inside border of a cell to the content. Values expressed in pixels

<table cellpadding=”3″ width=”500″>

cellspacing: defines distance between cells in a table. Values expressed in pixels.

<table cellspacing=”4″ cellpadding=”3″ width=”500″>

border: determines the thickness of the table’s outside border only. Expressed in pixels.

<table border=”3″ cellspacing=”4″ cellpadding=”3″ width=”500″>


Establishes individual rows in a table. Typically, not used for much formatting but required for sound table structure. <tr> is nested inside table:

. . .

<th> and <td>

Establish individual cells in a row. <th> denotes a header cell; <td> denotes a content cell.
The tags take the same attributes, including the following:

width: Defines the width of an individual column. Cumulative cell widths must equal the width of the table.

<td width=”125″>
<td width=”25%”>

height: Defines the height of an individual row.

<td width=”125″ height=”35″>

align: Defines the alignment of content within the cell. Values are left/center/right.

<td width=”25%” height=”35″ align=”center”>

valign: Defines vertical alignment of individual cells. Important because table cells default to middle vertical alignment. Values are top/middle/bottom.

<td width=”25%” height=”35″ align=”center” valign=”top”>

Example Table:

<table border=”1″ width=”75%” align=”center” cellspacing=”3″ cellpadding=”2″>

<tr height=”40″>

<th width=”25%”>Date</th>
<th width=”25%”>Input</th>
<th width=”25%”>Outtake</th>
<th width=”25%”>Cost</th>



<td>Saturday, August 5</td>
<td>Rio Embudo Input, Pilar, NM</td>
<td>Horseshoe Outtake</td>

<td colspan=”4″>Reservations are required for all trips!</td>


Create a new site folder. Create a new index.htm inside it.

Design a simple three-column table layout. Choose some simple graphics from Google Images or your own source. Merge the top row for your header graphic. Include a text title for your site.

In the center cell of the body of the page, create another table with at least four column headings. Put a little sample text in at least two of this table’s cells.

Insert a few fake menu items in the layout column on the left.

Insert some filler text in the layout column on the right.

Preview your page in at least two browsers. Test it by resizing your browser window, and optionally by resetting your monitor’s resolution, if you’re familiar with doing that.

3. CSS Selectors [Ch 7, p 119]

Style rules


Inheritance, Specificity and Location

Internal and external style sheets [p 128]

Selectors: [p 138]








Create and link an external style sheet in your site folder.

Create and apply a “#” (id) style for your text site title.

Create and apply a “.” (class) style for your table text.

Create and apply a style that selects your table headings automatically.

Create and apply a style (of the type of your choice) for the menu items.

Tip: see

4. CSS Formatting [Ch 10, p 151]

Fonts and alternates



Line height (leading)







5.CSS Layout [Ch 11, p 169]

Divs and the Box Model


Height, Width and Margins

Position:relative [p 178]

Position:absolute [p 179]

Position:fixed [p 180]

Float: [p 181]

Remove your site graphic and text title from the top cell of your table.

Create a div, name it, and put your graphic and text title into it. Preview.

Now set the size, margin/padding, and absolute position of your new div.

Remove the embedded table and place it above your old table, below your new div. Position it in the center, with room for your left and right layouts.

Remove the menu items from the left layout column, create a new div for them, and place them inside. Position this div on the left.

Remove the filler text from the right column, create a div, and place the text there. Position this div on the right.

6. Dynamic Effects with CSS [p 189]

Display: and visibility:

Rollovers and popups

Drop-down menus using lists and CSS

7. Forms [Ch7 p 253]

Creating and submitting forms

Text boxes

Password boxes

Pick lists

Radio buttons and check boxes

Hidden fields

8. Javascript

Events: body:onload



<script type=”text/javascript”>

function welcome()
alert(“Welcome to my site!”);



<body onload=”welcome()”>
<h1>My Site</h1>


Calling Javascript from a button [p 316]

Form Validation:

function validate()
if (x==null || x==””)
&nbsp; {
&nbsp; alert(“First name must be filled out”);
&nbsp; return false;

&nbsp; }


<form name=”Form1″ action=”result.php” onsubmit=”return validate()”

First name: <input type=”text” name=”firstname”>

<input type=”submit” value=”Submit”>


Implement validation on your form.

Showing and hiding elements:

9. A Glimpse of PHP

About PHP [p 256]

Implement the PHP email form script [p 258].