http://youranonnews.tumblr.com/
AnonOps Communications One account. All of Google. Sign in to continue to Blogger Find my account Forgot password? Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.)
Ross Anderson's Home Page Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard. In a nutshell, the systems needed to support it properly just don't get built (blog). SQL Injection Attacks by Example A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. Anonymous to Retire Low Orbit Ion Cannon? The hacker collective is reportedly developing a new DDoS tool called #RefRef in the wake of multiple arrests linked to the use of the LOIC to take down PayPal. Anonymous is considering putting its most formidable DDoS weapon in cold storage following a recent series of high-profile arrests of the hacker group's members, according to the AnonOps blog. Members of Anonymous are pushing to retire the group's Low Orbit Ion Cannon (LOIC) while the loosely organized hacker collective develops a new DDoS tool to take down websites called #RefRef, an AnonOps Communications blog post revealed Tuesday. The LOIC, an open source network stress testing application that is widely distributed throughout the Anonymous ranks to create a powerful, voluntary botnet, was "the go-to weapon for Anonymous supporters during protests against dictators in North Africa, and Operation: Payback," according to the AnonOps post.
Google Dorks cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. History of Computer Security Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security. They are papers every serious student of computer security should read. How They Hack Your Website: Overview of Common Techniques We hear the same terms bandied about whenever a popular site gets hacked. You know… SQL Injection, cross site scripting, that kind of thing. But what do these things mean? Is hacking really as inaccessible as many of us imagine — a nefarious, impossibly technical twilight world forever beyond our ken?
We Are Anonymous, We Are Legion “We are Anonymous. We are Legion. We do not forgive. Google hacking Basics[edit] The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file. intitle:admbook intitle:version filetype:php One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field: "#-Frontpage-" inurl:administrators.pwd
YourAnonNews, YourAnonMusic, Jackal, Chris Banks, Chacal by charasonymous Dec 7