background preloader

National Centre for Text Mining — Text Mining Tools and Text Mining Services

National Centre for Text Mining — Text Mining Tools and Text Mining Services

Gephi, an open source graph visualization and manipulation software The Official YAML Web Site Punching holes into firewall or "Why firewalls shouldn't be considered a ultimate weapon for network security" or "Secure TCP-into-HTTP tunnelling guide" Introduction Firewalls are heavily used to secure private networks (home or corporate). Usually, they are used to protect the network from: intrusions from outsidersmisuse from insiders In a TCP/IP environment, the typical corporate firewall configuration is to block everything (both incoming and outgoing), and give access to the internet only through a HTTP proxy. Still, this should not considered a ultimate weapon, and network administrators should not rely on the firewalls only. Encapsulation is the basis of networking. As soon as you let a single protocol out, tunelling allows to let anything go through this protocol, and thus through the firewall. This paper demonstrates how to encapsulate any TCP-based protocol (SMTP, POP3, NNTP, telnet...) into HTTP, thus bypassing the firewall protection/censorship (depending on your point of view) A word of warning: The problem

GHH - The "Google Hack" Honeypot M-payment: a Threat to Anti-money Laundering By H. Paul Leyva, J.D., C.AM.C. October 1, 2008 International Narcotics Control Strategy Report (INCSR), March, 2008: " … there are already indications that money launderers and those that finance terrorism will avail themselves of the new m-payment systems." NEW YORK, NY—Brittany has never filed an income tax return to report her $200,000.00+ income as a high-class call girl. LOGAN SQUARE, CHICAGO, IL—Alex, an accountant by day and drug user by night, uses his PC to transfer $400 from his personal checking account to his mobile phone's m-payment account. As the dealer enjoys his latte, he uses his mobile phone to text the funds to a bank in the Cayman Islands, where the deposit will easily get lost in the multitude of other small value transfers. NAIROBI, KENYA—International Press: August 7th. What is m-payment? -INCSR, March, 2008 The Virtual Wallet M-payment (mobile payment) is synonymous with the terms m-commerce, m-accounts, m-wallet, m-banking, e-money, or digital cash. The Virtual ATM

Hidden iframe injection attacks | Structured Randomness [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. To the html pages the following piece of code was added: To php pages it added: echo “<iframe src=\” Asha took the effort and cleaned most of the infected files. How did the worm inject the hidden iframes to my files? There are two ways through which the worm is believed to infect your files: 1) Server is compromised This is the most common way. 2) Client side FTP The worm resides in some/any of the client side PCs you use for accessing the ftp/control panel accounts of your hosting server.

Mobile Megatrends 2010 [In our third annual Mobile Megatrends 2010 research we look at the future of web platforms, app stores, revenue models, open source, mobile recommendations, OEM monetisation, and operator strategies] After many months in the making, we ‘ve released our annual Mobile Megatrends 2010. It’s our third and biggest Megatrends research we ‘ve published to date featuring 64 juicy slides with detailed analysis on the future of mobile. So what are the overarching trends of mobile in 2010? 1. 2. 3. 4. 5. 6. 7. 8. We ‘ve already presented earlier versions of our Mobile Megatrends as part of closed customer events and conferences, including as part of Rutberg’s invitation-only Wireless Influencers event in San Diego. Comments welcome as always,

About OverviewThey Rule aims to provide a glimpse of some of the relationships of the US ruling class. It takes as its focus the boards of some of the most powerful U.S. companies, which share many of the same directors. Some individuals sit on 5, 6 or 7 of the top 1000 companies. It allows users to browse through these interlocking directories and run searches on the boards and companies. A user can save a map of connections complete with their annotations and email links to these maps to others. Context A few companies control much of the economy and oligopolies exert control in nearly every sector of the economy. Karl Marx once called this ruling class a 'band of hostile brothers.' The Data We do not claim that this data is 100% accurate at all times. Credits This site was made by Josh On with the indispensable assistance of LittleSis.org. Project History 2001 The first version of They Rule was a static set of data gathered from the websites of the top 100 companies.

Related: