background preloader

News. Opinion. Advice. Research

Krebs on Security Print - Concerned About Your Digital Privacy? You Should Be Threat Level III: Devastating Victims: Harassed ex-spouses, government suspects, random targets, future homeowners Damage: psychological and physical Threats, oppressive Orwellian Intrusion GPS Car Tracking Low-cost GPS devices for tracking kids or pets may be marketed for innocent purposes, but they can also be used to sinister effect. Last October, Yasir Afifi, a college student and son of an Islamic-American community leader, discovered a GPS tracking device on his car during an oil change. Fight Back If you have reason to believe someone is tracking your vehicle, take it to a mechanic for a look-see—most found trackers pop up during routine inspections. Internet Trolls Allison Stokke wasn't looking for Internet fame, but it sure found her. Fight Back Protecting yourself from Internet trolls is like a farmer attempting to fend off locusts. The Aware Home The hot new Microsoft Kinect is a revolutionary camera-­based gaming accessory that recognizes the movements of players' bodies.

Hash Database Search Form Enter a sha1 or md5 hash, or a filename.The search is not case sensitive.The Malware search only works for md5 hashes at this point. Current database size: 39,944,023 samples. Summary This page will search your for a hash in the NIST National Software reference Library for files matching your hash. The NSRL is a collection of hashes of "known" software. DNS Interface MD5 sums from the complete known database can now be queried via DNS. Other similar database: Bit9 Fileadvisor (opens in new window) Virus Total analyzes suspicious files and URLs (opens in new window)

Dark Reading | Security | Protect The Business - ... 70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? 1. 2. 3. 4. 5. 6. 7. 8. 9.

Privacy.org - The Source for News, Information, and Action Automated Malware Analysis - Cuckoo Sandbox Download Cuckoo Sandbox The following fields are optional. They are intended as a survey for us to better understand the type of userbase we have, so we invite you to fill out the form if you can. What are you going to use Cuckoo for? Get Cuckoo Sandbox 1.1 now and start fighting malware! Alternative Downloads Even if it's not recommended, in case you need to download older versions of Cuckoo, you can find our historical repository here. The project is also available on our official GitHub repository. In order to clone Cuckoo from GitHub you can use the following command: git clone If you want to clone a specific branch: git clone -b <branch name> Documentation Installing Cuckoo Sandbox is a delicate operation and requires attention to details and following careful all the required steps. Please read throughly the documentation available here.

NoLimitSecu - Podcast dédié à la cyber sécurité 25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

Electronic Privacy Information Center Writing Snort Rules Writing Snort RulesHow To write Snort rules and keep your sanityCurrent as of version 1.3.1.2By Martin Roesch Contents The Basics Snort uses a simple, lightweight rules description language that is flexible and quite powerful. Rule Headers Rule Actions: The rule header contains the information that defines the "who, where, and what" of a packet, as well as what to do in the event that a packet with all the attributes indicated in the rule should show up. tcp udp icmpIP Addresses: The next portion of the rule header deals with the IP address and port information for a given rule. Rule Options Rule options form the heart of Snort's intrusion detection engine, combining ease of use with power and flexibility. msg: "<message text>"; LogtoThe logto option tells Snort to log all packets that trigger this rule to a special output log file. logto: "<filename>"; MinfragMinfrag sets a minimum size threshold for a fragmented packet. minfrag: "<number>"; ttl: "<number>"; id: "<number>; offset: <number>;

SANS Institute: Reading Room ICS security: SANS needs your input on attacks and threats and how you're preventing and mitigating them in the industrial control systems environments. Share your experiences and enter to win a $400 Amazon gift card! More than 75,000 unique visitors read papers in the Reading Room every month and it has become the starting point for exploration of topics ranging from SCADA to wireless security, from firewalls to intrusion detection. The SANS Reading Room features over 2,650 original computer security white papers in 102 different categories. Auto-Nuke It from Orbit: A Framework for Critical Security Control Automation STI Graduate Student Research by Jeremiah Hainly - March 15, 2017 in Automation, Incident Handling, Free and Open Source Software Over 83% of security teams report that the use of automation in security needs to increase within the next three years (Algosec, 2016). All papers are copyrighted.

Ophcrack

Related: