background preloader

News. Opinion. Advice. Research

Krebs on Security Print - Concerned About Your Digital Privacy? You Should Be Threat Level III: Devastating Victims: Harassed ex-spouses, government suspects, random targets, future homeowners Damage: psychological and physical Threats, oppressive Orwellian Intrusion GPS Car Tracking Low-cost GPS devices for tracking kids or pets may be marketed for innocent purposes, but they can also be used to sinister effect. Last October, Yasir Afifi, a college student and son of an Islamic-American community leader, discovered a GPS tracking device on his car during an oil change. Fight Back If you have reason to believe someone is tracking your vehicle, take it to a mechanic for a look-see—most found trackers pop up during routine inspections. Internet Trolls Allison Stokke wasn't looking for Internet fame, but it sure found her. Fight Back Protecting yourself from Internet trolls is like a farmer attempting to fend off locusts. The Aware Home The hot new Microsoft Kinect is a revolutionary camera-­based gaming accessory that recognizes the movements of players' bodies.

Hash Database Search Form Enter a sha1 or md5 hash, or a filename.The search is not case sensitive.The Malware search only works for md5 hashes at this point. Current database size: 39,944,023 samples. Summary This page will search your for a hash in the NIST National Software reference Library for files matching your hash. The NSRL is a collection of hashes of "known" software. DNS Interface MD5 sums from the complete known database can now be queried via DNS. Other similar database: Bit9 Fileadvisor (opens in new window) Virus Total analyzes suspicious files and URLs (opens in new window)

70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? 1. 2. 3. 4. 5. 6. 7. 8. 9.

Privacy.org - The Source for News, Information, and Action Automated Malware Analysis - Cuckoo Sandbox Download Cuckoo Sandbox The following fields are optional. They are intended as a survey for us to better understand the type of userbase we have, so we invite you to fill out the form if you can. What are you going to use Cuckoo for? Get Cuckoo Sandbox 1.1 now and start fighting malware! Alternative Downloads Even if it's not recommended, in case you need to download older versions of Cuckoo, you can find our historical repository here. The project is also available on our official GitHub repository. In order to clone Cuckoo from GitHub you can use the following command: git clone If you want to clone a specific branch: git clone -b <branch name> Documentation Installing Cuckoo Sandbox is a delicate operation and requires attention to details and following careful all the required steps. Please read throughly the documentation available here.

25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

Electronic Privacy Information Center Writing Snort Rules Writing Snort RulesHow To write Snort rules and keep your sanityCurrent as of version 1.3.1.2By Martin Roesch Contents The Basics Snort uses a simple, lightweight rules description language that is flexible and quite powerful. Rule Headers Rule Actions: The rule header contains the information that defines the "who, where, and what" of a packet, as well as what to do in the event that a packet with all the attributes indicated in the rule should show up. tcp udp icmpIP Addresses: The next portion of the rule header deals with the IP address and port information for a given rule. Rule Options Rule options form the heart of Snort's intrusion detection engine, combining ease of use with power and flexibility. msg: "<message text>"; LogtoThe logto option tells Snort to log all packets that trigger this rule to a special output log file. logto: "<filename>"; MinfragMinfrag sets a minimum size threshold for a fragmented packet. minfrag: "<number>"; ttl: "<number>"; id: "<number>; offset: <number>;

Ophcrack Online Privacy Alliance, Internet Privacy, Consumer Privacy, FTC, Privacy Regulation, Privacy Protection, Web Privacy. How to Read & Write Snort Rules to Evade an NIDS (Network Intrusion Detection System) Hack Like a Pro: How to Read & Write Snort Rules to Evade an NIDS (Network Intrusion Detection System) Welcome back, my novice hackers! My recent tutorials have been focused upon ways to NOT get caught. Some people call this anti-forensics—the ability to not leave evidence that can be tracked to you or your hack by the system administrator or law enforcement. One the most common ways that system admins are alerted to an intrusion on their network is with a Network Intrusion Detection System (NIDS). I already did an introduction to Snort, and now I want to delve deeper to show you how the rules in Snort are designed to detect your intrusion. Step 1: Finding the Snort Rules Snort is basically a packet sniffer that applies rules that attempt to identify malicious network traffic. We can see the Snort rules by navigating to /etc/snort/rules on our BackTrack install. cd /etc/snort/rules Now, let's do a listing of that directory to see all of our rule files. ls -l Step 2: Viewing Snort Rules

Chat with Your Friends through ms dos Command Prompt - StumbleUpon -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. ShareThis

Related: