background preloader

Reset The Net - Privacy Pack

Reset The Net - Privacy Pack

Netcat: the TCP/IP swiss army Hands-on Scala.js Scala.js compiles Scala code to equivalent, executable Javascript. Here's the compilation of a trivial hello-world example: object Example extends js.JSApp{ def main() = { var x = 0 while(x < 10) x += 3 println(x) } } ScalaJS.c.LExample$.prototype.main__V = (function() { var x = 0; while ((x < 10)) { x = ((x + 3) | 0) }; ScalaJS.m.s_Predef().println__O__V(x) }); As you can see, both of the above programs do identical things: they'll count the variable x from 0, 3, 9, and 12 before finally printing it out. Traditionally, Scala has been a language which runs on the JVM. Typo-safety due to its compiler which catches many silly errors before the code is run In-editor support for autocomplete, error-highlghting, refactors, and intelligent navigation Moderate sized compiled executables, in the 100-400kb range Source-maps for ease of debugging Javascript is the language supported by web browsers, and is the only language available if you wish to write interactive web applications.

How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. General Syntax By default, netcat operates by initiating a TCP connection to a remote host. The most basic syntax is: netcat [options] host port This will attempt to initiate a TCP to the defined host on the port number specified. If you would like to send a UDP packet instead of initiating a TCP connection, you can use the -u option: netcat -u host port You can specify a range of ports by placing a dash between the first and last: netcat host startport-endport This is generally used with some additional flags. How To Use Netcat for Port Scanning

Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown Among the advances offered to it users, Windows 7’s handling of virtual memory is the most efficient to date. However, as the RAM in a computer increases, so must the size of the pagefile to accommodate the larger capacity of computer memory. There are several advantages to starting each Windows 7 session with a cleared pagefile. Learn about virtual memory and how to force Windows 7 to clear your virtual memory pagefile whenever the operating system shuts down. What is Virtual Memory? The amount of memory you can put into your computer is finite. The amount of hard drive space set aside for virtual memory ranges from zero to about 1 to 2 times the memory you have installed in your computer. Why Clear Virtual Memory? When you shutdown Windows 7, the data in your computer’s RAM is lost because PC memory is volatile. Virtual memory is quite secure within Windows 7 because only the operating system has the authority to read and write to the virtual memory pagefile.

Sandbox (computer security) In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites.[1] The sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. Sandboxing technology is frequently used to test unverified programs which may contain a virus or other malignant code, without allowing the software to harm the host device.[2] Examples of sandboxes include: Security In-Depth for Linux Software: Preventing and Mitigating Security Bugs (PDF)

Defense in depth (computing) Defense in depth is an information assurance (IA) concept in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical for the duration of the system's life cycle. The idea behind the defense in depth approach is to defend a system against any particular attack using several independent methods. It is a layering tactic, conceived by the National Security Agency (NSA) as a comprehensive approach to information and electronic security.[1][2] Defense in depth is originally a military strategy that seeks to delay, rather than prevent, the advance of an attacker by yielding space in order to buy time. Using more than one of the following layers constitutes defense in depth.

Test your server for Heartbleed (CVE-2014-0160) If there are problems, head to the FAQ Results are now cached globally for up to 6 hours. Enter a URL or a hostname to test the server for CVE-2014-0160. All good, seems fixed or unaffected! Uh-oh, something went wrong: Check what it means at the FAQ. Here is some data we pulled from the server memory: (we put YELLOW SUBMARINE there, and it should not have come back) Please take immediate action! You can specify a port like this example.com:4433. 443 by default. Go here for all your Heartbleed information needs. If you want to donate something, I've put a couple of buttons here.

Superfish CA + Komodia vulnerability test This test has been retired in favor of the badssl.com Dashboard. You can still find Superfish removal instructions here. Test disabled. YES, it looks like you have a Komodia proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at the moment, but you can follow the Superfish ones with the name of the software you installed instead of "Superfish". Here is an incomplete list of known affected softwares: "Keep My Family Secure", "Kurupira", "Qustodio", "Staffcop", "Easy hide IP Classic", "Lavasoft Ad-aware Web Companion". YES, you have a big problem - even if it's not Komodia. Apparently no certificates checks are happening. This might be due to the browser you are using (if it's not a major one) or to software you are running, like PrivDog. See here for instructions on removal. Also no other SSL-disabling product was detected on your system. What's this about?

DigiCert SSL Certificate Discovery Tool With the SSL Discovery Tool you can perform manual and automatic scans. Manual scanning lets you search your network by a list of hosts or IP ranges or by a Host Group. Auto scanning allows you to schedule periodic scans at specified intervals (daily, weekly, or monthly) in order to detect and be notified of changes to your active certificate inventory. SSL Certificates are supposed to make life easier, so don't let managing them make your life more difficult. Speakeasy Speed Test Why do I get a “socket error” message? An error may result from having the speed test open in more than one browser tab or window. The test may fail to complete and display the following message: “A socket error occurred during the Upload test. Please try again later.” To prevent this error, and get the most accurate test results, close all other browser tabs and windows before running. If you continue to get a socket error message, or another type of error message, please provide feedback by emailing us at speedtestfeedback@fusionconnect.com. Why is the location I usually pick missing from the City list? A slow response can be caused by latency or packet-loss between the client and server, or particularly high Internet usage (during peak hours). In which browsers does the Speed Test work best? Why am I receiving “Could not connect to the Internet” errors when I am connected? Why didn’t the test choose the server location nearest me? Why is my speed lower than expected?

Download Microsoft Baseline Security Analyzer 2.3 (for IT Professionals) from Official Microsoft Download Center <a id="b7777d05-f9ee-bedd-c9b9-9572b26f11d1" target="_self" class="mscom-link download-button dl" href="confirmation.aspx?id=7558" bi:track="false"><span class="loc" locid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d" srcid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d">Download</span></a> The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations. MBSA 2.3 release adds support for Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012. Windows 2000 will no longer be supported with this release.

List of Printers Which Do or Do Not Display Tracking Dots Introduction This is a list in progress of color laser printer models that do or do not print yellow tracking dots on their output. We are in the process of trying to interpret the information conveyed by these dots as part of our Machine Identification Code Technology Project. Limitations of this information A "no" simply means that we couldn't see yellow dots; it does not prove that there is no forensic watermarking present. A "yes" simply means that we (or another source, as noted) saw yellow dots that appeared anomalous to us. Sources of information We have employed three sources of information. Thanks to our friends at software firms and symphonies, public schools and physics labs, semiconductor fabs and ice cream parlors, in about a dozen countries around the world. Table of printers

Related: