Network Security
Discussions on network security, holes, exploits and other issues...
121 topics in this forum
-
Lavabit got order for Snowden’s login info...
by Teddy Rogers- 0 replies
- 6.1k views
Lavabit got order for Snowden’s login info http://www.wired.com/threatlevel/2013/10/lavabit_unsealed/ Ted.
-
FBI Admits It Controlled Tor Servers...
by Teddy Rogers- 1 reply
- 4.8k views
FBI Admits It Controlled Tor Servers http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi Ted.
-
Opening Discussion: Speculation on "BULLRUN"...
by Teddy Rogers- 0 replies
- 4.4k views
Opening Discussion: Speculation on "BULLRUN" http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html Ted.
-
On the NSA...
by Teddy Rogers- 3 replies
- 5.4k views
Matthew Green's thoughts on the recent news regarding the NSA being able to weaken and defeat most encryption standards... http://blog.cryptographyengineering.com/2013/09/on-nsa.html? For those who may have missed reading about it all in the news... http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html Ted.
-
Opera - Security Breach Stopped...
by Teddy Rogers- 4 replies
- 5.7k views
Security Breach Stopped http://my.opera.com/securitygroup/blog/2013/06/26/opera-infrastructure-attack Ted.
-
Google Declares War on the Password...
by Teddy Rogers- 1 reply
- 4.9k views
Google Declares War on the Password I think its a good idea having a ring key or key card that uses some form of near field communication to assist with password security and user authentication methods... http://www.wired.com/wiredenterprise/2013/01/google-password/ Ted.
-
Here’s Why We Keep Getting Hacked...
by Teddy Rogers- 4 replies
- 6.2k views
Here’s Why We Keep Getting Hacked... A quick rundown over the Billabong website... http://www.troyhunt.com/2012/07/heres-why-we-keep-getting-hacked-clear.html Ted.
-
my own winsock packet sniffer & spoofer
by PassionSOHN- 0 replies
- 5.8k views
PAPAHACKER.zip you can use this program very easily. not packed 1. select a process you wanna hook 2. if you wanna spoof some packets, just write down the hex codes(upper text) or ASCII (lower text) example) textbox of "Search Hex" 47 45 54 "Replace Hex" 53 45 54 or "Search ASCII" GET "Replace ASCII" SET in addition, you can bypass some bytes by writing "??" when searching by hex codes. like this: 47 ?? 54 ?? 2F-> only searching array [0], [2] and [4] except [1], [3] comparing with WPE, you can replace packets regardless of its position or size. only support winsock 1.1 send(), recv() passionsohn @ south korea ssc0116@hanmail.net
-
- 5 replies
- 7k views
As any Jedi knight knows, the temptation to turn to the Dark Side is difficult to resist. The same can be true for White Hat hackers--malware fighters who discover vulnerabilities in software. The black market prices for those kinds of security flaws are as tantalizing to ethical hackers as the malevolent side of The Force was to Luke Skywalker. Microsoft wants to temper those temptations, though, and has announced a contest that offers more than $250,000 in prizes for developing better solutions to counter security threats. Microsoft's "BlueHat Prize," announced by the company at the Black Hat security conference in Las Vegas Wednesday, offers a grand prize of $200,000…
-
Top Antivirus Software Review 1 2
by CodeExplorer- 29 replies
- 19.2k views
Top Antivirus Software Review />http://www.all-internet-security.com/top_10_antivirus_software.html Never heard of first two! #7 Avira Antivir Premium, #8 ESET NOD32 Antivirus, #9 Kaspersky Anti-Virus 2011 should get more points if you ask me #6 ZoneAlarm Anti-virus Is a good firewall but in rest not so good. #5 Panda Antivirus Pro 2011 and #3 Norton Antivirus 2011 and should always be on last place especially Panda god damn. These are just my comments
-
- 3 replies
- 9k views
RISING Internet Security is a full function computer security software that provides a professional antivirus protection and customizable personal firewall defense to protect your computer against all types of threats existed within Internet. Along with its cloud security it offers you immediate security response, as well as protection. Key features of "Rising Internet Security 2011": Zero-Day Computer Security Protection with Rising Cloud Security: · Rising Cloud Security 3.0, with high intelligence performance based on strong technique support from Rising Cloud Security Data Center which is the largest one in Asia and, the most efficient Rising Antivirus Virtual Mach…
-
F-Secure Free Anti-Theft for Mobile
by Jaymz- 0 replies
- 5k views
F-Secure Free Anti-Theft for Mobile Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE! This is what you get: Easy to install and use Protects your confidential information against loss or theft Helps you locate your phone Anti-Theft is a FREE application for your mobile phone provides protection in case it gets lost or stolen If you suspect your phone is missing you can remotely lock it or wipe the data so that your private text messages or pictures don't end up in the wrong hands. You can also locate your phone or the person holding it remotely. System requirements Anti-Th…
-
DDos solution
by DMichael- 0 replies
- 5.1k views
i found this software that can protect you from DDOS />http://www.fortguard.com/
-
- 3 replies
- 5.1k views
How do I edit data being received and sent to a server from a game? I can only handle about 3000 lines of code so try not to make the example to big. the game's name: Wolfteam what I want: health hack Please give me a example....I Would be very pleased if you helped.
-
NIS Admits to Packet Tapping (Sniffing) Gmail...
by Teddy Rogers- 0 replies
- 4.6k views
NIS Admits to Packet Tapping Gmail Over the past few weeks we have finally come to see that the known flaws and weaknesses with HTTPS and digital certificates are being exploited. A time to reflect and rethink on the whole system? http://english.hani....nal/496473.html Ted.
-
- 0 replies
- 4.8k views
TrustPort is well known for their multiple antivirus engine integrated into one product. Most of the time these multi-engine antivirus top the rank in malware detection but with a price of slowing down your computer. No matter how fast an antivirus engine is, it still requires time to check the files on your computer. When have have a few engines running together, the amount of time required to check on a file obviously increases. TrustPort Total Protection 2012 which uses AVG and Bitdefender engines normally cost EUR 49.95 for 1 year 1PC license but they are offering home users a chance to gain its paid version of the product TrustPort Total Protection 2012 for free! Y…
-
Google Data Center Security...
by Teddy Rogers- 1 reply
- 4.8k views
An interesting little video about the security at Google's datacenters... >http://www.youtube.com/watch?v=1SCZzgfdTBo&feature=player_embedded Ted.
-
How we found the file that was used to Hack RSA...
by Teddy Rogers- 0 replies
- 4.4k views
How we found the file that was used to Hack RSA A brief but still interesting blog post from F-Secure... http://www.f-secure....s/00002226.html Ted.
-
Chinese Military TV Show Reveals More Than Intended...
by Teddy Rogers- 0 replies
- 5.2k views
/>http://www.theepochtimes.com/n2/china-news/slip-up-in-chinese-military-tv-show-reveals-more-than-intended-60619.html >http://www.youtube.com/watch?v=L_Wu1HlZbBk& Ted.
-
Decoding Facebook invites !
by Krisler12- 1 reply
- 6.3k views
Hi ! Someone sant to me an invite on facebook on the one of my email addreesses. As I can see it looks something like this: />http://www.facebook.com/r.php?invid=[NUMBER HERE]&key=AQA14oodIHqfQZ-jYWGKIXi09O3oQr18SQhLvinuOcDBeqMNZb1Ebjqn5bbL_LaIJV37DtbSv-TAdbQgOpCXKRVTC2Q Is there any way to decode them ? I want to know what the number means ? What the key means ? What is the relation between them ? Until now, if I just click on it it redirect me to the facebooke profile of that guy and the key I suppose is my older email address because it apears automatically into textboxes. So, it is possible that the number means a profile of someone and the key repre…
-
heap spray exploits adobe tutorial
by abhijit mohanta- 0 replies
- 4.4k views
http://dreamofareverseengineer.blogspot.com/2011/07/heap-spraying-adobe-exploiting.html
-
neo
by 20Giis- 0 replies
- 4k views
@edit solved this on my own thanks for responding though <,<
-
What's the URL?
by roocoon- 1 reply
- 4.8k views
Hello. I was Googling for some wireless info (how to connect to a BSSID instead of SSID) and tried the following entry from the search results: http://www.google.gr/url?sa=t&source=web&cd=12&ved=0CB0QFjABOAo&url=http%3A%2F%2Frmccurdy.com%2Fscripts%2Fdownloaded%2Fwww.offensive-security.com%2F0000_metasploit%2520unleashed.html&ei=ZAuXTdO5CY_Lsga__LzICA&usg=AFQjCNHHojILd2lMPbduvrl_f9XHh539XQI was surprised it took me to my aDSL modem's login page. Conveniently, the URL had changed to my current IP. One more way to get your current IP while you're online, I guess. Question is, what does this URL translate to? Anything I try, doesn't reach a valid page …
-
HTTP DDoS Attack Mitigation Using Tarpitting
by CodeExplorer- 0 replies
- 4.1k views
HTTP DDoS Attack Mitigation Using Tarpitting />http://www.secureworks.com/research/threats/ddos/
-
[ BBC Tech ] 'Indestructible' botnet uncovered
by News Feeder- 2 replies
- 5.3k views
More than four million PCs have been enrolled in a botnet security experts say is almost 'indestructible' View the full article