Thursday, 08.24.2017, 4:14 AM

Ethical Hacking - By Chintan Gurjar

Site menu
Calendar
«  November 2010  »
SuMoTuWeThFrSa
 123456
78910111213
14151617181920
21222324252627
282930
Our poll
Rate my site
Total of answers: 164
Main » 2010 » November » 11

A security guru has debunked cyber war and cyber terrorism myths.

The threats of cyber war and cyber terrorism have been grossly exaggerated and are hindering a real understanding of risks on the internet, one of the world’s leading information security experts has said. Bruce Schneier, the author and security technologist who is also chief security technology officer wit ... Read more »
Views: 367 | Added by: handsome_devil | Date: 11.11.2010 | Comments (2)



Orkut users have lately been targeted with a clever scheme that redirects them to phishing pages without them having to do anything except visit a compromised account.

Using malicious applications that were made available in the Apps Directory, the phishers let the users do the dirty work themselves. Attracted by possibilities such as being able to watch TV channels online, users would add the application to their profiles and, from then on, every ... Read more »
Views: 430 | Added by: handsome_devil | Date: 11.11.2010 | Comments (2)


Apple released Mac OS X 10.6.5 and Security Update 2010 - 007 which increases the stability, compatibility, and security of your Mac.

New Security Changes Will Affect This all below mentioned Things.
Views: 475 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)

Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features.



Red Hat Enterprise Linux 6 includes hundreds of technical feature enhancements and additions that offer customers a significant technology leap over marketplace alternatives. It offers:
Views: 676 | Added by: handsome_devil | Date: 11.11.2010 | Comments (3)


Views: 1480 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

Background

I noticed a strange behaviour. A lot of people were into cracking WEP, but still had a lot of questions on WPA. After these findings, I decided to just write my own tutorial :-)
Knowledge

If you look at the attacks closely, you'd think WPA was very easy to crack. Well, some people say it is, some don't agree. The fact is, that if the password is in some sort of dictionary, the password can be cracked. you'll need a 4-way handshake from a client connecting to an AP. The 4way handshake holds an encrypted algorithm which can be cracked by dictionary attack. you'll need a huge list and some luck that the password is in the list, or you can make a personal list created with a password tool of your choice (like john), which will not be discussed in this tutorial ;-).For this tutorial, of course I' ... Read more »
Views: 733 | Added by: handsome_devil | Date: 11.11.2010 | Comments (2)


For more info
nbceditor@gmail.com
+919820199881
... Read more »
Views: 580 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)



The Hacker’s Underground 
Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of

... Read more »

Views: 441 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that when run, spread the virus to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits its ... Read more »
Views: 646 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)




Mitchell L. Frost, age 23, admitted to initiating Denial of Service attacks on web servers hosting websites for several conservative figures and for operating a botnet. He also admitted to initiating a DDoS on the University of Akron which cost the University $10,000 to restore network services. 30 months in prison... watch your cornhole, Mitchell.

Frost admitted using the compromised machines to spread malware and harvest data from the compromised systems, including user names, passwords, credit card numbers, and ... Read more »
Views: 421 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)


Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.

For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.< ... Read more »
Views: 810 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)

 Mobile Nanny is an extremely useful which can be used to monitor an iPhone or an iPod, With Mobile Nanny you can block, record user activity and set restrictions on your iPhone or iPod touch using MobileNanny which is a new jailbreak tweak available in cydia, Mobile Nanny s next generation Parental control softwares which also has an ability to block and monitor every aspect of how your Child uses your mobile phone.All of these softwares have 100% money back guarante.

Views: 484 | Added by: handsome_devil | Date: 11.11.2010 | Comments (2)



By Dr. Ravi Bhatia

E-Mail-ravipbhatia28@rediffmail.com

The world-wide web or the internet has become an omnipresent presence in the contemporary world. From sending and receiving messages to accessing services such as banking, booking rail or air tickets, to trading shares on stock exchanges, more and more people inhabit cyberspace with the aid of a computer. Science fiction writer William Gibson coined this term, which indicated his vision of a global computer network linking people, machines and sources of information throughout the world. Anyone could navigate through this virtual space and use this facility free ... Read more »
Views: 3781 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)