|
Main » 2010 » November » 11
A security guru has debunked cyber war and cyber terrorism myths.
The threats of cyber war and cyber terrorism have been grossly exaggerated and are hindering a real understanding of risks on the internet, one of the world’s leading information security experts has said. Bruce Schneier, the author and security technologist who is also chief security technology officer wit
...
Read more »
|
Orkut users have lately been targeted with a clever scheme that redirects them to phishing pages without them having to do anything except visit a compromised account.
Using malicious applications that were made available in the Apps Directory, the phishers let the users do the dirty work themselves. Attracted by possibilities such as being able to watch TV channels online, users would add the application to their profiles and, from then on, every
...
Read more »
|
Apple released Mac OS X 10.6.5 and Security Update 2010 - 007 which increases the stability, compatibility, and security of your Mac.
New Security Changes Will Affect This all below mentioned Things.
|
Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features.
Red Hat Enterprise Linux 6 includes hundreds of technical feature enhancements and additions that offer customers a significant technology leap over marketplace alternatives. It offers:
|
BackgroundI
noticed a strange behaviour. A lot of people were into cracking WEP,
but still had a lot of questions on WPA. After these findings, I decided
to just write my own tutorial :-) Knowledge
If you look at the attacks closely, you'd think WPA was very easy to
crack. Well, some people say it is, some don't agree. The fact is, that
if the password is in some sort of dictionary, the password can be
cracked. you'll need a 4-way handshake from a client connecting to an
AP. The 4way handshake holds an encrypted algorithm which can be
cracked by dictionary attack. you'll need a huge list and some luck
that the password is in the list, or you can make a personal list
created with a password tool of your choice (like john), which will not
be discussed in this tutorial ;-).For this tutorial, of course I'
...
Read more »
|
For more info nbceditor@gmail.com +919820199881
...
Read more »
|
The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of
...
Read more »
|
Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that when run, spread the virus to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits its
...
Read more »
|
Mitchell L. Frost, age 23, admitted to initiating Denial of Service attacks on web servers hosting websites for several conservative figures and for operating a botnet. He also admitted to initiating a DDoS on the University of Akron which cost the University $10,000 to restore network services. 30 months in prison... watch your cornhole, Mitchell.
Frost admitted using the compromised machines to spread malware and harvest data from the compromised systems, including user names, passwords, credit card numbers, and
...
Read more »
|
Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.
For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.<
...
Read more »
|
Mobile Nanny is an extremely useful which can be used to monitor an iPhone or an iPod, With Mobile Nanny you can block, record user activity and set restrictions on your iPhone or iPod touch using MobileNanny which is a new jailbreak tweak available in cydia, Mobile Nanny s next generation Parental control softwares which also has an ability to block and monitor every aspect of how your Child uses your mobile phone.All of these softwares have 100% money back guarante.
|
By Dr. Ravi Bhatia
E-Mail-ravipbhatia28@rediffmail.com
The world-wide web or the internet has become an omnipresent presence in the contemporary world. From sending and receiving messages to accessing services such as banking, booking rail or air tickets, to trading shares on stock exchanges, more and more people inhabit cyberspace with the aid of a computer. Science fiction writer William Gibson coined this term, which indicated his vision of a global computer network linking people, machines and sources of information throughout the world. Anyone could navigate through this virtual space and use this facility free
...
Read more »
| |
|