Calendar
« September 2024 » | Su | Mo | Tu | We | Th | Fr | Sa | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
|
Main » Entries archive
Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features.
Red Hat Enterprise Linux 6 includes hundreds of technical feature enhancements and additions that offer customers a significant technology leap over marketplace alternatives. It offers:
|
BackgroundI
noticed a strange behaviour. A lot of people were into cracking WEP,
but still had a lot of questions on WPA. After these findings, I decided
to just write my own tutorial :-) Knowledge
If you look at the attacks closely, you'd think WPA was very easy to
crack. Well, some people say it is, some don't agree. The fact is, that
if the password is in some sort of dictionary, the password can be
cracked. you'll need a 4-way handshake from a client connecting to an
AP. The 4way handshake holds an encrypted algorithm which can be
cracked by dictionary attack. you'll need a huge list and some luck
that the password is in the list, or you can make a personal list
created with a password tool of your choice (like john), which will not
be discussed in this tutorial ;-).For this tutorial, of course I'
...
Read more »
|
For more info nbceditor@gmail.com +919820199881
...
Read more »
|
The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of
...
Read more »
|
Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that when run, spread the virus to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits its
...
Read more »
|
Mitchell L. Frost, age 23, admitted to initiating Denial of Service attacks on web servers hosting websites for several conservative figures and for operating a botnet. He also admitted to initiating a DDoS on the University of Akron which cost the University $10,000 to restore network services. 30 months in prison... watch your cornhole, Mitchell.
Frost admitted using the compromised machines to spread malware and harvest data from the compromised systems, including user names, passwords, credit card numbers, and
...
Read more »
|
Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.
For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.<
...
Read more »
|
|