Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, January 5

15 Useful Linux and Unix Tape Managements Commands For Sysadmins



Explains how to read and write data from and to tapes in Linux,  Solaris, FreeBSD and Unix-like system using mt, tar, dump and restore commands.

Tape devices should be used on a regular basis only for archiving files or for transferring data from one server to another. Usually, tape devices are all hooked up to Unix boxes, and controlled with mt or mtx. You must backup all data to both disks (may be in cloud) and tape device. In this tutorial you will learn about:

How does GNU GRUB work?


This blog post is closely related with my interest in low-level stuff. As you already may know, I've started to be interested in such things like: How N works, where the N is something like - what does occur when we turn on the computer, pressing key on keyboard, how does an operating system load a program and many many more. I have found answers on some of my questions. You can look on the set if blog posts which are describe some aspects of the assembly programming or the linux-insides book which describes internals of the Linux kernel.

Friday, December 18

Microsoft Smartscreen Can Now Block Zero-Day Attacks On Edge And IE

Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads since its initial release in Internet Explorer 7.

REDMOND COMPANY Microsoft has approached its customers with some boasts about SmartScreen and how much better it is as protecting people today than it was earlier this week.

The firm said that the SmartScreen system has been a capable security option for some time, and has made its bones in protecting against phishing attacks and malware and that kind of thing.

Linux Foundation Forms Banking Alliance To Look For The Next Bitcoin Technology

Linux Foundation Forms Banking Alliance To Look For The Next Bitcoin Technology

THE LINUX FOUNDATION has announced another collaborative effort, this time dedicated to the advance of blockchain technology.

The Foundation already manages groups from across the industry dedicated to areas such as security and containerisation.

Tuesday, November 17

A Collection of Python Pentest Scripts

A large scripts for python fully featured security and hacking tools. We also provide some exploits, proof of concept code, shellcodes and snippets.

These files and scripts are not intended for malicious purposes, they are to be used for training, and legally approved assessments.

A Collection of Python Pentest Scripts


Thursday, October 29

Government Gateway online hack claims 'nonsense' from the government information security experts.

Claims the Government Gateway online identity portal has been "hacked" have been dismissed as "nonsense" by the man originally responsible for the project and two government information security experts.

Earlier this week the Financial Times (behind paywall) reported that “tens of thousands” of Britons’ identities were currently for sale on "the dark web". The newspaper cited a Whitehall security officer, who revealed this included thousands of detailed profiles stolen from the government’s own computer systems.

Malware Infects MySQL Servers, Enrolls Them in Worldwide DDoS Botnet

According to Symantec's Gavin O. Gorman, attackers may be using SQL injections (still unconfirmed) to infect MySQL servers with a custom-made UDF (user-defined function) file, which then saves the Downloader.Chikdos trojan on the server.

Saturday, July 25

Everything About Tor - Tom Ritter


A little bit ago NCC Group North America had an all-hands retreat, and solicited technical talks. I fired off a one-line e-mail: "All About Tor - Everything from the Directory Authorities to the Link Protocol to Pluggable Transports to everything in between." And promptly forgot about it for... a couple months. I ended up building the deck, with a level of detail I thought was about 80% of what I wanted, and gave a dry-run for my 45 minute talk. It ran two full hours.

Monday, July 20

Bulletproof Hosting Services: Cybercriminal Hideouts for Lease

There are many facets to a cybercriminal operation, and one of them that is often overlooked—but is no less significant—is the hosting servers from which they launch their attacks. Commonly known in the industry as Bulletproof Hosting Servers (BPHS), these are hardware-, software- or application-based hosting facilities that can store any type of content and executable code, just like any regular hosting service.
View research paper: Criminal Hideouts  for Lease: Bulletproof Hosting Services

Sunday, July 19

Latest Python tools for penetration testers



If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This page lists some of them.

Latest Python tools for penetration testers
Latest Python tools for penetration testers

Tuesday, July 14

Mozilla Blocks Flash By Default On Firefox Browser



Adobe’s Flash blocked by mainstream browser over critical security bugs actively exploited by hackers, as calls for its decommissioning rise

Mozilla blocks all versions of Adobe Flash in Firefox Adobe Flash
Mozilla blocks all versions of Adobe Flash in Firefox Adobe Flash

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations



Another zero-day vulnerability is being exploited in attacks spotted in the wild: this time, the targeted software is Java.

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations
First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations

Thursday, July 9

Windows 10: The New Trojan Horse for NSA And Microsoft ?


BEFORE USE THE WINDOW 10 OR WINDOW 10 PREVIEW READ THE STUFF OUR TEAM COLLECT IT 

Windows 10: The New Trojan Horse for NSA And Microsoft?
Windows 10: The New Trojan Horse for NSA And Microsoft?
First look over the old report which prove that Microsoft build Record Data Software for NSA and US government not for WINDOW USER

1.  NSA Built Back Door In All Microsoft Windows Software Since 1999:
                we have a see this full report there are using a  secret NSA key inWindows, whose functions we don't know.

2.  Aswe all know that earlier Microsoft and NSA have backdoors in windows 8, we allknow after Germen government say no to window 8 in 2013. And Microsoft also declares that Window 10 its  late version of windows its mean it's a MATERPIECE

3. Microsoft mention in the preview Privacy Statement,
                that they can monitoring every system it is on to gather useful information on how to improve itself. But there are side effects of it too. With new revelation coming every day on how tech companies are monitoring you and sharing those data with law agencies or ad networks, it may not be a wise decision to go for Windows 10 TP. For more information visit preview privacy statement from Microsoft which states,

 “When you acquire, install and use the Programme software and services, Microsoft collects information about your use of the software and services as well as about the devices and networks on which they operate. Examples of data we may collect include your name, email address, preferences and interests; location, browsing, search and file history; phone call and SMS data; device configuration and sensor data; voice, text and writing input; and application usage.”


As Its seems like NSA also have full control over Every system. Microsoft Windows has a universal back door through which any change whatsoever can be imposed on the users.
Microsoft look at user's files for the US government on demand, though the “privacy policy” does not explicit say so.

Let's see how they can do that,

How They Collect our Data

They also mention that how they collects our data in the statement

Microsoft uses a number of methods and technologies(BackDoors) to gather data, such as:

·         Internet-enabled features in the Programme software and services that transmit information to Microsoft; and

·         Technologies like cookies and web beacons. Microsoft may use cookies (small text files placed on a device's hard disk by a web service) or similar technologies to provide the software and services. For example, cookies may be used to store a user’s preferences and settings, to gather Experience Data, to authenticate a user or to detect fraud.


But till now we don't have test on window 10 because it's don't  released yet so we don't say any commitment on that but as per the previous(Till now) behavior of Microsoft they start giving free to windows 7 and 8 user and Windows 10Insider Preview users and they have a target of billions of user till 2017.

We don't have any problem with target but for FREE USER we have a doubt that no company provide free full version why Microsoft may be because may be they want to take full control over billions of devices


Unconfirmed Report.................

Wednesday, July 8

US To Set Biometric ID Verification After 4 Million Federal Government Employees Affected By Massive Cyber Attack

The US government is to introduce a biometric access to the internet, so that to trace every step of the users.


US To Set Biometric ID Verification
Greater control is explained with alleged hacking attacks.

Tuesday, July 7

Kali Linux 2.0 Release Day on August 11th, 2015 with teaser

We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we’ve been working feverishly on our next generation of Kali Linux and we’re really happy with how it’s looking so far.

Thursday, July 2

Linux Deploy: Convert Android Phone to Linux

LINUX DEPLOY is an open source software and redistribute it under license GPLv3. It's an easy to use application that creates a disk image on the flash card, mount it and install OS distribution. You require to have a super user privilege to install Linux on android phone.

 Convert Android Phone to Linux

EvilAP Defender: Protect Wireless Network from Evil Access Points!

EvilAP_Defender is an application that helps wireless network administrator to discover and prevent Evil Access Points (AP) from attacking wireless users.

How to protect wifi from the Evil Access | Fake accessPoints (AP)

Wednesday, July 1

20 Ways To Make Your Chrome Browser So Much Better

The Web can be overwhelming, but it doesn't have to be.


If you're a Google Chrome user, there are thousands of browser plug-ins called "extensions" that can make it easier to stay on top everything you do online.
The Web can be overwhelming, but it doesn't have to be.
Here are 20 of the most useful Chrome extensions to make browsing better.
Here are some of the best free Chrome extensions you can download.