ContributeBandwidth isn't free you know :) Here's how to help.
RumorThe tree of liberty must, from time to time, be washed clean with the blood of tyrants and patriots
add a rumor
[ ACWoT ]
[ Announcements ]
[ Cake ]
[ Code ]
[ Directions ]
[ E3 ]
[ Flame Kodrik ]
[ Games ]
[ Laid off ]
[ Locked ]
[ Main ]
[ Network ]
[ Photoshop ]
[ Pie ]
[ Quick Questions ]
[ Science! ]
[ (Security) ]
[ Stupid Links ]
[ Subculture ]
[ Web Videos ]
[ (1) 2 3 ][ next 30 ]
Hacker NeededPosted by kodrik on Tuesday August 19, 2014 @ 12:58pm
[ 2 replies ]
I need a security review to be done on a system we run, so we basically need someone to try to hack it anyway possible and to record the methods used and the results. Password stealing and downloading of data, sql injection, server access...
Your GPG keys ... I has them.Posted by Krux on Friday December 20, 2013 @ 10:52am
[ 4 replies ]
This is crazy. Apparently it was figured out how to break 4096-bit RSA used in GPG by listening to the CPU, or rather the electrolytic capacitors in the power supply for the CPU, which make noise in response to the voltage fluctuations caused by calculations being performed to decrypt messages.
So, after 2 years.. a new version of putty is outPosted by Stealth on Tuesday August 6, 2013 @ 09:10pm
[ more ]
0.63 just got released.. fixes 4 recently dropped bugs (one described here - http://packetstormsecurity.com/files/122693/putty-overflow.txt)
BackupsPosted by Krux on Thursday August 30, 2012 @ 07:38pm
[ 25 replies ]
So this is more for Stealth, since he has like all of the TBs at home. But I was looking for a decent backup solution that offered unlimited storage and handled Linux without having to mount a samba share or some shit.. So my co-worker suggested Crash Plan, as that's what he was using. Seems they have a family unlimited plan which lets you do up to 10 computers. And most important for those paranoid security types, you have the option to encrypt your data using a 448-bit encryption key that they don't have. It's also pretty inexpensive considering what you get. And with about 4TB of data I need to backup, I figured it's worth at least trying out for a year to see how I like it.
Cert QuestionPosted by unicron on Thursday November 3, 2011 @ 06:41pm
[ 6 replies ]
What do you guys think of the Certified Ethical Hacker cert? Trendy BS or something worth having? Has Anyone here ever seen it give someone the leg up in a job search? Just seems like a cool cert to have, something different.
On the topic of CA's and SSL trafficPosted by Stealth on Wednesday August 31, 2011 @ 10:52pm
[ 3 replies ]
Check out this plugin for Firefox - http://convergence.io/ There's an article about it here - http://www.esecurityplanet.com/news/article.php/3938211/Who-Do-You-Trust-with-SSL.htm and it was mentioned at BlackHat '11 and in the back 10 minutes of this video - http://www.youtube.com/watch?v=Z7Wl2FW2TcA
And for some good news with our Info Sec communityPosted by Stealth on Monday July 19, 2010 @ 04:25am
[ 7 replies ]
On the topic of ACLs, firewalls and routers..Posted by Stealth on Friday January 15, 2010 @ 03:03am
[ 68 replies ]
I'm going through my 'list' mailbox and noticed a good sized thread on Firewalls vs ACLs in routers, etc. There are basically two camps, one saying with ACL's in routers and switches, why waste time with another device and something else that could slow down the service, the other, believes firewalls are good. I suppose it's going to depend on whats behind the device, and what you are protecting, but would tend to think that hardware based firewalls are going to be better at protecting machines that routers with ACL's, but then again, I don't run big data centers or even hard-hit outside facing servers.
Well you should have seen that one comingPosted by Krux on Wednesday October 21, 2009 @ 02:59am
[ 2 replies ]
Convicted computer hacker is given unsupervised access to a prison's computer system and ... get ready for the surprise here folks ... hacks said computer system, locking everyone else out.
Here's the username and password, but read the fine print.Posted by Stealth on Tuesday September 15, 2009 @ 01:46pm
[ 10 replies ]
Oh yeah, don't use them. http://www.wired.com/threatlevel/2009/09/montgomery/ Interesting.. People always trying to point fingers at someone else.
TCP over Carrier PigeonPosted by Krux on Friday September 11, 2009 @ 11:15am
[ 5 replies ]
Data transfer? Forget email, send for the pigeon posl
Defcon 17Posted by Krux on Tuesday July 7, 2009 @ 12:31am
[ 5 replies ]
So who's planning on going to Defcon? I'll be there, likely banging my head against some strange encryption puzzle in the LosT@Con Mystery Challenge or hitting up the hardware hacker village, since I've been getting heavy into electronics lately.
Looking for some diamonds?Posted by Stealth on Thursday March 12, 2009 @ 09:26am
[ 28 replies ]
Judge orders defendant to decrypt PGP-protected laptopPosted by Krux on Wednesday March 11, 2009 @ 09:44am
[ 12 replies ]
The Internet, now with 2/3rds less spamPosted by Krux on Wednesday November 12, 2008 @ 08:09pm
[ more ]
After Hurricane Electric and Global Crossing both pulled the plug on McColo Corp., after a report revealing a number of illegal activities happening on McColo?s servers, 2/3rds of the Internet spam worldwide has been stopped. McColo hosted a number of botnet control servers and phishing sites.
Because you don't really trust anyonePosted by Krux on Wednesday September 10, 2008 @ 10:26pm
[ 9 replies ]
I have no real use for one of these, yet still I want one: Micro BallCam, which is a DVR in the shape of a 1.5" clear ball. Probably would be neat to have for some model rocketry cameras, if say you really wanted to spy on your wife, but from space.
[ (1) 2 3 ][ next 30 ]