-
Sep 9, 2016
And it works on Windows and OSX! The security researcher Rob Fuller has discovered a new attack method that can be used to steal credentials from a locked computer (but, with the user logged in) and works on both Windows and… read more »
-
Sep 8, 2016
Using qemu-img! About VMXRAY i have already spoken in a previous post. But if i need to open a Virtual Disk Image with a forensics tool like Autopsy? Just convert the VMDK file into a format that can be read… read more »
-
Sep 7, 2016
Change your password as soon as possible! The italian email hosting “Libero Mail” has announced that has suffered an attack that resulted in the compromise of its user database: Ti informiamo che il sistema di sicurezza di Libero ha rilevato… read more »
-
Sep 7, 2016
The power of HTML5! You need to extract a single file from a disk image of a Virtual Machine (VMWare, VirtualBox and other), or just navigate the disk without install and start a virtualization tool? Pretty simple, with VMXRAY: VMXRay is… read more »
-
Sep 6, 2016
The only paper ship that can be made in less than 12 parsecs
A funny infographic from DeAgostini Model Space:
And here another version from Tadashi Mori:
[embed]https://www.youtube.com/watch?v=XqRGl4O-WzA[/embed]
Enjoy! :-)
… read more »
-
Sep 5, 2016
Userful for Sys/Network Admins Great post from nixCraft about the famous security tool Nmap: The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out… read more »
-
Sep 2, 2016
Short but useful!
Need to connect to an ssh server through a socks4/5 proxy? (for example, to connect to a tor hidden server?)
Simple, with this short bash snippet:
ssh -o ProxyCommand=’nc -x 127.0.0.1:9150 %h %p’ user@host
… read more »
-
Sep 1, 2016
Casey Chan on Gizmodo has made a good analysis Have you seen Suicide Squad? Do you like Jared Leto’s Joker or your preferred villain still remains Heath Ledger? Casey Chan on Gizmodo has written a good article about this two iconic… read more »
-
Aug 31, 2016
And some interesting comments from Bruce Schneier’s blog Bruce Schneier, on his blog, has linked an interesting article from eff.org about privacy implications of Windows 10: The trouble with Windows 10 doesn’t end with forcing users to download the operating… read more »
-
Aug 30, 2016
Ten tips from three great guitarists Classical Guitar has published a really useful article about improvisation, with 10 tips from three great guitar players: Andrew York, Roland Dyens, and Dušan Bogdanovic. Classical guitar students may encounter a lack of standard… read more »
-
Aug 29, 2016
Only a few days ago, the creators of the series have suggested that “Stranger Things” could become a video game. No sooner said than done. Speaking with IGN, Matt and Ross Duffer revealed that the timeline of next season of “Stranger… read more »
-
Aug 26, 2016
Upgrade your device to iOS 9.3.5, ASAP! Citizen Lab and Lookout have discovered an active threat using three critical iOS zero-day vulnerabilities: when exploited, creates an attack chain that subverts even Apple’s strong security environment. The vulnerabilities CVE-2016–4655: Memory Corruption in… read more »
-
Aug 25, 2016
Be brave, basically steganography is not hard! OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file. Watermarking: Sign files with an invisible signature. It can be used to detect unauthorized… read more »
-
Aug 24, 2016
Maybe it’s a dated topic, but it’s always funny! What is a fork bomb? A fork bomb (also know as Rabbit Virus or Wabbit) is a denial-of-service attack wherein a process continually replicates itself, slowing down or crashing the system due to… read more »
-
Aug 23, 2016
A new youth for macro viruses? Recently, with a colleague were discussing how Office macros are becoming a vehicle widely used by malware distributors. On this Github repository i have found Macroshop, a collection of python script to aid the embedding… read more »
-
Aug 23, 2016
For inexperienced or impatient admins! Five complete solutions for rapidly deploy a complete mail server with a single installation. Enjoy! Citadel: Versatile and powerful mail server, written in C.License: GPLv3 iRedMail: Mail server solution based on Postfix and Dovecot.License: GPLv3… read more »
-
Aug 22, 2016
And shows how the National Security Agency was able to decrypt VPN traffic! Some days ago, an hackers group named “The Shadow Brokers” has announced to have hacked a group linked to the NSA and dumped a lot of its hacking… read more »
-
Aug 19, 2016
In this interesting video, the bielorussian guitar player Tatyana Ryzhkova talks about her fingernails shaping. [embed]https://www.youtube.com/watch?v=fDzFTBJRJnI[/embed] Tatyana uses a right hand posture rotated outwards, and this implies an asymmetric length of the fingernails, with the index fingernail visibly longer than… read more »
-
Aug 18, 2016
How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web! How make it? Three simple steps! 1 — Install Tor Install OrBot app from Google Play: [embed]https://play.google.com/store/apps/details?id=org.torproject.android[/embed] Then enable the ‘Hidden Service Hosting’ option… read more »
-
Aug 17, 2016
A group of researchers of Arizona State University think it could work! In the paper titled “Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence”, a group of 10 researchers ( Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra,… read more »