-
Sep 1, 2016
Casey Chan on Gizmodo has made a good analysis Have you seen Suicide Squad? Do you like Jared Leto’s Joker or your preferred villain still remains Heath Ledger? Casey Chan on Gizmodo has written a good article about this two iconic… read more »
-
Aug 31, 2016
And some interesting comments from Bruce Schneier’s blog Bruce Schneier, on his blog, has linked an interesting article from eff.org about privacy implications of Windows 10: The trouble with Windows 10 doesn’t end with forcing users to download the operating… read more »
-
Aug 30, 2016
Ten tips from three great guitarists Classical Guitar has published a really useful article about improvisation, with 10 tips from three great guitar players: Andrew York, Roland Dyens, and Dušan Bogdanovic. Classical guitar students may encounter a lack of standard… read more »
-
Aug 29, 2016
Only a few days ago, the creators of the series have suggested that “Stranger Things” could become a video game. No sooner said than done. Speaking with IGN, Matt and Ross Duffer revealed that the timeline of next season of “Stranger… read more »
-
Aug 26, 2016
Upgrade your device to iOS 9.3.5, ASAP! Citizen Lab and Lookout have discovered an active threat using three critical iOS zero-day vulnerabilities: when exploited, creates an attack chain that subverts even Apple’s strong security environment. The vulnerabilities CVE-2016–4655: Memory Corruption in… read more »
-
Aug 25, 2016
Be brave, basically steganography is not hard! OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file. Watermarking: Sign files with an invisible signature. It can be used to detect unauthorized… read more »
-
Aug 24, 2016
Maybe it’s a dated topic, but it’s always funny! What is a fork bomb? A fork bomb (also know as Rabbit Virus or Wabbit) is a denial-of-service attack wherein a process continually replicates itself, slowing down or crashing the system due to… read more »
-
Aug 23, 2016
A new youth for macro viruses? Recently, with a colleague were discussing how Office macros are becoming a vehicle widely used by malware distributors. On this Github repository i have found Macroshop, a collection of python script to aid the embedding… read more »
-
Aug 23, 2016
For inexperienced or impatient admins! Five complete solutions for rapidly deploy a complete mail server with a single installation. Enjoy! Citadel: Versatile and powerful mail server, written in C.License: GPLv3 iRedMail: Mail server solution based on Postfix and Dovecot.License: GPLv3… read more »
-
Aug 22, 2016
And shows how the National Security Agency was able to decrypt VPN traffic! Some days ago, an hackers group named “The Shadow Brokers” has announced to have hacked a group linked to the NSA and dumped a lot of its hacking… read more »
-
Aug 19, 2016
In this interesting video, the bielorussian guitar player Tatyana Ryzhkova talks about her fingernails shaping. [embed]https://www.youtube.com/watch?v=fDzFTBJRJnI[/embed] Tatyana uses a right hand posture rotated outwards, and this implies an asymmetric length of the fingernails, with the index fingernail visibly longer than… read more »
-
Aug 18, 2016
How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web! How make it? Three simple steps! 1 — Install Tor Install OrBot app from Google Play: [embed]https://play.google.com/store/apps/details?id=org.torproject.android[/embed] Then enable the ‘Hidden Service Hosting’ option… read more »
-
Aug 17, 2016
A group of researchers of Arizona State University think it could work! In the paper titled “Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence”, a group of 10 researchers ( Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra,… read more »
-
Aug 16, 2016
A cheat sheet of shortcuts and tips for analyzing and reverse-engineering malware Lenny Zeltser teaches digital forensics and anti-malware courses at SANS Institute: on his site, at https://zeltser.com/cheat-sheets/, has published a lot of useful cheat sheets. Today i want to… read more »
-
Aug 15, 2016
Pepe Romero talks about the Concierto de Aranjuez, The Universe, and Everything! From the youtube channel of the “Guitar Foundation of America” a useful video in which Pepe Romero talks about the “Concierto de Aranjuez”, by Joaquín Rodrigo. [embed]https://www.youtube.com/watch?v=4AYAf-tC8HI[/embed] Pepe… read more »
-
Aug 12, 2016
An end-to-end solution to incident responders and forensic analysts Rekall is a collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory samples. The extraction techniques are performed completely independent… read more »
-
Aug 11, 2016
It’s a trend topic, I think is useful summing up the highlights taken from the major sites. The malware has been active since at least 2011 and has been discovered on 30 infected organizations in Russia, Iran, Rwanda and possibly in… read more »
-
Aug 10, 2016
Recently we have heard many scary stories of hacking IoT devices, but how realistic is the threat? This is not just a hypothetical scenario: at the DEFCON24 security conference in Las Vegas, Ken Munro and Andrew Tierney of PenTestPartners have showed… read more »
-
Aug 9, 2016
Do we still need a CDN? PixelsCommander ha released an interesting project called ViralSJ: a Node.js/Express.js library to distribute application via P2P, using WebRTC. ViralJS creates a self-establishing and self-evolving CDN which moves data closer to client. P2P content distribution allows… read more »
-
Aug 8, 2016
Yep! Another vulnerability in Qualcomm devices, dubbed “QuadRooter”, was disclosed by Check Point in a session at DEF CON 24 in Las Vegas QuadRooter is a set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with… read more »