background preloader

Security

Facebook Twitter

Security :><: WebPortals

Fake programs. Security, Windows. Malware = (virus & worm) + spyware. Privacy. matters. Security news. Attacchi di rete. Disinfezione avanzata, support microsoft. By @Blackhattat. Hyperlink. Hacking Society. Guida per hacker principianti di Anonymous, ecco dove trovarla. Capire se un sito è affidabile. IP Address Distance Lookup. Visualizz IP client e porte di rete. Top 100 Network Security Tools. Comment détruire une puce RFID ? Les puces RFID (Radio Frequency IDentification) sont des puces électroniques constituée d'une antenne et d'un microprocesseur.

Comment détruire une puce RFID ?

On peut y stocker pas mal d'informations, et contrairement aux cartes à puces (carte bancaire, téléphonique...etc), on peut lire ces informations et les mettre à jour sans inserer la puce dans un lecteur. Tout passe par l'antenne sur des fréquences plus ou moins haute. Actuellement, les puces RFID sont utilisées pour un tas de choses comme l'identification d'animaux, les controles d'acces par badge, l'ouverture de serrures (sur les voitures par exemple), la traçabilité des livres dans les bibliothèques, pour l'acheminement des marchandises, pour les péages automatiques et même la carte Navigo.

C'est donc l'avenir en matière de traçabilité. Une puce RFID dans toute sa splendeur Dans le futur, elles seront implantées dans les produits au supermarché, remplaçant ainsi les codes barres traditionnels. Radio-frequency identification. Da Wikipedia, l'enciclopedia libera.

Radio-frequency identification

In telecomunicazioni ed elettronica con l'acronimo RFID (dall'inglese radio-frequency identification, in italiano identificazione a radio frequenza) si intende una tecnologia per l'identificazione e/o memorizzazione dati automatica di oggetti, animali o persone (automatic identifying and data capture, AIDC) basata sulla capacità di memorizzazione di dati da parte di particolari dispositivi elettronici (detti tag o transponder) e sulla capacità di questi di rispondere all'interrogazione a distanza da parte di appositi apparati fissi o portatili chiamati per semplicità lettori (in realtà sono anche scrittori) a radiofrequenza comunicando (o aggiornando) le informazioni in essi contenute. In un certo senso possono essere quindi assimilabili a sistemi di lettura e/o scrittura senza fili con svariate applicazioni. P Q R S, acronimi informatica. UDP flood. ByPassare sondaggi - hacking. Re: Attacco HACKER. Wix.com - Website built by apocalisse based on Designer Boutique.

Defcom1.tk. How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is.

The Best Hacking Tutorial Sites - Learn Legal Hacking. Written by: Daniel Robson•edited by: Aaron R.

The Best Hacking Tutorial Sites - Learn Legal Hacking

•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process. Challenges - ThisisLegal.com. Hacker Test: Level 3. Top 15 Open Source/Free Security/Hacking Tools. 1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Best Privacy Tools. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

64 Things Every Geek Should Know « Caintech.co.uk

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. 64 Things Every Geek Should Know - laptoplogic.com. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

Chi è Eugene Kaspersky?Storie di virus, Internet e spie di Putin. Tag: antivirus malware Russia sicurezza informatica di Antonino Caffo Tra un paio di settimane la software house Kaspersky Lab presenterà in Italia la collezione antivirus 2013 e lo farà con la testa altrove.

Chi è Eugene Kaspersky?Storie di virus, Internet e spie di Putin

Hack a Server, ecco dove gli hacker fanno palestra. L’attacco hacker che ha quasi distrutto internet. Credits: Eric Fischer, Flickr Tag: ddos hacker privacy sicurezza informatica di Antonino Caffo Se il vostro internet è lento potrebbe non essere colpa del modem o del provider.

L’attacco hacker che ha quasi distrutto internet

Da qualche ora è in corso, in tutto il mondo, il più grande attacco DDoS della storia, come lo hanno etichettato i principali esperti. Delete Button for the Internet: Tool Removes Personal Info From Google, Facebook. Remember the 1995 movie The Net--when Sandra Bullock frightened audiences with the prospect of having your identity deleted in cyberspace?

Delete Button for the Internet: Tool Removes Personal Info From Google, Facebook

How times have changed. With the rise of third-party cookies and ads that watch your online behavior, removing embarrassing personal information from the Internet has almost become a holy grail of digital life. Bullock's situation seems almost desirable in retrospect. Recognizing the growing call for privacy, Cambridge, MA-based online privacy company Abine today launched DeleteMe, a "delete button for the Internet. " Rather than tracking down that ancient Friendster password on your own, users can pay Abine between $10 to $100 (depending on how complicated their history is) to remove photos, blog posts, videos, and search results, delete old accounts, and stop companies from selling private data to advertisers. The process is not entirely automated.

Spy tool 'The Mask' targeted government agencies for seven years. Researchers have uncovered a sophisticated cyber spying operation that has been alive since at least 2007 and uses techniques and code that surpass any nation-state spyware previously spotted in the wild.

Spy tool 'The Mask' targeted government agencies for seven years

The attack, dubbed "The Mask" by the researchers at Kaspersky Lab in Russia who discovered it, targeted government agencies and diplomatic offices and embassies, before it was dismantled last month. It also targeted companies in the oil, gas and energy industries as well as research organisations and activists. Kaspersky uncovered at least 380 victims in more than two dozen countries, with the majority of the targets in Morocco and Brazil. The attack -- possibly from a Spanish-speaking country -- used sophisticated malware, rootkit methods and a bootkit to hide and maintain persistence on infected machines. The Mask also went after files with extensions that Kaspersky has not been able to identify yet. Stuxnet was reportedly created by the US and Israel. 5 questions pour mieux comprendre le malware The Mask. Antivirus gratuit en ligne. Privacy Protection. Hyperlink. Java. Test, esercitazioni informatica. Corsi on- line informatica.

Security, mac [ Apple ] Attualità. Security, android. EMET. Hyperlink. Computer Science. Hackers virus security. "The Mask" (malware & Advanced Persistent Threat - ADT) Hyperlink. COMPUTER HACKS. Hacking. Security.