background preloader

Security

Facebook Twitter

Security :><: WebPortals

Fake programs. Security, Windows. Malware = (virus & worm) + spyware. Privacy. matters. Security news. Attacchi di rete. Disinfezione avanzata, support microsoft. By @Blackhattat. Hyperlink. Hacking Society. Guida per hacker principianti di Anonymous, ecco dove trovarla. Capire se un sito è affidabile. Quante volte avete ricevuto un email di siti e-commerce con prezzi da paura, ultimi modelli di cellulari venduti al 70% in meno o le scarpe della nike a pochi euri???

Capire se un sito è affidabile

Beh… ormai le riceviamo tutti queste email di spam, ma la nostra paura e l’affidabilità del sito, infatti buona parte delle email che riceviamo possono essere un tentativo di truffa e come possiamo evitare di farci truffare??? La cosa è molto semplice basta prendere qualche informazione sul sito su cui intendiamo fare gli acquisti e possiamo scoprire se è un sito truffa o uno onesto. IP Address Distance Lookup. Visualizz IP client e porte di rete. Top 100 Network Security Tools. Comment détruire une puce RFID ? Les puces RFID (Radio Frequency IDentification) sont des puces électroniques constituée d'une antenne et d'un microprocesseur.

Comment détruire une puce RFID ?

On peut y stocker pas mal d'informations, et contrairement aux cartes à puces (carte bancaire, téléphonique...etc), on peut lire ces informations et les mettre à jour sans inserer la puce dans un lecteur. Tout passe par l'antenne sur des fréquences plus ou moins haute. Actuellement, les puces RFID sont utilisées pour un tas de choses comme l'identification d'animaux, les controles d'acces par badge, l'ouverture de serrures (sur les voitures par exemple), la traçabilité des livres dans les bibliothèques, pour l'acheminement des marchandises, pour les péages automatiques et même la carte Navigo.

C'est donc l'avenir en matière de traçabilité. Une puce RFID dans toute sa splendeur Dans le futur, elles seront implantées dans les produits au supermarché, remplaçant ainsi les codes barres traditionnels. Radio-frequency identification. Da Wikipedia, l'enciclopedia libera.

Radio-frequency identification

In telecomunicazioni ed elettronica con l'acronimo RFID (dall'inglese radio-frequency identification, in italiano identificazione a radio frequenza) si intende una tecnologia per l'identificazione e/o memorizzazione dati automatica di oggetti, animali o persone (automatic identifying and data capture, AIDC) basata sulla capacità di memorizzazione di dati da parte di particolari dispositivi elettronici (detti tag o transponder) e sulla capacità di questi di rispondere all'interrogazione a distanza da parte di appositi apparati fissi o portatili chiamati per semplicità lettori (in realtà sono anche scrittori) a radiofrequenza comunicando (o aggiornando) le informazioni in essi contenute. In un certo senso possono essere quindi assimilabili a sistemi di lettura e/o scrittura senza fili con svariate applicazioni.

Importanza e diffusione[modifica | modifica sorgente] Descrizione fisica[modifica | modifica sorgente] P Q R S, acronimi informatica. UDP flood. ByPassare sondaggi - hacking. Re: Attacco HACKER. Wix.com - Website built by apocalisse based on Designer Boutique. Defcom1.tk. How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. The Best Hacking Tutorial Sites - Learn Legal Hacking. Challenges - ThisisLegal.com.

Hacker Test: Level 3. Top 15 Open Source/Free Security/Hacking Tools. 1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7.

Best Privacy Tools. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

64 Things Every Geek Should Know « Caintech.co.uk

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 2.

64 Things Every Geek Should Know - laptoplogic.com. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. Chi è Eugene Kaspersky?Storie di virus, Internet e spie di Putin. Tag: antivirus malware Russia sicurezza informatica di Antonino Caffo Tra un paio di settimane la software house Kaspersky Lab presenterà in Italia la collezione antivirus 2013 e lo farà con la testa altrove.

Chi è Eugene Kaspersky?Storie di virus, Internet e spie di Putin

Giusto un mese fa Wired aveva lanciato delle frecciatine al co-fondatore Eugene Kaspersky considerato come capo di un team che “non ufficialmente” lavora per i servizi di sicurezza russi. Hack a Server, ecco dove gli hacker fanno palestra. L’attacco hacker che ha quasi distrutto internet. Credits: Eric Fischer, Flickr.

L’attacco hacker che ha quasi distrutto internet

Delete Button for the Internet: Tool Removes Personal Info From Google, Facebook. Remember the 1995 movie The Net--when Sandra Bullock frightened audiences with the prospect of having your identity deleted in cyberspace?

Delete Button for the Internet: Tool Removes Personal Info From Google, Facebook

How times have changed. With the rise of third-party cookies and ads that watch your online behavior, removing embarrassing personal information from the Internet has almost become a holy grail of digital life. Bullock's situation seems almost desirable in retrospect. Recognizing the growing call for privacy, Cambridge, MA-based online privacy company Abine today launched DeleteMe, a "delete button for the Internet. " Rather than tracking down that ancient Friendster password on your own, users can pay Abine between $10 to $100 (depending on how complicated their history is) to remove photos, blog posts, videos, and search results, delete old accounts, and stop companies from selling private data to advertisers. The process is not entirely automated. Spy tool 'The Mask' targeted government agencies for seven years. Researchers have uncovered a sophisticated cyber spying operation that has been alive since at least 2007 and uses techniques and code that surpass any nation-state spyware previously spotted in the wild.

Spy tool 'The Mask' targeted government agencies for seven years

The attack, dubbed "The Mask" by the researchers at Kaspersky Lab in Russia who discovered it, targeted government agencies and diplomatic offices and embassies, before it was dismantled last month. It also targeted companies in the oil, gas and energy industries as well as research organisations and activists. Kaspersky uncovered at least 380 victims in more than two dozen countries, with the majority of the targets in Morocco and Brazil.

The attack -- possibly from a Spanish-speaking country -- used sophisticated malware, rootkit methods and a bootkit to hide and maintain persistence on infected machines. The Mask also went after files with extensions that Kaspersky has not been able to identify yet. Stuxnet was reportedly created by the US and Israel. 5 questions pour mieux comprendre le malware The Mask. Antivirus gratuit en ligne. Privacy Protection. Hyperlink. Java. Test, esercitazioni informatica. Corsi on- line informatica. Security, mac [ Apple ] Attualità. Security, android. EMET. Hyperlink. Computer Science. Hackers virus security. "The Mask" (malware & Advanced Persistent Threat - ADT) Hyperlink. COMPUTER HACKS. Hacking. Security.