background preloader

Security

Facebook Twitter

HTTPS Everywhere. HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using clever technology to rewrite requests to these sites to HTTPS.

Information about how to access the project's Git repository and get involved in development is here. HTTPS Everywhere now uses the DuckDuckGo Smarter Encryption dataset, to enable even greater coverage and protection for our users. Original announcement can be found here: Further technical details on how we utilize Smarter Encryption: The 17 Most Dangerous Places on the Web - PCWorld. Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system. You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble.

You can do everything you can think of to protect yourself and still be taken by a malware infection, a phishing scam, or an invasion of on­­line privacy. We'd like to provide a little help. Not all Web dangers are created equal. Threat 1 >> Malicious Flash files that can infect your PC The Place: Websites that use Flash Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. If You Have to Go There: To help protect against Flash-based attacks, make sure you keep your Flash browser plug-ins up-to-date.

Ssh-udp

Poisoned PDFs? Here's Your Antidote - PCWorld. Attacks employing poisoned PDF files have leaped to the top of the threat list, according to statistics from major security companies. Symantec reports that suspicious PDF files skyrocketed in 2009 to represent 49 percent of Web-based attacks that the company detected, up from only 11 percent in 2008. The next-most-common attack, involving a good old Internet Explorer flaw, was far behind at 18 percent.

In a typical scenario, crooks might hijack a legitimate site and insert a PDF file made to exploit flaws in Adobe Reader. They then link to that PDF via social-engineering lures such as spam or comments on a blog or social network. Even astute users who check the link would see a legit domain. Not knowing the site was hacked, they would be more likely to download and open the file. Now, a new threat allows for launching malware hidden inside a PDF file. Here's the kicker: This embedded-file threat makes creative use of functionality built into the PDF standard. How to Fight the New Threat. How to Check if Your Gmail Account Has Been Hacked. If you’re worried about email security, here is a step by step guide to help you check and determine if your Gmail account has been hacked or compromised in any way. Step 1: Find the ˜Last Account Activity’ Section Your Inbox At the bottom of your Gmail inbox there is a ˜Last Account Activity’ section.

Click on ˜details’ to launch the full blown monitor. Step 2: See who has accessed your Gmail account recently Next, what you’ll see is a table of the most recent activity from your Gmail account. How it was accessed (Browser/mobile etc)Where exactly the IP address is (So you can do some further digging)When it was accessed Step 3: Understand the IP addresses – Has your Gmail really been hacked? If you see IP addresses from different countries, don’t be too quick to panic. Step 4: Understand the alerts – Google’s way of highlighting suspicious activity Step 5: Sign Out All Other Sessions – If you forgot to sign out on a public computer So there you have it.

Google+ Network Security/Analysis Software for Linux. Note: In most cases descriptions have been taken verbatim from project websites. tcpdump tcpdump is a tool for network monitoring, protocol debugging and data acquisition. IPTraf IPTraf is a network monitoring utility for IP networks. It intercepts packets on the network and gives out various pieces of information about the current IP traffic over it. IPTraf can be used to monitor the load on an IP network, the most used types of network services, the proceedings of TCP connections, and others. ngrep ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets.

Iftop iftop does for network usage what top(1) does for CPU usage. Ntop ntop is a network traffic probe that shows the network usage, similar to what the popular top Unix command does. Nagios Ethereal Ethereal is a network packet analyzer. Nmap dsniff Snort Nessus. How to delete and control cookies. How to Access Your Computer Files Over the Internet from Anywher. Learn how you can access documents, music and other important files on your home computer from any other computer or mobile phone through the Internet. The problem: You have documents, photos, music and other important files on the home computer.

How can you “remotely access” these files from your office computer or, when you are travelling, from your mobile phone? The solution: The simplest solution would be that you copy all your data from the home computer on to a portable hard drive and carry it around but this is obviously a bit cumbersome approach as it requires you to manually sync the home computer and your portable disk. There are couple of ways by which you can retrieve files stored on your home computer from anywhere else using a regular Internet connection. Option 1: Using Online Backup The upside is that your files will always be available to you even if the home computer is not running. Option 2: Using Desktop Sharing Software Option 3: Access Files Directly through the Browser.