background preloader

Information Security

Facebook Twitter

Passfault Demo: Password Evaluation. Anonymity Online. Ophcrack. ElcomSoft turns your laptop into a one-touch WiFi cracking system. Open source anti-theft solution for Mac, PCs & Phones – Prey. How to Verify if an Email Address Is Real or Fake. This is a pretty good article, but I thought I would mention a couple of items. 1. Some email servers will accept an email rcpt to: then bounce the mail later. At the command-line, this would give the appearance that the rcpt to: address is good but will actually fail further within the email server.

Not only that, many email servers these days do not issue bounce messages as a spam preventative measure. 2. 3. As email server software becomes more sophisticated or companies start to employ hosted filters like Postini more often, this type of exercise is becoming less trustworthy. Mobile Spy - How the iPhone, BlackBerry, Windows Mobile, Android and Symbian OS Smartphone Spy Software Works on your Cell Phone. Mobile Spy defines the latest in high-tech cell phone surveillance. This revolutionary software allows individuals to easily install monitoring software directly onto a compatible smartphone that you own or have the proper consent to monitor. Once the software is installed onto the phone to be monitored, it silently logs activity such as SMS messages and call information along with recording GPS locations every 30 minutes when a GPS signal is available.

There's no need to worry about being near the phone to view the activity after installation because activities are uploaded to a private account viewable using ANY web browser, even a Mac or phone web browser. Here's a video and diagram to help you visualize how this process works. This new technology might sound complicated but the process is actually quite easy using our online User Guide and other documentation. Below you will find a summarized version of how the entire process works. Geek to Live: Choose (and remember) great passwords. How I’d Hack Your Weak Passwords.