Cybersecurity

Facebook Twitter
My husband was my inspiration for this post. He wanted to share his contact information on Twitter and was 2 seconds away from posting a tweet with his actual email address, until I stopped him. I let him know that he was just asking for trouble (lots of spam) by doing that. I then helped him search for a better alternate: a way of posting his contact information without having to actually post his email address. He decided upon Scrim, but along with that service here are 2 other quick and easy spam free ways to share your contact information on the Web. Scrim 3 Spam Free Ways to Share Your Contact Information 3 Spam Free Ways to Share Your Contact Information
C0d1ng

Why the Navy Likes Google+ Why the Navy Likes Google+ The United States Navy has been quietly coaching sailors, personnel, and their families on proper use of social media. But that's not all--they also seem to be major fans of Google+. A presentation on how to get started on Google+ was recently made available to Navy personnel; copies have also been published online by the Navy's Chief of Information office. The guide is full of plans for specialized Navy pages to be created once Google allows them for businesses and institutions.

Top 100 Network Security Tools

Top 100 Network Security Tools SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ).

Chat with Your Friends through ms dos Command Prompt - StumbleUpon

Chat with Your Friends through ms dos Command Prompt - StumbleUpon -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt.
25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks.

25 Best SSH Commands / Tricks - StumbleUpon

Digital Inspiration: A Technology Blog on Software and Web Appli

07 Apr 2014 Easily Unsubscribe from all LinkedIn Emails LinkedIn, the social network for professionals, sends too many email notifications and they also make it difficult for you to unsubscribe from these emails. There’s an easy workaround though. The 10 HTML Codes You Need to Know for Writing on the Web Digital Inspiration: A Technology Blog on Software and Web Appli

70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon

70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.
If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

64 Things Every Geek Should Know « Caintech.co.uk

64 Things Every Geek Should Know « Caintech.co.uk
Naked Security | News. Opinion. Advice. Research About two weeks ago, a posting on the Full Disclosure Mailing List announced a new Linux rootkit. Indeed, the posting didn't just announce the malware, but included a fully-working sample... While the biggest shopping days of the year in the United States are now over, the scams are likely to continue through the end of the year. Read on for tips on what to look for.

Naked Security | News. Opinion. Advice. Research

Ophcrack What is ophcrack? Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: » Runs on Windows, Linux/Unix, Mac OS X, ... » Cracks LM and NTLM hashes. » Free tables available for Windows XP and Vista/7. » Brute-force module for simple passwords. » Audit mode and CSV export. » Real-time graphs to analyze the passwords. » LiveCD available to simplify the cracking. » Dumps and loads hashes from encrypted SAM recovered from a Windows partition. » Free and open source software (GPL).

Ophcrack

CSM: Computer Science and Mathematics Division Pratul Agarwal, of the Computational Biology Institute and Computer Science & Mathematics Division, has been appointed specialty editor and editorial board member to WebmedCentral Plus, a publishing platform that publishes biomedical scientific content. As a specialty editor, Agarwal will handle manuscripts submitted to the biochemistry section. Members of the specialty editorial board are specialists in their respective fields and have had some previous experience reviewing manuscripts. CSMD Researcher Travis Humble (along with ORNL researchers Ryan Bennink and Warren Grice) have been awarded a patent for their invention "Tampering Detection System Using Quantum-Mechanical Systems." According to Dr. Humble -"The patent describes a method for detecting unauthorized physical access to a protected environment.
In the wake of long-overdue media attention to revelations that a business unit of credit bureau Experian sold consumer personal data directly to an online service that catered to identity thieves, Experian is rightfully trying to explain its side of the story by releasing a series of talking points. This blog post is an attempt to add more context and fact-checking to those talking points. Experian has posted several articles on its Web properties that lament the existence of “inaccurate information about Experian circulating in news outlets and other Web sites.” “It’s no surprise that cybercrime and data breaches are hot topics for media and bloggers these days,” wrote Gerry Tschopp, senior vice president of public affairs at Experian. “Unfortunately, because of all the attention paid to these topics, we’ve seen some inaccurate information about Experian circulating in news outlets and other Web sites.

Krebs on Security

Cryptome

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored. Email: cryptome[at]earthlink.net Mail: John Young, Cryptome, 251 West 89th Street, New York, NY 10024 Checks/Money Orders: Make out to "John Young" Telephone for messages: 212-873-8700

Schneier on Security

This is an update to my earlier post. Cloudflare is reporting that it's very difficult, if not practically impossible, to steal SSL private keys with this attack. Here's the good news: after extensive testing on our software stack, we have been unable to successfully use Heartbleed on a vulnerable server to retrieve any private key data. Note that is not the same as saying it is impossible to use Heartbleed to get private keys.
Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard. Ross Anderson's Home Page
Tom Dunigan's Security page
Computer Security - Internet Security - Network Security - Anti Virus Information Portal - Anti Virus Hacking Alerts Bulletins - InfoSysSec
Cybersecurity News
History of Computer Security
megapanzer