background preloader

Sécu

Facebook Twitter

Kali Linux Cracks Passwords and Finds Security Exploits on the Enterprise Level. BackTrack is a Security-Focused Live CD Packed With System Tools. Kinja is in read-only mode.

BackTrack is a Security-Focused Live CD Packed With System Tools

We are working to restore service. I found Backtrack via lifehacker when it was mentioned a couple weeks back. Coincidentally, I just so happen to be going through PCI compliancy right now at work. After asking the auditor some questions about what tools they use so I could reproduce their results, I found Backtrack comes with a lot of the tools they use (the free ones anyways). Backtrack is not for people looking for a new version of linux to play with. A lot of the tools it comes with, such as nikto 2, sqlix, nmap, meta exploit, etc... are excellent and really helped me close up some holes. Since I began with Backtrack, I've implemented PHPIDS, made many changes to [php.ini] and [httpd.conf] that I wouldn't have normally made and will be more confident when my next pen test comes.

Its just been an excellent tool for me. Oh yeah, both ethernet and wifi work fine running Backtrack 3 on my Acer Aspire One with the SSD drive (zg5 is the model number) Hotspot Shield Offers VPN Servers in Multiple Countries, Perfect for Watching Blocked Content Overseas. I agree with you on the point that the VPN service can "spy" on your data.

Hotspot Shield Offers VPN Servers in Multiple Countries, Perfect for Watching Blocked Content Overseas

Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs) Solutions - Best VPN Service - Hide IP - OpenVPN - VPN USA - VPN FRANCE. How Secure Are You Online: The Checklist.

Korben

How to Make Your VPN Even More Secure. How to Track and (Potentially) Recover Your Stolen Laptop or Android with Prey. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive. Use This Infographic to Pick a Good, Strong Password. That's what I do.

Use This Infographic to Pick a Good, Strong Password

If it has a credit card attached to it it gets a unique password, if not I just reuse a couple standby ones. It goes without saying that e-mail should have a unique one as well so people can't steal it an do the ol' forgot my password bit. Look at you clowns, thinking for yourselves instead of mindlessly following a random infographic. You should be ashamed. Sure it's realistic. Sheepish for Chrome Tracks and Blocks the Websites that Track You. Carrier IQ: What it is, what it isn't, and what you need to know. Carrier IQ has recently found itself swimming in controversy.

Carrier IQ: What it is, what it isn't, and what you need to know

The analytics company and its eponymous software have come under fire from security researchers, privacy advocates and legal critics not only for the data it gathers, but also for its lack of transparency regarding the use of said information. Carrier IQ claims its software is installed on over 140 million devices with partners including Sprint, HTC and allegedly, Apple and Samsung. Nokia, RIM and Verizon Wireless have been alleged as partners, too, although each company denies such claims. Ostensibly, the software's meant to improve the customer experience, though in nearly every case, Carrier IQ users are unaware of the software's existence, as it runs hidden in the background and doesn't require authorized consent to function.

From a permissions standpoint -- with respect to Android -- the software is capable of logging user keystrokes, recording telephone calls, storing text messages, tracking location and more. Carrier IQ : l’application qui en disait trop. Carrier IQ: How the Widespread Rootkit Can Track Everything on Your Phone, and How to Remove It. In theory, they would need a warrant to go after that info, which means they would have had to satisfy a judge that the info is necessary.

Carrier IQ: How the Widespread Rootkit Can Track Everything on Your Phone, and How to Remove It

I realize that, in practice, it doesn't always end up that way, and when that kind of breach occurs, I'm generally just as upset as I am over CarrierIQ. I realize that privacy is all but dead these days, but that doesn't mean we should continue to dig it up and fuck its corpse. Second that, but with what's been happening out in Nevada with the whole Chanel vs. counterfeiters thing, it seems all too easy to 'convince' a judge. Anonymity Online. Security Handbook. BlackSheep - A Tool to Detect Firesheep. UPDATE: see the requirements for the extension at the end of the postUPDATE: an new version is availableUPDATE: BlackSheep for Linux is available hereUPDATE: If you use FileVault on MacOSX, you might be prompted for a password.

BlackSheep - A Tool to Detect Firesheep

See this thread for more information. You've probably all heard of Firesheep by now, a Firefox add-on which lets anyone hijack a user's session to various popular web applications when they're using an open wireless network. While sniffing/stealing session credentials is nothing new, Firesheep exposes this capability to the masses by automating the process so that absolutely no technical know-how is required.

Unfortunately, it is actually quite difficult to defend against Firesheep because most sites only permit SSL connections during the initial login, not while surfing other pages. As such, while your username and password are encrypted, your session ID is available to all other machines on the same network. TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux. Geek to Live: Encrypt your data. Know Your Network: The Complete Guide. How Can I Protect My Computers and Data When Someone Else Is Using My Network?

Dear Lifehacker, After reading how easy it is for someone else to get onto my Wi-Fi network, and, similarly, thinking about how often I let my friends connect to my wireless network, I want to lock down the rest of my network so people connected to it can't go snooping around my computers—or at least secure my most super secret files and folders.

How Can I Protect My Computers and Data When Someone Else Is Using My Network?

What's the best way to go about this? P Thanks, Insecure About Network SecurityP Dear Insecure, We hear you. No one's stuff should be rifled through, whether you're protecting something as mundane as photos of you in a swimsuit or more sensitive information like your bank statements and tax returns. Set Permissions on Files or FoldersP You can password-protect important files or folders on your computer by editing the permissions settings, which control who can view or edit those items. In Windows, right-click the folder, go to Properties, and open the Security tab. Encrypt Your Drive or FoldersP Turn Off File Sharing and Network DiscoveryP P.S.