background preloader

Security/hacking related

Facebook Twitter

Online Information Security Training - BackTrack. Exploits Database by Offensive Security. Virus, Spyware & Malware Protection. Password Checker: Using Strong Passwords. Windows 7 Compatibility: Software Programs & Hardware Devices: Find Updates, Drivers, & Downloads. The Great Boot Race - StumbleUpon. Hacking Tip: Trace IP addresses to a location - StumbleUpon. How to be a HACKER Ep 1. Hacking with command prompt - StumbleUpon. Emiemi2's Channel - YouTube - Iceweasel. Linux HOWTO #4, Part 1: Secure Your Data with PGP - YouTube - Iceweasel. Linux HOWTO #4, Part 2: Secure Your Data with PGP - YouTube - Iceweasel. Linux HOWTO #3, Part 1: Anonymous Web Browsing with Tor - StumbleUpon. Linux HOWTO #3, Part 2: Anonymous Web Browsing with Tor - YouTube - Iceweasel.

PeerBlock – Peerblock Site. 1.1 – Peerblock Site. Here it is, PeerBlock 1.1, released November 22, 2010!

1.1 – Peerblock Site

This is a Stable Release of PeerBlock. It includes many bugfixes and a few new features over our last PeerBlock 1.0 Stable Release, and should work great on Windows 2000, XP, Vista, 7, and 8 (plus server variants), both 32- and 64-bit versions. New Stable 1.1.x bugfix releases should come out every few months from here on in, but new feature development releases will be PeerBlock 1.1+ Beta Releases. Here are the most important changes present in this new Stable Release, as compared to our previous Stable Release PeerBlock 1.0 (r181). Anonymity Online. How to Hide Your IP Address. Subscribe to our newsletter and boost your IT I.Q. withIP news, hot tips, updates and more.

How to Hide Your IP Address

Get yours today! We'll never share your address. You can opt out any time.This is a free publication. Please review our Privacy Policy. Hide IP Borrow a different IP address to go anywhere online and stay hidden. There are a few ways to hide your IP address...that unique number assigned to the network connection on the computer. Top 4 reasons why people want to hide their IP address: Hide their geographical locationPrevent Web trackingAvoid leaving a digital footprintBypass any bans or blacklisting of their IP address The safe and secure way Use a Trusted Proxy or Virtual Private Network. Here are some VPN providers that you might consider: VPNs can be free or you can pay for the service.

There are many more advantages to using a personal VPN service over a proxy (usability, security, access to blocked sites). The easy way. What's My IP Address? Networking Tools & More. Open Port Check Tool - Test Port Forwarding on Your Router. Remote Address Port Number Check a port's status by entering an address and port number above.

Open Port Check Tool - Test Port Forwarding on Your Router

The open port checker is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful for finding out if your port forwarding is setup correctly or if your server applications are being blocked by a firewall. This tool may also be used as a port scanner to scan your network for ports that are commonly forwarded. For more a comprehensive list of TCP and UDP ports, check out this Wikipedia article. If you are looking for a software solution to help you configure port forwarding on your network, try using this powerful Port Forwarding Wizard. Hide My Ass! Free Proxy and Privacy Tools - Surf The Web Anonymously. How to check a Website for a Virus. Free Online Virus, Malware and URL Scanner. Standard diagnostic - Firefox - MozillaZine Knowledge Base - Iceweasel. From MozillaZine Knowledge Base This article provides a more or less complete set of steps to identify and correct most known causes of Firefox no longer working properly.

Standard diagnostic - Firefox - MozillaZine Knowledge Base - Iceweasel

The solutions offered will preserve your user profile data (bookmarks, passwords, history, preference settings, etc.) as far as possible. You should first search the Knowledge Base and check the links given at the end of this article for a solution to your specific problem. If you find one, this will take less time than working or even reading through all the diagnostic steps presented here. The advantage of using this standard diagnostic is that the order of the steps helps narrow down where the problem is. Important: The Firefox configuration, bookmarks and other personal data, and information on themes and extensions are stored in your profile.

Standard diagnostic steps Note: Many "Firefox" problems are caused by incompatible themes, extensions, or programming errors in plugins. Extension issues Profile issues. TCPDUMP/LIBPCAP public repository.

News/Tips

Security: NTLM Multiprotocol replay attack - Smbrelay 3 - Iceweasel. Introduction Most Windows networks still support insecure authentication schemes by default.

Security: NTLM Multiprotocol replay attack - Smbrelay 3 - Iceweasel

This is for example what happends with NTLM who is enable by default until lastest Windows Vista. NTLM allows users to reply incomming connections against third part systems, and authenticate themselves without knowing the password. Therefore, connecting to a system with NTLM means that you can be owned. This authentication scheme is used on a variety of protocols, like HTTP. If you are able to force remote users to connect to your system (HTTP or SMB) with dns attacks (poisoning,..), social engineering, email link, msn http link, xss, shutting down valid servers and getting the server ip address, or deploying some kind of malicous payload theorically, the network belongs to you.

Smbrelay3 is the first public tool that allows those kinds of attacks. BackTrack Linux - Penetration Testing Distribution - Iceweasel. How to easily delete your online accounts. Spring Financial is a finance company based in Canada.

how to easily delete your online accounts

The company was founded in 2014. Spring Financial is a subsidiary of Canada Drives, which is a leading auto financing company in Canada. The Chief Executive Officer is Michael Galpin. The Director is Cody Green. The Customer Relations Manager is Laura Marchand. Upon loan approval, the funds will go into a secure trust account. Top 100 Network Security Tools. How to gain access to system account the most powerful account in Windows.... - StumbleUpon. There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems.

How to gain access to system account the most powerful account in Windows.... - StumbleUpon

That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges.

Firestarter - Iceweasel. BleachBit - Clean Disk Space, Maintain Privacy - Iceweasel. BleachBit - Iceweasel. Skip to main content BleachBit Open source system cleaner Help <div style="padding: 2em; width: 200px; text-align: center"><p style="font-size:200%">Donate to BleachBit<br /></p><form action=" method="post"><fieldset style="display:none"><!

BleachBit - Iceweasel

Documentation - Firestarter.