background preloader


Related:  OSINT and other intelSecurityREKCAHSensibilisationRelated pdfs, Blogs, Journals

Skip Trace Links Are you looking for someone? This is the place to start! There are many resources available on the Internet to help you find people. You will also find several links below pertaining to collections. Disclaimer: These links take you to outside of the ECSI site. Ipredia OS for anonymous browsing and communications Ipredia OS is a Fedora based Linux operating system for anonymous web browsing, email, chat and file sharing, unlike similar projects like Tails and Liberte Linux based on tor, Ipredia anonymity takes root around the I2P anonymous network, with websites and services only accessible through an i2p proxy tunnel. The distribution can be downloaded with the Gnome or LXDE desktop, I tested the LXDE version because it is best for a live CD since it is lightweight and it should load quicker, there is the option to install Ipredia OS in your hard drive and some people might prefer the Gnome desktop for that. The operating system includes all of the basic applications an average computer user needs. Anonymous operating system Ipredia OS Anonymous live CD Ipredia OS Visit Ipredia OS homepage

Hint: It Ain't Twitter. (aka: An Open Letter to the Next Big Social Network I've held off writing this post for a long time, because I couldn't quite get my head around all the issues. It wouldn't be accurate to say there's something "wrong" with Facebook, and it's not like I don't spend a shitload of time ego-whoring around on Twitter too. Let's face it: I'm completely & utterly addicted to social networks & tha Interwebs. but: Something is Still Missing. Something is Wrong on the Internet and it's keeping me awake at night. however, i think i finally figured out what "IT" is...

IPew Attack Map About IPew Attack maps are the <blink> tag of information security. They are pure eye candy, meant to scare the general public and WOW unsuspecting executives visiting Security Operations Centers. Yet, security vendors keep cranking them out. We didn't want organizations without "real" data or l33t animation skills to to feel left out, so we built this map for anyone to use [CC BY-SA]. Plus, they're all missing sound effects!

The Federalist Papers - Resources - This web-friendly presentation of the original text of the Federalist Papers (also known as The Federalist) was obtained from the e-text archives of Project Gutenberg. For more information, see About the Federalist Papers. || Federalist No. 1 || General Introduction For the Independent Journal. Author: Alexander Hamilton Automating OSINT Blog On May 20, 2015 the ODNI released a trove of documents called “Bin Laden’s Bookshelf“. This included all kinds of materials including letters he had written, books he was reading and other various bits of information. This document released piqued my interest primarily because I was interested to see what the most common thing was that Bin Laden wrote about. I am fully aware that these documents are only a fraction of the material he had, but it seemed like a good exercise to stretch my Python legs and to learn a new API. This blog post will teach you how to analyze PDF’s (pretty useful all around really), and how to use the Alchemy API which is an extremely powerful data processing API that can do entity extraction, sentiment analysis, keyword extraction and a whole bunch of other stuff.

Most popular VMWare Virtual Appliances for IT Administrators Updated on September 23, 2009: Please review the updated list of virtual appliances. You may also be interested in reviewing virtual appliances for Security. The original post has been retained as a historical reference. The download links for most of the appliances in the following table no longer work since VMware has revamped the Appliance Marketplace. Thanks SQL Injection Attacks by Example A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises. We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches.

Live Cyber Attack Threat Map ATTACKS TODAY (since 12AM PST) 5,599,997 USA India Philippines Turkey Ecuador Mexico Brazil Taiwan Israel South Africa France USA Sweden Netherlands Germany China Vietnam Russia United Kingdom Switzerland Attackers

Peace Revolution 002: The Million Dollar Education Gorgias by Plato 386 B.C.E. The Republic by Plato 380 B.C.E. Phaedrus by Plato 370 B.C.E. The Art of Rhetoric by Aristotle 322 B.C.E. The Metalogicon: A 12th Century Defense of the Trivium by John of Salisbury 1159 C.E. Utopia by Sir Thomas More 1516

Documents on cryptology, dual-use technologies, and national security and intelligence. Includes archives. by agnesdelmotte Mar 8

Related:  VibrationDonnées ouvertessecurityjournalismFreedom of Informationright to knowAlternative MediaCybersecuritylojikbombcybersecurityMonkey businessArchivesLeaks&InfoMyth of Firewallvenant4government-conspiracyxerces2012News And Views Of The DayCryptome5 Declassifiedkevinmolebuggedplanet.infozahlentheorie