background preloader

Stuxnet: Anatomy of a Computer Virus

Stuxnet: Anatomy of a Computer Virus

Related:  hacking & cyberactivism

Screenshot Tour: How to crack a Windows password with Ophcrack Live CD There are simpler ways to "crack" a password. First you could try mspassview which you can download from Microsoft's website. It kinda assumes you already have limited access to the computer in question and the the antivirus/firewall can be turned off. 80+ Excellent Cinema 4D Tutorials and Best Practices CINEMA 4D is a 3-D application that is popular amongst matte painters in film production, largely due to the BodyPaint 3D functionality. It is equally popular amongst motion graphics artists, thanks to its excellent integration with compositing application pipelines, and a very artist-friendly, customizable workflow and interface. It has been used for films such as Chronicles of Narnia, Beowulf, Polar Express, Spiderman 3 and Monster House. CINEMA 4D’s intuitive interface and logical workflow make it possible for those new to 3D artistry to dive in and be productive quickly. Feedback is smooth and interactive so you can let your creativity run free. It’s been weeks, since we have been Rounding-Up Excellent Cinema 4D Tutorials and Best Practices which can help you to create amazing 3D graphics.

Most Watched YouTube Videos Of All Time (Non-Music Video Edition [Exclusif] Entretien avec Lawrence Lessig, professeur de droit à Harvard Cet article a été publié il y a 2 ans 10 mois 5 jours, il est donc possible qu’il ne soit plus à jour. Les informations proposées sont donc peut-être expirées. En exclusivité cette interview du grand Lawrence Lessig avec l’aimable autorisation de la rédaction d’Europolitique, le quotidien des affaires Européenne (publication pour décideurs européens en grande partie payante). Il s’agit d’une interview réalisée à l’occasion du récent Eg8 par Nathalie Vandystadt, journaliste, merci à elle Droit d’auteur : « Les lois du XXème siècle sont totalement inefficaces » Propos recueillis par Nathalie Vandystadt à Paris | vendredi 27 mai 2011

Funny Pictures at WalMart Photos April 25th, 2014 Head Games I think this is the level of psychopath that falls between when he is a kid torturing animals and when he is the guy that has people buried in his basement. Texas Bruce Schneier on how to choose secure passwords Part of my job requires asking for people's passwords for their computer. in order to do diagnostics & repair. They don't have to provide it if they don't want to. I can think of one person who opted for this, and he was a software developer, he encrypted everything, he had good backups — most people don't do that, either — and he preferred to have everything deleted rather than give out the password. Fair enough, all prudent practices. They're welcome to change it to a dummy value — blank, a dictionary word, etc — and change it back afterwards.

Information in search of meaning Picture: AP Source: AP The Next Digital Decade: Essays on the Future of the InternetEdited by Berin Szoka and Adam MarcusTechFreedom, 575pp, $28 (HB)(Also available for free download Information: A History, a Theory, a FloodBy James GleickFourth Estate, 526pp, $35 Too Much to Know: Managing Scholarly Information before the Modern AgeBy Ann M. BlairYale University Press, 397pp, $65 (HB) The Master Switch: The Rise and Fall of Information EmpiresBy Timothy WuAtlantic Books, 366pp, $35 The Net Delusion: how Not to Liberate the WorldBy Evgeny MorozovAllen Lane, 408pp, $29.95 The Offensive InternetEdited by Saul Levmore and Martha C. NussbaumHarvard University Press, 299pp, $39.95 (HB) Virtual Justice: The New Laws of Online WorldsBy Greg LastowkaYale University Press, 226pp, $49.95 (HB) Digital CulturesBy Milad DoueihiHarvard University Press, 183pp, $29.95 (HB)

Punching holes into firewalls or "Why firewalls shouldn't be considered a ultimate weapon for network security" or "Secure TCP-into-HTTP tunnelling guide" Introduction Firewalls are heavily used to secure private networks (home or corporate). CHALLENGE: Can You Float on Air Like Tokyo's Levitating Girl? CHALLENGE: Can You Float on Air Like Tokyo's Levitating Girl? [Closed/Winner Announced] Giveaway Tuesdays has officially ended! Empty suit: the chaotic way Anonymous makes decisions On February 16, the freewheeling hacker collective decided to take on the Kansas-based Westboro Baptist Church, best known for its "God Hates Fags" protests. The Anonymous hivemind, the "Voice of Free Speech & the Advocate of the People," has had enough of this sort of free speech and has decided to fight the church's "assembly of graceless sociopaths and maniacal chauvinists & religious zealots" who issue "venomous statements of hatred." The manifesto contains the trademark Anonymous prose style, one that might be summed up with the words "florid bombasticism." (Case in point: "Your demonstrations and your unrelenting cascade of disparaging slurs, unfounded judgments, and prejudicial innuendos, which apparently apply to every individual numbered amongst the race of Man…") And it closes with the typical Anonymous threats, which drinks deep from the wells of prophetic denunciation literature—combined with a splash of The Matrix. But did Anonymous really write this?

The darkness at the heart of Anonymous Louise Mensch, the Conservative MP, didn't react as perhaps the sender of the threatening email she received on Monday had hoped. She came out swinging - as anyone who knows her even a little might have been able to predict. "Had some morons from Anonymous/LulzSec threaten my children via email. As I'm in the States, be good … to have somebody from the UK police advise me where I should forward the email," she tweeted. And then followed up by refusing to be cowed: " I'm posting it on Twitter because they threatened me telling me to get off Twitter.

WikiLeaks: Anonymous hierarchy emerges They were described as a leaderless, anarchic group of "hacktivists" who briefly brought down MasterCard, Visa and PayPal after those companies cut off financial services to WikiLeaks. But inside Anonymous, the Guardian has found that the organisation is more hierarchical – with a hidden cabal of around a dozen highly skilled hackers co-ordinating attacks across the web. The secretive group that directs the Anonymous network was also behind the assault on the Gawker websites in the US at the weekend, according to documents seen by the Guardian. That led to email addresses and passwords of more than 1.3 million Gawker users being made public, and spawned a spam attack on Twitter that is now being investigated by the FBI. In the last 10 days, Anonymous has also orchestrated Operation Payback, which attacked Visa, MasterCard and PayPal for cutting off financial services to WikiLeaks under pressure from the US government. "Our project has no leader structure, only different roles.

NSA has VPNs in Vulcan death grip—no, really, that’s what they call it The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture. OTP’s VPN exploit team had members assigned to branches focused on specific regional teams, as well as a “Cross-Target Support Branch” and a custom development team for building specialized VPN exploits. The NSA has a specific repository for capturing VPN metadata called TOYGRIPPE.

The Hacks of Mr. Robot: How to Hack Bluetooth Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ruthless and unrelenting drug dealer, Vera, to hack him out of jail. He is holding Elliot’s new love interest, Shayla, hostage and has given Elliot until midnight to hack the jail’s computer system in order to release him. Elliot tries to explain to Vera that such a hack can’t be done in a matter of hours, but rather days or weeks to find a security vulnerability that he can exploit.

Related:  Computer Security and virus informationViDEOanimationYoutubeDATAMAPS DATABASESINFOGRAPHICSTUFF YOU SHOULD KNOWtemp for infosec workshopAnimations Flash / autresTechnology / ComputersInteresanteDIY, Hacks and Self-helpINSPIRATION AFTERCyber Warfare