background preloader

Internet Research, Anti-Phishing and PCI Security Services

Internet Research, Anti-Phishing and PCI Security Services
As the results of CloudFlare's challenge have demonstrated, a server's private key can be extracted using the Heartbleed vulnerability. Consequently, the 500,000+ certificates used on web servers supporting TLS heartbeat should be urgently replaced and revoked. Whilst the replacement and revocation process has begun — 80,000 certificates have been revoked since the announcement — it is far from over. Private key extraction is real CloudFlare, which uses a modified version of the nginx web server, originally thought it would be extremely hard or impossible to use the Heartbleed bug to steal a certificate's private key from an nginx server. However, this was quickly proved wrong last week after CloudFlare set up a vulnerable website and challenged people to steal its private key.

http://news.netcraft.com/

Related:  StatistiquessafetySécurité informatique au domicile

The 100 Best, Most Interesting Blogs and Websites of 2012 (Categorized) Editor’s note: 2015’s list of the best, most interesting websites has arrived! I don’t know about you, but I’m constantly running into so many cool websites I want to remember or recommend to people but I don’t always have time to make a note of them, add them to Evernote, bookmark them in Delicious, etc. So this is a good example of a post I created as a personal (and completely unscientific) resource that other people will probably benefit from as well. Some of these sites are pretty new while others have been around for a while now, but they are all awesome right now in 2012. So whether you are looking for a way to catch up on the latest Internet trends, want to find some exciting new content to load into your favorite news aggregating app or are just bored and need to waste some time online, this list represents hours of potential discovery. You might also like:

Anti Spam - Antispam fights spam and is free a tool that's easy to use Anti Spam, the best way to fight spam bots! The purpose of this page is to make it so spammers who attempt to collect email addresses off the web, via programs, will not have real email addresses in their database. Anti-Spam causes problems because they will have to clean out their list. It also makes their database worthless for reselling purposes because the company purchasing their spam database will have worthless email address. This page has fifty randomly generated email addresses (refresh and new ones will appear).

The 100 Best, Most Interesting Blogs and Websites of 2013 Editor’s note: 2015’s list of the best, most interesting websites has arrived! Welcome to one of the web’s most anticipated lists of the year: The 100 Best, Most Interesting Blogs and Websites of 2013. This is the second such list I have made since founding DailyTekk and it’s very special. A website can only be featured ONCE in this annual series, so make sure to check out last year’s list so you don’t miss 100 other amazing sites and blogs. I’ve broken this monster list down into 19 categories and limited myself to five links per category (except for the last category) to ensure I whittled away all but what I thought were the most deserving candidates of right here and right now in 2013. This post kicks off a whole new year of incredible top 100 lists (see a summary of the best curated content from last year in The Ultimate Lifehack for 2013: 200+ Incredible Sites and Services).

BlackHole 2.0 gives hackers stealthier ways to pwn A new version of the BlackHole exploit kit is now out on the web and ready to start infecting. The developer of the toolkit, who goes by the handle "Paunch," recently announced the availability of Blackhole 2.0, which removes much of its trove of known and patched exploits, and replaces them with a whole new crop—along with features that will make it harder for antivirus companies and site owners to detect trouble. BlackHole is a widely-used, web-based software package which includes a collection of tools to take advantage of security holes in web browsers to download viruses, botnet trojans, and other forms of nastiness to the computers of unsuspecting victims.

Free VPN Software: Virtual Networking with LogMeIn Hamachi Centralized Software Deployment Save yourself onsite visits. Quickly and easily dispatch virtual network client software to new computers remotely. Simply send end users a link to download and install the client to participate in a specific virtual network. Manage and Restore Networks Handle your virtual networks virtually. Center for Complex Networks and Systems Research We study the structure and dynamics of Web traffic networks based on data from HTTP requests made by users at Indiana University. Gathering anonymized requests directly from the network rather than relying on server logs and browser instrumentation allows us to examine large volumes of traffic data while minimizing biases associated with other data sources. It also gives us valuable referrer information that we can use to reconstruct the subset of the Web graph actually traversed by users. Our Web traffic (click) dataset is available!

 ShieldsUP! — Internet Vulnerability Profiling Your Internet connection's IP address is uniquely associated with the following "machine name": The string of text above is known as your Internet connection's "reverse DNS." The end of the string is probably a domain name related to your ISP. This will be common to all customers of this ISP. But the beginning of the string uniquely identifies your Internet connection.

The top 100 sites on the internet Explore this interactive graphic to find out which are the biggest sites on the internet, as measured by the Nielsen company. This feature is part of SuperPower, a season of programmes exploring the power of the internet. About this data The data used to generate the interactive treemap visualisation were collected by the Nielsen company and covers the UK, France, Germany, Italy, Spain, Switzerland, Brazil, US and Australia. The figures represent unique users for the month of January 2010. Getting Started In order to make phone calls, WarVOX needs to be configured with one or more service providers. For a list of VoIP ISPs, please see the Service Providers section. To add a new provider to WarVOX, access the web interface, click the Providers link, and fill in the New Provider form. This form allows you to specify a nickname for the provider and indicate how many concurrent outbound calls can be made using this account. WarVOX can make use of multiple service providers and multiple outbound calls per provider when processing jobs.

LockNote: Overview - Steganos GmbH Steganos LockNote will change the way you work with confidential notes. Application and document in one: the mechanism to encrypt and decrypt a note is part of it. Secure, simple, independent. No installation required.

Related:  InternetjefersoneduardokuhngabrielherrmannsecurityNetworkingozbeqSEO