background preloader

Computer Security

Computer Virus Myths home page Dimoniusis Homepage - Soft - Download U… НазначениеСкриншотыСкачатьКак пользоваться программойЕсли у Вас не работает программа или есть какие-либо вопросыСервера обновлений Назначение Программа для скачивания файлов. В первую очередь оптимизирована под скачивание (в том числе полностью автоматическое) с различных файлообменных серверов типа rаpidshаrе.cоm, megаuplоad.cоm и прочих, сайтов с видео, и прочих. Вам достаточно добавить в программу ссылки, нажать старт и она скачает все самостоятельно. Вам уже не надо будет помнить через сколько времени снова можно скачать с рапидшары, сколько еще ссылок осталось и в какие папки все это сохранять. Скриншоты Кликните по изображению, чтобы его увеличить. Основное окно программы Опции программы Список плагинов Индикатор в трее Скачать Скачать программу Вы можете в нескольких вариантах с одного из зеркал. Как пользоваться программой Если у Вас не работает программа или есть вопросы Сначала, пожалуйста, прочитайте "Часто задаваемые вопросы и ответы" (FAQ). Сервера обновлений

Beginner's Guide to Nmap Ever wondered how attackers know what ports are open on a system? Or how to find out what services a computer is running without just asking the site admin? You can do all this and more with a handy little tool called Nmap. What is Nmap? It's famous, too. In this tutorial, I'll cover some of the basics of using Nmap and provide some examples you can use quickly. Getting Nmap and Basic Use You'll find Nmap packaged for most major Linux distros. The basic syntax for Nmap is Nmap Scan Type Options target. nmap -O Note that Nmap requires root privileges to run this type of scan. Starting Nmap 5.21 ( ) at 2010-02-27 23:52 EST Nmap scan report for Host is up (0.0015s latency). As you can see, Nmap provides a lot of data. Here's the result of another scan, against a desktop machine running Ubuntu 9.10: Starting Nmap 5.21 ( ) at 2010-02-28 00:00 EST Nmap scan report for Host is up (0.0039s latency). Practice Hosts Multiple Hosts Zenmap

Windows NT Magazine Online Articles Keep your network up-to-date and secure without burning the midnight oil Microsoft recently responded to several new security holes in Windows NT. Some of these security holes required only a configuration change to protect the system, but many required Microsoft service packs or hotfixes. Security experts estimate that patches (i.e., configuration changes, service packs, or hotfixes) are available for over 90 percent of system breaches that occur. Security suffers if you don’t apply patches in a timely manner. Without an easy method for administering patches, your costs increase and your security and stability suffer. Discovery A proper discovery process depends on your level of specialization and responsibility in security matters. For years, UNIX users have had security bulletin services such as the Computer Emergency Response Team (CERT) and Computer Incident Advisory Capability (CIAC), which announce new exploits and vendor patches. Automated patch deployment. For /? :error Popd or

Streaming - 25C3 Public Wiki From 25C3 Public Wiki The 25C3 is over. Get the Official Conference Recordings . [ edit ] Formats Several teams will offer audio- and video-livestreams of the lectures. [ edit ] H264 mplayer -playlist $url z.b. oder einfach vlc [ edit ] WMV Room1/Saal1: Room2/Saal2: Room3/Saal3: There is another server (it lags a bit): Optional (might work!) FeM WMV Streams edit BCC Local FeM WMV Streams edit [ edit ] Theora Here is an playlist with all the links, so you can use an player with playlist support: There is also a smaller version of the saal1 stream: Room1/Saal1-small If you are at the bcc, you can access our internal server: [ edit ] Ogg (Audio only) [ edit ] Multicast [ edit ] FEM

10 Free Server & Network Monitoring Tools that Kick Ass By Ben Dowling When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding being taken offline and evaluating if your resource needs has outgrown your infrastructure. In this article, we review our top 10 server/network monitoring tools. 1. Monit not only monitors your server, but also attempts to remedy problems by taking predefined actions for certain situations. If you have more than one server that you need to monitor, then you can use M/Monit– an extended version of Monit that provides a simple way to monitor multiple machines. There’s also an iPhone app available for M/Monit to help you conveniently check on your network without lugging around a laptop around. 2. When you have a cluster of machines, it’s difficult to see how the whole cluster is doing all at once.

Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News 10 Cool Ways to Use Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open