background preloader
Related:  security & privacy

collective-intelligence-framework - a framework for warehousing intelligence bits CIF is a cyber threat intelligence management system. CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route). The most common types of threat intelligence warehoused in CIF are IP addresses, domains and urls that are observed to be related to malicious activity. More can be found by continuing on to What is CIF? and some history Due to the various content "licenses" for each of the feeds (malwaredomains, zeustracker, etc) We do NOT offer this as a service, we can't give you an api-key to "test with". deploy a v1 instance deploy a v1 client current v1 issues generating your own feeds writing your own smrt config leverage the v1 API how others are leveraging the framework join the community jump in to IRC on freenode #cif the CommunityRules potential new feed sources bored?

Symantec Threat Explorer Threat Spotlight: Trojan.Ransomlock Trojan.Ransomlock is a detection for Trojan horse programs that lock the desktop of a compromised computer making it unusable. The threat may arrive on the compromised computer by various means, such as visiting malicious sites, by opening untrusted links or advertisement banners, or by installing software from untrusted sources. These programs attempt to convince the user to pay money in order to have their computer unlocked and use a variety of different techniques in order to encourage the user to pay the ransom. More information on Trojan.Ransomlock is available in the threat family writeup.

Most Common Passwords Roleplay. Learn to play songs by ear! Free Ear Training.[Video Tutorial] How to build google chrome extensions Update: See my analysis of the most common passwords from and other hacked databases. Most people are clueless as to how accounts are hacked and their passwords reflect that. Most Common Passwords 123456, 123, 123123, 01234, 2468, 987654, etc123abc, abc123, 246abcFirst NameFavorite BandFavorite Songfirst letter of given name then surnameqwerty, asdf, and other keyboard rollsFavorite cartoon or movie characterFavorite sport, or sports starCountry of originCity of originAll numbersSome word in the dictionaryCombining 2 dictionary wordsany of the above spelled backwardsaaa, eee, llll, 999999, and other repeat combinations Common Extensions Some sites force you to have passwords with both numbers and letters. Years are usually added in different ways: football85, football1985, football04 instead of football4. My opinion on an Ideal password Words in the Dictionary Numbers

Security Process Explorer - Best Free tool for Process Management Detailed Information It displays all the standard information, including file name, directory path, description, CPU usage, as well as a unique security risk rating. User-friendly Interface The program interface is logically structured and based on the default task manager and the process of replacing it is fast so that we quickly forget having ever used a default tool. Full Featured Security Process Explorer allows you to monitor CPU and memory usage graphs per process, view detailed processes information (with descriptions), stop and start new processes, set priorities and much more. Media Review This is the case of Security Process Explorer, a full featured task manager created by Glarysoft. Softonic Customer Review "Using Security Process Explorer you can easily find and remove unnecessary background processes. 100% Clean We've analyzed the latest version of Security Process Explorer with 30 antivirus engines and found that it's virus-free.

Criminalités numériques LCEM Gates predicts death of the password SAN FRANCISCO--Microsoft Chairman Bill Gates predicted the demise of the traditional password because it cannot "meet the challenge" of keeping critical information secure. Gates, speaking at the RSA Security conference here on Tuesday, said: "There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." RSA is working with Microsoft to develop a SecurID technology specifically for Windows. SecurID is the best-known two-factor authentication system and is used by many large enterprises. However, Gates said that Microsoft would not be using the SecurID system internally because it had opted for a smart-card system--with the help of RSA. To create an ID card, the software requires a photograph and some basic information about a person, such as name and date of birth.

Portail:Sécurité de l'information Une page de Wikipédia, l'encyclopédie libre. La sécurité de l'information est un processus visant à protéger des données contre l'accès, l'utilisation, la diffusion, la destruction, ou la modification non autorisée. La sécurité de l'information n'est confinée ni aux systèmes informatiques, ni à l'information dans sa forme numérique ou électronique. Au contraire, elle s'applique à tous les aspects de la sûreté, la garantie, et la protection d'une donnée ou d'une information, quelle que soit sa forme. 1 493 articles sont actuellement liés au portail

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc. When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers. Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. Lets begin this. Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Finding IP address in Yahoo! Log into your Yahoo! You may copy the headers and use my IP address detection script to ease the process. Finding IP address in Hotmail Finding IP address in AOL

Quickly adjust your social media privacy settings. Adjust Your Privacy Settings Start by quickly adjusting the privacy settings on all of your major accounts by using the icons below: Check Your Privacy Now you can use these two links to see what your Facebook and Google Plus profiles would look like to a complete stranger: Test Your Privacy Next, you can test your privacy settings by seeing how easily you can find yourself using this custom people search engine. Useful Privacy Tools Finally, you can use the following online tools and resources to help maintain your online privacy: As Seen On

Predator Locks and Unlocks Your PC with a USB Thumb Drive | PREDATOR PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: you define the times of day when each user may access the computer with the built-in scheduler you can make specific rules for each user and each day of the week out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer ; or you can remove the flash drive to disable the computer for good. Watch a short demo video of PREDATOR: