background preloader

Open Port Check Tool

Open Port Check Tool

http://canyouseeme.org/

The Infection File Popularity Contest - SpywareGuide Greynets Bl Ever wondered exactly how people who enjoy putting malicious files into the wide blue yonder ensure their bundles of joy are as attractive as possible to those who would happily download them? Well, I came across this program today and thought it was worth looking into. It dips into what's hot and current in the world of free downloads then uses that to ensnare as many potential victims as possible. How do they do it? The above program helps, for starters. Fire it up and you see this:

Five data recovery apps that could make you a hero When you get a panicked call from someone whose hard disk has crashed (with precious files that weren't backed up), one of these apps might save the day. As IT pros, we all get those occasional phone calls from friends and family who want us to save their data after a hard drive crash. Since backups are usually nonexistent in those situations, I thought I would take the opportunity to talk about a few of the data recovery utilities that are available.

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

Observatoire des inégalités 10 juin 2011 - Alors que la Haute autorité de lutte contre les discriminations et pour l’égalité (Halde) disparaît, l’Observatoire des inégalités dresse un bilan de ses six années d’existence. Par Noam Leandri, de l’Observatoire des inégalités. La Haute autorité de lutte contre les discriminations et pour l’égalité (Halde) a été supprimée par une loi adoptée le 15 mars 2011. We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... - StumbleUpon Think you're safe from a cyberattack just because you're a small biz? Think again. Here's how to prevent a hacking. July 20, 2011

Les Classiques des sciences sociales: Joseph Schumpeter, Théorie de l'évolution économique. Recherche sur le profit, le crédit, l'intérêt et le cycle de la conjoncture. (1911) Voir le numéro 46 de l'excellente revue québécoise INTERVENTIONS ÉCONOMIQUE / PAPERS IN POLITICAL ECONOMY, entièrement consacré à l'oeuvre de Schumpeter, intitulé: “Innovation et développement chez Schumpeter.” URL. Tous les textes sont en accès libre et en texte intégral. Christian Deblock, Présentation du dossier: Innovation et développement chez Schumpeter [Texte intégral]; Henri Denis, La pensée de Schumpeter face à celles de Marx et de Walras [Texte intégral]; Sophie Boutillier et Dimitri Uzunidis, Schumpeter, Marx et Walras.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

Découvrir la recherche en informatique - Accueil the web site computer criminals don't want you to read! Hacker news, updated every few minutes --->> What else is new at this website, updated Jan. 12, 2010 Latest News on Cyberwar, updated Jan. 12, 2010 How to Break into Banks -- without Breaking the Law (would we lie to you?) See how Greggory Peck broke into a bank's computer system, legally. Bsoco - Software comparison Ethical Hacker Network "Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities. This is yet another great introduction to a topic for the Dummies Series. Chapter 1 – Ethical Hacking

Le Défenseur des Droits Love Thy Neighbor but hack his Wi-Fi My neighbor works for a fortune 500 company. I don’t know what he does exactly but he got a 10mbps internet connection attached to his WiFi router. He is mostly not home till late in the evening. so all this bandwidth sits idle all day. such a waste! I did try to connect to this router many times but it kept asking for a password. That son of gun must have it encrypted it. So what should I do, It is a sin to have a 10mbps wireless in range and not hack it. Top 100 Network Security Tools

Related: