background preloader

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus
Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.

Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

How to Build the Ultimate Survival Shotgun As a Survival and Preparedness instructor, I take my line of work very serious – sometimes too serious. Occasionally, though, I like to take on survival projects that are just down right fun. This article highlights one of those projects. I’m fortunate in that I’ve been able to turn my passion into my profession – this being the study of Survival and Preparedness. I’ve always enjoyed building survival kits of all shapes and sizes. Ultimately your survival needs fall into 5 main categories. Every survival kit must include contents that directly or indirectly meet these 5 basic survival needs.

How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “? 4.

Exploiting Unexploitable XSS XSS that are protected by CSRF protection or where other mitigating factors are present are usually considered to be unexploitable or of limited exploitability. This post details real world examples of exploiting “unexploitable” XSS in Google and Twitter. While the XSS detailed in this post are site specific the methods that were used to exploit them could be applied to other websites with similar implementations. Google Google has services deployed across many different domains and subdomains and as a result requires a way to seamlessly authenticate members who are logged in to their Google Account. When called by a member who is logged in to their Google Account the URL generates an auth URL and redirects to the particular service. When the auth URL is loaded the service uses the auth token to log the member in. At ads.youtube.com a YouTube member can create paid promotions for their videos.

Airsnarf - A rogue AP setup utility The United States of GOOD Beer More Infographics on Good Gadgets SOOOOooo…yes I know that is all grammatically incorrect and yes I am a TEACHER! AHHHhhhh! Anyways, usually most people don’t worry too much about grammar when we are communicating what we might say in person to someone else in writing on the internet, not a term paper. ANYWAYS, a lot of this commentating explains a lot about human interaction in general to me. I am predicting either someone will come back with another insult to this or ignore it altogether because they aren’t sure what I am talking about….oooorrr we could start an equally engaging conversation and discussion (not argument) about what we think about all this wonderfully engaging art! Every one have a blessed day or at least a better one than some of the above appears to be having. I would also say….. that I agree that some people in some countries sometimes have better graces than some Americans. Which also applies to the next comment from my fellow American, as well. How did I do sticking to the topic???

Hexxeh's Blog - Home of…um, well, Hexxeh… Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers fuzzers

Great Truths About Life This page is brought to you by UC Berkeley Parents Network Back to the Jokes & Quotes Collection 1. No matter how hard you try, you cannot baptize cats. 2. The opinions and statements expressed on this page are those of parents who belong to the UC Berkeley Parents Network and should not be taken as a position of or endorsement by the University of California, Berkeley.

Tap code The tap code, sometimes called the knock code, is a way to encode messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicating is usually by "tapping" either the metal bars, pipes or the walls inside the cell. Design[edit] The tap code is based on a Polybius square, a 5×5 grid of letters representing all the letters of the Latin alphabet, except for K, which is represented by C. Each letter is communicated by tapping two numbers: the first designating the row (horizontally) and the second designating the column (vertically). Or to communicate the word "water", the cipher would be the following (the pause between each number in a pair is smaller than the pause between one pair and the next): History[edit] The origins of this encoding go back to the Polybius square of Ancient Greece. References[edit] External links[edit]

Related: