
‘A real free press for the first time in history’: Wikileaks editor speaks out in London Julian Assange, editor of whistle-blowing website Wikileaks, has criticised mainstream media for not making proper use of “primary resources” and claimed that the site has created “a real free press (…) for the first time in history”. Speaking at the Centre for Investigative Journalism Summer School at City University London on Friday, Assange accused the media of failing to consult important evidence in its reporting of a 2007 US Air Force strike that killed two Reuters news service employees and several Iraqi civilians The attack became infamous after a video of the event was leaked through WikiLeaks, entitled Collateral Murder. The footage was recorded by one of two Apache helicopters involved in the attack. Showing an alleged copy of the US Military’s 2007 rules of engagement hosted on WikiLeaks, Assange said: “We had the raw ingredients you needed to decide right there. Why didn’t they use them?
Step-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit (quick plug – to all current & future reverse engineers – check out our Reverse Engineering Training Course. We’d love to publish your work next!) Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent DropperPart 2: Reverse Engineering the Kernel-Mode Device Driver Stealth RootkitPart 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection RootkitPart 4: Tracing the Crimeware Origins by Reversing the Injected Code This four part article series is a complete step-by-step tutorial on how to reverse engineer the ZeroAccess Rootkit. ZeroAcess is also known as the Smiscer or Max++ rootkit. You can either read along to gain an in-depth understand the thought process behind reverse engineering modern malware of this sophistication.
Wikileaks : Que contient réellement Insurance.aes256 14 décembre 2010 Le sulfureux site Wikileaks a mis à disposition des internautes cet été un fichier. Celui-ci se nomme Insurance.aes256. Le nom du fichier laisse présager qu’il s’agit d’un fichier crypté à ‘aide d’une clef de type AES sur 256 bits et dont son contenue serait une assurance pour le fondateur de Wikileaks , Julian Assange afin que son intégrité physique ne soit pas atteinte. Mais que contient donc ce fichier et qui en possède la clef ? Les caractéristiques du fichier Insurance.aes256 manuel piñeiro (@manuel_pineiro) sur Twitter Julian Assange and the Wikileaks agenda at George Brock Wikileaks founder Julian Assange came to the Centre for Investigative Journalism weekend school at City University last Friday to speak to a public audience. Assange is clearly making many more of these appearances in what might be called the Phase Two of the Wikileaks story. Julian Assange In Phase One, Assange barely gave any interviews at all and was secretive about himself and his organisation. Phase Two began when Wikileaks had put more than a million documents into the public domain which organisations and governments had never intended to release and when the US government arrested one of Wikileaks alleged leakers in the American military.
Training This section of the web site provides security training resources for infosec professionals based in or around the Northern Virginia (NoVA), DC, and MD areas. If there are any mistakes or information we should add, please let us know through our Contact Us form. For recent posts regarding this information, see the Recent Posts area below. Look for a complete list of all related posts on the Training category page. Northern Virginia Infosec Training Hacking Challenges
Wikileaks - Insurance.aes256 Je me suis déjà exprimé une première fois sur l’affaire Wikileaks et c’est sur un autre point, toujours le même thème que je voudrais réagir, assez rapidement, en parlant de Insurance.aes256. Source de l’image Présentation Gigantesque fichier informatique de 1,39 Go, "Insurance.aes256" contiendrait des révélations explosives que WikiLeaks promet de diffuser s’il arrive quelque chose au célèbre fondateur du site, toujours emprisonné à Londres. (…) Reste que pour en prendre connaissance, il faudrait parvenir à lire le fichier. Or, celui-ci est protégé par une clef longue de 256 bits dont la méthode de cryptage est également utilisée - ironie de l’histoire - par la Nasa pour ses dossiers classés "Top Secret"… "Il faudrait, a priori, 3x1051 années à une armée d’ordinateurs pour pouvoir déchiffrer ce code" Source A lire également : Wikileaks : Que contient réellement Insurance.aes256
Wikileaks plans to release files about deadly U.S. airstrike on Wikileaks.org plans to release as soon as this week documents related to a U.S. airstrike that killed Afghan civilians last year and plans to release combat footage of the incident this summer, the founder of the whistleblower site said in an interview Monday. Julian Assange said the documents pertain to an attack near the Afghan village of Garani, which killed scores of civilians in May 2009 In April, Wikileaks released video footage of a U.S. Apache helicopter attack in Iraq that killed several civilians, including two employees of the Reuters news service. The release catapulted Wikileaks into global headlines and sparked debate over a site that aims to uncover government and corporate secrets. Assange said Wikileaks does not try to identify sources.
T2 Magazine - From scratch to login promt with T2 2008-12-07, by Iulian Demetrescu I am a Linux user for about 15 years or so and i was always wondering about what is "under the hood" of it and how it's put together. I was especially interested in how a distribution is made up, since there are so many things that you have to take into account. Recently i was asked about one of my customers to deliver an embedded device capable of maintaining a small database, serve some pages via http and print some information on a thermal printer. In an instant i said embedded Linux and the customer agreed.
Swedish Pirate Bay to Host New Wikileaks Servers The Pirate Party will host several new WikiLeaks servers. This was agreed during Julian Assange’s visit to Stockholm last weekend, and the Pirate Party is happy to announce that everything has been finalized. The contribution of WikiLeaks is tremendously important to the entire world, says Rick Falkvinge, leader of the Pirate Party in Sweden. We desire to contribute to any effort that increases transparency and accountability of power in the world. Partner Colleges for Online College Credit Enjoy a hassle-free application process and save money when you enroll at one of StraighterLine's accredited Partner Online Colleges and Universities. Most online colleges and universities have agreed to accept StraighterLine college credits directly. StraighterLine selects Partner Colleges for their rigorous and high quality degree programs as well as for their commitment to individual learners and their needs. All of our Partner Colleges have distance learning options available.
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains. What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign? It's the Koobface connection. For instance, the ionisationtools .cn or moored2009 .cn redirectors, as well as the scareware serving premium-protection6 .com; file-antivirus3.com; checkalldata .com; ... webgoat - Project Hosting on Google Code After 1,000,000+ downloads and 10+ years, we have started an effort to significantly upgrade WebGoat. We are looking for help. If you have experience in any of these areas and time to contribute: UI Design Spring MVC JavaEE ESAPI and other security controls Application attacks (lessons revamp) Technical writing Please contact Bruce Mayhew (webgoat AT owasp DOT org). The source code repository has moved to github, You can find us at There are many WebGoat repositories on GitHub.