Honeypots (Definitions and Value of Honeypots)Honeypots (Definitions and Value of Honeypots)

By Lance Spitzner Definitions and Value of Honeypots Lance Spitzner With extensive help from Marty Roesch and David Dittrich …

Read more »
25 Feb 2006

Losing Trust In Search EnginesLosing Trust In Search Engines

Privacy. It's a pretty simple concept, at least, for an individual. When you get a group of friends together, expecting your comments and actions to remain private is a little tougher to do. But what …

Read more »
24 Feb 2006

Modifying exe's to dll's for firewall bypassModifying exe's to dll's for firewall bypass

well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user tr…

Read more »
14 Feb 2006

Two Way Authentication To Defeat PhishingTwo Way Authentication To Defeat Phishing

Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological…

Read more »
14 Feb 2006

Two New Windows Wmf Flaws FoundTwo New Windows Wmf Flaws Found

Microsoft announced on TechNet last night two new flaws in Windows, one in viewing WMF files with older versions (pre 6.0) of Internet Explorer, and a second related to priviledge escalation in Window…

Read more »
11 Feb 2006

I'm InI'm In

I'm a new member who just happened to meet the right persons on the net.well i don't have much to say. Just a thank you to all for doing this owsome work.…

Read more »
11 Feb 2006

Re: ip addressRe: ip address

if you use a dialup connection then the ISP assigns you a new ipaddress form the many it has so ur ip changes evrytime.…

Read more »
09 Feb 2006

ip addressip address

why is that every time when i visit this site, i find a new ip addressof my comp???somebody help me.site is : www.whatismyip.com…

Read more »
09 Feb 2006

Anonymity mini HOWTOAnonymity mini HOWTO

Disclaimer: I strongly recommend that nobody attempts in anyway to gainunauthorized access to any sort of computer system, as any kind ofattempt to gain unauthorized access sadly seems to be a serious…

Read more »
08 Feb 2006

Lost Linux PasswordLost Linux Password

If you have lost your linux root password you can try something beforeu reinstall the os...read more at http://aplawrence.com/Linux/lostlinuxpassword.html…

Read more »
06 Feb 2006

Overview of HTTP AuthenticationOverview of HTTP Authentication

The HTTP 1.x protocol has a built in mechanism for requiring a validusername/ password to gain access to web resources. This mechanism isknown as HTTP Authentication and can be initiated by either a C…

Read more »
06 Feb 2006

Wmf Exploit Sold For $4,000Wmf Exploit Sold For $4,000

Russian hacker groups sold exploit code for the WMF exploit in earlyDecember, well before vulnerability research companies caught wind ofthe problem, mounting evidence is suggesting.A two-week window …

Read more »
06 Feb 2006

New Bid To Tackle Spyware ScourgeNew Bid To Tackle Spyware Scourge

Five computer security firms are collaborating on a common namingsystem for spyware and will co-produce tools to remove the malicioussoftware.The initiative hopes to remove some of the current confusi…

Read more »
04 Feb 2006

Armoring SolarisArmoring Solaris

By Lance Spitzner Preparing Solaris 8 64-bit for CheckPoint FireWall-1 NG Lance Spitzner http://www.spitzner.net …

Read more »
02 Feb 2006

Nmap 4.00 With FyodorNmap 4.00 With Fyodor

After more than eight years since its first release in Phrack magazine,Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzziinterviewed Fyodor on behalf of SecurityFocus to discuss the …

Read more »
01 Feb 2006

Re: This Is AmazingRe: This Is Amazing

Well its not legal now but it may be once the FCC approves it. As ofnow only federal agencies can spy on you legally:P…

Read more »
01 Feb 2006

Re: This Is AmazingRe: This Is Amazing

Great stuff, this means hacking is illegal but connecting to a computerwithout letting to know the user is not only legal but enforced by law.What a strange world...…

Read more »
01 Feb 2006

Writing Writing "hacker" Tools And Exploits Could Be Illegal In The Uk

"Proposed changes to the Police and Justice bill would make it anoffense to make, adapt, supply, or offer to supply any article which isdesigned or adapted to impair the operation of a computer, preve…

Read more »
01 Feb 2006
 
Top