
by: Chris Bryant, CCIE #12933 Policy routing is a major topic on your BSCI exam, and you'll find quite a bit of policy routing going on in today's production networks. But what exactly is policy rou…
Wellcome
by: Chris Bryant, CCIE #12933 Policy routing is a major topic on your BSCI exam, and you'll find quite a bit of policy routing going on in today's production networks. But what exactly is policy rou…
SMTP stands for simple mail transfer protocol. It is a simple protocol based on exchange of commands. There are lots of commands supported, you can view a list here. The first command used in SMTP is…
Hey, Welcome Back!It is possible that you have heard about article submissions sites. They are sites which allow you to submit your article for free, and people can read them.What you don't know is, t…
Hello! Welcome Back!As you can see, I've made a few changes!New Template, New Translation Bar, New Links, New Listen To Article!Please give me some feedback!Tell me what you like, and what you hate! W…
Ok, after a short break, we're back and running.If you have written a blog, or want to start writing one, I can imagine you want people to read it.So the first question you need to ask yourself when w…
Had enough of logging into your google addsense every second to check your earnings? Me too.Their is a very simple solution for that, but it works only on firefox. (To download and install FireFox, yo…
Here is the list of default unix accounts... root sys bin mountfs adm uucp nuucp anon user games install reboot demo umountfsys sync admin guest daemon …
New kinds of Denial of Service attacks have been detected late last year. They consist of using the DNS servers to flood the victim computer. More information here...…
By Lance Spitzner Definitions and Value of Honeypots Lance Spitzner With extensive help from Marty Roesch and David Dittrich …
Privacy. It's a pretty simple concept, at least, for an individual. When you get a group of friends together, expecting your comments and actions to remain private is a little tougher to do. But what …
well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user tr…
Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological…
Microsoft announced on TechNet last night two new flaws in Windows, one in viewing WMF files with older versions (pre 6.0) of Internet Explorer, and a second related to priviledge escalation in Window…
if you use a dialup connection then the ISP assigns you a new ipaddress form the many it has so ur ip changes evrytime.…
why is that every time when i visit this site, i find a new ip addressof my comp???somebody help me.site is : www.whatismyip.com…
Disclaimer: I strongly recommend that nobody attempts in anyway to gainunauthorized access to any sort of computer system, as any kind ofattempt to gain unauthorized access sadly seems to be a serious…
If you have lost your linux root password you can try something beforeu reinstall the os...read more at http://aplawrence.com/Linux/lostlinuxpassword.html…
The HTTP 1.x protocol has a built in mechanism for requiring a validusername/ password to gain access to web resources. This mechanism isknown as HTTP Authentication and can be initiated by either a C…
Russian hacker groups sold exploit code for the WMF exploit in earlyDecember, well before vulnerability research companies caught wind ofthe problem, mounting evidence is suggesting.A two-week window …
Five computer security firms are collaborating on a common namingsystem for spyware and will co-produce tools to remove the malicioussoftware.The initiative hopes to remove some of the current confusi…
By Lance Spitzner Preparing Solaris 8 64-bit for CheckPoint FireWall-1 NG Lance Spitzner http://www.spitzner.net …
After more than eight years since its first release in Phrack magazine,Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzziinterviewed Fyodor on behalf of SecurityFocus to discuss the …
Well its not legal now but it may be once the FCC approves it. As ofnow only federal agencies can spy on you legally:P…
Great stuff, this means hacking is illegal but connecting to a computerwithout letting to know the user is not only legal but enforced by law.What a strange world...…
"Proposed changes to the Police and Justice bill would make it anoffense to make, adapt, supply, or offer to supply any article which isdesigned or adapted to impair the operation of a computer, preve…
Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software have awiretap backdoor that allows the government to tap into all …
new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release.QUOTEI am pleased to announce the release of Nmap 3.9999. From the versionnumber, you can probably guess that we are…
There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake it possible (and alarmingly easy) for malicious sites to pla…
Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per centof firms experienced computer attacks last year despite th…
For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuch greater control over which applications can run on the sys…
ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould perform better penetration testing inside networks, turningvu…
By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPreface [This talk was presented as the keynote address at the 19…
Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security industry.Speaking in Moscow, the head of Kaspersky Lab said c…
Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompasses spyware and adware.Harvard University's Berkman Centre and the Oxf…
Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of memory, they are tremendously usefulfor a huge number of programm…
This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to any Operating System or to perfectsecurity on any Computer.If …
Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanuary 1986. Brain spread via infected floppy disks and was are…
Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis would fill a firkin with mnemona anon parfay. Compared to o…
The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddatabases.The move is part of a government effort to revive an …
Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards to how Windows searches for connections after an AP is not a…
Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploit being an intential backdoor.The article leads through an Micro…
National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make sure u attend the "The Digital Fortress - Hacking Contes…
We often hear people claim that they have lost their passwords because they have been hacked and now need to get their password back.Here i am giving few techniquesAll this techiniques are illegal can…
A new report from the Information Security Forum (ISF) warns that along with existing security problems associated with IP networks, VoIP will present new and more sophisticated threats, such as calle…
Security experts with Packet Storm have published proof of concept code that exploits an unpatched flaw in the Firefox 1.5 browser, making the application vulnerable to a denial of service attack. Th…
A very elemental intrusion technique is bruteforce password guessing with a wordlist. This is very easy to do and I'd like to specifically explain how to crack simple, online websites. The basic princ…
Article at ... http://www.hacker.co.il/security/ie/css_import.htmlGoogle Desktop Exposed: Exploiting an Internet Explorer Vulnerability to Phish User InformationOverviewIt was bound to happen. I was r…
By ShaolinTiger The following article was written by ShaolinTiger, Administrator of: …