Monday, November 3rd, 2008
Gooscan is a tool that automates queries against Google search appliances, but with a twist. These particular queries are designed to find potential vulnerabilities on web pages. Think “cgi scanner” that never communicates directly with the target web server, since all queries are answered by a Google appliance, not by ...
Posted in Internet, Privacy, Security | No Comments
Sunday, September 28th, 2008
As more people become accustomed to Web surfing and downloading software and multimedia, legitimate Web sites have become the favorite targets of hackers.
"The hacking of legitimate Web sites is the biggest threat today," said David Freer, Symantec's vice president for consumer business in Asia-Pacific and Japan.
Freer revealed that based on ...
Posted in Internet, Privacy, Security | No Comments
Monday, August 25th, 2008
Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Thursday, July 24th, 2008
MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. It’s included as part of the OSWA Assistant LiveCD we mentioned quite recently.’
I wanted to mention this tool separately as I think it’s very cool!
MoocherHunter™ identifies the location of an 802.11-based wireless moocher ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Sunday, July 20th, 2008
Kevin Mitnick knows that the weakest link in any security system is the person holding the information.
As a young fugitive hacker, he went to jail for breaking into computer networks, mostly by using his cunning and persuasion than his tech skills. He was an early master of the science of ...
Posted in General BS, Networking, Privacy, Security | No Comments
Page 7 of 24« First«...56789...20...»Last »