Sunday, November 28th, 2010
RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. Function of this software is to crack hash.
The straightforward way to crack hash is brute force. In brute force approach, all candidate plaintexts and corresponding hashes are computed one by one. The computed hashes are compared with ...
Posted in Security, Software | No Comments
Monday, October 18th, 2010
Whether you just regained access to Gmail, or you want to make sure your account is secure, take a minute to complete our Gmail security checklist to make sure your mail security measures are up to date.Source:https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488
Posted in Internet, Privacy, Security | No Comments
Saturday, November 14th, 2009
A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, November 9th, 2009
If you spend much time online, you probably have the same problem I do: How to remember your ever-growing list of online usernames and passwords-and stay secure at the same time.
You're savvy enough to know that identity theft and illegal access to personal and financial data are real-world problems that ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, October 28th, 2009
Whether you use a single desktop or manage a lab full of servers, with the various threats we all face from hackers these days you simply have to make sure you're running a secure ship.Running Linux gives you some inherent protection from attack, but you still need to take adequate ...
Posted in Linux, Security | No Comments