RainbowCrack – Largest NTLM rainbow tables ever

Sunday, November 28th, 2010

RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. Function of this software is to crack hash. The straightforward way to crack hash is brute force. In brute force approach, all candidate plaintexts and corresponding hashes are computed one by one. The computed hashes are compared with ...

Gmail Security Checklist

Monday, October 18th, 2010

Whether you just regained access to Gmail, or you want to make sure your account is secure, take a minute to complete our Gmail security checklist to make sure your mail security measures are up to date.Source:https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488

Researcher busts into Twitter via SSL reneg hole

Saturday, November 14th, 2009

A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...

Drowning in Passwords: Tips to Stay Safe and Sane

Monday, November 9th, 2009

If you spend much time online, you probably have the same problem I do: How to remember your ever-growing list of online usernames and passwords-and stay secure at the same time. You're savvy enough to know that identity theft and illegal access to personal and financial data are real-world problems that ...

10 easy steps to secure your Linux machine

Wednesday, October 28th, 2009

Whether you use a single desktop or manage a lab full of servers, with the various threats we all face from hackers these days you simply have to make sure you're running a secure ship.Running Linux gives you some inherent protection from attack, but you still need to take adequate ...