Monday, March 17th, 2008
Wi-Fu! More than just a statement, it reflects you wireless security skill set from knowledge and practical experience. This covers everything from using the tools out there to profile and attack your wireless network, to checking the security of your client devices yourself. If you feel your Wi-Foo is slipping, ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Monday, March 17th, 2008
For those that don’t know, Inguma is an open source penetration testing and vulnerability research toolkit written completely in Python. The environment is mainly oriented to attack Oracle related systems but, anyway, it can be used against any other kind of systems.
It’s becoming a mature and useful package! I’m glad ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, March 17th, 2008
Cisco has reported a critical security hole in CiscoWorks Internetwork Performance Monitor (IPM), the network availability monitoring component of the CiscoWorks LAN Management Solution (LMS). According to the advisory, commands can be executed remotely on the underlying Solaris or Windows operating system without authentication.
Cisco reports that the problem is due ...
Posted in Hardware, Internet, Networking, Security | No Comments
Sunday, March 16th, 2008
If you're serious about the Internet, chances are you spend anywhere from $30 to $99 per month for a broadband Internet connection. But regardless of how much you pay, are you getting all the speed that your ISP promised you? And does your connection persist reliably without dropping out frequently ...
Posted in Internet, Networking | No Comments
Sunday, March 16th, 2008
Monday, 9am
Blackjack, a hacker working from an internet cafe in London, is about to launch an attack on a major government agency. His aim is to cause maximum disruption and embarrassment. And, according to security experts, his job is going to be worryingly easy.
"Most organisations have dozens of vulnerabilities they ...
Posted in Internet, Networking, Privacy, Security | No Comments