Sunday, August 5th, 2012
Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless.
The exploit successfully compromised a legacy authentication protocol, MS-CHAPv2, which was created by Microsoft years ago. But the vulnerabilities of this protocol (and other similar ones) ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, May 23rd, 2012
The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 6.00 from http://nmap.org/. It is the product of almost three years of work, 3,924 code commits, and more than a dozen point releases since the big Nmap 5 release in July 2009. Nmap ...
Posted in Internet, Linux, Networking, Software, Windows | No Comments
Wednesday, March 14th, 2012
This is a great list of 65 open source projects to replace various security applications that you are probably running right now. I personally use most of them and it's great to see such a thorough list like this posted all in one place.
Source:
http://www.datamation.com/security/65-open-source-replacements-for-security-software-1.html
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Wednesday, April 13th, 2011
We are today proude to announce the release of RawCap, which is a free raw sockets sniffer for Windows.
Here are some highlights of why RawCap is a great tool to have in your toolset:Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback)RawCap.exe is just 17 kBNo ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, November 28th, 2010
Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments