Friday, May 29th, 2009
Polish researchers have described a way of hiding information in retransmissions of IP-based data traffic. Transmission errors are simulated in a TCP connection to provoke retransmissions and, before packets are retransmitted, their content is replaced with data intended to be concealed.
With the steganographic protocol known to both sender and receiver, ...
Posted in Internet, Networking, Privacy, Security | No Comments
Thursday, May 28th, 2009
Microsoft is investigating new public reports of a new vulnerability in Microsoft DirectX. The vulnerability could allow remote code execution if user opened a specially crafted QuickTime media file. Microsoft is aware of limited, active attacks that use this exploit code. While our investigation is ongoing, our investigation so far ...
Posted in Security, Windows | No Comments
Wednesday, May 27th, 2009
L0phtCrack 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding. Yet it is still the easiest to use password auditing and recovery software available.
Password Scoring
L0phtCrack 6 provides a scoring metric to quickly assess password quality. Passwords ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Wednesday, May 27th, 2009
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known ...
Posted in Internet, Security, Software | No Comments
Wednesday, May 27th, 2009
If you see some tweets in your stream that say: “OMG I just got over 1000 followers today from http://twittercut.com” — don’t be fooled, it’s a scam. The link takes you to a website that will prompt you for your Twitter login information. Once it has stolen your credentials, it ...
Posted in Internet, Privacy, Security | No Comments