Tuesday, January 4th, 2011
Browser security specialist Michal Zalewski believes that Chinese hackers have long been aware of a security vulnerability in Internet Explorer which has only recently come to public attention. It is believed that this vulnerability could be exploited to infect computers, though current efforts have succeeded only in provoking crashes. The ...
Posted in Internet, Privacy, Security, Software | 1 Comment
Sunday, November 28th, 2010
Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Sunday, November 28th, 2010
RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. Function of this software is to crack hash.
The straightforward way to crack hash is brute force. In brute force approach, all candidate plaintexts and corresponding hashes are computed one by one. The computed hashes are compared with ...
Posted in Security, Software | No Comments
Monday, July 26th, 2010
Google Chrome 5.0.375.125 has been released to the Stable channel on Linux, Mac, Windows, and Chrome Frame.Download:http://www.google.com/chrome?hl=en
Posted in Internet, Security, Software | No Comments
Sunday, May 9th, 2010
In September 2007, we have published an article about a great disease that affected tens of Windows security products. The article called Plague in (security) software drivers revealed awful quality of kernel mode drivers installed by all the major desktop security products for Windows. The revealed problems could cause random ...
Posted in Internet, Security, Software, Windows | No Comments