Tuesday, June 16th, 2009
Torfox is a mash-up between Firefox and Tor. Ideally, we want to completely remove all direct communication between Firefox and the localhost. Instead, all address lookups are done through tor-resolve and all connections are made through tor socks server. Right now the project only works on Windows and relies on ...
Posted in Internet, Privacy, Security, Software | No Comments
Wednesday, June 10th, 2009
HijackThis is one of the well-known free utilities of Trend Micro that quickly scans a user’s Windows computer to find settings that may have been changed by spyware, malware, or other unwanted programs. By itself, it does not determine what is good or bad but it lists registry keys and ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Fixes:
Fixed memory & register leaks in NASL
nessus-fetch ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New functionalities in the v 0.88 release are:
Support for the Cisco ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Saturday, June 6th, 2009
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your homepage's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments