Main » Архив материалов
Describing the application Wikileaks app in the Apple Store, I promised to translate the customers $ 1 to each sales SKU (instance) a charitable payment to support a free Internet.

One Dollar For Internet Freedom

Internet democracy requires funds to stay strong. By purchasing the Wikileaks app, you donate one dollar of the purchase price towards organizations that work to promote the future of online democracy.
Your donation may be used to fund defense costs of high profile individuals in the event they will be charged for espionage or crimes related to the leakage of confidential documents.
The Wikileaks app and its designers operate independently of Wikileaks and Apple.


Money from Apple I did not get, but to complete the experiment, decided to carry out charitable transfers from their own funds.

In the comments to this article on Habre received a proposal from habrayuzera SMiX check the translation through the



How it managed ... Читать дальше »
Просмотров: 815 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (1)

Once in early February 2011 in Lente.Ru was reported detained in the Netherlands twelve Somali illegal immigrants on charges of planning terrorist attacks, some readers were concerned about the mention of technology arrest: It was in fact publicly declared that the officers received information about the status of illegal immigrants in using GPS-modules in cellphones, sending to the telephone numbers of illegal immigrants a message that was processed without the knowledge of the owners of cellphones, followed by mobile phones (again, unbeknownst to the owners) will automatically send an SMS showing the location of vehicles. Judging by the fact that the detentions were made in seven different places, this technology was supposed to work in seven mobiles (with a maximum of twelve), so it certainly is widespread.

Appears:

1) With the SMS-Centre, legally connected to the global network of SS7, with a simple MAP-query, and knowing only a phone number, you can find and IMSI (nu ... Читать дальше »
Просмотров: 1015 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

In the hacking competition for the maximum number of zombie PCs controlled by leaders bots Sdbot and Gaobot. As reported by antivirus company PandaLabs, the two specified bot responsible for 80% of all new infections in the I quarter. 2007. With a large gap from the leaders follow Oscarbot, IRCbot and RXbot.

"The reasons for this dominance lie not so much in any special properties of Gaobot or Sdbot, but simply that their code is the most prevalent on the Internet - explains Luis Corrons, technical director of PandaLabs. - This means that any criminal who wants to make a bot can simply take the source code for these threats and make any changes of your choice. Indeed through this saves them time and effort. "

Bots - it's worms or Trojans that install themselves on computers to automatically perform certain actions such as sending spam, and then turn computers into "zombies." Botnets - networks of computers infected with bots have become a lucrative business model. There i ... Читать дальше »
Просмотров: 720 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

The Philippine Government filed an appeal to hackers to break in an online vote. This system will be tested during the trial of elections from 10 to 30 July. The Philippines and some other countries are trying to emulate the success of Estonia, which is the world's first fully-fledged Internet-held elections.

The system of online voting for the Philippines was developed by Spanish company Scytl Consortium at a cost of $ 452 thousand during the testing of 26,893 registered voters will be answering questions on-line questionnaire, which should mimic the process of selecting candidates for these elections.

The developers of the system, and Philippine authorities have asked the International Organization of electoral systems with a request to bring to the online testing system "professional hackers."

The Spaniards are confident that their development is completely secure and will withstand any attack. The computer system now being introduced also for online voting in ... Читать дальше »
Просмотров: 692 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Hacker nick Zoz spoke at a conference Defcon 18 with 20-minute story about how he was able to detect the desktop stolen a year ago. The story is really unusual (presentation slides, video (see 3:15)).

Zoz months of dogged, when somewhere in the auction will completing its serial numbers, but to no avail. Account of service DynDNS (dynamic binding domain to the IP-address) are also no signs of life. After 30 days they sent a letter saying that if you want to keep your account in the mode of inactivity, you need to buy an upgrade to version Pro. In October 2009, Zoz did it - and Luck turned in his face.

May 7, 2010 at DynDNS account appeared strange record.



Zoz made the request to the DNS ...



then successfully logged into your own computer by SSH.



Next began the most interesting. At its native desktop Mac OS X, he immediately discovered a few new files and folders. It was a game Realm of Warfare, files an application for unemploy ... Читать дальше »
Просмотров: 803 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

German scientists have learned with the help of sophisticated computer algorithms to recover deleted files and shredders have decided therefore to recover classified documents of the secret police of East Germany.

When the Berlin Wall fell in 1989 and it became clear that the regime of East Germany finished Stasi employees with Shredder tried to destroy all human intelligence materials.

About 16,250 bags containing about 45 million shredders destroyed documents were found and confiscated after the reunification of Germany in 1990. Work to restore the documents began 12 years ago, but 24 people were able to recover the contents of only 323 sacks. With such rates would restore all the documents 30 people would be engaged from 600 to 800 years.

The researchers hope that they can recover documents from 400 bags for 2 years, using new computer technology, proposed by the Fraunhofer Institute.

If the search project in which the state has allocated $ 8.53 million, ... Читать дальше »
Просмотров: 701 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

In the yard - in 2007, and the malicious software is already in the last year reached a record level of growth and technological sophistication. Many of us on his experiences have been exposed to spyware, viruses, worms and other malicious programs, and therefore wisely decided to take the appropriate steps to protect themselves.

Even those who escaped infection, is seriously resort to measures to ensure safety on the Internet. Everyone needs a reliable protection, covering as much as possible areas of risk and ability to protect your network, while not hindering the work.

But where to focus your search for security - for antivirus, firewall, integrated solution, or something else? Agnitum talks about how to choose the best combination of tools to counter modern threats. An article for the newsletter "In the world of security" was written to help you make informed choices, with short videos and simple descriptions, we show how modern malware infects a computer, and show ... Читать дальше »
Просмотров: 675 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Very controversial law adopted on Monday the German Bundestag deputies. Following the path of gradual tightening of articles of the Criminal Code against cyber-crime, legislators have made yet what feared among the experts on information security - a serious went too far in imposing bans and almost completely erased the line between "white" and "dark" parties to the computer underground.

It is quite reasonable position on the illegality and criminal liability of any action to circumvent protection of information by unauthorized persons is complemented by the new rules confusing ban on development, reproduction, distribution, installation and use of any software that can be used for these actions. That is now in Germany can not test durability of the security without the risk of thunder in jail.

Law, according to specialists, it is as foolish as the law against the acquisition and use, such as forks. They also can cause serious harm to humans (and at a certain skill - and ... Читать дальше »
Просмотров: 662 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)



This is the right of the U.S. president really is, and most unusual in this whole situation is that these rights are granted Congress leader of the country at a time when the Internet or computer networks, no one dreamed of. The fact that in 1942 Congress granted the right U.S. president to manage telephonic or telegraphic networks in the event of a "difficult" situations that threaten national security. The wording of the law we see that it is relevant to almost any means or centers of wire communications. This summer, the administration of current U.S. president said that he was going to take almost forgotten the law in the event of an emergency.

Some analysts have even decided that the president could in one fell swoop "disable" Internet that other experts think clearly nonsense. Nevertheless, the U.S. Congress is going to take away from the president the right to manage computer networks, as they say, away from sin. "

In principle, now the U.S. government fin ... Читать дальше »
Просмотров: 653 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Security experts have discovered new evidence of the war being waged between a botnet owners Srizbi and the Storm Worm. Like a mafia groups from "The Sopranos", the hackers made a redistribution of spheres of influence. The only difference is that the criminals from the virtual world are struggling for control over the tens of thousands of infected computers and is used in this war, not machines, and Trojans.

Trojan called Trojan.Srizbi, part of the combat kit MPack - the latest addition hacker weapons. It not only infects the computer and makes it part of a botnet, but also tries to destroy its main competitor - another trojan Storm Worm.

This is another episode in the war between the two botnets. More recently, the bots from the network Storm Worm «ddos" production server Srizbi, which was used to spread malware. The server has been put out of action for the day. Security experts have observed for this attack and said that during the day could not get through to him, to ... Читать дальше »
Просмотров: 779 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

« 1 2 3 4 ... 58 59 »