Main » Архив материалов
Such malicious hakeryuga like you, of course, not once spoken to software keyloggers. Run once this program from the enemy - and you're done: all the passwords and typing, you can assume you have already. However, this approach has a drawback: you have to somehow start cFosSpeed ??on another computer that is not always possible. Therefore, we decided to make the elementary device with which you can easily benefit from logging all the typing, just coming closer to a computer enemy.

The essence of the ideas and methods
briefly explain what will be discussed. All tokopotreblyayuschie device, be it television, mouse, keyboard, hard drive or cooler during operation creates in the surrounding electromagnetic field. His appearance, as we know from physics course is directly related to a current of different voltage passing through the wires and channels of printed circuit boards. The magnitude of these electromagnetic waves can be measured by special devices. Field often crea ... Читать дальше »
Просмотров: 611 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

National Laboratory, Oak Ridge (ORNL) has undergone a complex and subtle attacks over the Internet, admits its Director Tom Mason (Thom Mason). Attackers acted in a very sophisticated way: the fake email with malicious attachments were sent to several people whose computers have a connection with both the World Wide Web, and from internal networks lab. One wrong action - and the burglars gained access to a database of all who have been in Oak Ridge for 14 years starting from 1990.

After receiving and analyzing this information, hackers have begun to send targeted letters "weak link" in defense laboratory - the people have a fairly high level of access to the LAN from your computer. Made about 1,100 attempts, while applying 7 different versions of letters, almost indistinguishable from conventional internal correspondence, they have ensured that "at least 11 employees" engaged dangerous attachments and give them access to even deeper secrets of hidden laboratory.

How serio ... Читать дальше »
Просмотров: 613 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)


Did you know that January 29 to February 5, 2008 ROCIT and Microsoft
hold Safety Week Runet?

Maybe I'm a bit late with his notes, but the summary of the action, consisting of 2 main parts, all the same to say.

So, opened the "Safety Week Runet press conference and round table
" Internet for Children: Prospects and threats? .. "
, Held at the RIA-Novostyah.Veli Roundtable Ilmira Malikov and Sergey Plugotarenko. During the events discussed:
  • Role of society and the state in ensuring the safe use of the Internet for children
  • Ensuring the safety of children on the Internet, software solutions, specialized Internet portals
  • International experience against malicious content and its impact on children
  • Health and safety of children on the Internet: understanding the problem or the solution?
  • International experiences and approaches of limiting children's access to harmful Intern ... Читать дальше »
Просмотров: 651 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Chris Rowland (Chris Rouland), one of the leaders of IBM Internet Security Systems, division of Blue Giant, is looking for and combating threats to information security, said that his colleagues from other companies of the same profile of deliberately hiding information about the vulnerabilities they found. He shares his findings strange statistics have revealed in the preparation of the annual report of X-Force. In 2007, the report said, for the first time in 10 years was found in 5.4% fewer gaps in the protection of computer systems than in the previous year.

Rowland believes that there are developed a black market for vulnerabilities that computer security experts are sold as criminals, and by the authors of the software. And the last goal as clear as in the first place: no one wants to risk their reputation and do not want to draw attention to their miscalculations, preferring to quietly fix them. High profitability of such a "business model" for research firms makes it virt ... Читать дальше »
Просмотров: 573 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

According to experts on network security company McAfee, in 2011 hackers will pay maximum attention to mobile devices, sokraschatelyam URL, geolocation services such as Foursquare, plus the products Apple, which for the time hackers almost never touched. "Social services, mobile web applications become more popular, which makes them very attractive to hackers," - says Vincent Weafer, vice president of McAfee Labs.

In principle, the prediction of experts from McAfee is quite logical - of Internet services, mobile software, Soup themselves are becoming better and smarter, gathering functional. Members of all, it also becomes more and more, and attackers can not simply pay no attention to such a wide field of activities. Same sokraschateli URL - who would have thought that they might be interested in intruders? However, today it is one of the most popular tools for criminals.

According to the same experts, social networks will remain hot "theme" of network intruders, but the ... Читать дальше »
Просмотров: 539 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Before you read this article would recommend to get acquainted with the basic terms of the technology http://ru.wikipedia.org/wiki/BitTorrent
also desirable basic knowledge of the language Perl

Today Bittorrent protocol is at its peak of popularity. Hundreds and thousands of terabytes per second rushing to peers over fiber optic backbones and radio channels. Millions of files (torrent) appear on the tracker. What can prevent this?

In this article I want to discuss and show excessive openness and ease of messaging tracker and bittorrent client. Maybe this vulnerability can not be named because real threat to the server and the client does not, but it can undermine the functioning of the network and dramatically reduce the overall rate of return. It's no secret that an indicator of user activity tracker is a ratio. It is less than the greater restrictions imposed on the user. Very low ratio may serve as deleting the account. This is especially important in networks usin ... Читать дальше »
Просмотров: 10012 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (9)

Today I wrote to my old friend and asked the institute to lend him money. Under the cut - History of the ICQ (Ivanov - he, Tony Clifton - I). Nothing new in this, but still beware ...


Ivanov (17:06:00 6/03/2008)
hello, webmoney in debt do not?

Tony Clifton (17:06:17 6/03/2008)
Che-ta lately all they want from me webmoney

Ivanov (17:06:29 6/03/2008)
:-) lend? Saturday will return ,25-30 VSW

Tony Clifton (17:08:21 6/03/2008)
VSW not - there is only WMR and Yandex

Ivanov (17:11:15 6 / 03/2008)
GIR skinesh ? 1000 should be about 900 rubles

Tony Clifton (17:11:27 6/03/2008)
1000 should be about 900 rubles? how much do you need money?

Ivanov (17:11:40 6/03/2008)
1000 skinesh?

Tony Clifton (17:11:47 6/03/2008)
I, and 1000
a purse?

Ivanov (17:12:04 6/03/2008)
R420344696559

Tony Clifton (17:13:02 6/03/2008)
What was the name of teaching math at 1 year? name

Ivanov (17:13:18 6/03/200 ... Читать дальше »
Просмотров: 655 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

At Georgia Tech have developed a prototype program BotSniffer (research work in PDF), which alone is capable of finding botnets, analyzing network activity of individual computers on the network. The program identifies patterns that are characteristic for infected zombie PCs, and then introduced them to the network and goes to the management server (C & C) botnet. Typically, the management server runs through IRC or HTTP, and BotSniffer supports both modes.

BotSniffer does not need a signature-based or IP-address list, to get started. It detects bots and finds C & C-servers, even if the traffic between them is encrypted. The fact that all the bots exhibit the same behavior. At the same time, they simultaneously begin to or send information, or to scan the network. The program determines these patterns. Then you can quickly block the transmission of commands over the network, that is to neutralize this paper. The researchers explain that the mechanism of transmission of ... Читать дальше »
Просмотров: 1206 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

At the Black Hat conference was shown a new method of cracking encryption GSM, which is characterized by simplicity and cheapness. Requires equipment costing only $ 1000 and about half the time to decode the signal and the selection keys.

Thanks to the work of two young specialists David Halton and Steve Mueller soon remote wiretapping GSM-phone will be available not only for intelligence, but also for every citizen. The inventors have used long-known vulnerability in the standard protocol. According to Mueller, the protection of GSM has been broken in 1998 when they were published theoretical papers on this topic. They are easy to implement in practice "exploit".

In March of this year, Hulton and Muller are planning to launch a quick version of his spy system that would break the protection in just 30 seconds. True, such a system will cost at least $ 200 thousand Hulton and Muller has defended the design patent.

For comparison, currently special services for the p ... Читать дальше »
Просмотров: 622 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Anti-virus companies have reported a new trend in the spread of viruses. After a wave of e-mail and script viruses is now one of the most popular ways to spread malicious programs are USB-Stick. This was made possible thanks to the weakness of Windows, which by default will automatically launch the autorun.inf file from the removable drive.

For the first time viruses that spread in this way (via INF / Autorun), have shown themselves in June 2007, when statistics ESET Software (developer of NOD32), their share rose to 2.17% of the total number of registered viruses. To date, that is just nine months, the number of viruses has increased to 10,3%.

Among the most popular viruses in March 2008 includes generator popup Win32/Adware.Virtumonde (distributed via USB-sticks), which is very difficult to remove, as well as Mebroot, using the classic technique of recording in the MBR and store data in sectors hard disc, but not in the files, which complicates its detection, even when ... Читать дальше »
Просмотров: 609 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

« 1 2 3 4 5 6 ... 58 59 »