Main » Архив материалов


Despite the fact that computer security experts for a long time know about the worm Zeus (the developers who have not found yet) and the eponymous botnet (owners who recently did not find about it wrote on Habre) virus still continues to infect users' computers, expanding the scope of the botnet. Recently, the company F-Secure discovered the premium version, if I may say so, the worm Zeus, which begins to run only on powerful PCs.

The experts, who discovered this version Zeus, claim that had not previously encountered with malicious software for which you were put limits on the speed of your computer. In other words, not very powerful machines, the virus simply will not work. To test found the virus specialists F-Secure used a virtual machine, virtual configuration which can be changed without any problem. It was discovered strange behavior of the virus - he worked on "weak" configurations.

Experts have found that this version of the worm begins to work only when ... Читать дальше »
Просмотров: 359 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)


The development of cyberspace war has already led to a reassessment of many tenets of military science of the past, and even about the nature ensure global domination. There are new theorists of military affairs and the new theory.
The most interesting current results of this process (it is clearly only just begun and will present more surprises) is probably the doctrine of "geocentric TVD", put forward by the commander of space forces the U.S. Air Force Gen. Robert Koehler. At its core - understanding of the fundamental relationship of space and cyberspace. It is necessary to discuss the short but eventful history of the recognition of the doctrine of TVD geocentric, though here indicate its basic tenets, and try to understand its meaning.

Events unfolded as follows.
March 31, 2009 at 25 Space Symposium, General Kohler unexpectedly used the new term - "geocentric theater of war» (Spherical Battlespace) and in a few sentences describe it. The new theater of war exte ... Читать дальше »
Просмотров: 548 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

November 22, 2010 the Russian company Agnitum has released a free version of its integrated solutions to protect personal computers running Windows - Outpost Security Suite Free. The package includes antivirus, firewall, proactive components (system protection against data leakage) and anti-spam ... Unlike popular on Download.com class solutions from the manufacturer's Internet Security Comodo, the product contains anti-spam and has certified its anti-virus, but from Lavasoft Internet Security distinguishes it the presence of firewall and proactive protection. Download Outpost Free, please visit free.agnitum.com / download.php

Differences between the free version of the fee is very important. Free version of one or another form contains all the modules: firewall, email protection, proactive protection, virus scanner, content filtering. At the same time, the work of almost all of these modules is very limited. In particular, the paid version, as opposed to free

You can run ... Читать дальше »
Просмотров: 416 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

24th November was disclosed 0day vulnerability that affects all the most popular current operating systems Windows, namely Windows XP, Vista, 7, and Windows Server 2008. At the moment, are under attack, even a system with all security updates, both 32-bit and 64-bit edition. Technical details have been published on the Chinese forum and have led to speculation that hackers will soon begin full swing exploit the vulnerability.

Exploit uses a bug in the file win32k.sys, entering into the core of Windows, and is the result of the fact that the call API NtGdiEnableEUDC unable to verify the user input for malicious content. Attackers can exploit this bug to overwrite the return addresses on malicious code, which is then executed in privileged mode. As a result, the gap allows the user or process, even with limited privileges to execute code with elevated privileges. By its nature, an exploit to circumvent the protection afforded by technology UAC (User Account Control), is present in ... Читать дальше »
Просмотров: 420 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

VS

As I looked at Habre has repeatedly raised the topic "The Federal Law № 152 and social network Vkontakte." But I'll add another couple of cents, because I think it's important enough that he, perhaps, make someone think.

User piepl in his tank top Our new personal information (thanks to him, incidentally, a rather interesting analysis) gave an example of the rules item facebook, as a reference, namely:

In the paragraph 4.8 of the rules of social network Vkontakte written as follows.

By accepting these rules by registering on the site, the user confirms its consent to the processing of the management of his personal data provided during registration, as well as the user has voluntarily placed on your personal page. Handling of personal information in accordance with Russian law. Site Administration handles personal data in order to provide user services, including, in order to get users with a personalized (-targeted) advertising, ... Читать дальше »
Просмотров: 516 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Interesting to increase the vulnerability of local privileges to system-level, appeared on November 24 in an article in the resource The Code Project (http://www.codeproject.com/KB/vista-security/uac.aspx). Just a few hours it was removed from this resource, but the information has spread across the network and in my opinion to remove it was pointless. Increase the benefits you can work on systems from XP and up Vista/Win7, and server versions, too, are under attack. And what's even more interesting vulnerability is relevant, both on x86 systems, and on x64. True submitted PoC code was successfully run only on x86 systems.




All because of lack of control parameters of the function WinAPI RtlQueryRegistryValues ??():

NTSTATUS RtlQueryRegistryValues ??(
__in ULONG RelativeTo,
__in PCWSTR Path,
__inout PRTL_QUERY_REGISTRY_TABLE QueryTable,
__in_opt PVOID Context,
__in_opt PVOID Environment
);

This function is used to obtain several registr ... Читать дальше »
Просмотров: 434 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

This article will be considered one of the greatest challenges of the new information society. The article will be of interest to those who like to philosophize on the topic of the future and who was interested in philosophy at the university.


Introduction


Since its inception computer systems were very complicated and expensive systems. At the beginning of its history with computers, the specialists in white coats. Not many people have access directly to the big machine. Only a guru of computers have access to them, they got the formula and objectives, and then translates them into comprehensible only to them and the computer language.

Over the years, as predicted by many futurists, the world has made a huge leap in information technology, thanks to the emergence of transistors, circuits, development of combinatorics, algebra and physics.

Now computers have penetrated into all spheres of human activity. There were computers the size of a coin, wer ... Читать дальше »
Просмотров: 428 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)



Currently in Russia there are 10 commercial nuclear power plants, which operates 31 units with total capacity of over 23 gigawatts. Despite the fact that the share of nuclear energy accounts for approximately 16% of electricity (the rest is divided between a hydroelectric power station - 21% and fuel energy - 63%), the peaceful atom plays a crucial role in the power of the country. Nuclear power plants are strategic objectives and to get there the average citizen is almost impossible, so such an opportunity is usually not refuse. Last week I managed to visit at the Leningrad nuclear power plant, which has been operating for more than 36 years.

Despite the fact that the tour included visits to the central plant and machinery rooms, security stations allowed to shoot only in the Training Center, so the missing pictures I found on the Internet to compensate for (unsigned shots - my). Facilities Management reactor in UTC is nearly the same that of a unit of SELA, adjusted f ... Читать дальше »
Просмотров: 414 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Have already been several posts about the personal data on the Habre: Personal Data (Short FAQ), Vkontakte and Federal Law 152 and our new personal data

While the apparent difficulty writes "Personal data and SAAS», I decided to help users and put list of relevant resources on the topic. I am sure that most of the sites will be useful.




In advance to say that many more sites, but here I have brought, in my opinion, the most interesting:

1. www.ispdn.ru - polnolostyu resource devoted to legislative, judicial, legal, technical, theoretical and practical aspects of protection of personal data. Customers are responsible for all questions, including "How to protect personal data, help!"
2. www.pd.rsoc.ru - guide to personal data by overriding the regulator Roskomnadzora. On the resource you can find all the necessary relevant legislation, a forum with the pressing issues of users, the registry operators, PDN and electronic form of notification of the start ... Читать дальше »
Просмотров: 363 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Apparently, the administration of the service is still not able to provide complete protection against viruses (and who are capable of it?), As Twitter has appeared another virus, which, as usual, nothing entices unsuspecting users links are processed through "sokraschatelya "links goo.gl. No wonder - many, like seeing a reliable link address is automatically decide that and go to the link would be safe. The virus that sends a tweet, there was some day ago.

Of course, hackers, run a virus into the system, thoughtful and enticing a few texts that are accompanied by links to malicious sites. Once the user arrives at a site is infected computer. Currently, the administration tries to get rid of the malicious code, however, as we see, it turns out not the best way.

The virus began with a mobile version of site Twitter. It is worth noting that when infected user's computer is automatically connected to the virus, user accounts on this service, and is sent to all contact list ... Читать дальше »
Просмотров: 603 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

« 1 2 ... 55 56 57 58 59 »