Category: security


„Mobile devices can hold a lot of information,“ Pontiroli said. „But just because you are able to do it, [it] doesn’t mean you should carry all your digital life on your phone.“ Follow us @tomsguide, on Facebook and on Google+.,news-18695.html


vim /etc/fail2ban/jail.conf; # open up the config file that defines all the defaults # find those lins: # # Destination email address used solely for the interpolations in # jail.{conf,local} configuration files. destemail = # Choose default action. To […]


grab/download yourself a copy of truecrypt binaries from here: wget; # if you are running 32Bit Linux wget; # if you are running 64Bit Linux sha256sum truecrypt-7.1a-linux*; # generate checksum # should be 32Bit: 9d292baf87df34598738faef7305cddaa15ea9f174c9923185653fb28f8cfef0 and # […]


rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong […]


Secret documents – thanks Snowden 😀 NSA Experiment for massive SSL-TLS Decryption media-35509 What the NSA can hack and what not: ‚“Bigger“ Problems has the NSA with Truecrypt, a program to encrypt files and Off-the-record (OTR) Chats. „Katastrophal“ – level […]


don’t ask be why… but the Antivir „Feature“ „Scan incoming mail“ actually results in „NO INCOMING MAIL“. It blocks your connection to the SERVER TOTALLY. The Antivir Company RECOMMENDS YOU TO DISABLE ENCRYPTION IN YOUR MAIL PROGRAM!? WTF? YOU […]


just in case… if you installed wordpress using an unencrypted connection (without SSL) and later you decide to add SSL and want to connect to your blog via https… well you kind of CAN but … it will keep you […]


Update: 100+X MILLION USD STOLEN / STOCK PRICE MANIPULATION „Prosecutors in Atlanta and New York unsealed indictments against four men and one unnamed alleged co-conspirator in connection with a complex, sprawling scheme to artificially manipulate the price of certain publicly […]


https://Exploit.IN – site about network security and protection Exploit.IO DamageLab happily transled from Russian to English by 27.11.2015 23:18: Dent in VPN allows you to identify the real IP address of the user According to the VPN-provider Perfect […]


Today, David Vincenzetti is a cyberarms dealer who does business with some of the world’s most repressive regimes. Twenty years ago, he was on the other side of the fight. Vincenzetti was a cypherpunk who built tools to beat hackers […]


A great article 🙂 1. How to hide Apache Version and OS Identity from Errors When you install Apache with source or any other package installers like yum, it displays the version of your Apache web server installed on […]

CryptoCat – Chat Secure Addon for Desktop/Firefox and App

Sind wir denn alle Paranoide „Verschwörungstheoretiker“? Google: Don’t be evil… oder maybe doch? Was kann man(n)/Frau tun? Android App Apk Download/Mirror: Cryptocat_1.0_1.apk.gz Firefox Rated 4 out of 5 stars 21 user reviews 24,718 users Add to collection Share this Add-on […]

24.06.2015 What is prism_sw.dll? Is this related to the PRISM NSA Spying program? Or am i only paranoid 😀 It would make sense to put it into one of the most used Frameworks/Libraries used: JAVA prism_sw.dll is part […]


SVG Basics <!– will create a animated square that changes its height –> <svg> <rect width="200" height="200" fill="slategrey"> <animate attributeName="height" from="0" to="200" dur="3s"/> </rect> </svg> Security ProblemZZZ

17.06.2015 says: New Intel Chips Contain Back-Door Processor, Hackable Even When Computer is Turned Off „Throw away your computer“ Julian Assange kept changing hardware for not beeing tracked. What use is it to install a secure operating system, if your […]


that’s what you get for using WINDOWS!!!! 😀 Jeder Kindergarten ist vermutlich besser geschützt… Bzw. in kritischen Infrastrukturen DARF GAR KEIN INTERNET vorhanden sein. (Router-Cascade DMZ etc.) Sind wir den Blöd 😀 ? Oder werden wir nur absichtlich dumm gehalten? […]


Example of tunneling an X11 application over SSH: the user ‚josh‘ has SSHed from the local machine ‚foofighter‘ to the remote machine ‚tengwar‘ to run xeyes. Vulnerabilities in 2.x In November 2008, a theoretical vulnerability was discovered for all versions […]