Stream

TheWatcher _
moderator

Discussion  - 
 
does anyone know about cheap magnetic card readers/writers? 
1
Green “Boomerang” Weenie's profile photoTheWatcher _'s profile photo
3 comments
 
+Green Weenie well time to start looking for those then
Add a comment...

TheWatcher _
moderator

Discussion  - 
 
 
does someone know how to get files on github to use an indentation amount of 4? whenever I save it resets the amount to 8
2
1
Gene Moody's profile photo
 
(Previous post seems to have disappeared.  *shrugs* )
Add ?ts=2 or ?ts=4 to your URL to change the Tab Size.  Otherwise it's a feature of your text editor, because it isn't saved like spacing in Git.
Add a comment...
 
OS fingerprinting is a vital pen testing tool.
Here's what you must know...

#penetrationtesting #pentesting #infosec #cybersecurity
For those of us in the information technology field, there are two reasons why we should understand operating system fin…
4
1
John Doe (Faraday Defcon)'s profile photoᏩ천사 (ᏌиeqμalᏩ)'s profile photo
 
My kid's on this subject right now in school. I'll fwd this to him, thanks!
Add a comment...

Mahadi Raof

Discussion  - 
 
 
Here's How the Hacker did it...
Hacker Leaks Info of 30,000 Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) Employees
5
Add a comment...

Eye Witness

Discussion  - 
 
Aaron Swartz and Jonathan James commit suicide in different years; surprisingly the prosecution team trying them was the same Two of world’s most wanted hackers had committed suicide and no one still knows why. Aaron Swartz and Jonathan James, both hackers by profession and most wanted by the FBI have committed suicide in face of theRead More
8
3
Friedrich der Große's profile photoARCHANGELUS LEGION ACTIVISTS's profile photoMatthew “Lord Drachenblut” Williams's profile photoMahadi Raof's profile photo
7 comments
 
+Friedrich der Große u funny dude!!! 🍗🍝🍕🍟🍔🍳🍤🍛
Add a comment...

Shawn Tuma

Discussion  - 
 
In his latest Ethical Boardroom article, Shawn Tuma explains why it is important for board members to have an active role in their company's cybersecurity preparation and tells them several key ste...
2
Add a comment...
 
A few days ago after created a few batch commands, I thought about an interesting question related to malware spreading methods which is:

Would a hacker be able to uncover malwares he/she sent to a victim in the form of an image (for those of you who don't know: it's possible to zip any files and hide them in an image) by either doing the reverse process he/she used to get that file-transporting image or directly calling the files in the image ?
2
dustin h.'s profile photoMaximilian “Max” Berkmann's profile photo
7 comments
 
+dustin h. It's not zipping, as the process (mentionned in the OP) start by zipping files then merging it into an image.
So let's say you have file0.txt, file1.txt and img.png, you first start by zipping file0.txt and file1.txt into an archive named file.zip you'll then merge file.zip with img.png to get a new image: x-img.png which can be viewed as an image (like it was img.png) and opened as an archive (like it was file.zip).

Otherwise I do argree with you. Sort using the macro approach where someone would open a word/excel file with that macro in it that will call the files or directly the code inside of them.
Add a comment...

Raiden Kaiser

Discussion  - 
 
Not security based but its important for the internet 
‪#‎UnSubTheFineBros
6
1
ARCHANGELUS LEGION ACTIVISTS's profile photoMike Hildyard's profile photo
4 comments
 
Ty 👍⏳
Add a comment...

Mahadi Raof

Discussion  - 
 
 
How to remove shortcut Trojan/Virus from USB/Hard Drives?
Today we are going to tell you an easy technique for removing the inborn shortcut Trojan/Virus from your hard drives, USB Drives, Memory Cards and/or other  storage devices. USB drives specially those which were partially used on shared computers or laptops...
2
Add a comment...

Raiden Kaiser

Discussion  - 
 
wow.... just wow.... I think I might leave youtube soon this spreads like a virus and i dont want infected 
1
John Lynch's profile photoFriedrich der Große's profile photo
10 comments
 
While gender roles are, in part, learned from culture, gender itself is not. Gender and sexuality are rather complicated issues and will not yield to the politics and puerile notions you see tossed around all the time.

And so, I criticize the tone and character of this video. As I testified at the first marriage equality hearing in New Hampshire long ago, there is an entire spectrum here of both "gender" and "sexuality", and the relationship between the two, how they develop and are seen in "society", and the like, is even more complicated yet.

The speaker in the video keeps claiming "science", but he is not entirely being scientific. He is more trying to make a political statement in the name of "science".
Add a comment...

Sean M

Discussion  - 
 
 
AT&T and Government - No User Privacy

+AT&T​ is does not support basic user protections. When a company CEO is vocal about their impartiality to a topic as a concern then it is very likely the company culture and attitude will follow. So, to have the CEO of AT&T say that he does not think it is his job to push for user privacy, then it is very likely that his company follows suit.

Those that care about their privacy would do well to avoid using AT&T. While AT&T states that they only hand over information when properly requested that is not sufficient during this period of intense debate over the breadth of government and corporate collusion. 
But tech company leaders aren't all joining the fight against the deliberate weakening of encryption. AT&T CEO Randall Stephenson said this week that AT&T, Apple, and other tech companies shouldn't have any say in the debate. "I don't think it is Silicon Valley's decision to make about whether ...
5
2
Sean Guidry (v1c10u5)'s profile photoMatthew “Lord Drachenblut” Williams's profile photo
Add a comment...

Tony Campbell

Discussion  - 
2
Add a comment...
 
Transparent firewall implementation is a must to keep your datacentre secure.

I explain what you need to know here...

#networking #networks #infosec #cybersecurity
By Kim Crawley The proper implementation of network appliances is vital to designing and maintaining a properly secured network. Modern networking devices usually integrate multiple functions into one box. For example, most enterprise quality firewalls have built-in malware detection and IPSes or IDSes. Most home and small business routers have built-in firewalls and various WLAN/WiFi configuration features. You must understand how to configure ...
9
1
Lode Van Beethoven's profile photo
Add a comment...
«Доктор Веб» – российский разработчик антивирусных программ и сервисов для предоставления услуг информационной защиты для корпоративных и частных пользователей.
3
1
ARCHANGELUS LEGION ACTIVISTS's profile photo
Add a comment...
 
When you read about security attacks involving mobile network technology, typically they’re incidents that target mobile devices used by consumers.

All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus software to acquire signatures a day or so after a zero-day is discovered, run it, reboot your device, you’re all set.

That’s not what Regin is, oh no. Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I’m going to take you on a bumpy ride.

#infosec #malware #cyberwarfare #cybersecurity
By Kim Crawley. When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers. All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus ...
6
2
John Doe (Faraday Defcon)'s profile photoLode Van Beethoven's profile photoFriedrich der Große's profile photo
 
I was at our local monthly Defcon meeting tonight...[name deleted, not me]  gave a demo with a small GUI [s]he coded [deleted what I said here, sorry]  that revealed all usernames and passwords of any cisco router online in the IP ranges he selected that didnt have RW changed to RO in the public settings (which is RW by default). I was amazed how much hardware is out there that is so vulnerable.    
Add a comment...
 
Horrible security vulnerabilities are a major factor in the downfall of Adobe Flash.

My analysis is here...

#infosec #webdevelopment #web #cybersecurity #tech
7
1
John Doe (Faraday Defcon)'s profile photoFriedrich der Große's profile photo
 
“Look ma, this ain’t GeoCities no more!” lol ded! +1
Add a comment...
 
Decided to write an article on making security matter to employees. Kind of lengthy but I'm hoping it is insightful.
by Sage N Clements, Sec+ Now more than ever cyber security (or internet security if you prefer) is important for all organizations big or small. Why? It’s simple. We live in a global connected en...
4
1
Mike B's profile photo
Add a comment...

Mahadi Raof

Discussion  - 
 
 
Exploit Windows 7 from Guest Account

(⌐■_■)
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than ...
1
Add a comment...