Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  (Computer Security)
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

27B Stroke 6: HPVA is the new pop?
Topic: Computer Security 11:20 pm EDT, Aug 24, 2006

Paris Hilton has been caught using a caller I.D. spoofing service to hack into someone else's voicemail, according to spoofing company SpoofCard.

OK, its official, Hacking, Phreaking, and related activities are now, officially, lame. This is no longer the domain of detached, nihilistic, techno-futurist intellectuals who are pushing the edge of the envelope while blasting KMFDM. This is the domain of daddy's money poplettes and myspace chix0rs who are all like OMFG while blasting Britney Spears. Its over. Fuck it. Find a new hobby.

27B Stroke 6: HPVA is the new pop?


Boing Boing: TrackMeNot: Firefox extension randomizes your search history
Topic: Computer Security 2:06 pm EDT, Aug 22, 2006

While it's a nice idea, this extension, in it's current form, really doesn't do anything to protect people's privacy.

Acidus was talking about making something like this.

Boing Boing: TrackMeNot: Firefox extension randomizes your search history


Captcha Mashup
Topic: Computer Security 3:20 pm EDT, Aug 13, 2006

"I met my wife on your captcha!!!" -- Steve, from New York

OK, this is funny... Hotornot captcha.

Captcha Mashup


The Metasploit Project: MS06-040
Topic: Computer Security 1:32 pm EDT, Aug 10, 2006

This module exploits a stack overflow in the NetApi32 NetpIsRemote() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denial of service on on Windows XP SP2 or Windows 2003 SP1. A failed exploit attempt will likely result in a complete reboot on Windows 2000 and the termination of all SMB-related services on Windows XP.

Don't be suprised if someone turns this into a worm. Patch early and often.

The Metasploit Project: MS06-040


Detecting, Analyzing, and Exploiting Intranet Applications using JavaScript
Topic: Computer Security 6:16 pm EDT, Jul 27, 2006

Or: How Acidus [*] learned how to port scan company intranets using JavaScript!

Imagine visiting a blog on a social site like MySpace.com or checking your email on a portal like Yahoo’s Webmail. While you are reading the Web page JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects and determines your Linksys router model number, and then sends commands to the router to turn on wireless networking and turn off all encryption. Now imagine that this happens to 1 million people across the United States in less than 24 hours.

This scenario is no longer one of fiction.

You can visit the proof of concept page he created and test drive it now.

This is really, really, really scar^H^H^H^H cool!

Detecting, Analyzing, and Exploiting Intranet Applications using JavaScript


rehpic
Topic: Computer Security 1:03 pm EDT, Jul 24, 2006

Bugle is a collection of search queries which can help to identify software security bugs in source code available on the web.

rehpic


Secunia - Advisories - Asterisk IAX2 Call Request Flooding Denial of Service
Topic: Computer Security 6:09 pm EDT, Jul 17, 2006

ISS X-Force has reported a vulnerability in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

Provided and/or discovered by:
Tom Cross, ISS X-Force

woot

Secunia - Advisories - Asterisk IAX2 Call Request Flooding Denial of Service


Top 100 Network Security Tools
Topic: Computer Security 10:42 am EDT, Jun 23, 2006

I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way.

Top 100 Network Security Tools


www.zone-h.org - CHINA VS. TAIWAN: IT'S CYBER WAR
Topic: Computer Security 1:59 pm EDT, Jun 21, 2006

On June 17 2006, a press release denouncing a big bribery scandal was sent out by Taiwan’s Defence Ministry Network. The announcement came from the official source of the Ministry, and the press soon reported the news while outraged comments raised among citizens. However, the statement was not real: Governmental Security Systems were hacked and the intruder managed in using official credits to spread out a fake press release...

What’s interesting in this case is that the operation seems to have been planned to work on a larger scale, over a long period of time in order to damage the public image of Taiwanese government.

www.zone-h.org - CHINA VS. TAIWAN: IT'S CYBER WAR


How to Build a Low-Cost, Extended-Range RFID Skimmer
Topic: Computer Security 7:05 pm EDT, Jun 20, 2006

Ignoring the time and cost of labor, the system cost is ridiculously low. The most expensive item in the system is the TI module, which costs around $60. All the other components, the materials for the PCBs, and the items needed for building the loop antenna, together cost at most $40-$50, giving a total cost of $100-$110.

Cool Paper. The cost of time and labor, however, should not be underestimated.

How to Build a Low-Cost, Extended-Range RFID Skimmer


(Last) Newer << 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 ++ 25 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0