thehackerschoice.wordpress.com
October | 2011 | thehackerschoice
https://thehackerschoice.wordpress.com/2011/10
Just another WordPress.com site. Skip to primary content. Skip to secondary content. Monthly Archives: October 2011. October 24, 2011. Today the German hacker group “ The Hacker’s Choice. 8221; officially released a new DDoS tool. The tool exploits a weakness in SSL to kick a server off the Internet. Technical details can be found at http:/ www.thc.org/thc-ssl-dos. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer (“bot”). We warned in 2002 ...
shaolininteger.blogspot.com
Bajau Legacy In Modern World: Never trust a subcontractor
http://shaolininteger.blogspot.com/2015/07/it-all-started-with-phone-call.html
Bajau Legacy In Modern World. A Moro indigenous ethnic of Austronesian who live geographically in Maritime Southeast Asia, root language is Malayo-Polynesian (sometimes called Extra-Formosan or Malagasy). Today I speak Bajau, Malay and English. Wednesday, July 22, 2015. Never trust a subcontractor. It all started with a phone call. "The whole network at [customer redacted] is down and they have no power - they need your help.". Log into switches, check things, nope, the network's not down. When I log...
shaolininteger.blogspot.com
Bajau Legacy In Modern World: Hacking Team Uses UEFI BIOS Rootkit
http://shaolininteger.blogspot.com/2015/07/hacking-team-uses-uefi-bios-rootkit.html
Bajau Legacy In Modern World. A Moro indigenous ethnic of Austronesian who live geographically in Maritime Southeast Asia, root language is Malayo-Polynesian (sometimes called Extra-Formosan or Malagasy). Today I speak Bajau, Malay and English. Monday, July 20, 2015. Hacking Team Uses UEFI BIOS Rootkit. They have written a procedure specifically for Insyde BIOS (a very popular BIOS vendor for laptops). However, the code can very likely work on AMI BIOS as well. This means that when the BIOS rootkit is in...
kawaidito.wordpress.com
April | 2010 | Hacking is not a crime
https://kawaidito.wordpress.com/2010/04
Hacking is not a crime. Just another WordPress.com weblog. You are currently browsing the monthly archive for April 2010. Campur – Campur ttg Jaringan. April 5, 2010 in Uncategorized. Aplikasi buat bobol pasword Wifi. 1 wepbuster (backtrack 4). 2 gerixIT (backtrack 4). Untuk cara kerjanya nanti saya akan jelaskan lebih lanjut. Masyarakat Underground Dunia Maya. April 5, 2010 in Internet. April 5, 2010 in Uncategorized. Inetnya jadi lambat…. 8216;ga connect…. Spesifikasi yang me pake :. OS : Windows XP.
mckeay.net
Network Security Blog » Security Advisories
http://www.mckeay.net/category/security-advisories
An American in London. The views of one man on security, privacy and anything else that catches his attention. The views expressed on this blog do not reflect the views of my employer or anyone other than myself. Archive for the 'Security Advisories' Category. Wake up to a POODLE puddle. TL:DR – Disable SSL immediately. The POODLE bites: Exploiting the SSL 3.0 Fallback. 8211; From the discoverers at Google. POODLE Attacks on SSLv3. 8211; At Imperial Violet, always a good resource for SSL. Why get lost in...
crypt0gr4phy.wordpress.com
Me, My self and My Life « Cryptography
https://crypt0gr4phy.wordpress.com/about
Security is not a Product, its a Process. Me, My self and My Life. Me, My self and My Life. I’m Just a NewBie but I Learn to be a Stupied,. Seorang bodoh yang pengen belajar dan berbagi . Mencoba menggenggam dunia dari sebuah komputer tua, dalam kamar kumuh yang selalu tak pernah tertata rapi . 3 Comments ». Salut atas ungkapan kamu atas cinta.thanks for givin’ me some inspirations today! February 9, 2007. 😉 I would like to know what language you are using? October 19, 2007. Ini kamu emg anak its? Menco...
crypt0gr4phy.wordpress.com
Transparent Firewall « Cryptography
https://crypt0gr4phy.wordpress.com/2007/02/01/transparent-firewall
Security is not a Product, its a Process. Me, My self and My Life. Adalah firewall yang “tidak tampak” baik oleh user di dalam zona yang kita amankan atau dari luar zona kita. Transparent Firewall pada dasarnya adalah firewall biasa hanya saja implementasinya dilakukan pada. Dan pengaturan umum kerja firewall yang kita buat. Topologi yang dipakai diasumsikan seperti gambar di bawah ini. INTERNET - - - BRIDGE - - - JARINGAN KITA. Implementasi ini membutuhkan beberapa hal yaitu:. Komputer dengan 2 NIC.
crypt0gr4phy.wordpress.com
Cryptography
https://crypt0gr4phy.wordpress.com/page/2
Security is not a Product, its a Process. Me, My self and My Life. Install SQUID with Dellay Pool. Installing Squid with the delay pools feature. As I mentioned before, Squid has a feature called delay pools, which allows us to control download bandwidth. Unfortunately, in most distributions, Squid is shipped without that feature. So if you have Squid already installed, I must disappoint you — you need to uninstall it and do it once again with delay pools enabled in the way I explain below. Configuring S...
crypt0gr4phy.wordpress.com
JaVa Crypto « Cryptography
https://crypt0gr4phy.wordpress.com/2007/01/14/java-crypto
Security is not a Product, its a Process. Me, My self and My Life. Created on Apr 5, 2005. Import java.io.File;. Import java.io.FileInputStream;. Import java.io.FileOutputStream;. Import java.io.IOException;. Import java.io.InputStream;. Import java.io.OutputStream;. Import java.io.Writer;. Import java.io.OutputStreamWriter;. Import java.security.cert.Certificate;. Import java.security.cert.CertificateFactory;. Import java.security.Key;. Import java.security.KeyStore;. Import javax.crypto.Cipher;. String...
SOCIAL ENGAGEMENT