Archive | April, 2006


19 April 2006 | 38,980 views

Good Password Guidelines – How to Make a Strong/Secure Password

It’s common sense for most people on the hacking side of computer security as we know how easy it is to break a password when it’s only a few characters long or it uses a dictionary word (even if it is postfixed with a couple of digits, a hybrid dictionary attack breaks it pretty fast). [...]

Continue Reading


18 April 2006 | 235,296 views

Photos as Visual Passwords Could Foil Hackers?

I’ve tried out a few of these visual recognition password technique things, and to tell you the truth they didn’t work for me, not at all. I clicked the requisite 3-4 spots on the image, and remembered them, but when I tried to login it wouldn’t accept it. A password that uses images instead of [...]

Continue Reading


17 April 2006 | 1,861,642 views

Top 15 Security/Hacking Tools & Utilities

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to [...]

Continue Reading


15 April 2006 | 36,690 views

Some Good Tips to Secure Linux

I came across this while browsing, has some pretty solid stuff, goes deeper than most basic Linux security guides. It has some good sections like this on protection against fork bombs: Fork bombs are programs that keep creating child processes until system resources are all used, they actually aren’t remote exploits because they require a [...]

Continue Reading


14 April 2006 | 53,691 views

bsqlbf 1.1 – Blind SQL Injection Tool

bsqlbf is a tool for Blind SQL Injection attacks, a pretty nifty one too! The author says there are similar tools about, but he’s tried to combine all the techniques into one compact but complete tool. # CHANGELOG: # -get now support resume (with -start option) # -get to fetch files (thank you ilo AGAIN) [...]

Continue Reading


13 April 2006 | 12,720 views

British Hacker Gary McKinnon Fears Guantanamo

I don’t know what he was thinking really, tampering with US military or governmental systems without some SERIOUS protection. A British man accused of being behind the largest ever hack of US government computer networks could end up at Guantanamo Bay, his lawyer has claimed. Gary McKinnon, from London, denies causing $700,000 (£400,000) damage to [...]

Continue Reading


13 April 2006 | 4,699 views

New Critical MEGApatch fixes 10 Vulnerabilities in Internet Explorer

Well how many does that leave unpatched? 30+ if I remember correctly from the PivX page that got taken down mysteriously. Microsoft on Tuesday released a “critical” Internet Explorer update that fixes 10 vulnerabilities in the Web browser, including a high-profile bug that is already being used in cyberattacks. The Redmond, Wash., software giant sent [...]

Continue Reading


12 April 2006 | 45,994 views

Download Youtube.com & Google Videos With 1 Click

With one easy click! We talked about Downloading Youtube.com Videos before, but now it’s even easier. Found a new site that does this seamlessy, all you have to do is drag the bookmarklet to your toolbar, then when you see a video you want on Google or Youtube, just hit the button on your bookmark [...]

Continue Reading


12 April 2006 | 21,692 views

Paros Proxy 3.2.10 Released – MITM HTTP and HTTPS Proxy

One of my favourite proxy options, along side the Burp Proxy (evolved into Burp Suite). I’ll definately talk more about the Burp Suite later as it’s excellent for testing anything web-based. Paros labels itself as MITM Proxy + Spider + Scanner plus anything else you want it to be, it is a pretty neat piece [...]

Continue Reading


11 April 2006 | 3,966 views

Oracle on the Quest for ‘Secure Search’ – Rival for Google Desktop?

A competitor for our buddy Google Desktop perhaps? ORACLE, the world’s third- biggest software maker, has begun selling software that allows users to search only personal data on their work computers such as email, word documents and calendar appointments. Chief executive Larry Ellison says the California company’s new search program “is one of the biggest [...]

Continue Reading