Archive | March, 2007


05 March 2007 | 5,583 views

Massive Security Breach Leaks Credit Card Info

Recently a fairly huge credit card breach occurred involving a large retail company called TJX, with more than 2,000 retail stores. Some pretty well known brands there, I know I’ve used some of them…the sad part is they themselves still haven’t worked out the extent of the damage done to their information. For me this [...]

Continue Reading


02 March 2007 | 5,533 views

the Art of Virology 03h

…finally after three months of inactivity (exams, parties and so) I made some time to write this virus and this article… so for the ones who read this series… ENjOY =) The Old School Virus Yeah, I gave up writting infant-b because even the [a] version was full of bugs, and had to logicaly restructure [...]

Continue Reading


02 March 2007 | 8,277 views

Handy Recovery for Recovering Deleted Data on Windows

Handy Recovery is pretty neat software, there is occasions when I’m using Windows and I need to recover something or I’ve deleted something by mistake (I have a habit of using SHIFT+DEL so it’s not even in the recycle bin. I usually use Active Undelete and was pretty happy with it, I got a chance [...]

Continue Reading


02 March 2007 | 10,538 views

SHA-1 Cracked – Old News, But People Still Talk

A paper about cracking SHA-1 originally surfaced in 2005, from a fairly reputable scientific source in China, it was widely publicised nor talked about much. But then recently, just last month China managed to make a wave out of it, almost 2 years after the initial ‘report’. It was even Slashdotted on January 20th 2007, [...]

Continue Reading


01 March 2007 | 27,087 views

A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor

Michael Daw has collected some WEB backdoors to exploit vulnerable file upload facilities and others. It’s a pretty useful library for a variety of situations, especially for those doing web application security audits and web app security. Understanding how these backdoors work can also help security administrators implement firewalling and security policies to mitigate obvious [...]

Continue Reading