Microsoft’s Live OneCare the WORST Anti-Virus Solution

An Austrian web site called AV Comparatives has done an ‘independent‘ test of 17 different Anti-Virus products and released the results online. On this site you will find independent comparatives of Anti-Virus software. All products listed in our comparatives are already a selection of some very good anti-virus products. In order to get tested by […]

Tags: , , , , ,

Posted in: Countermeasures, Malware, Security Software, Windows Hacking | Add a Comment

WordPress Download Server Compromised (2.1.1) – Get 2.1.2 NOW!

Some sneaky hacker got into the WordPress download server and placed a backdoor in the latest available version (2.1.1). Luckily within a day someone reported the exploit to the WordPress team and they took the site down to investigate. This morning we received a note to our security mailing address about unusual and highly exploitable […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking, Web Hacking | Add a Comment

Let’s Digest Some Messages – md5 Hash Checker for Windows

Of course it’s a small article about md5… I really wondered how many Micro$oft Windows users check the md5 sum of programs that they download from the internet… Do you really trust that much the mirror websites? Even I could set up a mirror website for any download website and spread malformed packages to include, […]

Tags: , , , , , , ,

Posted in: Cryptography, Security Software | Add a Comment

Massive Security Breach Leaks Credit Card Info

Recently a fairly huge credit card breach occurred involving a large retail company called TJX, with more than 2,000 retail stores. Some pretty well known brands there, I know I’ve used some of them…the sad part is they themselves still haven’t worked out the extent of the damage done to their information. For me this […]

Tags: , , , , , , , ,

Posted in: General Hacking, Privacy | Add a Comment
Handy Recovery

Handy Recovery for Recovering Deleted Data on Windows

Handy Recovery is pretty neat software, there is occasions when I’m using Windows and I need to recover something or I’ve deleted something by mistake (I have a habit of using SHIFT+DEL so it’s not even in the recycle bin. I usually use Active Undelete and was pretty happy with it, I got a chance […]

Tags: , , , , , , , , ,

Posted in: Forensics, Security Software, Windows Hacking | Add a Comment

SHA-1 Cracked – Old News, But People Still Talk

A paper about cracking SHA-1 originally surfaced in 2005, from a fairly reputable scientific source in China, it was widely publicised nor talked about much. But then recently, just last month China managed to make a wave out of it, almost 2 years after the initial ‘report’. It was even Slashdotted on January 20th 2007, […]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, General Hacking | Add a Comment

A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor

Michael Daw has collected some WEB backdoors to exploit vulnerable file upload facilities and others. It’s a pretty useful library for a variety of situations, especially for those doing web application security audits and web app security. Understanding how these backdoors work can also help security administrators implement firewalling and security policies to mitigate obvious […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Solaris 10

Sun Solaris 10 – Free Offer – Media DVD

It’s good to have a variety of Operating Systems in your hacking lab at home, it helps you get familiar with them..as to break things, you have to know how they work first. So get to know Solaris, they have some pretty neat security related software inside their OS and generally are pretty good when […]

Tags: , , , , , , ,

Posted in: General News, UNIX Hacking | Add a Comment

ADTool – Active Directory Domain Listing Tool

ADtool is a neat tool to help you list all the machines that are part of an Active Directory driven domain or network. It is intended to help pentesters and admins in their day to day work, there are some other tools that can accomplish the work for listing domain servers, but unfortunately all other […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment