Tag Archive | "Information-Security"


22 June 2006 | 8,525 views

Botnets and Phishing Numbers Increasing Despite Crackdown

Botnets and organises cybercrime is getting more prevalent, it seems it’s increasing exponentially despire crackdowns by the US governments and other organisations. The criminals are getting more advanced, phishing scams are getting more realistic, technically trojans are getting more effective and the groups are getting really organised. Cybercrooks are organizing better and moving to more [...]

Continue Reading


18 June 2006 | 5,932 views

Kevin Mitnick Interview on Social Engineering

There’s a good interview with Kevin Mitnick on Social Engineering. Well afterall, that is where his skill lies, not in technical hacking. Arrested by the FBI in 1995 and convicted of breaking into the systems of Fujitsu Siemens, Nokia and Sun Microsystems, Mitnick served five years in prison–eight months of it in solitary confinement. In [...]

Continue Reading


11 June 2006 | 3,352 views

Custom Trojans – Isn’t it Old News?

Well it is for me, and I guess anyone who consider themselves a career hacker, or at least has a serious interest.. As a few good trojans are open source (Back Orifice?), you can just mess around with them for a while until you reach the point they are no longer detected by any of [...]

Continue Reading


21 April 2006 | 5,474 views

Kids Learn About Cyber Security – About Time Too!

I have always said no matter what it be, you need to start ‘em young! Same for open source, don’t lock kid into Microsoft operating systems in the schools, give dual boot machines, let them use Ubuntu or Debian or something else. Let them explore free software, let the smart ones see the source, fix [...]

Continue Reading


13 March 2006 | 9,526 views

Donations Flood in for Guilty Security Researcher Guillaume Tena

This could be the end of reverse engineering in France sadly, I hope it doesn’t have repucussions in other parts of the world. I think it’s the end of using reverse engineering tools to find flaws in France. Maybe the next step will be to forbid the possession of debuggers and disassemblers. It’s a valid [...]

Continue Reading


10 March 2006 | 22,803 views

SSL VPNs and OpenVPN – Part IV

4. Brief How-to …. Creating Multiple clients to Single site tunnels. Example of using PKI to create a client-to-site VPN: For a road warrior or roaming/multiple user scenario, static keys based VPNs don’t scale well. You will need to implement a PKI if you have Hub and Spoke architecture of VPN. From the OpenVPN.net website: [...]

Continue Reading


09 March 2006 | 21,436 views

SSL VPNs and OpenVPN – Part III

3. Brief How-to ….. OpenVPN and Site-to-Site Tunnels. OpenVPN can be implemented either Site-to-site or client-server model. I will take example configurations of both models. If you want to implement site-to-site configuration, the best way is to use static-keys instead of PKI. Using static keys, you can have your VPN tunnel up and running in [...]

Continue Reading


08 March 2006 | 16,470 views

SSL VPNs and OpenVPN – Part II

2. Why OpenVPN Here, in this article, I will lay down the emphasis on one important Open-Source SSL VPN software written by James Yonan and contributed by several others, which proposes security without the inherent complexity of IPsec AND using a trusted design of client component and VPN server. Usually VPNs require end points which [...]

Continue Reading


07 March 2006 | 27,272 views

SSL VPNs and Using OpenVPN

Requirement: To connect to a VPN server in a different country. Situation: A country which has proxies at every gateway. Issues: VPN based on IPSec is fussy when it comes across networks which are NAT’ted/ proxied. The Security Parameters Indexes don’t match and clients do not get connected. Objective: To connect VPN server in a [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·