I’ve seen quite a lot of discussion lately on how to ‘defend against nmap’ or how to change the properties of your TCP/IP Stack so your Windows OS appears to be something else (As in you can guess the OS from the TTL value passed back in a TCP/IP packet). One way you can do […]
The Latest Countermeasures
Hacking Countermeasures
Find the Best Countermeasures from 2021 here:
Post-Mortem Data Destruction
Last updated: September 9, 2015 | 13,896 views
1. Introduction This article describes and partly implements a method to delete or re-locate, potentially sensitive and / or incriminating information from your UNIX flavoured machine, after the sad event of your death. An older version of this article has been published before, yet it has since disappeared from the Internet and the Google cache; […]
Topic: Countermeasures, Privacy, UNIX Hacking