Category: Security

  • Schneier on Security

    Schneier on Security A weblog covering security and security technology. Bruce is ALWAYS a good read. Thanks to BoingBoing for the pointer that he now has a blog. Link to share this: https://gabrielserafini.com/blog/2004/10/05/schneier-on-security/

  • AntiExploit – find bad stuff on your server

    AntiExploit – find bad stuff on your server About AntiExploit AntiExploit is the first ON-ACCESS exploit-scanner for Linux and FreeBSD. Aexpl can help you to identify local intruders or users who want to harm your or other systems with well known tools. aexpl uses the dazuko kernel-modul and md5sums (signatures are planed) to identify bad…

  • Kryptonite Evolution 2000 U- Lock hacked by a Bic pen – Engadget – www.engadget.com

    Kryptonite Evolution 2000 U- Lock hacked by a Bic pen – Engadget – www.engadget.com Kryptonite Evolution 2000 U- Lock hacked by a Bic pen Posted Sep 14, 2004, 5:04 PM ET by Phillip Torrone Related entries: Misc. Gadgets lock vs pen Much to our surprise, we were able to hack our Kryptonite Evolution 2000 U-…

  • Paj’s Home: Cryptography: JavaScript MD5

    Paj’s Home: Cryptography: JavaScript MD5 The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number – 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input – a small change in the input results in a…

  • Metasploit and Open Source Vulnerability Database (OSVDB)

    This is the Metasploit Project. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on…

  • Running Bastille Linux

    Harden your Linux box with Bastille Linux. This nifty application not only helps you harden your system but it also helps you understand exactly why it takes the steps it takes. http://s92531067.onlinehome.us/mp3/ Link to share this: https://gabrielserafini.com/blog/2004/02/14/running-bastille-linux/

  • Googling for the Juicy Stuff

    Check out Google a Dream come true (otherwise known as WATCH WHAT YOU PUBLISH ON THE WORLD WIDE WEB!!!) Got to the honey page that linked to the paper above via search: intitle: “Index+of..etc” + passwd from http://johnny.ihackstuff.com/index.php?module=prodreviews via Google search for: googledorks via MSNBC via Slashdot. I’ve seen this before (Google does, after all,…

  • Howto: iptables + SSL + Apache 2

    It took a bit of searching to finally figure out the right process for getting SSL running properly for Apache. I’ve used it before, of course, but hadn’t personally set it up myself yet. Here is how to take a stock Red Hat 9 installation that has been updated with the latest patches and allow…

sell diamonds