Category Archives: Security

TCP/IP Hijacking

TCP/IP Hijacking : TCP/IP hijacking is a clever technique that uses spoofed packets to take over a connection between a victim and a host machine. This technique is exceptionally useful when the victim uses a one-time password to connect to the host machine. A one-time password can be used to authenticate once and only once, […]

Great Aussie firewall claims first victim

Great Aussie firewall claims first victim Forum threatened with fine for link to banned site By John Oates Posted in Government, 17th March 2009 09:30 GMT The great Australian Firewall might be struggling to make political progress, but regulators are already using its blacklist to threaten local websites with fines. Broadband discussion forum Whirlpool was […]

Crackers latch onto year-old Windows token vuln

Crackers latch onto year-old Windows token vuln Track this topic   Print story  Post comment Unpatched bug features in multi-stage attacks By John Leyden Posted in Security, 18th March 2009 20:25 GMT Hackers have created exploits against a long-standing, unpatched Windows “token kidnapping” vulnerability. The appearance of attacks follows a year after security researchers Cesar […]

TrueCrypt — Free Open-Source Disk Encryption Software

TrueCrypt — Free Open-Source Disk Encryption Software Homepage : http://www.truecrypt.org Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or […]

Security Attacks

What is Social Engineering? Social engineering is the method by which an attacker will gain information about a person or system by manipulating people within the organization. Using this method to gain access to a network does not always involve complex computer hacking techniques. A phone can be a hacker’s best friend. Many times an […]