Showing Tag: "key" (Show all posts)

HP researchers develop browser-based darknet

Posted by Oyya-Info on Sunday, July 26, 2009, In : Security 

Two researchers for Hewlett-Packard have created a browser-based darknet, an idea that could make it easier for businesses to keep eavesdroppers from uncovering confidential information.

Darknets are encrypted peer-to-peer networks normally used to communicate files between closed groups of people. Most darknets require a certain level of technological literacy to set up and maintain, including taking care of the necessary servers. However, HP researchers Billy Hoffman and Matt Wood plan nex...

Continue reading ...

Look Ma, I created a botnet!

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The abstract concepts of "botnet" and "Trojan" just became a lot more concrete for me.

In less than an hour on Thursday, I was able to use programs readily available on the Internet underground for as little as $300 to infect several Windows clients and take complete control of them in a test environment.

In contrast to the real world, the McAfee Malware Experience event, which was akin to a Malware 101 class (or, in my case, Malware ...

Continue reading ...

Turkish hackers breached U.S. Army servers

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

Hackers based in Turkey penetrated two U.S. Army Web servers and redirected traffic from those Web sites to other pages, including one with anti-American and anti-Israeli messages, according to a report in InformationWeek.

The hackers, who go by the group name "m0sted," breached a server at the Army's McAlester Ammunition Plant in Oklahoma on January 26 and a server at the U.S. Army Corps of Engineers' Transatlantic Center in Winchester, Va., on September 19, 2007, the report said.


Continue reading ...

Teen gets job and spreads another Twitter worm

Posted by Oyya-Info on Monday, June 15, 2009, In : Security 

The teenager who created the worms that hit Twitter earlier this week has been hired by a Web application development firm and on Friday released a fifth worm on the microblogging site.

Twitter fought off four waves of worm attacks last weekend and into Monday in which Twitter users were infected just by clicking on the name or image of someone whose account was infected. The worms appeared to do no damage other than spread to infected users' followers and modify profile pages.


Continue reading ...

Best Communitation Website
Which communication website is best?


Make a free website with Yola