Suck-O Time

Who's online

Registered members:
  • ilkjester

Now online:
  • 1 member
  • 110 guests

Latest members:
  • adah
  • SITI
  • Trumpitasinoichi
  • Alderson
  • pc666pc

Total members: 41907

Resources

Latest posts

Sorry, the latest posts are only visible to registered users in order to protect privacy!
Our forums contain more than 72.000 posts in more than 9.500 topics at the moment.

Feel free to register for an account here.

-----

The benefits if you are a registered user:

- Forum access
- Downloads access
- Event calendar access
- Submit links to your sites
- Submit events
- Submit articles
- Apply for an own blog

 


Hackers Brew Self-Destruct Code to Counter Police Forensics PDF Print E-mail
Written by ph0bYx   
Tuesday, 15 December 2009 15:17

By Kim Zetter, Wired.com
Hackers have released an application designed to thwart a Microsoft-packaged forensic toolkit used by law enforcement agencies to examine a suspect’s hard drive during a raid.

Last Updated on Tuesday, 15 December 2009 15:20
 
Linux kernel vulnerabilities closed PDF Print E-mail
Written by ph0bYx   
Sunday, 13 December 2009 12:45

H-Online.com
Several Linux distributors are releasing updated kernel packages to close security holes in the kernel. For instance, very large packets can reportedly be used to remotely provoke a flaw in the TCP/IPv4 stack`s ip_defrag() (net/ipv4/ip_fragment.c) function. This can potentially cause null-pointer dereferencing and crash a system.

 
Top 10 botnets and their impact PDF Print E-mail
Written by ph0bYx   
Thursday, 10 December 2009 18:27

By Zeljka Zorz, Net-Security.org
Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet.
Botnets - apart from inundating out inboxes with spam - can also be used for ulterior purposes such as executing DDoS attacks or hosting websites, so understanding the ˝modus operandi˝ and size behind the well-known names is a good idea.

Last Updated on Thursday, 10 December 2009 18:45
 
`Fake fingerprint` Chinese woman fools Japan controls PDF Print E-mail
Written by ph0bYx   
Thursday, 10 December 2009 18:25

BBC.co.uk
A Chinese woman managed to enter Japan illegally by having plastic surgery to alter her fingerprints, thus fooling immigration controls, police claim.
Lin Rong, 27, had previously been deported from Japan for overstaying her visa. She was only discovered when she was arrested on separate charges.

Last Updated on Thursday, 10 December 2009 18:37
 
New Cloud-based Service Steals Wi-Fi Passwords PDF Print E-mail
Written by ph0bYx   
Thursday, 10 December 2009 18:17

By Robert McMillan, PCWorld.com
For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says.

Last Updated on Thursday, 10 December 2009 18:45
 
«   Start  Prev  31  32  33  34  35  36  37  38  39  40  Next  End »

Page 39 of 40