!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> Computer News and Nonsense: February 2007

Computer News and Nonsense

The best of both Worlds and the worst of none.

 
TheTAZZone.com
TheTAZZone.com website is the Information Arm of the TAZ Zones. .
TAZForum
TAZForum is a Community run by a Membership Committee of Administrators/Mods/ and regular members. A very relaxed atmosphere, feel free to lounge, relax, and enjoy yourself.
TheTAZZone.net
A full links page, and the latest posts.
The Security Zone
The newest installation to TheTAZZone is a no-nonsense forum for security enthusiasts and professionals.
TheTAZZone.org
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
The Sports Emporium
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
0-Day exploit in Solaris
Sunday, February 11, 2007
If you are one of the ones running solaris, TURN OFF TELNET! There is a 0 day exploit available that even the biggest script kitty could run it. To check out all the relavent details, click here.
posted by JayMill @ 4:04 AM   0 comments
REALLY tired of wireless theives?
This man had truly had it with people stealing his internet, so much so that he sealed his house in zinc-coated lead. Aparently no one taught this man how to set up WPA, WPA2, or a MAC filter.

Labels: , ,

posted by JayMill @ 1:38 AM   0 comments
Social Engineering
Friday, February 09, 2007
Ever wonder about what exactly Social Engineering is? What qualifies as social engineering, and how could I do it myself(which you should be doing)? You can take a quick look at exactly what qualifies, and a description of each type here.

~Jaymill

Labels: , , , ,

posted by JayMill @ 7:20 PM   0 comments
Accessing a Network Through the Side Door
Thursday, February 08, 2007
Nokia has written another article titled Accessing a Network Through the Side Door. In this article he writes about a presentation by a senior Microsoft programmer about computer security. The article includes video, and a good brief of the seminar. It describes an extremely well executed attack that fully exploits a web server, and then moves into the main corporate LAN, including a nice little remote desktop GUI. You can check it out here, and Digg it here.

-JayMill

Labels: , , , , , ,

posted by JayMill @ 7:55 PM   0 comments
Canadian Nuclear Power Site Hacked
A Canadian nuclear power plants web page was hacked and an investigation is under way to determine how the attack was executed and by who. The hacker placed pictures of exploding nuclear bombs on every sub-page, but nothing on the main page itself. The attacker also placed a message that read, "Please Don't Put me in Jail....oops, I divided by 0". Canadian officials said no internal information was compromised.

Labels: , , , ,

posted by JayMill @ 6:48 PM   0 comments
nUbuntu
Are you looking for a better security live CD similar to the auditor package? nUbuntu is here, and its the best in my humble opinion. You can check what programs are installed by clicking here, and by looking here. The first link is to the deb packages installed, and the second is the non deb programs and the general 'about page' on their website. I am also planning on writing a tutorial on many of the nUbuntu features, so check back for more.

Labels: , , , , , , ,

posted by JayMill @ 3:42 PM   0 comments
2007- A Hacking Odyssey
Wednesday, February 07, 2007
Nokia has released the Part one whats going to be a stellar series of hacking tutorials. Part one is titled "Reconnaissance" and is the first step that any hacker should take. It goes on to describe, how to pick a target, and the first steps to take when you have located a target. So feel free to go and check it out here, and feel free DIGG it.

Labels: , , , ,

posted by JayMill @ 8:09 PM   0 comments
DNS Root Servers Attacked
Last night there was an Denial of Service attack on 3 of the 13 DNS root servers. There was no noticeable damage done, or drop in performance. What did make this attack special was it was the largest attack on the DNS servers since 2002 and it lasted for about 12 hours. The attackers attempted to hide their identities (most likely using anonymous proxy servers), but some were tracked to South Korea. The investigation is still underway.

Labels: , , , , , ,

posted by JayMill @ 5:24 PM   0 comments
About Me

Name: Security News Media
Home:
About Me:
See my complete profile
Previous Post
Archives
Links
Powered by

Free Blogger Templates

BLOGGER

© 2005 Computer News and Nonsense Template by Isnaini Dot Com