In monetary terms, the value of the data in a computer often exceeds the actual cost of the hardware and software of the machine. Therefore, encrypting the information data in our computer system is of utmost importance. Encryption plays an important role in protecting data, not only for maintaining confidentiality of information but also to […]
How to install Backtrack 4 R1 in VMWARE
So I decided to have a look at the latest Backtrack release (Backtrack 4 R1) which is claimed to be the best version released so far from the backtrack community. With the new Linux kernel version 2.6.34 and with significant overall improvements, this release is worth checking out. I always use the virtual machine option […]
Securing your personal information during the holidays
The security problems associated with unsecured WiFi networks when you sit on the beach, cafe, etc., the applications that “show” your geographical location, the information exchanged through social networks etc are hiding serious security threats for your PC and for your personal information as well. The use of secure wireless networks, encryption or hiding of […]
How to enable SSH Tunneling on QNAP NAS
I have a QNAP TS-109 II Network Attached Storage (NAS) device which I use for data storage, download station, torrent client etc. This NAS is a Linux Box so I thought about using it for another application in addition to the other mentioned above: as an SSH tunneling box for encrypting traffic when I’m outside […]
Information Security Cyber Threats for 2010
Kaspersky Lab announced recently the estimations of their security analysts about the activity of cyber criminals for 2010. In 2008, the company’s analysts predicted an increase in system infections by viruses. Unfortunately, these estimates proved accurate. In 2009 we saw the emergence of sophisticated malware with functionality based on rootkits, the significant use of worm […]
The Results Of A Hacker Finding Your Personal Information
Everyone has heard of the latest scandal regarding the “whatever.com” site being hacked and vital information for over one million people being stolen. Now what would a hacker want with the information some would wonder? The thought behind a hackers motives in most cases, is to just be able to hack the site that says […]
Installing BackTrack 4 Pre Final in VMWARE
EDIT: There is a final version of BackTrack4 released, both an ISO image and a VMWare image. Also, backtrack is now distributed from www.backtrack-linux.org instead of remote-exploit.org. I suggest you to download and install the final VMware version. I have been using BackTrack3 so far for my ethical penetration testing tasks with great success. I […]
Who should be responsible for Computer Software Security?
Information security is not a technology problem. It is an economic problem and in order to improve information security we will have to correct the economic problem first. Let’s do this and all others will follow. The lack of security in computer software products costs us billions. We pay tons of money in information theft, […]