Advanced Threats,...
Follow
Find
32.8K views | +330 today
Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Noriben: Your Personal, Portable Malware Sandbox

Noriben: Your Personal, Portable Malware Sandbox | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Noriben is a Python-based script that works in conjunction with Sysinternals Procmon to automat...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Google's Data Architecture and What it Takes to Work at Scale.

Google's Data Architecture and What it Takes to Work at Scale. | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Malte Schwarzkopf — currently finishing his PhD on “operating system support for warehouse-scale computing” at the University of Cambridge — has released a series of slides describing some of his research into large-scale, distributed data architectures. Schwarzkopf and his team at Cambridge Systems at Scale are aiming to build the next generation of software systems …
more...
Richard Platt's curator insight, August 30, 12:16 PM

Schwarzkopf and his team at Cambridge Systems at Scale are aiming to build the next generation of software systems for large-scale data centers. So it has been essential for him to understand how some of the current data giants are configuring their full stack at present, in order to build software for the next wave of businesses that grow with a need to work at a similar scale. Along the way, he has contributed to a number of open source projects including DIOS (a distributed operating system for warehouse-scale data centers that uses an API based on distributed objects); Firmament (a configurable cluster scheduler that looks to apply optimization analysis over a flow network); Musketeer (a workflow manager for big data analytics); and QJump (a network architecture that reduces network interference and provides latency messaging).   Schwarzkopf’s slide deck builds on his extensive bibliography into the Google stack.  His research finds that warehouse-scale computing (defined at 10,000-plus machines) requires a different software stack, all aiming to help increase the utilization of many-core machines, and allow fast, incremental stream processing and approximate analytics (like that offered by BlinkDB) on large datasets. (Many-core is a term meant to indicate a level of magnitude greater than multi-core.)   -   Schwarzkopf’s research spells out the three main characteristics that many of the largest data-driven companies like Microsoft, Twitter and Yahoo have in common with Google and Facebook:

*  “Frontend serving systems and fast backends.
*  Batch data processing systems.
*  Multi-tier structured/unstructured storage hierarchy.
*  Coordination system and cluster scheduler.”
In his presentation, “What does it take to make Google work at scale?” Schwarzkopf discusses the architecture behind those 139 microseconds between submitting a search request in the Google input bar, and the pages of ads-and-search results that are returned.

Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Symantec discovered 49 New Modules of the Regin espionage platform

Symantec discovered 49 New Modules of the Regin espionage platform | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Share it please ...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Firewall: Iptables Chains, New Defaults & Fail2Ban

Firewall: Iptables Chains, New Defaults & Fail2Ban | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
What programmers need to know about servers.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Linux Basics for the Aspiring Hacker, Part 26 (Apache Configuration)

Linux Basics for the Aspiring Hacker, Part 26 (Apache Configuration) | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Welcome back, my hacker novitiates! In an earlier Linux Basics tutorial, I had demonstrated the basics of the Apache web server. Since Apache is the world's most widely used web server on the Internet (as of July 2015, Apache was 38%, IIS was 26%, and Nginx is 15%), the more you know about it and understand it, the more success you are likely to have hacking it. In this tutorial, we will examine the basics of how the Apache server is configured. Like nearly every application in Linux or Unix, configuration is done with a plain text configuration file. Apache is no exception. As a result, we
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How To Use Maltego To Scan Network .

How To Use Maltego To Scan Network . | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Maltego, is a software developed for gathering information about target as much as possible. Easy to use, and also very helpful.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Sniffing Encrypted puTTY/Outlook credentials with Metasploit/NetRipper

Sniffing Encrypted puTTY/Outlook credentials with Metasploit/NetRipper | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
"NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

War by non-military means: Understanding Russian information warfare.+pdf.

War by non-military means: Understanding Russian information warfare.+pdf. | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it

Author: Ulrik Franke

City: StockholmPages: 60Publication year: 2015Publish date: 3/12/2015ReportNo: (FOI-R--4065--SE) 
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Deanonymization Made Simple - 0xAA - Random notes on security

Deanonymization Made Simple - 0xAA - Random notes on security | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
cbcf9dde327c475d99627c87f58cab7ac6689164bf2fe7734c10c78005ed118e == sha256(“[10.08.2015] I’ve discovered that about 2% of the known …
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Web Application Penetration Testing Methodology eBook - InfoSec Resources

Web Application Penetration Testing Methodology eBook - InfoSec Resources | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
34 Page eBook This comprehensive eBook dives deep into Penetration Testing Methodology, covering Security in the SDLC, Information Gathering, Vulnerability Testing, a breakdown of the OWASP Top 10, Risk Ratings/Assessment and Reporting. A live case study is conducted and the book is completely FREE! Click the button below for your free copy!  
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Different Types of Attacks Hackers Need To Know .

Different Types of Attacks Hackers Need To Know . | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Different Types of Attacks Hackers Need To Know
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Exploring The Secret World of the Darknet - 2015

Exploring The Secret World of the Darknet - 2015 | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Exploring The Secret World of the Darknet - 2015
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

XKeyscore: A Dubious Deal with the NSA

XKeyscore: A Dubious Deal with the NSA | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Internal documents show that Germany's domestic intelligence agency received the coveted software program XKeyscore from the NSA and promised data from Germany in return.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Docker: Installation and Basic usage on Ubuntu 15.04

Docker: Installation and Basic usage on Ubuntu 15.04 | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Docker is an open-source project that provides an open platform for developers and sysadmins to build, package, and run applications anywhere as a lig...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Server hijinks: Setting up your own VPN on OS X

Server hijinks: Setting up your own VPN on OS X | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
In the midst of my many travels, I decided it would, of course, be the perfect time to do some maintenance on my home server.

The server is a Mac mini that’s set up for a few different things: It holds my entire photo library, works as a media cen...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Creating the Ultimate Tor Virtual Network .

Creating the Ultimate Tor Virtual Network . | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Creating a virtual network that allows VMs to be transparently proxied through tor with zero configuration.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Cybercrime and Cybersecurity
Scoop.it!

All About Skimmers — Krebs on Security

All About Skimmers — Krebs on Security | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it

Via Oksana Borukh
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

25 Ways to Become the Ultimate Script Kiddie - InfoSec Resources

25 Ways to Become the Ultimate Script Kiddie - InfoSec Resources | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
You do not need to learn C, C++, C#, Python, Perl, PHP, Assembly and other computer programming languages since Kali, Parrot OS, and Backbox Linux have scr
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

There’s No Anonymity on the Internet .

There’s No Anonymity on the Internet . | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Where to Learn More — Related Resources and Educational Tools:
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

3 Ways to Keep Hackers out of your Smart Home

3 Ways to Keep Hackers out of your Smart Home | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Smart homes might be right around the corner, but are you and your neighbors really ready for them? While research from firms like Gartner project demand for IoT devices to skyrocket over the next ...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Katoolin, Automatically install all Kali Linux tools

Katoolin, Automatically install all Kali Linux tools | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Automatically install all Kali linux tools Features Add Kali linux repositories Remove kali linux repositorie Install Kali linux tools Requirements Python 2.7 An operating system (tested on Ubuntu)...
more...
totoro's curator insight, August 24, 5:10 PM

this is good!