Info[SEC*] Redemp...
Follow
Find
3.4K views | +0 today
Info[SEC*] Redemption
Your new post is loading...
Your new post is loading...
Scooped by Chintan Gurjar
Scoop.it!

Ruby Hacking Guide | opexxx

Ruby Hacking Guide | opexxx | Info[SEC*] Redemption | Scoop.it
Ruby Hacking Guide on opexxx curated by alexander knorr (Ruby Hacking Guide | @scoopit http://t.co/AfLrqWbURN)
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Oh dear. Gmail misidentifies Adobe password reset message as spam

Oh dear. Gmail misidentifies Adobe password reset message as spam | Info[SEC*] Redemption | Scoop.it
Gmail, one of the world's most popular webmail providers, is blocking a bona fide security message from Adobe as spam. (Oh dear.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Prism and Tempora: the cabinet was told nothing of the surveillance state's excesses

Prism and Tempora: the cabinet was told nothing of the surveillance state's excesses | Info[SEC*] Redemption | Scoop.it
Chris Huhne: Was the Home Office deliberately misleading ministers by asking for powers that we now know GCHQ already had?
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Managed C++/CLI Programming: Part-1

Managed C++/CLI Programming: Part-1 | Info[SEC*] Redemption | Scoop.it
Managed C /CLI Programming: Part-1 http://t.co/P6WKt3MmdW
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Twitter / EddyWillems: No pictures, notes, press during ...

Twitter / EddyWillems: No pictures, notes, press during ... | Info[SEC*] Redemption | Scoop.it
RT @EddyWillems: No pictures, notes, press during @gcluley and Bob Burls talk #vb2013 about Operation Crossbill http://t.co/eEnPt85IbF
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Practical guide to StatsD/Graphite monitoring - Matt Aimonetti

Practical guide to StatsD/Graphite monitoring - Matt Aimonetti | Info[SEC*] Redemption | Scoop.it
Practical Guide to StatsD/Graphite Monitoring Engineers love to improve things. Refactoring and optimizations
drive us.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Carnal0wnage & Attack Research Blog: AD Zone Transfers as a user

Carnal0wnage & Attack Research Blog: AD Zone Transfers as a user | Info[SEC*] Redemption | Scoop.it
AD Zone Transfers as a user: The tired and true method for Zone Transfers are using either nslookup:nslookupls... http://t.co/tLPuZXzZkv
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources

Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | Info[SEC*] Redemption | Scoop.it
RT @pierre: Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport http://t.co/cHuybcqAIG
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

How SSL works tutorial - with HTTPS example

How SSL works by leadingcoder.This is a full tutorial how to setup SSL that requires client certificate for reference: http://www.windowsecurity.com/article... (RT @symantec: VIDEO ➽ How #SSL works http://t.co/PNbREDr9Ul...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Understanding Windows Internal Call Structure

Understanding Windows Internal Call Structure | Info[SEC*] Redemption | Scoop.it
Understanding Windows Internal Call Structure http://t.co/I4aVItNdN3
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Carnal0wnage & Attack Research Blog: Dumping a domain's worth of passwords with mimikatz

Carnal0wnage & Attack Research Blog: Dumping a domain's worth of passwords with mimikatz | Info[SEC*] Redemption | Scoop.it
Dumping a domain's worth of passwords with mimikatz: clymb3r recently posted a script called "Invoke-Mimikatz.... http://t.co/CIgMMFk8ow
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Anonymous claim Apple's Touch ID is linked to US surveillance

Anonymous claim Apple's Touch ID is linked to US surveillance | Info[SEC*] Redemption | Scoop.it
Anonymous have some big claims concerning Apple Touch ID system, claiming a connection between the technology and the US defense industry to claim it's just another step forward for state surveillance.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Full Disclosure: PRISM

Full Disclosure: PRISM | Info[SEC*] Redemption | Scoop.it
PRISM http://t.co/o0287RCyO8
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Distributed Nmap Port Scanning with a DNmap Megacluster - The State of Security

Distributed Nmap Port Scanning with a DNmap Megacluster - The State of Security | Info[SEC*] Redemption | Scoop.it
The legally dubious Carna Botnet and Internet Census 2012, took advantage of systems facing the Internet that were running Telnet with the username and password root:root.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Twitter / _cypherpunks_: Sandia National Laboratories ...

Twitter / _cypherpunks_: Sandia National Laboratories ... | Info[SEC*] Redemption | Scoop.it
RT @_cypherpunks_: Sandia National Laboratories Mobile Biometric Device Technology Study https://t.co/PitvuLgIat http://t.co/XWFjIytvDV
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

How The NSA Targets Tor - Slashdot

How The NSA Targets Tor - Slashdot | Info[SEC*] Redemption | Scoop.it
The Guardian has released new documents from Edward Snowden showing how the U.S. National Security Agency targets internet anonymity tool Tor to gather intelligence.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Attacking Tor: how the NSA targets users' online anonymity

Attacking Tor: how the NSA targets users' online anonymity | Info[SEC*] Redemption | Scoop.it
Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers (RT @0xabad1dea: Schneier. NSA’s backbone MITM system. Tor.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

GitHub wipes hand across bloodied face, stumbles from brutal DDoS beating

GitHub wipes hand across bloodied face, stumbles from brutal DDoS beating | Info[SEC*] Redemption | Scoop.it
Wouldn't have happened if you'd just used SVN, eh! (Lame: GitHub Was Massively DDoSed: http://t.co/yvFN7rm2Mj)
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Junkie - extendable sniffing framework : netsec

reddit: the front page of the internet (RT @r_netsec: Junkie - extendable sniffing framework - http://t.co/sJXGo0uoKX)
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

The IT Brand Is Broken - InformationWeek

The IT Brand Is Broken - InformationWeek | Info[SEC*] Redemption | Scoop.it
In order to repair IT's reputation, technology leaders need to understand the business and become the first choice of users, not the last.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

What Dropbox tells you about your IT department

What Dropbox tells you about your IT department | Info[SEC*] Redemption | Scoop.it
Remember when you rolled out an ERP system 10 years ago? Remember working to identify Super Users, the blessed few eager adopters who would champion the system within their own departments? Remember 'training the trainers'?
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Hacktivism: Means and Motivations … What Else?

Hacktivism: Means and Motivations … What Else? | Info[SEC*] Redemption | Scoop.it
Hacktivism: Means and Motivations … What Else? http://t.co/bdOAzwcP6S
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

grr - GRR Rapid Response is an Incident Response Framework - Google Project Hosting

grr - GRR Rapid Response is an Incident Response Framework - Google Project Hosting | Info[SEC*] Redemption | Scoop.it
RT @SharpeSecurity: Google's open source alternative to F-Response: http://t.co/ocUbpwxNfa
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Estonia: To Black Out an Entire Country – part one

Estonia: To Black Out an Entire Country – part one | Info[SEC*] Redemption | Scoop.it
Estonia: To Black Out an Entire Country – part one http://t.co/88Dcm8UBQx
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

From search to security: the five most important algorithms in tech

From search to security: the five most important algorithms in tech | Info[SEC*] Redemption | Scoop.it
Algorithms such as those run by Google are the brains of the internet, encrypting data and helping us navigate online (RT @Klose7: From search to #security : the five most important algorithms in #tech http://t.co/XOtB9whDIe)...
more...
No comment yet.