Hacks/Cracks - Page 126
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Legendary hacking figure Captain Crunch is returning from years of relative obscurity to set himself up as a security consultant. Perhaps the most well known figure in the digital underground besides Kevin Mitnick, John Draper made his name in 1971 when . . .
The dust has settled from the frantic first week of Openhack III, with its heavy traffic and mass of DoS attacks. The second week saw a lot more stability in the site and a bit more frustration from serious hackers still . . .
The next wave of hacking schemes focuses on a vulnerable and extremely difficult area to defend: Web applications. Application hacks take advantage of vulnerabilities that normally occur in many HTML pages. A person hacking into a Web page could, for example, . . .
... there may be no tale so poignant as that of John T. Draper, the mythical "phone phreak" who became a national figure in 1971 after being one of the first to discover that a toy whistle in the Cap'n Crunch . . .
In a move that free-speech activists hope will be trendsetting, Internet service provider Verio is standing up to the movie industry by refusing to remove a Web site the Motion Picture Association of America says is illegal. Many ISPs, especially smaller . . .
Start with the basics. "No longer does a hacker have to huddle in front of a glowing monitor. Today's hacker has at his disposal a literal arsenal of fully automated tools, through which he can gain access to your system without . . .
Two French hackers, Julien Stern and Julien Boeuf, have broken the Secure Digital Music Initiative's watermarking scheme. However, being French, they (1) have declined to sign SDMI's nondisclosure agreement, and (2) are not subject to the Digital Millennium Copyright Act. So they have published their findings, both in French and in English. . . .
As a result, this easily avoidable problem has reached near-epidemic proportions. Making matters more frustrating is knowing that so many losses could have been easily avoided with a few mundane but crucial steps. "I would put patching in the top two . . .
A key ruling last October by the 9th U.S. Circuit Court of Appeals, located in San Mateo, Calif., affecting the home video game sector is having a direct impact on the entire software industry. The ruling, which upholds engineers' rights to . . .
Tonight the Attrition.org staff has mirrored one of the largest, most systematic defacements of worldwide government servers on the Web. The defacers, known as Pentaguard, took out various government Web sites from 3 countries - the United Kingdom, Australia, and the . . .
Still, the continuing spread of Ramen raises some serious questions about the ability of the open-source community to live up to its security boasts. Linux supporters have long claimed the transparent nature of open-source development produces more secure software and fixes . . .
The attack was one of the largest, most systematic defacements of worldwide government servers on the Web, Attrition.org said on its site. The sites were replaced with the hackers' logo and the message "presents... the largest .gov and .mil mass . . .
A group calling itself Pentaguard simultaneously cracked government websites in the United States, England and Australia. The group replaced the home pages of the sites over the weekend with a statement reading "The largest .gov & .mil mass defacement in the . . .
After infecting NASA and Texas A&M University last week, the worm--a self-spreading program that focuses on versions 6.2 and 7.0 of Red Hat's Linux OS--is making its move on Linux servers abroad, as vandals use the program to post digital graffiti.. . .
The battle has begun, and the first salvo was a fierce one, as a cascade of denial-of-service attacks swept over the Openhack III site in its first four days of operation. As of midday Thursday, no one had succeeded in any . . .
A computer glitch is being blamed for cutting off Web traffic headed for Yahoo.com and Microsoft.com on Saturday. For about 12 hours, thousands of Internet users trying to visit those two popular Web sites and dozens of others were instead sent . . .
The Internet world stood still this past summer when hackers launched denial-of-service attacks on Yahoo, Amazon and other high-profile Web sites, effectively shutting them down. Today, months after the attacks, the Internet is no better protected, security experts say. "A lot . . .
Two hot new weapons are "honey pots" and tracers. A honey pot is a fake server set up to trap the unwitting intruder. Once inside, an alarm is tripped and the hacker's every keystroke, method of entry and manner of attack . . .
Whistler's copy protection is by no means uncrackable, according to various of The Register's shady sources. The hardware-locked key system currently shipping with the Whistler beta seems to be fairly easy to get around, and the inconvenience of the system - . . .
When trying to infect Red Hat 6.2 systems, the worm will use the RPC.statd and wu-FTP flaws, according to an analysis completed by Daniel Martin, a Debian Linux developer. RPC.statd is one of several services that a Linux server can run . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.