Latest Articles: Computers-Hacking
Romney investment in voting machines uncovered (hanging chads & butterfly ballots obsolete)
Post Date: 2012-10-22 14:35:12 by hondo68
In the last debate Romney and Obama briefly sparred over their investment portfolios and the nefarious line items that may appear therewhen Romney asked Obama if he was sure he didnt have investments in Chinese firms, Obama dodged it by making a joke and saying his pension report sheet isnt as long as Romneys.It was funny, but it also touched on a disturbing reality: When you get someone as rich as Romney their money becomes like a Russian nesting doll, with investments hidden under subsidiaries of private equity firms, offshore accounts and blind trusts. Keeping track of its influencefollowing the money, so to speakcan become ...
Every email, text msg, phone call, bank transaction collected by NSA
Post Date: 2012-09-01 10:56:44 by whyofcourse
Video Op-Doc: The Program (Stellar Wind)
Piratebay soon available on 18,446,744,073,709,551,616 addresses?
Post Date: 2012-06-22 09:24:16 by A K A Stone
Blocking the Piratebay seems the latest hobby of legislators around Europe. In the UK, the Netherlands, Belgium and Finland, the Piratebay has to be blocked by ISPs. Blocking is done by removing the Piratebay from the ISPs DNS system or by even blocking the IP addresses the Piratebay is running on. Recently the Piratebay already showed it wasnt impressed by that, by simply making the site available on another IP and by just increasing a number (from 126.96.36.199 to 188.8.131.52). However the internet has a shortage of these kind of IP addresses. The current IP address system is IPv4 and with only 4 billion addresses available, these IPv4 addresses are running out. So ...
How Flame Virus Has Changed Everything For Online Security Firms
Post Date: 2012-06-18 12:51:13 by Brian S
Heres a question: if you connect an unprotected Windows computer to the internet, how long will it take before it is infected by malicious software? The answer is: much more quickly than most lay users think. In 2003, the average time was 40 minutes. A year later it was 20 minutes. By 2008 an unpatched computer running Microsoft Windows XP could only expect five to 16 minutes of freedom. The Internet Storm Centre (ISC) provides a useful chart of what it calls survival time for Windows machines. It suggests that a PC currently can expect between 40 and 200 minutes of freedom before an automated probe reaches it to determine whether it can be penetrated. The numbers for ...
Pentagon sets up fast track for buying cyber war tools
Post Date: 2012-04-14 00:52:02 by hondo68
WASHINGTON (Reuters) - The Pentagon is establishing a fast-track acquisition process that would enable it to develop new cyber warfare capabilities within days or months if urgently needed, the Defense Department said in a report to Congress.The process, which would be overseen by a new senior-level Cyber Investment Management Board, aims to streamline the sluggish traditional defense acquisition process to meet the rapid pace of events in cyberspace, the 16-page report said.Congress, in defense legislation enacted last year, directed the Pentagon to develop a strategy that would enable it to speedily acquire cyber warfare tools, applications and other capabilities. The Pentagon sent a ...
Live Broadcast TV, meet the Internet. Finally.
Post Date: 2012-03-06 23:01:29 by A K A Stone
Really? Wow. Imagine the antenna on your roof or rabbit ears on your TV was somewhere you never had to see them. Aereo makes that possible. Heres how: 1. We made the TV antenna unbelievably small So small it fits on the tip of your finger. But it still gets awesome HD reception. 2. We connected these antennas to the Internet We engineered a way to put tons of these antennas in data centers, along with massive amounts of storage and super-fast Internet connections. 3. We give you control We built a simple, elegant interface to let you control your antenna. Through the Internet. With any device you want. All without cords, cables, or boxes.
The Little White Box That Can Hack Your Network
Post Date: 2012-03-04 17:39:05 by A K A Stone
When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful. Dressed like a technician, Street walked in and said he was there to measure power fluctuations on the power circuit. To do this, hed need to plug a small white device that looked like a power adapter onto the wall. The power fluctuation story was total bullshit, of course. Street had been hired by the bank to test out security at 10 of its West Coast branch offices. He was conducting whats called a penetration test. This is where security experts pretend to be bad guys in order to spot problems. In this test, bank ...
IMPORTANT STUFF: How to delete your Google Browsing History
Post Date: 2012-03-03 10:22:17 by buckeroo
Mozilla Introducing Collusion Discover who’s tracking you online
Post Date: 2012-02-29 17:02:56 by A K A Stone
Collusion is an experimental add-on for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers. https://addons.mozilla.org/en-US/firefox/addon/collusion/
Anonymous took down cia.gov
Post Date: 2012-02-10 19:52:25 by hondo68
Traditionally known as FuckFBIFriday, this weekend's eve turned into FuckCIAFriday, as hacktivists downed the official website for the Central Intelligence Agency of the United States cia.gov. At approximately 3:10 p.m. Eastern time one of twitter accounts related to the hackers' group announced "cia.gov DOWN. #UMAD?#Anonymous." The CIA website became the latest victim in a series of attacks conducted by the elusive group of hackers against US law enforcement agencies and copyright holders. As RT reported earlier, Anonymous took credit for crashing the websites of the US Department of Homeland Security, which was quickly revived, and the FBI.The CIA seems to be less ...
Father Shoots Daughter's Computer For Disrespectful Facebook Post
Post Date: 2012-02-10 09:53:14 by Happy Quanzaa
6:59 a.m. EST, February 10, 2012 YouTube - A gun-toting father gives his daughter a lesson in respect after finding a disrespectful Facebook post that she wrote about her family. The father actually shoots his daughter's computer. Now his actions are getting mixed reviews. Warning: language and content may not be appropriate for young viewers
Intro: Cleanliness is Next to Godliness: Browser cookies
Post Date: 2012-02-09 20:46:51 by buckeroo
Intro: Cleanliness is Next to Godliness: Browser cookies We often think of the above expression as a method of keeping mind, body, soul, heart, word and deed in a state of salvation (from a western cultural perspective) or a state of nirvana (from an eastern cultural perspective) in an effort to identify ourselves with a Creator or perhaps called a Supreme Being. In all cases of the above expression, some computer users leave the cleanliness of a computer to pure happenchance or at best an archaic process of deleting a file or a cache memory which is not much more than having your dawg lick a plate after dinner and subsequently placing the plate back on the shelf ...
Maryland Fusion Center Criminal Use of Police Scanner Apps and RadioReference.com
Post Date: 2012-01-05 14:08:47 by Brian S
This bulletin was originally published on RadioReference.com by users of the site. Maryland Coordination and Analysis Center Criminal Use of Police Scanner Apps3 pagesFor Official Use Only Law Enforcement SensitiveDecember 9, 2011 (U//FOUO//LES) During several recent contacts with criminal gang members, an identified Maryland law enforcement agency has heard their radio transmissions broadcast over a suspects smartphone. In one incident, officers pursuing a suspect on foot overheard the suspect listening to the pursuing officers radio transmission over a smartphone. The radio broadcasts of the agencys primary secure law enforcement channel had an approximate delay of ...
Firefox Add-On Bypasses SOPA DNS Blocking
Post Date: 2011-12-21 11:37:35 by A K A Stone
The pending Stop Online Piracy Act (SOPA) continues to inspire opponents to come up with creative solutions to circumvent it. A new anti-SOPA add-on for Firefox, titled DeSopa, is such a counter measure. When installed, users can click a single button to resolve a blocked domain via foreign DNS servers, bypassing all domestic DNS blockades and allowing the user to browse the site though the bare IP-address (if supported). I feel that the general public is not aware of the gravity of SOPA and Congress seems like they are about to cater to the special interests involved, to the detriment of Internet, for which I and many others live and breathe, DeSopa developer T ...
Review: Kindle Fire a worthwhile bargain
Post Date: 2011-11-18 19:11:22 by A K A Stone
(CNN) -- If you view a tablet as a guilty pleasure, like I do, then buying the Kindle Fire should make you feel a little less guilty. Amazon's new device doesn't replace a computer for doing e-mail or composing documents, but it's a fun hub for personal entertainment. And at $199, Amazon has managed to greatly undercut the price of Apple's iPad, the dominant tablet, and still churn out a good product. Apple calls its iPad "a magical and revolutionary product at an unbelievable price." Consider now that for the iPad's $499 price tag, I could buy two Kindle Fire tablets and still have cash left over for downloading apps and movies. Fact Box Gadget Review: ...
Google vs. Microsoft: Not All Clouds Are Created Equal
Post Date: 2011-11-16 18:45:12 by A K A Stone
MOUNTAIN VIEW, Calif. Amit Singh defected to Google after 20 years at Oracle because he wanted to join the revolution in the cloud. In May, he took over Googles enterprise operations, overseeing the companys effort to replace traditional business software with new-age web services such as Google Apps and Google App Engine. Since his move, Oracle has uncloaked its own cloud services. But for Singh, thats a little different. I dont know what there is about Oracles cloud that is really the cloud, he told Wired.com this week. [Oracle CEO] Larry [Ellison] has never been a big supporter of the cloud. Hes recently made some ...
Post Date: 2011-11-12 09:08:15 by A K A Stone
Autoruns is an utility that shows all the programs that are configured to run in login. The utility lists autorun programs from your Startup folder, Run, RunOnce and other Registry keys. You'll be able to view the autoruns in the order Windows processes them and exclude Windows programs from the list to view only third party software. The downloadable package contains both the standard GUI version and the Autorunsc command-line version which is able to output in CSV format. www.afterdawn.com/softwar..._id=1610&version_id=40182
Firefox 8 Final now available for download
Post Date: 2011-11-06 18:20:26 by A K A Stone
Download here for Windows www.afterdawn.com/softwar...s/firefox.cfm#description
FBI Investigating Possible US Murdoch Hacking Case
Post Date: 2011-10-14 17:52:30 by Skip Intro
Auto Hide IP v184.108.40.206
Post Date: 2011-09-05 18:07:42 by A K A Stone
Auto Hide IP allows you to hide your real IP to protect your privacy automatically on the Internet. Auto Hide IP enables you to surf anonymously and automatically change your IP address every few minutes. With it, you are able to conceal your identity online by showing them a fake IP, preventing identity theft and hacker intrusions, all with the click of a button. You can also select fake IP from different countries via Choose IP Country option and can Check IP directly. www.afterdawn.com/softwar...ty_tools/auto_hide_ip.cfm
SaturdayNightMusickClasick: Now We Are Free by Lisa Gerran and Hans Zimmer
Post Date: 2011-08-06 23:29:08 by buckeroo
FBI Targets 12 In Koch Industries Online Assault (Leaked FBI affidavit)
Post Date: 2011-07-30 22:33:37 by hondo68
JULY 26--As part of its multi-front assault on Anonymous, the FBI has identified 12 targets it alleges participated in coordinated online assaults earlier this year against business web sites operated by Koch Industries, the Kansas-based conglomerate owned by billionaire brothers--and leading Republican benefactors--Charles and David Koch, The Smoking Gun has learned. Details of the ongoing criminal investigation are contained in a confidential FBI affidavit obtained by TSG. That document, excerpted here, includes the names, addresses, and IP numbers of a dozen U.S. residents who are subjects of the federal probe of a series of distributed denial of service (DDoS) ...
Feds Indict Hacktivist For “Stealing” Public Domain Data
Post Date: 2011-07-20 12:33:27 by hondo68
Activist Aaron Swartz The government is going out of its way to create show trials in order to make the case that hackers are out of control and threaten our national security. The latest propaganda effort coincides with so-called cyber security legislation floating around the district of criminals. Coinciding with the ludicrous assertion by the government that hackers will take down the power grid and pitch the country into the Stone Age, the DOJ and FBI have arrested more than a dozen people in the PayPal Ddos case. Now they are going after a hacker who stole non-profit public domain documents. They want to throw him in prison for 35 years. A number of companies claim they are ...
Free Service Shields Online Communications From Surveillance
Post Date: 2011-06-22 19:06:17 by Brian S
SAN FRANCISCO A free service launched on Wednesday called PrivateSky lets Internet users shield email, Facebook updates, and other online exchanges from hackers or other unwanted snoops. The service from startup CertiVox comes as hackers appear to be rampaging through the Internet, cracking defenses at companies, attacking public websites, and tricking their way into email accounts to spy on contents. PrivateSky works with Internet Explorer (IE) browsers to provide encryption for whatever people type into message boxes and decodes it only for those they chose. Users highlight blog posts, Facebook updates, email messages or other text then indicate who should be allowed to read ...
Latest [Newer] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [Older]