Monthly Archives: October 2010

Cause mayhem! Bleat like Firesheep for security!

Have you had your identity stolen yet? It sure isn’t fun. And you were not the only one. Did you get through to and were you supported by the developer of the site? Likely not. Maybe you got your account restored. Maybe you were made to think it was in your power, your responsibility, and you had just been a dummie user?

A first solution exists to prevent the easy sidejack, but does not seem to get through. Many web sites still leave its users wide open to identity theft.
Sidejacking is common, and you can help raise awareness on it by causing some mayhem, without actually stealing identities

Advertisements

Stuxnet: Re-define standalone

Erwin Wurm: House attack

Image by Dom Dada via Flickr

Supposedly, Stuxnet was using not just one, but four XP zero-day exploits that allowed it to spread from computer to computer, typically via USB sticks. Lots of predators jumped into the fray offering XP users tools to clean their systems with. Mostly at a price, of course. But only Siemens systems were under attack. Warnings went out to not just remove it from Siemens systems as the PLC code might still contain hidden commands. Advice was to restore the system from a secure backup. Next, more people jumped in to warn us all about the upcoming cyber wars.
Cyber wars???

Hello world!

A simple history of the evolution of unix. Cat...

Image via Wikipedia

If we dispel ignorance, we dispel suffering. Half of learning to “hack to learn” is learning a system from the inside out, and most internet servers run either Unix or Linux, because it still is the much better system for that. Even more now.

By re-reading anything and everything I can get my hands on related to hacking and Unix and Linux systems, experimenting and exploring, and sharing my adventures with that in this blog. I can help dispel gullibility and ignorance!
If only my own …