Tor allows you to anonymity online. It protects your privacy and defend yourself against network surveillance and traffic analysis.
The setup of Tor is very complicated and sometimes you will fail to make it to work. The most easy way is to download Tor Browser. However, it has some limitations and the main problem is that it is for web browsing only.
The drawback of using Tor is the speed. It is quite slow as the traffic passes a lot of nodes in order to hide your IP address and traffic. Your IP will be changed every 10 minutes. The IP is not belonged to your home country.
Learn more about Tor.
I created a Torified Ubuntu VPN Server in order to overcome some limitations of Tor but except the speed. It is still under heavy development. The final product will be released soon.
Update
NightHawk - Torified Ubuntu VPN Server is released on August 3, 2012. You can download it at official site.
NightHawk in Action
Installation and Configuration
That's all! See you.
Open Source is a great idea and it has changed the world!
Open Source forever ....
While you do not know attack, how can you know about defense? (未知攻,焉知防?)
Do BAD things .... for the RIGHT reasons -- OWASP ZAP
It is easier to port a shell than a shell script. -- Larry Wall
Most of you are familiar with the virtues of a programmer. There are three, of course: laziness, impatience, and hubris. -- Larry Wall
为天地立心, 为生民立命, 为往圣继绝学, 为万世开太平。 -- 王炜
Tuesday, July 31, 2012
Sunday, July 29, 2012
The Corrs - Full acoustic concert
00:23 Only When I sleep
04:55 What Can I do?
09:48 -Radio
14:25 Toss The Feathers
17:56 Everybody Hurts
23:50 Dreams
27:48 Runaway
32:40 Forgiven, Not Forgotten
38:00 At Your Side
43:00 Little Wing
48:00 No Frontiers
52:48 Queen of Hollywood
57:40 Old Town
1:01:00 Lough Erin Shore
1:05:38 So Young
Labels:
The Corrs
The Corrs - What Can I Do
Lyrics
I haven't slept at all in days
It's been so long since we've talked
And I have been here many times
I just don't know what I'm doing wrong
What can I do to make you love me
What can I do to make you care
What can I say to make you feel this
What can I do to get you there
There's only so much I can take
And I just got to let it go
And who knows I might feel better
If I don't try and I don't hope
What can I do to make you love me
What can I do to make you care
What can I say to make you feel this
What can I do to get you there
No more waiting, no more aching
No more fighting, no more trying
Maybe there's nothing more to say
And in a funny way I'm calm
Because the power is not mine
I'm just gonna let it fly
What can I do to make you love me
What can I do to make you care
What can I say to make you feel this
What can I do to get you there
Love me
Labels:
The Corrs
Saturday, July 28, 2012
VEGA - Web application vulnerabilites scanner
Vega is an open source platform to test the security of web applications. Vega can help you find and validate SQL Injections, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.
That's all! See you.
That's all! See you.
Labels:
SQLi,
web scanner,
XSS
Get Windows systems password without hash decyption
Almost all the Windows system versions are affected. The following video is not made by me and it shows you how.
That's all! See you.
That's all! See you.
Friday, July 27, 2012
Why you need to learn hacking skills?
System Administrator and Programmer can be an Ethical Hacker too, not just only Penetration Tester.
Ethical Hackers and Hackers are speaking the same language, using the same tools and playing the same game.
Learn to hire a thief to try to steal something but don't hire a cop.
That's all! See you.
Ethical Hackers and Hackers are speaking the same language, using the same tools and playing the same game.
Learn to hire a thief to try to steal something but don't hire a cop.
That's all! See you.
Labels:
penetration tester,
programmer,
sysadmin
Wednesday, July 25, 2012
Enterprise WiFi Worms, Backdoors and Botnets for fun & profit
Windows 7 has a feature to create a Wifi access point on your laptop. Hackers will take advantage this feature to leverage to compromise your networks by mean of worms and/or backdoors with social engineering technique to build a botnet.
Vivek Ramachandran is going to show you the concept and how it works.
That's all! See you.
Vivek Ramachandran is going to show you the concept and how it works.
That's all! See you.
Saturday, July 21, 2012
Revolution OS
What is GNU? What is Open Source? What is Linux and how it grows?
Want to know? Just watch this video.
That's all! See you.
Want to know? Just watch this video.
That's all! See you.
Labels:
Linux
Web Warriors
This is another a little bit out-dated video (around the year of 2003) that worth to watch.
This video is talking about virus and the damage. The victims are almost Windows systems. The video also talking about botnets and DDoS. They also think that some powerful virus are created by China.
By the way, this video also introduces what is Black Hat, Grey Hat and White Hat.
That's all! See you.
This video is talking about virus and the damage. The victims are almost Windows systems. The video also talking about botnets and DDoS. They also think that some powerful virus are created by China.
By the way, this video also introduces what is Black Hat, Grey Hat and White Hat.
That's all! See you.
Labels:
Botnet
Hackers : Outlaws and Angels
This an inside story about hackers on the both sides - outlaws and angels which is talking about hackers (White Hat and Black Hat). It is a bit out-dated (around the year of 2002) but it is still worth to watch, in my opinion.
Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
"Learn to hire a thief to try to steal something, don't hire a cop." (at 16:50)
"The battle between the angels and outlaws seem sat to continue. But hackers on the both sides know that like many conflicts, they between both of the people speak the same language, use the same tools and play the same game." (at 47:58)
That's all! See you.
Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
"Learn to hire a thief to try to steal something, don't hire a cop." (at 16:50)
"The battle between the angels and outlaws seem sat to continue. But hackers on the both sides know that like many conflicts, they between both of the people speak the same language, use the same tools and play the same game." (at 47:58)
That's all! See you.
Friday, July 06, 2012
NEWS : Latest message from LulzSec
I think someone out there should heard about LulzSec.
The below statement is copied from Wikipedia :
"Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline."
The following is believed to be the latest message from LulzSec :
LulzSec: All your base are belong to us
Just for information. Nothing else.
That's all! See you.
The below statement is copied from Wikipedia :
"Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline."
The following is believed to be the latest message from LulzSec :
LulzSec: All your base are belong to us
Just for information. Nothing else.
That's all! See you.
Labels:
Hacktivism,
LulzSec
Subscribe to:
Posts (Atom)