Friday, July 27, 2012

Meet 'Rakshasa,' The #Malware Infection Designed To Be Undetectable And Incurable - #Rakshasa

Malicious software, like all software, gets smarter all the time. In recent years it’s learned to destroy physical infrastructure, install itself through Microsoft updates, and use human beings as physical “data mules,” for instance. But researcher Jonathan Brossard has innovated a uniquely nasty coding trick: A strain of malware that’s nearly impossible to disinfect.
At the Black Hat security conference in Las Vegas Thursday, Brossard plans to present a paper (PDF here) on “Rakshasa,” a piece of proof-of-concept malware that aims to be a “permanent backdoor” in a PC, one that’s very difficult to detect, and even harder to remove.

Monday, July 23, 2012

iPhone 5 production begins in #Shanghai , says report - #iphone5 #apple #iphone

iPhone 5 production reports are rolling in from Asia with more frequency. This time, a Taipei-based report claims that Pegatron has started making the next iPhone.
The Taiwan-based manufacturer has begun production of a new version of the iPhone at its factory in Shanghai, according to Digitimes, citing "industry sources in Taiwan."

Sunday, July 22, 2012

16-university consortium expands #free , online #IT course offerings

Along with the original institutions as part of Coursera -- Stanford University, University of Pennsylvania, Princeton University and the University of Michigan — Coursera is also partnering with Johns Hopkins University, University of Toronto, University of Illinois, University of Washington, CalTech, Rice University, Duke University, University of California San Francisco, University of Virginia, Georgia Institute of Technology, University of Edinburgh, and Ecole PolyTechnique Federale de Lausanne.

Friday, July 20, 2012

Know you Hash #password #encryption

Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual hash.
Notes: [1] [2]

Domain Cached Credentials
Example: Admin:b474d48cdfc4974d86ef4d24904cdd91
Used for caching passwords of Windows domain.
Length: 16 bytes.
Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($userna me)))
Note: [1]

Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/
Used in Linux and other similar OS.
Length: 34 characters.
Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.
Notes: [1] [2]

Internet Explorer #troll Face

Salammusik - Play Some Reggae Musik (Official #Music #Video )

Wednesday, July 11, 2012

Someone Like You - [Walk off the Earth] - Adele Cover

Somebody That I Used to Know - Walk off the Earth (Gotye - Cover)

Palaestra Training Modules: Cisco CCNA 640-802


English | ISO | 2.11 GB
Genre: Video Training

Cisco's CCNA certification is one of the most popular certifications in the IT industry for good reason. It translates to higher visibility, higher salaries and increased job opportunities. Palaestra Training's Cisco CCNA Training Videos provides expert, real-world computer based training instruction. IT Certification Training in a Computer Based Training format that enables a person to get trained and certified quickly; for a fraction of the cost of traditional classroom instruction.