I'm Alice and I live with mmy husband and our three children in Frithelstock, in the NA
south part.... View More
About Me
Friends
The file size limit is 20 Mb. If your upload does not work, try uploading a smaller picture.
Niklas Garling
posted a blog.
August 28, 2018
225 views
pentest, http://pos.escada.co.kr/?document_srl=4523025&mid=EKO1108&listStyle=&cpage=. Some of you may be familiar with Fon and the Fon movement. Fon is a company that sells (used to give em out for free) wireless routers for a pretty cheap price. Catch is, you have to agree to share you internet via the wireless network made by the Fon router. Thanks to the Open Source community, alternative firmware is available. Among the choices are DD-WRT, OpenWrt, and Legend which are all Linux based. Although the flashing process is not easy, the payoff is worth it.
DD-WRT has a great interface which lets you control almost every setting. Unlike the default firmware that doesn't even include static DHCP entries, DD-WRT unlocks a full suite of network tools and functionality. It also comes with ipkg, a package installer which makes installing additional software a breeze. Speaking of additional software, aircrack-ng immediately came to mind. Good thing these new routers have an Atheros chipset or else packet injection would be useless. I installed and gave the aircrack-ng suite a whirl. Sniffing worked fine, but injection was a different story. As soon as I started sending packets, the console froze and the router rebooted. Unfortunately, DD-WRT didn't have the patched Mad-Wifi drivers required by aircrack-ng
After some searching, I ran across Legend. This is a different firmware based on the OpenWrt platform, but it claimed to support aircrack-ng and included patched Mad-Wifi drivers. I decided to give it a try and I'm glad I did. Aircrack was already installed and good to go after the flash. After running a few tests, I was able to fake associate and replay packets through my home AP! Instead of using the adapter that came with the Fonera, I modified it to receive power from a USB port. It would then be possible to connect to the Fonera through the onboard ethernet port. I tried injection while being wirelessly connected simultaneously, but as soon as I started the injection process, the router immediately locked up. Oh well, I can still use the Fonera like an external wireless card to perform my pentesting, not to mention it's essentially a very basic, but portable Linux box!
Be the first person to like this.
Niklas Garling
posted a blog.
August 27, 2018
136 views
searchmechaniks - http://www.kweighing.or.kr/qa/1829. By Stephen Jewkes and Oleg Vukmanovic
MILAN/LONDON, May 11 (Reuters) - Suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states, sources said, raising security concerns inside the West's main military alliance, NATO.
Lithuania, Latvia and Estonia, all members of NATO and the European Union, are on the political front line of tensions between the West and Moscow. The Baltics are locked into Russia's power network but plan to synchronise their grids with the EU.
Interviews with more than a dozen law-enforcement and private investigators, insiders and utility officials show hackers have quietly made incursions into Baltic networks over the past two years, in parallel with more serious attacks in Ukraine that plunged swathes of that country into darkness.
They say Russian state organisations are suspected of being behind the campaigns.
Reuters could not independently verify the sources' allegations.
At the end of 2015, hackers attacked an Internet gateway used to control a Baltic electricity grid, disrupting operations but not causing blackouts, a source familiar with the matter said. He declined to give details due to ongoing private investigations into the incident, which has not been previously reported.
The attack was a distributed denial of service (DDoS), where Internet gateways are bombarded with large amounts of data, a blunt but sometimes effective technique in an age when energy networks are being modernised with digital technology.
The source also said suspected Russia-backed hackers had targeted a Baltic petrol-distribution system at around the same time in an unsuccessful denial of service attack that aimed to cause widespread disruption in petrol deliveries.
The system coordinates deliveries from storage tanks to a network of petrol stations, the source added.
In a separate malware attack on another undisclosed Baltic grid, also around end-2015, hackers targeted network communication devices, serial-to-ethernet converters (STEC), which link sub-stations to central control, two other sources said. The attack did not cause service disruption, they added.
Though these three incidents date back 18 months or so, cyber security consultants are still investigating some of them. They say hackers can remain dormant and undetected inside systems. In Ukraine, hackers had infiltrated the grids there for about six months before the lights went out in December 2015, consultants said.
STECs were also targeted in Ukraine by the so-called Sandworm team, a Russia-backed group that had attacked energy companies in Western Europe and the United States in a campaign in 2014, several sources said.
The two sources with knowledge of the STEC attacks said they had detected the presence of Sandworm in the Baltics, but they did not give evidence for their suspicion. One of them said Sandworm was still active in the Baltic states.
"It's the same kind of slander as all the other similar accusations," Kremlin spokesman Dmitry Peskov said when asked by Reuters about the possible hacks.
Russia has never cut power flows to the Baltic states or threatened to do so.
TESTING TIMES
The NATO sources and utility officials said the Baltic attacks raised concerns that hackers could disable the region's energy networks just as they had done in Ukraine, where government troops have been battling pro-Russian separatists since 2014.
The first Ukraine attack caused crippling blackouts in some parts of the country lasting several hours.
NATO and cyber security experts believe hackers are testing the Baltic energy networks for weaknesses, becoming familiar with how they are controlled in order to be able to shut them down at will.
"On a daily basis there are DDoS attacks designed to probe network architecture, so it could well be possible that something (serious) could take place later on," a Brussels-based NATO official said, requesting anonymity because he was not authorised to speak publicly on the matter.
Lithuanian grid operator Litgrid said attacks on IT systems and the grid were constant but it had not seen DDoS attacks.
Litgrid maintains constant monitoring and runs regular tests to detect any cyber break-ins as part of its network defences, the utility said in an emailed statement.
Latvia's grid operator, AST, said it had not seen incidents in the last year. Estonia's Elering said only that it had not seen any attacks at the time of the Ukraine incursions in 2015.
A security official based in the Baltics said cyber attacks usually increased when Russia carried out large military exercises near its borders with the Baltic states.
Last month, NATO helped stage a cyber-security exercise in Estonia in which hundreds of cyber experts from around the world competed in teams to protect a fictitious military air base from attacks on, among other things, a power grid system.
In its 2017 national security threat assessment, Lithuania said hackers had launched large-scale DDoS attacks in April last year against state ministries and institutions, Vilnius airport, media and "other important Lithuanian cyber infrastructure".
"A major part of executed cyber attacks against the state sector of Lithuania in 2016 were associated with Russian intelligence," the report said, without giving details.
Lithuania's state-owned energy holding group, Lietuvos Energija, said it had encountered untraceable attacks like zero-day viruses, among others, which exploit hidden vulnerabilities. Lietuvos's businesses include power distribution.
"We do assume that we have adversaries who want to harm us," said Liudas Alisauskas, information security chief at Lietuvos.
Lietuvos runs drills to prepare for cyber attacks, including switching to manual operation of the grid, Alisauskas said.
In Ukraine, operators of older and technologically simpler networks were able to send workers out into the field to manually bring grids back up. This would be more difficult to achieve in modern, digitised networks, cyber consultants said. (Additional reporting by Andrius Sytas in VILNIUS, David Mardiste in TALLINN and Jack Stubbs in MOSCOW; Editing by Mark Bendeich and Andrew Roche)
Advertisement
Be the first person to like this.
Niklas Garling
posted a blog.
August 27, 2018
131 views
searchmechaniks - http://www.giovaniconnection.it/?option=com_k2&view=itemlist&task=user&id=3249993. How did a cache of cash and gold worth hundreds of crores, watched over by an imposing idol of the goddess Kali, purportedly disappear from a secret cellar at an Assam temple hours before the army was to recover it?
The Supreme Court has asked the Centre to unravel this tangled mystery and determine if the money, valuables, and four AK-47 rifles reached the hands of Left-wing extremists from organisations such as the ULFA or NDFB.
A bench headed by Chief Justice of India TS Thakur described as "startling" the disappearance of the Rs 300 crore in cash, 300kg of gold, and the guns from the shrine at a tea garden in the state's capital Dispur.
The Supreme Court has asked the Centre to look into the alleged disappearance of treasure from a Kali temple in Assam's Dispur, hours before the Army was to recover it. (Picture for representation only).
The court issued the instructions while hearing a PIL filed by Manoj Kumar Kaushal, a retired military intelligence officer. The petitioner has alleged that the stash was smuggled out of the temple by about a dozen individuals in connivance with the police.
"The matter must be pursued with the home ministry as he (Kaushal) was part of military intelligence, and please give a report by May 6," the bench told Additional Solicitor General Maninder Singh, who was representing the Centre.
Advocate Jaspreet Rai, who appeared for the petitioner, said the central government should constitute a special CBI team to investigate the matter.
Kaushal served in Assam from 2006 until 2009 when he retired from the intelligence wing of the Indian armed forces.
The northeastern state has a long history of ethnic conflicts and separatist rebellions, while tea plantation workers and owners often fall prey to guerilla attacks.
Rai said the owner of the estate was one Mridul Bhattacharya, who was president of Assam's tea garden association.
Bhattacharya reportedly collected money from proprietors of tea estates and gave it to the ULFA as protection money. He was also allegedly involved in the smuggling of gold from Myanmar. Bhattacharya and his wife were murdered about four years ago.
"I am worried that the treasure could have been used for illegal purposes and may pose a threat to the sovereignty of our country, Assam being a border state which has seen much turbulence in past decades," Kaushal contended.
He said an informer told him two years ago about the treasure hidden in a vault below the idol. An inquiry revealed that it was lying unclaimed after the mysterious deaths of Bhattacharya and his wife.
After being informed about the cache, the army decided to recover it on June 1, 2014. But when soldiers reached the spot, they were shocked to find a gaping hole and the treasure missing.
Kaushal visited the spot later, snapped photographs and gathered intelligence on possible suspects.
The petition named 13 people whose call records showed they were in touch with each other since the time the theft likely took place, and were diverting huge amounts of money through their bank accounts.
"It is clear that these people hatched the conspiracy and took the treasure out by digging a hole from outside the temple, which is clearly depicted in the photographs," Kaushal alleged.
The petitioner said that despite informing the state's inspector-general of police (law and order), he got no cooperation, and that gave rise to suspicions that top officials from the department were involved in the smuggling. He also offered his assistance to any team constituted to hunt for the missing treasure.
Advertisement Read more:
India News - Latest Headlines, Pictures and Videos | Daily Mail Online
Be the first person to like this.
Niklas Garling
posted a blog.
August 26, 2018
127 views
giuelith.com - http://www.giuelith.com/article.php?id=99902. WASHINGTON, May 24 (Reuters) - U.S. lawmakers, including some Democrats, will receive briefings from FBI and intelligence officials on Thursday on the FBI probe into Russian election meddling after President Donald Trump made unsubstantiated claims about an informant being used against him.
Two Republican lawmakers, and no Democrats, were expected to attend the first meeting to review classified information relating to a recent suggestion by Trump that the FBI might have used an informant to gather information on his 2016 election campaign.
A second briefing was scheduled for the Republican and Democratic leaders from the Senate and House of Representatives, known as the Gang of 8, according to a Justice Department spokeswoman.
White House spokesman Raj Shah said in an earlier statement that briefing would take place after the Memorial Day congressional recess. Memorial Day will be observed on May 28.
Senate Democratic leader Chuck Schumer on Wednesday described the plan to review classified information as highly inappropriate. He said such a meeting must include Democrats as a "check on the disturbing tendency of the president´s allies to distort facts and undermine the investigation and the people conducting it."
FBI Director Christopher Wray, Director of National Intelligence Dan Coats and Deputy Attorney General Rod Rosenstein were scheduled to attend both meetings, along with White House Chief of Staff John Kelly, according to the Justice Department.
The FBI was investigating whether anyone in Trump's campaign had worked with Moscow to influence the election outcome in Trump's favor. Federal Special Counsel Robert Mueller took over that probe in May 2017 after Trump fired FBI Director James Comey.
The New York Times reported that the person working for the FBI was used to get information from people in Trump's campaign about Russian hacking of Democratic emails, not to spy on Trump.
Trump's closest conservative allies in Congress have been clamoring for access to the classified documents. The lawmakers have accused the FBI and Justice Department of political bias against Trump in favor of his Democratic rival, Hillary Clinton, during his successful presidential campaign.
Those lawmakers include the two Republicans who will be briefed first on Thursday, Representatives Devin Nunes, chairman of the House Intelligence Committee, and Trey Gowdy, chairman of the House Oversight Committee. (Reporting by Sarah N. Lynch and Doina Chiacu; Editing by Bernadette Baum)
Advertisement
Be the first person to like this.
Niklas Garling
posted a blog.
August 25, 2018
121 views
In today's digital world, small, medium and big businesses are facing the biggest threats from hackers. Any computer hacking attack, if successful, can create a lot of problem to networks and in fact all the critical information stored in the various computers within the network. In the field of IT, there is a growing need for professionals having ethical hacking courses to work for them and provide security to their computers and networks. Known as white hat hackers or ethical hackers, these professionals are expert in the area of anti-hacking techniques. They work for preventing the motives of malicious hackers from stealing or damaging important data and ensure the safety and protection of computer systems and networks.
People with ethical hacking trainings work to provide security to IT systems. At times, if required ethical hackers can even break into any other system. But the reason for doing so must be a genuine one for the safety of an organization or company. In fact, both black hat hackers and white hat hackers do the same thing, but the major line of discrimination is that an ethical hacker has altruistic motivations.
There are many major threats and issues related to computer hacking that one must be aware of to understand Information Security in the true sense of the terms. Today there are many some basic threats that you may face as an individual or as an organization such as:
Theft of Passwords
E-mail based Threats
E-mail based Extortion
Launch of Malicious Programmes (Trojans)
Internet Time Theft
Here are some major corporate threats that needs to be handled by professionals having knowledge of ethical hacking and lots more:
Web Defacement
Corporate Espionage
Website based Launch of Malicious Code Cheating and Frauds.
Exchange of Criminal Ideas and Tools
Cyber Harassment
Forged Websites
Not only this, there are some also online threats that need to be also taken care of, such as:
E-mail Spamming
Theft of Software, Electronic Records, Computer Hardware, etc.
Cyber Stalking
E-mail Bombing
Morphing
Denial of Service Attacks
Apart from this, there are some other threats too related to computer hacking such as:
Theft of Information
Email Forgery
Theft of E-Cash, Credit Card Numbers, Online Banking Accounts etc.
Protecting your computer and network can be done by ethical hackers, but as far security is concerned, the first step is to secure the hardware on which all the valuable information is stored and by which it moves across the network. Basically, it means limiting who is able to actually touch the computer, and what a person can do with it if they do gain on-site access. To protect your computers, network, and data from all types of damage and loss that can be done through computer hacking, however physical security can make a lot of difference. Well in physical security, computers must also be properly protected from natural disasters and accidental damage in addition to deliberate acts.
If you have just about any queries relating to where by as well as how to employ searchmechaniks.ru, you'll be able to e-mail us with our web site.
Be the first person to like this.
Niklas Garling
posted a blog.
August 25, 2018
113 views
searchmechaniks, http://wiki.mozillabd.org/index.php?title=6-Trump_Now_President_Pledges_To_Put_America_First_In_Nationali.... The neglect that place your skin thru can be reversed. Considering your particular situation you can reverse neglectfulness. Radiant glowing skin is an option if begin now. Continue reading for solid tips and tricks to begin your journey to healthy glowing complexions.
Aged Gleam look for a long-term solution. Merchandise in your articles simply with regard to the first wrinkle cream you choose because it promises "fast results", then you might not achieve the wrinkle reduction you undoubtedly crave. Almost all of those quick acting anti-aging creams merely cover up wrinkles as opposed to actively critical smooth them out. The temporary wrinkle relief will cause you to feel good when looking in the mirror, become more serious . the associated with that cream wears off, the wrinkles will return and your self-esteem tend to be shot right back down. Mentioned all that, don't invest your hopes into short-term wrinkle remedies.
Use the sunscreens:-Use the sunscreens to guard your skin from the ultraviolet sunshine in the middle time of day. You also use the hat and also the big sunglasses for the protections of the eye skin and pores.
Be the first person to like this.
Niklas Garling
posted a blog.
August 25, 2018
105 views
Be the first person to like this.
Niklas Garling
posted a blog.
August 24, 2018
123 views
https://fr.wikiversity.org - https://fr.wikiversity.org/wiki/Enjoy_A_Slice_Of_Heaven_At_Holy_Kalkaji; By Alastair Sharp
TORONTO, June 5 (Reuters) - BlackBerry Ltd on Monday downplayed news that Toyota Motor Corp would adopt rival software for its future vehicle consoles, saying it was more focused on the faster-growing market for autonomous driving technology.
Automotive Grade Linux (AGL), a collaborative effort of some 100 technology companies and automakers, said last week that Toyota would start using its open-source software in Entune 3.0 consoles of its 2018 Camry sedans, before deploying it in most Toyota and Lexus vehicles sold in North America.
BlackBerry Chief Operating Officer Marty Beard said in a blog posting that he expected AGL - as well as regular Linux and Android - to take a share of the automotive infotainment market, where BlackBerry's QNX is a dominant supplier.
"None of these challenger platforms is close to displacing BlackBerry QNX in safety-critical modules, areas that are growing faster than infotainment in the modern software-defined car," Beard said in the blog post.
QNX is a leading supplier of software for consoles that deliver video, mapping, hands-free calling and internet services to vehicles, and is pitching for more business in the race toward autonomous driving.
QNX was not Entune's main platform, but it did supply some peripheral infotainment software, BlackBerry spokeswoman Sarah McKinney said.
She also said she was not sure whether QNX would continue to be used in new versions of Entune 3.0.
Toyota is the first major automaker to adopt AGL, a project started five years ago to develop standardized open-source software for the auto industry.
Christopher Rommel, head of embedded technology research at VDC Research, said that a Linux-based industry standard could threaten QNX's strong position in infotainment, but that the BlackBerry unit has a history in smaller scale, real-time auto applications where Linux would struggle to compete.
"There's boundaries to where OEMs (original equipment manufacturers) want to put Linux or can put Linux based both on its memory requirements as well and latency and deterministic constraints," he said.
AGL's more than 100 members include Toyota, Ford Motor Co , Honda Motor Co, Mazda Motor Corp, Mercedes-Benz, Nissan Motor Co, Suzuki Motor Corp and Subaru. Other members include chipmakers and auto suppliers.
QNX said in October that it was working with Ford to develop increasingly automated vehicles, and executives have said they are in advanced discussions with several other major global automakers about similar partnerships. (Reporting by Alastair Sharp; editing by Jim Finkle, Dan Grebler and G Crosse)
Advertisement
Be the first person to like this.
Niklas Garling
posted a blog.
August 24, 2018
138 views
https://fr.wikiversity.org, https://fr.wikiversity.org/wiki/Enjoy_A_Slice_Of_Heaven_At_Holy_Kalkaji. By Alastair Sharp
TORONTO, June 5 (Reuters) - BlackBerry Ltd on Monday downplayed news that Toyota Motor Corp would adopt rival software for its future vehicle consoles, saying it was more focused on the faster-growing market for autonomous driving technology.
Automotive Grade Linux (AGL), a collaborative effort of some 100 technology companies and automakers, said last week that Toyota would start using its open-source software in Entune 3.0 consoles of its 2018 Camry sedans, before deploying it in most Toyota and Lexus vehicles sold in North America.
BlackBerry Chief Operating Officer Marty Beard said in a blog posting that he expected AGL - as well as regular Linux and Android - to take a share of the automotive infotainment market, where BlackBerry's QNX is a dominant supplier.
"None of these challenger platforms is close to displacing BlackBerry QNX in safety-critical modules, areas that are growing faster than infotainment in the modern software-defined car," Beard said in the blog post.
QNX is a leading supplier of software for consoles that deliver video, mapping, hands-free calling and internet services to vehicles, and is pitching for more business in the race toward autonomous driving.
QNX was not Entune's main platform, but it did supply some peripheral infotainment software, BlackBerry spokeswoman Sarah McKinney said.
She also said she was not sure whether QNX would continue to be used in new versions of Entune 3.0.
Toyota is the first major automaker to adopt AGL, a project started five years ago to develop standardized open-source software for the auto industry.
Christopher Rommel, head of embedded technology research at VDC Research, said that a Linux-based industry standard could threaten QNX's strong position in infotainment, but that the BlackBerry unit has a history in smaller scale, real-time auto applications where Linux would struggle to compete.
"There's boundaries to where OEMs (original equipment manufacturers) want to put Linux or can put Linux based both on its memory requirements as well and latency and deterministic constraints," he said.
AGL's more than 100 members include Toyota, Ford Motor Co , Honda Motor Co, Mazda Motor Corp, Mercedes-Benz, Nissan Motor Co, Suzuki Motor Corp and Subaru. Other members include chipmakers and auto suppliers.
QNX said in October that it was working with Ford to develop increasingly automated vehicles, and executives have said they are in advanced discussions with several other major global automakers about similar partnerships. (Reporting by Alastair Sharp; editing by Jim Finkle, Dan Grebler and G Crosse)
Advertisement
Be the first person to like this.