Search the Community
Showing results for tags 'hack'.
Found 4 results
Hi all, Today the dutch goverment agreed with a new Law on Computer Criminality III. This gives the police the right to hack any device off a suspect, by using exploits, zero days and backdoors.. What kind of impact has this on the dutch servers of Air? And how can we protect us from being hacked. Sorry for my poor English! I will go to a English study after the holidays Source: https://www.telecompaper.com/news/dutch-parliament-to-vote-on-cybercrime-law-20-december--1176773 Source 2: http://www.zdnet.com/article/dutch-police-get-ok-to-exploit-zero-days-so-will-that-just-mean-more-surveillance/
I am using Eddie 2.11.3 in latest Mac OSX . I found there was continual overhead traffic from Eddie, no matter what protocol I am using. The traffic was triggered each 10 seconds and sized several hunderds KBits. I am worried about it because it looks like a malcilous activity. Is it a normal situation? What is the traffic about and used for? Attached my screen capture about the situation. Thank you in advance.
Hi, after the usual worrisome news, - http://thehackernews.com/2015/10/nsa-crack-encryption.html I have one question among others: They state 'Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.' So how do the renaming 8% update them? Also hos vpn providers can protect to some extent against this ? cheers
/dev/ttyS0 recently analyzed D-Link's DIR-890L and found a security issue which opens up the possibility of executing any code with privileges of system, i.e. root. The worst thing about it is: The firmware version was designed to patch three different vulnerabilities in connection with HTTP and UPnP... .. which were, well, not really closed. If you are using a D-Link router orif you are planning on buying one,scroll to the bottom of the post and see if your model is listed there. If so, you should really think about your habits or your choices, respectively. From what I understood, this can only be exploited in a local network. The truth is: If D-Link doesn't seem to care about exploits in local networks - do you really think they care about what's coming from the internet? You should really abandon the D-Link ship.