Main Area and Open Discussion > Living Room
Interesting "stuff"
TaoPhoenix:
Wired "caught up" with Mark Russinovich. While I'm sure some of you geniuses are just as good, of the "popularly known" analysts, he kept catching my eye for the ferocious detail of some of his blog entries. (Which read like Scorpion should! "So I ran my tool X, tracked the process ID's, searched for a four character string in hex, and then ran a comparison with the raw data dump of my low level disk indexing system that bypasses Windows..." End fake Gobbledygook).
And of course, he basically punched Sony PR in the nose by finding the rootkit.
Eventually he was too good to be left loose, so Microsoft kept adding zeroes to their offer until he accepted and went to work for them!
http://www.wired.com/2014/05/mark-russinovich/
I've used a few of his tools a couple of times myself. Here's the complete list of the old SysInternal tools (and at the top if you like all that stuff, there's a link for a "bundle" that has all of them rolled up.)
http://technet.microsoft.com/en-us/sysinternals/bb545027
Arizona Hot:
U.S. shuts down Silk Road 2.0 website, charges alleged owner
Whether DonationCoder is next depends on what Mighty Mouser has been doing. I wonder what he would be known as if he did this kind of thing?
Arizona Hot:
Police take down Dark Web markets around the globe
Around that same time, two researchers from Carnegie Mellon, Alexander Volynkin and Michael McCord, were preparing for a presentation at hacker conference Black Hat about work they’d done to easily “break Tor.” They were vague about the details but promised that their work wasn’t just theoretical: “Looking for an IP address for a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild.” In a summary of the talk on the conference website, the researchers claimed that it was possible to “de-anonymize hundreds of thousands of Tor clients and thousands of hidden services within a couple of months,” and that they would discuss examples of their own work identifying ”suspected child pornographers and drug dealers.”
--- End quote ---
How Did The FBI Break Tor?
Arizona Hot:
Interesting "stuff"
Things Nobody But Your Mom Can Say
Things Nobody But Your Mom Can Say - YouTube
Arizona Hot:
Interesting "stuff"
Burger Place Geography
Interesting "stuff"
Wal-Mart to Stretch Black Friday Over Five Days to Lure Shoppers
Walmart's 'new Black Friday' will be a 5-day event this year
Microsoft Fixes Bug in Windows - After 19 Years
Microsoft Corp issued patches on Tuesday to fix a bug in its Windows operating system that remained undiscovered for 19 years.
The bug, which is present in every version of Microsoft Windows from Windows 95 onward, allows an attacker to remotely take over and control a computer.
IBM Corp's cybersecurity research team discovered the bug in May, describing it as a "significant vulnerability" in the operating system.
"The buggy code is at least 19 years old and has been remotely exploitable for the past 18 years," IBM X-Force research team said in its blog on Tuesday.
http://www.nbcnews.com/tech/security/microsoft-fixes-bug-windows-after-19-years-n247191
--- End quote ---
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version