report 2001
"sectool is a security tool that can be used both as a security audit as well as a part of an intrusion detection system. It consists of set of tests, library and textual/graphical frontend. Tests are sorted into groups and security levels. Administrators can run selected tests, groups or whole security levels. "
yet to be tested
"hcovert is a steganographic communications tool used to create a covert channel using a HTTP GET request to convey it's message to a webserver and webserver log parsing to retrieve the message. This tool will both send as well as recieve messages."
by cau - computer academic underground
"Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access."
by the cau - computer academic underground
"Daily news about computer crime, internet fraud and cyber terrorism"
linux with forensic tools, anti-vir/-rootkit/...-software.
some examples: ClamAV, rkhunter, wipe, Ftimes, sleuthkit
a testimonial about how internet censorship in China works and how the Golden Shield will face the Olympic Games
secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Its principal designer is Phil Zimmermann, the creator of PGP, the most widely used email encryption softw
research paper from 2001
White Hat - ?
Black Hat - hei-ke
Red Hat - hong-ke -->revolutionaries not criminals
--> Blue Hat - US (e.g. poison b00x)
see thedarkvisitor.com
- A network of some of the leading IT security blogs on the net. Vendors, analysts, users anyone blogging on security can be included. - A FeedBurner Network
"Tracking the history, organization, exploits and government affiliation if Chinese hackers"
Some experts hold that while International Humanitarian Law (IHL) includes no specific instruments regarding Information Warfare in the form of Computer Network Attacks (CNA), and although CNA is non-kinetic, humanitarian law is still relevant given its intrinsic purpose – to protect non-combatants and their property.
57 items | 69 visits
This is part of my research for my lates project: a survival-guide for cyber dissidence
Updated on Nov 26, 08
Created on Apr 24, 08
Category: Computers & Internet
URL: