Thursday, November 22, 2001

Hackers access Playboy.com's credit card data
Computer hackers broke into the Playboy Enterprises' Web site -- playboy.com -- gaining access to the credit card numbers of several customers, a company spokeswoman said Tuesday.

The company's technology team discovered the breach last weekend before the hackers sent threatening e-mails to the company's customers, said Playboy spokeswoman Laura Sigman. Consumers began alerting Playboy about the violation Sunday evening.
Firms warned of 'drive-by hackers'
Companies that use wireless technology to allow workers to log into networks throughout offices have been warned they could be laying themselves open to hackers.

The alert comes ahead of the scheduled signing in Hungary on Friday of a European convention that aims to unite about 30 countries in the fight against cyber-criminals.

Wednesday, November 21, 2001

OuterBrains 2K2 (a geek event)
What is OuterBrains ?

OuterBrains 2K2 is a party that brings together the hackers- and demo-scene. The hackers will have their hacking competitions and some nice seminars where the demo-scene people have their demos and related competitions. Three days non-stop action. More than 400+ people sharing ideas, tips, tricks, code, gfx, music and other digital information.
FBI software cracks encryption wall
MAGIC LANTERN installs so-called “keylogging” software on a suspect’s machine that is capable of capturing keystrokes typed on a computer. By tracking exactly what a suspect types, critical encryption key information can be gathered, and then transmitted back to the FBI, according to the source, who requested anonymity.
The virus can be sent to the suspect via e-mail — perhaps sent for the FBI by a trusted friend or relative. The FBI can also use common vulnerabilities to break into a suspect’s computer and insert Magic Lantern, the source said.
Magic Lantern is one of a series of enhancements currently being developed for the FBI’s Carnivore project, the source said, under the umbrella project name of Cyber Knight.

Tuesday, November 20, 2001

the-Cloak
The Cloak sits between your computer and any web sites you visit. It prevents the web sites you visit from finding out who you are. And it can use the standard SSL protocol to encrypt all communication from your browser, so that no one (except for the-Cloak) knows where you are surfing.
No Proxy
Free anonymous surfing!
Anti Censoring Section
Search For a Public Proxy: Search our Frequently Updated Database for Free Public Proxies.
Anonymity on the net: Hiding your real IP when using normal web applications ( Browsing - ICQ - IRC , etc )
Using Shell accounts.
Bypassing Proxy Restrictions (Do you wanna surf Blocked Pages?) Public Proxy Servers, and how to use them
Redirectors ( Redir - SSH , etc )
CGI Proxy Servers ( including how to build your own! )
Port Tunneling ( HTTP-PORT® )
Surfing the net through a shell account ( Lynx )
Bypassing ISP`s Port Blocks

Monday, November 19, 2001

Plan to Migrate to Advanced Encryption Standard
Once considered invulnerable, the Data Encryption Standard that secures many banking and e-commerce transactions has been cracked. Enterprises should switch to the Advanced Encryption Standard when feasible.
On the Security of PHP, Part 1
This article will provide you an overview of various security issues with PHP and offer advice on secure PHP programming practices.