How codebreakers cracked the secrets of the smart card
The process was complex, time-consuming, and very expensive. This was not about a lone hacker sitting at a computer screen trying to guess passwords. Instead, it was an attempt to split the foundation stone supporting an entire industry - the technology protecting pay TV.
The challenge handed in the autumn of 1997 to a team of scientists working quietly at a laboratory in Haifa, northern Israel, was to crack the encryption technique used to unscramble TV signals delivered to many paying customers through cable and satellite across Europe and the US.
Thursday, March 14, 2002
Wednesday, March 13, 2002
FAQ: Network Intrusion Detection Systems
This FAQ answers simple questions related to detecting intruders who attack systems through the network, especially how such intrusions can be detected.
This FAQ answers simple questions related to detecting intruders who attack systems through the network, especially how such intrusions can be detected.
MRTG: The Multi Router Traffic Grapher
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing graphical images which provide a LIVE visual representation of this traffic. MRTG is based on Perl and C and works under UNIX and Windows NT.
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing graphical images which provide a LIVE visual representation of this traffic. MRTG is based on Perl and C and works under UNIX and Windows NT.
Tuesday, March 12, 2002
Laptop Computer Security
This paper discusses the issues surrounding laptop computer security and offers some basic approaches to securing laptops.
This paper discusses the issues surrounding laptop computer security and offers some basic approaches to securing laptops.
Hammer of God Utilities
Here are just a few of the utilities we have designed to enhance your pen-testing sessions. Go nuts.
Here are just a few of the utilities we have designed to enhance your pen-testing sessions. Go nuts.
Security Toolbox
The Security Toolbox is a collection of freeware tools related to Windows security. The tools are not based on anybody elses source code, and we will not give away the code or give explainations of how the tools are built, so please don't send any mails asking for either - we will ignore all such mails. Also, please note that using some of these tools against systems without permission from the system owner(s) may be illegal in your country! Although some of these tools can be used by unethical attackers we hope that these tools will do more good than bad overall.
The Security Toolbox is a collection of freeware tools related to Windows security. The tools are not based on anybody elses source code, and we will not give away the code or give explainations of how the tools are built, so please don't send any mails asking for either - we will ignore all such mails. Also, please note that using some of these tools against systems without permission from the system owner(s) may be illegal in your country! Although some of these tools can be used by unethical attackers we hope that these tools will do more good than bad overall.
Monday, March 11, 2002
Subscribe to:
Posts (Atom)