public marks

PUBLIC MARKS with tag hacking

June 2008

The Usability of Passwords - Baekdal.com

by ghis & 5 others
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms.

May 2008

Senuti | fadingred.org

by simon_bricolo & 3 others
Unlock your iPod with Senuti, a simple application that allows you to transfer songs from your iPod to your computer

April 2008

March 2008

Burn a DVD on Your Mac | wired.com

by simon_bricolo
step-by-step for duplicating a video DVD using free and pay-for software.

Cold Boot Attacks on Encryption Keys - Center for information technology policy

by rike_
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

February 2008

Le hacking, toute une histoire : Hacking : les 15 plus gros piratages de l'histoire

by kasi77
La fin des années 70 et le début des années 80 ont été fortement marqués par l’arrivée des ordinateurs personnels. La machine électronique de travail a peu à peu perdu en volume, au point de s’introduire dans les foyers. L’informatique devient alors tellement populaire qu’on donne à ces ordinateurs le nom de PC (pour Personnal Computer, ou ordinateur personnel).

DNS2TCP

by rike_
Dns2tcp est un outil permettant d'encapsuler des sessions TCP dans des paquets DNS. Aucun pilote spécifique, tel que TUN/TAP, n'est nécessaire pour le faire fonctionner. Ceci permet de le différencier des outils classiques qui encapsulent IP dans DNS. De plus, le client ne nécessite pas de droit particulier pour être lancé. L'encapsulation TCP génère des paquets DNS plus petits autorisant ainsi des débits plus importants.

January 2008

SocGen trader's resume (Dealscape)

by night.kame

WORK EXPERIENCE

Societe Generale S.A., Paris, France

Trader and Market Maker for Delta One Products

March 2004 - Today

[...]

Development of managing tools (Excel VBA macro)

Societe Generale S.A., Paris, France

Trader Assistant - Basket Trading and Delta One Products

August 2002 - February 2004

[...]

Process automation and managing tools development

Societe Generale S.A., Paris, France

Middle Office - Referential Team

August 2000 - July 2002

Products modeling

Process automation

Excel macro Development for the exotic Desk

Participation to the single referential project

[...]

SKILLS

[...]

Microsoft Office Package - Visual Basic

La Société Générale a été mise en déroute par un seul homme, qui a déjoué tous les processus de contrôle, validation et supervision de la première banque d'Europe. Ses armes : Microsoft Excel et Microsoft Visual Basic for Applications. Anthony WYAND, ex-Aviva, ex-Lehman Brothers, et président du Comité d'Audit à la Société Générale, doit être extrêmement satisfait des performances de son service : sans doute des fonctionnaires.

Ophcrack

by jdrsantos & 14 others
Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well a

e107Hacks.org: News

by jdrsantos
home of hacking the e107 code base. For those who have come looking for ways to hack into other e107 sites, we are sorry to disappoint, but that's not what we're about! We are here to provide ways to insert code into your own site to enhance your users' e

December 2007

Bluetouff's Blog - Social Hacks 2.0

by bluetouff
Petit blog perso : open source, admin, système de gestion de contenu Unix & life

PUBLIC TAGS related to tag hacking

ajax +   apple +   code +   computer +   computing +   crack +   cracking +   css +   design +   development +   dhtml +   fon +   free +   guide +   hack +   hacks +   howto +   html +   internet +   java +   javascript +   library +   linux +   network +   networking +   password +   passwords +   php +   programming +   reference +   resources +   scripts +   security +   sécurité +   software +   sysadmin +   technology +   tips +   tools +   tutorial +   tutorials +   utilities +   video +   web +   webdesign +   wep +   wifi +   windows +   wireless +   xss +