Category Archives: Week 20

Google image search can execute malicious code

During my monitoring of the feeds from my local CERT group, I found a reference to vulnerability in Google Images Search that allows remote code execution. The CERT bullitin (Danish) The suggested solutions is to use the no-script plug-in to your … Continue reading

Posted in IT Security, Week 20 | Leave a comment

Use firewall software like PF to protect your desktop systems

This article is about PF firewall, and it can protect users’ desktop systems. It is called ‘ Packet Filter’, and it used in UNIX LIKE systems. The purpose of PF is that controlling TCP/IP’s flow and Broadband. Firewalls can help … Continue reading

Posted in IT Security, Week 20 | Leave a comment

Pentagon rules cyber attacks and sabotage constitute an act of war

“The US Department of Defense has ruled that attacks on computer networks and sabotage of information systems that stem from other countries officially constitute an act of war, and can be responded to with traditional military force.” This rule allows … Continue reading

Posted in IT Security, Week 20 | Leave a comment

Useful website for diagram creators

During Networking subject, I search for network routing diagram and accidentally find online diagram editor – Gliffy. In this site are many powerful tools to create good locking and even complicated diagram for Web site/Software design, Venn diagrams, Org Charts, Network diagrams even home floor plan or business planing and … Continue reading

Posted in IT Security, Week 20 | Leave a comment

Metasploit – Installation (Ubuntu) , Using, Hack remote system

This article is about Metasploit framework toolkit. There will be comprehensive explanation about how to install Metasploit on Ubuntu , use it and basic hack remote system.   I have chosen this topic because I found this toolkit is very useful … Continue reading

Posted in IT Security, Week 20 | 17 Comments

Linux kernel runs inside web browser

The Register postet : An independent programmer has used JavaScript to build a PC emulator capable of running Linux inside a web browser. A French ( Fabrice Bellard ) hacker sayes his JavaScript PC Emulator can run the 2.6.20 Linux … Continue reading

Posted in IT Security, Week 20 | Tagged | Leave a comment

Hackers steal Fox TV passwords

It’s about a group called Lulz Security. They gained access to a server belonging to the Fox Broadcasting network, and published details of hundreds of employees usernames and passwords on the net. A simple message was also send to them: … Continue reading

Posted in IT Security, Week 20 | Leave a comment