2 years, 11 months ago
Sammy Kamka, the main hero of history, did not want to be "hero" for everyone, he was not even going to get new friends. But thanks to several lines of a smart code he became per day "hero" and "friend" for more than one million people.
Everything occurred about midnight on October 4, 2005 in the solar city of Los Angeles. Then the 19-year-old hacker Sammy Kamka let out in a network something, better known as "Samy worm" now. It was the first fastest and self-extending virus which forever changed the world of web safety.
2 years, 11 months ago
In the previous note Linux kernel module code sketch for creation of the additional virtual network interface was shown. It was the simplified fragment from the real project which fulfilled several years without failures and claims so it can quite serve as a template for further improvement, correction and development.
But such approach to implementation, first, not only, and, secondly, in some situations it can be and unacceptable (for example, in the built-in system with a kernel is younger 2.6.36 where there is no netdev_rx_handler_register challenge yet ()). Below the alternative option with the same functionality but implementing it on absolutely other layer of a network stack of TCP/IP will be considered.
The programs racketeers using data encryption of users for a vymanivaniye of money at the victims use more and more sophisticated ways of blackmail. Creators of such software try to increase the income, thinking out new and new functions for the programs, for example, as we told earlier, some already began to cipher data in "offline".
This time it will be a question of one of newcomers of the ransomware market, the cryptoracketeer of Chimera who tries to select only representatives of business. This category of users usually very much values the data, and calculation, in general, correct: the businessman, most likely, will pay for an opportunity to receive the files back. At the same time the sum which is demanded from the victim, much above "an average on hospital" of an indicator — $638, in small notes bitcoins. At this Chimera threatens to lay out personal data of the user in the Network if payment is not.
2 years, 11 months agoThe idea to lease the space for the server became the answer to promptly growing requirements of the IT market. To create and to fully equip own date the center — business quite costly and troublesome. But also, not always it is necessary. Therefore services of a collocation so quickly found popularity in the market of a hosting. And for rather short period this type of business underwent a number of changes which allowed it not only to remain actual in a new era of information technologies, but also to offer something special.
Special communication — a thing very difficult. And the role of the encoder is very important for saving of secret. Everywhere, even where the ocean boils, hiding submarines, skillful "shaman" will send in seconds the kriptogrammny reports.
The cryptomachine M-125 — the granddaughter of legendary Enigma
M-125, with code the name Violet, represents the electromechanical 10th rotor cipher machine. It was for the first time provided in 1956, and became the most popular shifrmashiny in the countries of the Warsaw pact. For each participating country the version of the Violet was configured (the keyboard and the writing head are adapted under country language). The majority of machines perceived Latin and Cyrillics. The latin alphabet could differ, Cyrillics had no punctuation marks and was identical to all machines. Cryptofirmness is evaluated about 10^18.
Any ransomware, programs cryptoracketeers divorced now very much. Some just block the PC until the user pays. Other kinds of such software cipher files, sending a key to the server controlled by swindlers. But there are also other types of cryptoracketeers which work even more originally.
Researchers from the Check Point company carried out recently the analysis of work of one of kinds of such programs which uses the alternative cryptography technique of files and providing a key to the creators. The program — not new, for the first time it was noticed in June of last year. Since then the author repeatedly updated the creation (approximately time in two months), the cryptoracketeer constantly evolves and is improved. According to information security specialists, this sample was created by Russian-speaking malefactors, and it works as software, as a rule, with users from Russia.
2 years, 11 months ago
Having carried out the analysis of 110 applications (both Android, and iOS), the team of experts drew a conclusion that transfer of personal data of users of these applications to the third parties happens rather often. At the same time the user, often, just has no choice. As it appeared, the vast majority of the checked applications provide to Google, Apple and the third parties such data as e-mail, names and coordinates of the users. On average one Android application sends data such to 3,1 addresses (domains), and iOS the application does the same for 2,6 addresses (domains). In certain cases medical applications send search results on the words "herpes" or "interferon" not less, than on 5 different domains, without notifying the user on what occurs.
In February, 2015 there was price increase at Microsoft corporation for 15-30%. And here the new rise in price since January 1, 2016 on products and services of the known company by all is again predicted. Prices for products of Microsoft will change both for private, and for corporate users for 19-25%. Office products of Microsoft Office and Office 365, software for servers, cloud services based on Microsoft Azure, a line for developers of Microsoft Visual Studio and other products will rise in price. For private users the prices will be raised by 19%, for business — for 19-25%, depending on the program of licensing. Corporate customers and private users still can purchase products of Microsoft and update license agreements at the current prices before their adjustment.
2 years, 11 months ago
It is well-known that Linux drivers are modules of a kernel. All drivers are modules, but not all modules — drivers. An example of one of such groups of the modules which are not drivers, and much more rare appearing in discussions, surge filters at the different levels of a network stack Linux are.
Sometimes, and it is even rather frequent, it would be desirable to have the network interface which could operate with a traffic of any other interface, but somehow in addition "color" this traffic. It can it is required for the additional analysis, either traffic observation, or its enciphering, …
The idea is extremely simple: to canalize a traffic of already existing network interface in the newly created interface with absolutely other characteristics (a name, IP, a mask, a subnet, …). We will also discuss one of methods of execution of such actions in the form of Linux kernel module (it not only, but we will discuss other methods separately another time).
Researchers developed an inexpensive method of detection of exact location of the smartphone working in LTE/4G of a cellular network. This development lets know that mobile networks of new generations are also vulnerable to some types of attacks, as well as the networks working on former, already outdated, to standards of communication and specifications.
New attack uses vulnerability in the LTE protocol. This standard will provide by the end of the year communication for 1,37 billion subscribers. For carrying out attack it is required to bring together system from elements which total cost makes about $1400. As software Open Source software is used. The system, the NodeB node, allows to define location of phones compatible to the LTE standard, with an accuracy of 10-20 meters. In certain cases this equipment allows to learn also GPS coordinates of devices though attack of this kind can be found by the user of the smartphone. Also one more method of determination of coordinates of smartphones is developed, at the same time attack cannot almost be found. This method allows to define location of the set device within couple of square kilometers.