CryptoTweet™ is the Encrypted version of Twitter™. It uses advanced cryptography techniques to prevent unauthorized persons to read your ETweets.
Who are you? We are a group of independent software engineers who worked on this project for nearly 2 years. Because of the #Snowden discovery we start working around the clock to get this project up and running.
Is this all? No, its not even close to what we have in mind. It's better to release a working service with less features then a whole lot of features that are not working at all.
What about the NSA or any other intelligent agency? We would rather close down the service before letting anyone in or hand over any information/data. We build this service to be different from Twitter™. And that promise we will keep. Whatever it takes!
Step 1: Create your account by registering through Twitter™ Click here
Step 2: Go to your dashboard and authorize some friend's you want to communicate with. When you authorize friend's they will be able to read your ETweets and they will appear in the list where you can compose your ETweet when the completed the authorization process.
Step 3: Ask your friends and followers to authorize you so you are able to read they're ETweets too.
Step 4: Download your keys and certificate. You find them on the settings tab in your dashboard. If you choose to remove your private key, make sure you understand what your doing!
but I am not sure if this will help you against an official demand by an official service to have all the information on your twitter accounts - it will help you against the online interception of your tweets (so long as your browser and PC aren't compromised)
- Safe social network
Bitdefender Safego scans the links you receive from your friends, and monitors your account privacy settings.
With "Warn friend" option, you can warn your friends when "fishy" links are posted to their newsfeeds.
Surf the newsfeed and socialize without worries. Check your status in less than 60 seconds, thanks to our scanning technology.
Get an instant head-count of how many of your friends are also using Safego to keep themselves protected!
Simple and secure privacy protection
Cloudfogger encrypts your data on the local device before it gets uploaded to the cloud. That guarantees that Dropbox and others never get access to the content of your files.
Cloudfogger protects your privacy with 256bit AES (Advanced Encryption Standard) encryption.
Cloudfogger uses transparent encryption, which makes daily use fast and simple: On the local system you still access your data as you always did - while all files are securely encrypted when they get uploaded to the cloud.
Manual encryption and decryption of your files is not necessary with Cloudfogger. Does it get any easier?
Cloudfogger-protected files can also be shared without sacrificing security. You can for example use your shared Dropbox folders securely together with others - without the need of giving them your Cloudfogger credentials.
Also, distributing files via e-mail or USB sticks is easy with the portable Cloudfogger file format.
we are not talking about the blocking in internal network which should be standard by now because normally you will have blocked anything that is proxy or proxycircumventing category.
we are talking about the blocking of a string of domainnames at the national level (something the prime minister in the UK wants to do with porn)
"PirateBrowser is a bundle package of the Tor client (Vidalia), FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.
so the only thing you need is two things
* a portable application - app called now - because it doesn't install anything in the kernel of the machine and doesn't change anything in the reigstry (two things that are normally blocked in most enterprises)
if a company really wants to control what comes on the computers it will have now to install a sandbox (so software and documents aren't in the folder but in a protected environment of the computer and/or an applicationcontrol software
* a proxy list that is daily updated
the Tor thing is not necessary but a nice one - even if it has some security difficulties and seem now to have understood that updates have to be done on a permanent basis if they want to keep up any illusion of security and privacy
it may be difficult in a network to have a Tor connection (and it isn't really something that I would advise to do viewing the many judicial problems that may bring)
µphisher is a tool designed to support social engineering activities. It automates the collecting and analysis of public social network data (the current version only handles Twitter), and provides an interactive assisted text input interface which provides users real time metrics on word usage, hashtag and user references, as well as word suggestion based on usage frequency on the social network source.
this one only works on twitter which means that it only can be used on and against your twitter account
you will not solve the problem with beach and crime if you don't solve the CSRF attack and that is too say the fact that cookies can be send anywhere
this is the first package of documents and tools to test your code and application about how to treat CSRF problems the tools are mostly from OWASP
we will let you know when we add new stuff
we have put together in one folder copies of the articles about the attacks or parts of the attacks
the RFC's that are guiding the research
some old research from 2002
the new presentation
a tool to test your internal servers
and a lot of tips for apache, ngnix and other tools
because I am sure that most of you will now have a good day of work on their hands
it are about 42 files for educational purposes only so you can get your hands on it immediately
we placed some of the tools in the articles and the articles themselves together in one box so you could download the all at ease and speed - this folder will not necessarily stay online forever
but in the maintime, you could get your downloads here - we will put new info and tools in it as they become available
What Can the Essential Firewall Edition Do for My Business?
The Essential Firewall edition provides protection for unlimited IP addresses and the following features without any time limitations:
- Networking: Internet Router, Bridging, DNS server & proxy, DynDNS, DHCP server & relay, NTP support, automatic QoS
- Network Security: Stateful Packet Inspection Firewall & Network Address translation (DNAT/SNAT/Masquerading)
- Remote Access: PPTP and L2TP over IPSec support (including iPhone support)
- Logging/Reporting: Full logging on local hard drive, searching, real-time reports for hardware, network usage and network security, daily executive reports
- Management: Web-based GUI in local languages, setup wizard, configuration backup & restore, administrator notifications, SNMP support, centralized management using the Sophos UTM Manager (also free of charge)
two things are important
first you should start by closing everything down that is not necessarily needed and than listen to your network users to hear what should be opened for everybody or for some and considers eventual risks (doing it the other way round takes less time in the beginning but will in fact open your network far too much)
secondly you should place some monitoring rules in which you can see all the computer that try to go to Russia, China, P2P services, IRC services and other stuff that are indications of abuse or securityrisks. You should look everyday at least once at those incidents and pull computers that are hefty on this sort of traffic from your network for a securitycheck. In a bigger network you should never talk about names or people but about IP addresses and networktraffic (in fact you even never have to know who has been so stupid to try to circumvate your security, that is problem for your bosses. The only thing you have to do is to stop the connections and ask someone to clean up that computer from all the malware and adware).
it is one of those big organized lists that are not that easy for the newbies and dummies - you still have to find all the information yourself and you still have to install some stuff yourself and for for example the OS using live distros from other operation systems is something what more complicated to do
normally they only sells to enterprises and institutions
but hey here they launch a free edition for home users
Our Free Home Use Firewall is a fully equipped software version of the Sophos UTM firewall, available at no cost for home users – no strings attached. It features full Network, Web, Mail and Web Application Security with VPN functionality and protects up to 50 IP addresses. The Sophos UTM Free Home Use firewall contains its own operating system and will overwrite all data on the computer during the installation process. Therefore, a separate, dedicated computer is needed, which will change into a fully functional security appliance. Just right for the spare PC you have sitting in the corner!
What can Sophos UTM do for my Home Network?
Many things! Sophos UTM is great for providing many network tasks you might be trying to do manually, with different products, or didn’t even know were possible.
- Increase your Internet Bandwidth - You can make easy use of multiple Internet connections at the same time, giving your home more bandwidth.
- Protect your Kids Web Surfing Habits - Use Web Filtering to stop sites from infecting you with viruses and spyware, keep your kids from surfing to bad sites, and get full reporting on the activity in your home.
- Solve your Spam Mail Problems - Use Mail Filtering to clean up your inbox and reduce the amount of spam you have to sift through using any POP3 or SMTP setup.
- Access your Home Network from Anywhere - Dial in using Roadwarrior VPN access to securely use Remote Desktop, transfer files, and even print, from anywhere in the world, even from your iPhone.
- Connect to Work or Friends - Create a permanent tunnel to other Unified devices, linking you with a friends network, or having the perfect encrypted link to your office Astaro to work from home!
- Stop Viruses in Web and Email - Dual Scanning Engines stop viruses in file downloads, email attachments, and embedded in web sites. Sophos catches them at the gateway, before they can get in to assault your computers.
- And a lot more...
more at this link
and this is for mobiles
and this is a free antivirus for macs
This is how it works. If you have a free account at RapidShare with currently unlimited storage, from this Wednesday you will only be allowed to store a total of 5GB. If you do nothing then all your files stored at RapidShare over the 5GB limit will be deleted April 3. Just to be crystal clear – if you currently have 20GB of files, 15GB will be deleted.
“If you exceed your storage space limit, you will receive a warning email that files will be deleted,” RapidShare warns. “If you don’t add storage space within the next 24 hours or delete some of your files, we will delete files. That happens at midnight 24:00 CET.”
mega.co.nz is so fast and you have much more free space and it is encrypted and your visitors - downloaders don't have all those nagscreens, time-limits and other stuff that makes downloading from rapidshare more a harassment than a service you do
the more we know, the lesser they can know
"In the current threat environment, rapid communication of pertinent threat information is the key to quickly detecting, responding and containing targeted attacks. OpenIOC is designed to fill a void that currently exists for organizations that want to share threat information both internally and externally in a machine-digestible format. OpenIOC is an extensible XML schema that enables you to describe the technical characteristics that identify a known threat, an attacker’s methodology, or other evidence of compromise.
OpenIOC was originally designed to enable MANDIANT’s products to codify intelligence in order to rapidly search for potential security breaches. Now, in response to requests from across the user community, MANDIANT has standardized and open sourced the OpenIOC schema and is releasing tools and utilities to allow communication of threat information at machine speed."
and the tools to use and make and control all those indicators are for free available here, but you can also install a commercial version if your network is too great, the information to valuable or the number of specific attacks to great to deal with manually
and you should read much more on that site, especially the new report with indicators of chinese APT
but do not forget, this is mostly chinese and they are not the only one who have installed hacker-intelligence groups inside their intelligence services (even friends you wouldn't expect it from ....)
It is always possible to bypass certain security measures on local system, authentication to guest operating system can be manipulated and bypassed in VMware workstation using VMInjector.
This small python based tool can be used during penetration testing or to recover the operating system password, all new modern organization are relying on virtual environment which makes such tool important to evaluate overall security.
As well known that VMware handle all information and resources within the guest operating system. VMInjector injects a DLL library into the VMWare process to manipulate the RAM files and patching the function in charge of the authentication.
Click on the image to enlarge
You can use this tool and then change your password to recover it or make it as a PoC during your pentest operation. to read more about this tool you can visit the official website : https://github.com/batistam/VMInjector
I hear often that there is no problem because they use VMware as if this is the only thing to do to secure a site while it is just software and instructions, there is nothing magical about it
Firefox 18 has been released.
Twelve of the security fixes were deemed critical.
imagine that each time you would have to update your firefox manually
but the other question and in fact something annoying is that developers of the plugins can't follow anymore and if you have started with 10 a few months ago there will be very few that will still be functional. The danger for firefox and its users is that you will have to keep an older version if you have really become fond of a new functionality.
Firefox should integrate the most popular and most interesting plugins in its core. For the security and for its users. They have already voted which functions were not developed or were better developed elsewhere.
Despite increasing amounts of photos, videos, music, and documents one wants to share with family and friends there still has yet to be a convenient method for doing so.
“It has the same functionality as some other Torque Labs projects, but it has been designed from the ground up to bring the inherently social activity of sharing files to where the people are,” says the company in a blog post. “It?s a Facebook app that aims to make sharing your files as simple as sharing anything else.”
What BeamItOver does is allow users to finally share unlimited-sized files with friends and family right inside of Facebook. The desktop app makes it more convenient than ever before to share those family videos, photo albums, music, and data for which current methods can be exasperatingly difficult, especially when dealing with those that are less than tech-savvy.
or will they block it
Classic Start Menu is a clone of the original start menu, which you can find in all versions of Windows from 95 to Vista. It has a variety of advanced features:
- Drag and drop to let you organize your applications
- Options to show Favorites, expand Control Panel, etc
- Shows recently used documents. The number of documents to display is customizable
- Translated in 35 languages, including Right-to-left support for Arabic and Hebrew
- Does not disable the original start menu in Windows. You can access it by Shift+Click on the start button
- Right-click on an item in the menu to delete, rename, sort, or perform other tasks
- The search box helps you find your programs without getting in the way of your keyboard shortcuts
- Supports jumplists for easy access to recent documents and common tasks
- Available for 32 and 64-bit operating systems
- Has support for skins, including additional 3rd party skins
- Fully customizable in both looks and functionality
- Support for Microsoft’s Active Accessibility
- Converts the “All Programs” button in the Windows menu into a cascading menu (Vista and Windows 7)
- Implements a customizable Start button (Windows 7 and 8)
- Can show, search and launch Windows Store apps (Windows 8)
So you don't need expensive consultants to do that for you and there is no excuse not to start with planning and playing around with the images and bundles you would need for your network
especially if you are a smaller network and you don't have the money to invest in AD, PKI, application control and all that it would even be simpler with your environment and it would send you lightyears ahead in security (even if most of your workers are working also or primarily from a distance)
A Book Sprint brings together a group to produce a book in 3-5 days. There is no pre-production and the group is guided by a facilitator from zero to published book. The books produced are high quality content and are made available immediately at the end of the sprint via print-on-demand services and e-book formats.
Zero to book in 5 days. Seem impossible? Its not, its very possible, fun, and extremely rewarding.
There are three common reasons to do Book Sprints:
- Produce a book : at the end of the process, we obtain results in a book.
- Producing and sharing knowledge : the contents are published and shared under free distribution license.
- Experiencing other ways to work together : to enjoy and learn from a process of collective creation.
Julie Samuels EFF
Thanks to the open hardware community, you can now have a 3D printer in your home for just a few hundred dollars, with dozens of printer models to choose from and build upon. Community-designed printers already outclass proprietary printers costing 30 times as much. This incredible innovation is possible because the core patents covering 3D printing technologies started expiring several years ago, allowing projects such asRepRap to prove what we already knew—that openness often outperforms the patent system at spurring innovation.
Open hardware printers have been used for rapid prototyping of new inventions, to print replacement parts for household objects and appliances, by DIY scientists to turn a power drill into a centrifuge, for a game in which you can engineer your own pieces, and for thousands of other purposes by makers of all stripes. Projects like MakerBot and Solidoodle have made 3D printers accessible on a plug-and-play basis, so you don’t even need a soldering iron to start manufacturing objects you designed or downloaded from the Internet. As additional patents expire, the open hardware community will be able to unleash its creative spirit on new technologies, technologies that have already been used to design custom prosthetics, guitars, shoes, and more. The possibilities are limitless.
While many core patents restricting 3D printing have expired or will soon expire, there is a risk that “creative” patent drafting will continue to lock up ideas beyond the 20-year terms of those initial patents or that patents will restrict further advances made by the open hardware community. The incremental nature of innovation in 3D printing makes it particularly unsuitable for patenting, as history has shown.
We’ve said before that the America Invents Act failed to address many of the patent system’s worst problems. Despite that, it does include at least one provision we think could be helpful: the newly implemented Preissuance Submission procedure. That procedure allows third parties to participate in the patent application process by creating a vehicle to provide patent examiners with prior art. We’re glad to see the Patent Office open up the process to those who might not be filing patents themselves, but who are affected by the patent system everyday. We’re also glad that this new process may help stem the tide of improvidently-granted patents.
EFF and the Cyberlaw Clinic at Harvard’s Berkman Center for Internet and Society are working together to use this new process to challenge patent applications that particularly threaten growing 3D printing technologies. As a first step, we are evaluating 3D printing patent applications currently pending before the Patent Office to identify potential target applications. We need your help! If you know of any applications covering 3D printing technology that you think should be challenged, please let us know by emailing 3Dprinting@eff.org (and also point us to any relevant prior art you might know about).
To get involved with the search, go to the USPTO’s application search tool, PAIR, and/or Google Patents. Each of these sources contains valuable details about the applications currently pending before the USPTO.
Here’s the thing: under the current rules, a patent application may only be challenged by a Preissuance Submission within six months of its publication (or before the date of the first rejection, if that comes later).
This means the clock is already ticking on the current crop of patent applications.
Once target applications are identified, we will seek out relevant prior art. We’ll be asking for your help again then, so please watch this space.
Any document that was publicly available before an application was filed is considered prior art; this can include emails to public lists, websites, and even doctoral theses. Because of the time limit, once we identify the target applications, we must complete the prior art search quickly.
We’re glad there’s a new way to to challenge dangerous patent applications before they become dangerous patents. But the America Invents Act and the search capabilities of the Patent Office’s website won’t make this job easy. We need your help to get this done, so please do what you can to help protect the 3D printing community from overbroad patents that can threaten exciting innovation.