Archive for ‘Informatique’

octobre 23rd, 2011

ifttt / Tasks / IF this THEN that !

by admin

ifttt / Tasks About ifttt

Tasks

Put the internet to work for you by creating tasks that fit this simple structure:
if this then that
Think of all the things you could do if you were able to define any task as: when something happens (this) then do something else (that).

Triggers

if this then that
The this part of a task is the Trigger. Some example Triggers are « if I’m tagged in a photo on Facebook » or « if I tweet on Twitter. »

Actions

if this then that
The that part of a task is the Action. Some example Actions are « then send me a text message » or « then create a status message on Facebook. »

Channels

Triggers and Actions come from Channels. Channels are the unique services and devices you use every day. Some example channels:
Twitter

Twitter
Facebook

Facebook
Instagram

Instagram
Email

Email
Phone Call

Phone Call
Weather

Weather

All together now

When you put one channel’s trigger together with another channel’s action, that’s a task! Here is a task that saves every new photo I take with Instagram to my Dropbox:

if instagram then dropbox

Recipes

Create a recipe to share a task with friends. Here is a recipe for the task above:

instagram to dropbox

On/Off

Tasks can be turned on and off. When turned back on, they pick up as if you had just created them.

Polling period

Tasks poll for new trigger data every 15 minutes.
octobre 2nd, 2011

DropIt classe vos fichiers par extension (bureau tout propre)

by admin

DropIt classe vos fichiers par extension (bureau tout propre).

octobre 2nd, 2011

Proteger son PC avec une clé USB : Predator

by admin

Proteger son PC avec une clé USB : Predator.

Tags: ,
septembre 23rd, 2011

The Official Social Engineering Framework – Social Engineering Framework

by admin

PART VI: INFLUENCING OTHERS

I. Influence Tactics

A. Reciprocation

1. Obligation

2. Concession

B. Scarcity

C. Authority

D. Commitment and Consistency

E. Liking

F. Consensus or Social Proof

II. Framing

III. Manipulation of Incentives

PART VII: SOCIAL ENGINEERING TOOLS

I. Physical

A. Lock Picking and Shims

B. Cameras

C. GPS Tracker

D. Pen Recorder

E. RF Bug Kits

II. Computer Based

A. Maltego

B. Maltego Mesh

C. Social Engineer Toolkit (SET)

D. Common User Passwords Profiler (CUPP)

E. Who’s Your Daddy Password Profiler (WYD)

III. Phone

A. Caller ID Spoofing

viaThe Official Social Engineering Framework – Social Engineering Framework.

septembre 22nd, 2011

http://www.social-engineer.org/sponsors/

by admin

Sponsors.

 

« If you can control the meaning of words, you can control the people who must use the words. »

septembre 22nd, 2011

Social Engineer Toolkit (SET) tutorial for penetration testers

by admin

Social Engineer Toolkit (SET) tutorial for penetration testers.

The social engineering toolkit v1.0 release, code-named Devolution, is a suite of custom tools solely focusing on attacking the human element of penetration testing. Social Engineer Toolkit (SET) uses Backtrack as the framework for penetration testing. SET has been written by David Kennedy, who is also known by the nickname ReL1K. Complete details on the Social Engineer Toolkit are available at http://www.social-engineer.org

In a pen-testing scenario, alongside uncovering vulnerabilities in the hardware and software systems and exploiting them, the most effective of all is penetrating the human mind to extract the desired information. Such devious techniques are known as social engineering, and computer-based software tools to facilitate this form the basis of the Social Engineer Toolkit.

This social engineering toolkit tutorial covers backdooring of executables, and also evading antivirus software, which is implicitly handled by a few scripts within this framework. This SET tutorial also touches upon a scenario in pen testing to ascertain whether employees of the organization are aware of the security threats they face via the art of social engineering.

To continue reading for free, register below or login

septembre 22nd, 2011

zImperium – Securing Your Empire – Android Network Toolkit

by admin

zImperium – Securing Your Empire – Android Network Toolkit.

 

 

zImperium is an industry expert at solving difficult problems for special customers.

Our customers keeps choosing us because of our great level of expertise in wide varieties of technical fields including : Reverse Engineering, Malware Research, Peneteration Testing, Development and Customized Solutions.

Our employees are top-notch security specialists who have done a wide variety of security penetration-testing and exploitation on different platforms. We are working with world-experts in the field of mobile-exploitation and development.

  • World expert in mobile-industry
  • Updated on latest technologies
  • 24/7 Support Center/Problem fix ASAP
septembre 22nd, 2011

Security Database IT Watching

by admin

Security Database IT Watching.

 

Security-Database provides a continuous IT vulnerability XML feed based on open security standards for classification, scoring, enumeration and exploitation. It also provides a well maintained repository for latest security and auditing tools and utilities.

Security-database promotes Open Standards by supplying vulnerability
alerts based on the following :

  • CVE identifier number
  • Brief description of the security vulnerability or exposure.
  • Any pertinent references (i.e., vulnerability reports and vendors advisories).
  • CVSS Version 2.0 scores
  • OVAL ID related alert
  • CWE ID
  • CAPEC ID
  • SAINTexploit ID

Contact us

The Team
www.security-database.com
info at security-database dot com

septembre 22nd, 2011

Security Ninja | Security research, news and guidance

by admin

Security Ninja | Security research, news and guidance.

 

Security is one of our values in Realex Payments and as such we have developed this website to be our dedicated application security website and blog. We will bring you the latest information and advancements in the area of secure web application development as well as general information security and compliance guidance.

Tags: ,
septembre 14th, 2011

Samsung’s Windows 8 developer tablet – V3.co.uk Labs – a blog from V3.co.uk

by admin

The device in question is unmarked, with the box proclaiming it as developer prototype hardware. It features an impressive 11.6in 1,366 x 768 touch-screen display and weighs in at about 900g, with a slimline design at just 12.9mm thick.

In specifications, the Samsung tablet is based on a 1.6GHz Intel Core i5-2467M dual-core processor, with 4GB of DDR3 memory, a 64GB SSD drive, and supports 3G mobile broadband as well as Wi-Fi.

The unit has a microSD slot, a single USB port and micro HDMI connector. Microsoft is also providing developers with a Bluetooth keyboard, stylus, and a mini docking cradle that adds an extra USB and HDMI video output, plus Ethernet for a Lan connection.

Samsung’s Windows 8 developer tablet – V3.co.uk Labs – a blog from V3.co.uk.