Hoy, en Keiser Report, Max y Stacy tratan el tema del colapso de la economía de Estados Unidos que está utilizando la técnica de ´simular hasta conseguirlo´ como medio para combatir la depresión económica. El problema es que este declive no es un estado mental, sino una realidad. En la segunda mitad, Max entrevista al exagente de la CIA y cocreador del Centro de Inteligencia del Cuerpo de Marines, Robert David Steele.
Sophisticated and extensive study on China’s systematic hacking. The report, issued by Mandiant, is pivotal in understanding the lengths and degree to which Chinese hackers are going and how deeply entrenched within the government they are. So far, China denies it all.
Allow to send a datagram to a remote location, and optionally receive a datagram as answer. Main use case is to check that a correct NAT/firewall configuration is setup to access a UDP server from a public address, when there is no possible access to a machine that can call from the outside.
Tags: udptester, udp untuk android, udp tester, udp test android, download udp tester android.
A Netcat like applilication.
Connect to host and send anything.
– send data interactively
– send data from the file on the strage
– line separator can be specified
– charactercode can be specified
* You need OI FileManager to send a file.
My twetter: @teru_kusu
The Nessus Android.
The Nessus Android app, from Tenable Network Security Inc., enables you to log into your Nessus scanners and start, stop and pause vulnerability scans as well as analyze the results directly from your Android device.
This mobility helps improving the efficiency of your Incident Response process by letting you quickly log into a Nessus scanner from your phone to search previous scan results or check the status of an on-going scan.
(Requires an access to version 4.2 of the Nessus server, or newer)
e-Mintza es un sistema personalizable y dinámico de comunicación aumentativa y alternativa dirigido a personas con autismo o con barreras de comunicación oral o escrita. Funciona sobre diferentes dispositivos táctiles y no táctiles: ordenadores de sobremesa, netbooks, portátiles y tabletas que soporten la tecnología Adobe Air, en este caso, para tabletas, la resolución mínima de la pantalla es de 1024×600.
El proyecto es multiplataforma, está preparado para funcionar sobre Windows, MacOS y en tabletas con Android a partir de la versión 2.2.
Mobile devices are everywhere – and they get smarter by the minute (at least they get more functionality by the second). This is a threat to business and a treat for attackers. But are mobile devices safe? This talk looks at physical and psychological aspects of mobile device security, and also covers the various types of software attacks! Tam Hanna gave an overview in his presentation at the DeepSec 2011 security conference.
This is the GSM security follow-up to DeepSec 2007. Karsten Nohl explains the state of GSM security by adressing the weaknesses of GSM A5 encryption. Karsten held this talk at the DeepSec conference in 2009. [archivo viejo pero muy interesante]
Karsten Nohl speaks about GSM: „The popular GSM cell phone standard uses outdated security and provides much less protection than its increasing use in security applications suggests. Our research aims to correct the disconnect between technical facts and security perception by creating a GSM tool that allows users to record and analyze GSM data to see what security features were really implemented by their operator. The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.“
You vigilantly protect PC – you should also do the same with your tablet
Android Tablet Kaspersky
Kaspersky Tablet Security protects your Android tablet and personal information stored on it with advanced anti-theft features that can block, wipe and locate your lost or stolen tablet – and even take a “mugshot” picture of the thief. Plus, real-time Internet threat protection and virus-scanning of downloaded files and apps keep you safe online with minimal impact on tablet resources.
World-Class Anti-Malware Protection • Automatic virus-scanning of downloaded apps
• Cloud-enabled protection for rapid reaction against new viruses, spyware, trojans, bots and more
Internet Threat Protection
• Real-time protection against dangerous links and web-pages, including phishing websites
• Remotely blocks your missing tablet – to secure your personal information
• Remotely wipes your sensitive information from your tablet
• Remotely locates your lost or stolen tablet – using GPS, GSM or Wi-Fi, and Google Maps
• “Mugshot” feature to identify unauthorised users of your tablet – by secretly taking their photograph and sending it to you
Personal Web Account for Remote Management
• Allows easy communication with your lost or stolen tablet: activate block, data wipe, find and mugshot commands, and review logs of recent activities
Maximum Performance • Small, frequent updates to minimise impact on tablet performance
• Product interface has been optimised for Android tablets – to boost usability and performance
FireAMP from Sourcefire is an enterprise malware analysis tool that analyzes and blocks advanced malware. FireAMP has many attributes, such as file trajectory, outbreak control, retrospective remediation, and so on, but is also lightweight and about 1/3 the size of traditional anti-malware solutions. The comparison, as evidenced by this video, is stark. For more information, visithttp://www.sourcefire.com/FireAMP.