Quantcast

Archive: Jan 2014

Common Darknet Weaknesses 5: Clock Based Attacks, Metadata, and Forensics

Getting further into darknet attack strategies, Adrian Crenshaw sheds light on the use of system clock information, metadata, and local attacks deployment. Alright, clock based attacks: this is another place where people can at least reduce the anonymity set of someone using a darknet. Some protocols allow...

Common Darknet Weaknesses 4: Attack Mitigations

Along with countermeasures for attacks against darknets, Adrian Crenshaw also points out popular applications with poor anonymity capacity in this part. Another example of applications that suck at anonymity is BitTorrent (see right-hand image). There’s a paper written a while back, where they found that...

Common Darknet Weaknesses 3: DNS Leaks and Application Level Problems

Adrian Crenshaw describes some common attacks deployable in the darknet usage scenario, such as DNS leaks, content grabbing, and application level issues. Alright, some other common attacks: DNS leaks and various other protocols, and application level problems. An overview: does all the traffic go through...

Common Darknet Weaknesses 2: Tor and I2P

Two most popular darknets, The Onion Router and I2P, are comprehensively described by Adrian Crenshaw here, including their weaknesses and user precautions. Now I’m going to briefly cover two major darknets, Tor and I2P, so that the rest of the slides make some kind of sense. Most people make node...

Common Darknet Weaknesses: An Overview of Attack Strategies

Adrian Crenshaw, a well-known InfoSec expert and author of Irongeek.com, provides a comprehensive overview of known darknets at AIDE Conference. Hello everyone! My name is Adrian Crenshaw, and my presentation today is Darknets: An Overview of Attack Strategies. First of all, a little bit about me, if...

The Mysterious Mister Hokum 5: Almost Made It

In conclusion to his DerbyCon presentation, Jason Scott tells the things he learned about Robert Hoquim from his family and how Aleshe’s life came to its end. I was talking to Aleshe’s brother about: “Where do you guys come from?” And here is a picture: Tom is on the bottom here, sitting in...

The Mysterious Mister Hokum 4: Fraud as a Desire Path

Jason Scott dwells on the contrast between what’s on the cover and what may be inside when it comes to technology, and focuses on John Aleshe’s background. How much scamming is out there? Well, this (see right-hand image), for instance, is the cover of the Atari Video Checkers program for the Atari...

The Mysterious Mister Hokum 3: Inexistent Devices for Sale

Moving on with early PC scams, Jason Scott enumerates a few cases where con artists would attempt to sell imaginary or non-functional equipment back in the day. Like I said, it was an expensive time, and there were a lot of promises. This (see right-hand image) is Radio Shack, who has turned out to be a...

The Mysterious Mister Hokum 2: Outbreak of Early Computer Frauds

Jason Scott moves on to tell further details about Robert Hoquim’s BBS fraud and some of the first shady computer deals that were widespread back in the 1970s. So, he became the ‘solve-all-your-problems’ amazing guy. He ended up taking everyone’s messages, and then quietly entering into these...

Remove search.conduit.com hijacker: Conduit Search removal for Chrome, Firefox, Explorer browsers.

Installing some browser extensions might turn out a mixed blessing, because along with the benefits and increased web surfing convenience users may run into the problem of excessive intrusiveness. Ambiguous experience of this sort is exemplified by the Conduit Toolbar. Whereas, on the one hand, it is a...

The Mysterious Mister Hokum

Well-known technology historian Jason Scott tells the extraordinary story of the con artist named John Paul Aleshe, aka Robert Hoquim, at DerbyCon conference. Welcome to The Mysterious Mister Hokum, presented to you by Jason Scott, proprietor of textfiles.com, documentary filmmaker, famous cat owner,...

Best Security Software 2014

Having bidden farewell to the year of 2013, we would love to share our impressions, observations and perspectives with regard to the state of security software industry’s achievements within the respective time span and predict the trends for the year we’re already in. Our interest in this...