Tuesday, March 29, 2016

Netflix Verizon and AT&T speed scandal

Today Iam going to tell you about the latest Netflix Verizon and AT&T scandal.


[caption id="attachment_1896" align="aligncenter" width="300"]Netflix Verizon and AT&T Netflix Verizon and AT&T[/caption]

 

Netflix as been “capping” the download speed from American users who use Verizon and AT&T mobile service.
The users from those services, would only be able to use 600 kilobites of bandwith to watch their TV shows and movies. Netflix justified this measure as a way to prevent users to be charged extra from excessive Downloads.

Personally I believe it was a good call from the company, but anyway they should give the option to the customers if they wanted the cap or not.

But Netflix chose not to reveal this information, eventually it got out last Thursday during a story that came out in the Wall Street Journal. And now, they got a lot of angry customers to please!

Some quotes from the source article:

Sunday, March 27, 2016

Usenet group Newsoo raided by the police France

newsoo


Newsoo The French usenet group got raided and shut down by the police.


This may be just the tip of the iceberg when it comes to actions against “newsgroups”. The main attention nowadays are the peer to peer sharing webpages like thepiratebay or KickAssTorrents, but the old news groups stayed in silence on the background, surviving all the persecution that major sharing webpages have seen.

Unlike Peer to Peer (Torrents) pages, with Newsgroups, you get the files directly from the server, which means much faster transfer speeds and bigger anonymity/higher safety.

I just hope for the best. That this was a single isolated case; and not a change of strategy by the authorities.

To rap this up I will leave you with some parts of the news and the source url so you can visit it and read all the details:

Friday, March 25, 2016

surveillance law under pressure US

Surveillance law getting under pressure


NSA-binoculars

 

Politicians are trying to put some pressure over the NSA surveillance law on the US.
With all the domestic spying going on; the NSA has lots of dirt on them. This is probably the reason why they got so concerned about the issue.

How many persons are really squeaky clean? Would a “clean politician” get any support from dirtier ones? How much money would they get from corporations and other sponsors?

The reason behind this is not vital, as long as it is effective and they could actually put a stop on the NSA domestic surveillance. Below I leave you the article with the link top the correct sources.

Erik Prince, Under Investigation by DoJ

Erikprince blackwater

Today I bring you another news, this time the new is about Mr. Erik Prince, the security contractor and founder from Blackwater USA, a company that as been “renamed” several times (former, Xe Services and Academi). Mr Erik Prince fell under investigation by the U.S. Department of Justice.


Erik Prince, founder of the now-defunct mercenary firm Blackwater and current chairman of Frontier Services Group, is under investigation by the U.S. Department of Justice and other federal agencies for attempting to broker military services to foreign governments and possible money laundering, according to multiple sources with knowledge of the case.

What began as an investigation into Prince's attempts to sell defense services in Libya and other countries in Africa has widened to a probe of allegations that Prince received assistance from Chinese intelligence to set up an account for his Libya operations through the central bank of China. The Justice Department, which declined to comment for this article, is also seeking to uncover the precise nature of Prince's relationship with Chinese intelligence.

[...] For more than a year, U.S. intelligence has been monitoring Prince's communications and movements, according to a former senior U.S. intelligence officer and a second former intelligence official briefed on the investigation. Multiple sources, including two people with business ties to Prince, told The Intercept that current government and intelligence personnel informed them of this surveillance. Those with business ties were cautioned to sever their dealings with Prince.

[...] "He's a rogue chairman," said one of Prince's close associates, who has monitored his attempts to sell mercenary forces in Africa. That source, who has extensive knowledge of Prince's activities and travel schedule, said that Prince was operating a "secret skunkworks program" while parading around war and crisis zones as FSG's founder and chairman. "Erik wants to be a real, no-shit mercenary," said the source. "He's off the rails exposing many U.S. citizens to criminal liabilities. Erik hides in the shadows ... and uses [FSG] for legitimacy."

Erik Prince

As always, If you enjoyed this article please do share it by using the social buttons below (Facebook, Twitter, Stumbleupon, etc)

Really soon, I will update with another news article, a onion website review, some downloads, good tips, etc. you will need to pass by again to see what changed.

Stay tuned I will upload something new very soon, thanks.

Thursday, March 24, 2016

Three Syrian Electronic Army Suspects Got Charged by the US

After the attack to independent.co.uk the US Justice managed to find the Hackers responsible for these attacks and charged them for multiple offences. The only small problem is that they live in Syria, so a little bit away from US justice so for the time being they are quite safe.

most-wanted-syrian-electronic-army

First seen in 2011, the Syrian Electronic Army (SEA) claims to support the regime of Syrian President Bashar al-Assad. They've been linked to hacking the Websites of the US Marine Corps, Microsoft, Skype, eBay and PayPal. Arrest warrants have been issued for the suspects:

Stronghold Paste .onion Review

Hello, on this post I will give you another onion website review, this time Iam going to talk about Stronghold Paste


Stronghold Paste url http://nzxj65x32vh2fkhk.onion

Stronghold Paste works pretty much like pastebin.com, but as with all .onion webpages you can count on a huge level of anonymity and little to none propaganda.
The idea of the webpage is to freely leave text files on the "cloud". This pieces of text can be accessible by anyone or you may require a password.

Stronghold Paste

Some features from Stronghold Paste

Facebook Zuckerberg Meets With China's Propaganda Chief

Zuckerberg Meets With China once again to expand is business, but this time he was mocked by social media that he loves so much.

Facebook's Zuckerberg Meets With China's Propaganda Chief, Social Media Mocks Facebook Block


Facebook was blocked in mainland China in 2009 following conflict between Uighurs and Han Chinese in Xinjiang. Now Facebook CEO Mark Zuckerberg is on a "charm offensive" [qz.com] likely intended to convince the government to bring the site back through the firewall... in a heavily censored form. Meanwhile, Chinese social media users have been amused and confused by Zuckerberg's journey [bbc.com], which has been featured in state media rather than censored:

Wednesday, March 23, 2016

331 kg of plutonium ordered by the US from Japan

331 kg of plutonium arriving to the US


Source:http://news.yahoo.com/2-british-ships-arrive-japan-carry-plutonium-us-015323402.html

"Two British ships arrived in eastern Japan on Monday to transport a shipment of plutonium — enough to make dozens of atomic bombs — to the U.S. for storage under a bilateral agreement.
[...]
Japan has accumulated a massive stockpile of plutonium — 11 metric tons in Japan and another 36 tons that have been reprocessed in Britain and France and are waiting to be returned to Japan — enough to make nearly 6,000 atomic bombs.

Andy Grove A Former Intel CEO Has Died

andygroveAndy Grove has died. The  longtime Intel's CEO and President


He was 79 years old, and was Intel's first hire. Originally from Hungary, he was born during the pre-war, a survivor of both the  Nazi occupation and the Communist rule; he managed to immigrate to America at the young age age of 20.

Monday, March 21, 2016

iOS security - Improve your iOS system

iOS security

You just got a new Iphone?

The system is the second operating system most used on smartphones, tablets, ipads, etc. It is a specially design system by Apple to run on their hardware.

This system is already quite secure out of the box, but yet you need to take some basic steps to improve your iOS security!

With this article I will give you 7 easy things you can do to tune up your iOS safety without performing a JAILBREAK.

 

 

So lets get down to business.

iOS security in 7 steps


Friday, March 18, 2016

detecting the operation system from any person

On this post I will give you a small tutorial, on how to detect what OS any person is using, and how to protect against such a detection.


This detection can be used by malicious hackers to use the correct applications, to hack into the targets.

Everyone should at least know the basics to be able to prevent the attack and keep their system a bit more secure.

There are not many prerequisites to be able to do this. But the basics are:

Having a *nix system

Connecting to the Internet

Downloading the Xprobe applications

First let me talk about the Xprobe application.

 

Xprobe is a simple tool to perform a fingerprint of a remote server.

The Xprobe application is used to identify the possible operating system (OS) of the target.

An attacker uses this information to launch appropriate attacks for the results obtained.

This is the download link : https://sourceforge.net/projects/xprobe/

detecting the operation system with xprobe2

onion website review - Parazite

onion website review

Hello, on this post I will give you another onion website review, this time Iam going to talk about Parazite


Parazite is a repository for .onion websites and hidden services, but does more then just a normal “repository” function, mainly because it seems to be managed by a really crazy person, at least with a very weird sense of humor (just like me). And also because it looks really good, as great uptime and is well organized with lots of information.

This is the .onion link for Parazite main webpage: http://kpynyvym6xqi7wz2.onion

The “main” website list is sorted by this categories:

Tuesday, March 15, 2016

Windows 1.0 introduction and history Download

Windows1.0


Hello, I stumbled upon an interesting Download today, Windows 1.0!


Not everyday we can get our hands on a piece of History :)


on this article I will show you some screen-shots from Windows 1. Tell you the history of Windows 1.0 and what it is, and finally I will get you a link to download it and try for yourself!


But be advised to run this Windows version you will need 2 floppy disks and it needs to run under DOS.


So without loosing more time I present to you the story behind Windows 1.0 and what it is all about:



Windows 1.0 introduction and history


Sunday, March 13, 2016

Bitcoins explained (easy)


Bitcoins and what are they?


You just found out about Bitcoins and you are not really aware of what they are, or how to use them?

I have this post over HERE talking in detail about them.

But this post will be for the real beginner on Bitcoin who is still a bit confused about it.

Let me start:

Bitcoins are a form of “currency” just as Dollars or Euros.

Bitcoin can be purchased online from other persons using your local currency, a good place to start is in localbitcoins.com

You can also earn Bitcoins for free by using the GPT industry *1

Another way to get you some bitcoin is by selling products or services and get paid in bitcoins *2

And another way to get your bitcoin (And this is the real difference between normal currency and bitcoins) is that you can “mine” them on your computer, *3

Now you now how to earn some bitcoins, but you still don't know the value of the Bitcoins you have compared to you country currency?

Bitcoin price is really volatile, depending on the markets movement, at any given moment in the day it can rise up 300% but on the next hour it can also drop at the same rate :) you can check bitcoin prices in many online websites. Personally I use my wallet to check in blockchain https://markets.blockchain.info/ At this precise moment the Bitcoin USD price is 1-414.17 that means 1 bitcoin is the same as 414 usd. You can check this screenshot:Bitcoins price on Blockchain

 

If you just search online for “bitcoin price” you will get hundreds of webpages giving you the current prices don't be so lazy :)

By now you should be aware that Bitcoin is a currency and not a payment processor like Paypal.

So what is the interest in having Bitcoins? Silly question! What is the interest in having any sort of currency?..

The main difference between Bitcoin and “regular” currency is that they are not “regulated” by a Government or by a Bank. They exist only digitally there is no “paper Bitcoin money” Bitcoin relies on anonymous peer to peer transactions which makes it very difficult to trace back to you and they are TAX free!

You got some bitcoins by now and you want to convert them into your own country currency?

Houston we have a problem :) The best way to achieve this is by selling them to other persons who want some bitcoin, to do this the best way will be to go on localbitcoins.com and sell them there. Another way is to buy physical products online and then sell them, some vendors who accept Bitcoin are:

Amazon – You can get all kinds of products with bitcoins, provided by the largest “online” store on the Internet

Victoria's Secret – You can get lingerie from the world's top brand paying with bitcoins

Namecheap – Buy you domain online and pay with Bitcoin

Reddit – You can pay for their subscription services and upgrades with Bitcoin

Bing – Bing also accepts Bitcoins, so you can advertise on one of the biggest search engines with some Bitcoin

ExpressVPN – Premium VPN service provided that accepts bitcoin

Microsoft – Microsoft needs no introduction, this software giant already jumped into the bitcoin bandwagon, so get your products from them with bitcoins.

The third way you can convert bitcoins to your local currency, is by exchanging bitcoins for some “online” processor like Paypal, and then get your money from the payment processor. But solid “online processors” will not accept Bitcoins. So what you need to do is to find a product that you can buy with bitcoins and then sell it to your “online payment processor”

It may sound all too complicated, but it is fairly easy!

Step 1 know what Bitcoin is, NOT a payment processor, but a new currency.

Step 2 Earn or purchase your first Bitcoins

Step 3 Use your Bitcoins

 

 

Hope this text could clarify some of your doubts, any other subject you want to know more about just drop me a comment.

If you liked the text please do share it on social media by using the buttons below this post (Facebook, Twitter, Stumbleupon, etc)

 

 

*1 , GPT industry and Bitcoins, for example bitbin.it is a website identical to pastebin, where you just leave some text, and you gain bitcoins according to the number of hits your paste receives. Faucets are another way to earn bitcoins very easy, a faucet is a webpage that just as some ads in it, and a box for you to leave your bitcoin wallet address. You leave the address there and they will send you free bitcoins every-time you do that

*2 Gaining bitcoins by selling services and products. For this purpose you have the dark web markets, but not only there you can actually accept to be paid in Bitcoins everywhere you want to, just like a normal online payment processor (Paypal style)

*3 Mine your own Bitcoins, achieving this is quite easy in “theory” you just download a mining program for your system, and you leave it making money for you.

Friday, March 11, 2016

Hidden answers onion website review


Here is another .onion website review!


If you are not familiar with Tor or .onion websites check this Article


hidden answers logo

Windows, how to prevent the worst from happening

 

Due to popular demand, on this post I will teach you how to protect your Windows system from getting swarm with errors and malfunctions. By giving you some good Tips and advice's on how to prevent bad things from happening, but not only that I also show you how to restore your system back to work when the worst does happen and your system gets compromised.

Our first line if defense will have to be the Windows system itself!

[caption id="attachment_1237" align="alignright" width="150"]control panel System and Security[/caption]

When you install it, make sure you create a System Restore Point at a point where the computer actually works as you like it!

To create a System Restore Point on Windows follow these steps:


Step number one open your Control Panel. On Windows 10 right click the start button and choose Control Panel

 

 

Step two locate System and Security>System>System Protection

[caption id="attachment_1238" align="alignright" width="150"]system properties system properties[/caption]

 

 

Step Three Click on Create... Choose a name and that's it you created a restore point, in case your Windows system quits on you!

The System Restore Point is an easy way to get your system back after something fails. But you can prevent your system from failing by using a sandbox application.

 

 

What is a Sandbox Application?


A Sandbox Application is a program that allows you to run any program on your Windows System, but after you are finished with it ALL your definitions will go back to ORIGINAL like if you had never used that program. Sandbox applications are great to run old programs and games that may cause compatibility issues, You can use them to browse the Internet and avoid most kinds of Spyware and Virus. Now I will leave you the link to two different kind of “Sandbox” applications.

The first one is named Sandboxie, it is a FREE download for Home users and you can get it Here  Sandboxie

 

The second application I will recommend for you in this post is Time Freeze, you can get it from this LINK time freeze

This second application after you install it and run it, will automatically “Undo” all the changes you make to your syystem after you Turn on the application, give it a try!

So what you get from this post?

In case the worst happens to your Windows System you should have a Restore Point already Set Up. To prevent the worst from happening you can use a Sandbox Tool, which is a tool that allows you to run programs, browse the Internet and fool around. With the smaller ammount of consequences possible.

Hope this helped! More tips will come in the future so keep visiting the website.

If you found this post useful, please do share it by usingthe Social media buttons below this post (Facebook, Twitter, Stumbleupon, etc)

Thursday, March 10, 2016

Socks what are them why you need them

Hi again, this will be a brief post regarding Socks

[caption id="attachment_1233" align="alignright" width="300"]technology concept technology concept[/caption]

Socks what are them and why you need them?


If you just started lurking around on the Dark web markets and foruns. Time and time again you will read someone talking about Socks or selling them.

But the reality is you have no clue at all what they are.

Basically a sock is a point of entrance to your connection. And with that "information" websites can find out if the IP address that you are using really is your own, or if you are using some proxy server or a VPN service.

Contrary to "proxies" a Sock will not last for a long time! When you get a sock it will probably work only for a few hours, if you are lucky you can get it for 1 or 2 days.

get a new identity online for free

Why a new identity?


There are many different reasons why you need to get a new identity, everyone needs some privacy! When we register to certain websites, like free services and social media they always require you to complete your "profile"; and doing so with your real identity will often lead to identity theft.
By using a "virtual" persona you created, you can forget about all the risks of identity theft.
On this article I will explain to you how to create a new identity online.

your first step is to enter this link... Fake Name Generator fake name generator logo

Tuesday, March 8, 2016

BIN list and why you need one!


Viewers be advised! This is a basic tutorial, and just for educational purposes I would never ever really suggest that someone would use this knowledge. And all of those who do use them will rot in jail for a long long time.


Iam not going to give you the very basics, like were to get this stuff, there are already a lot of blog posts suggesting some markets and autoshops. How to burn a plastic CC will be another topic, on this one I will talk about BIN's


What is a binlist? Why do I need one?



visadiscovermaestroamex



To answer this question you should know that a BIN or IIN , both of these are acronyms for Bank Identification number or Issuer Identification number. The BIN or IIN Is the first 6 digits on a credit card that determines the bank and level of the card, a BIN List is a list of BINs that you know will be aproved for your region, having a BIN list is the difference between guessing for approve and hoping to eliminating the guess and knowing it will work


Ok now that you know what a BIN and BIN list is exactly, how do you get one?


Here is the tricky part! As always you need money to make money. As such the first round of dumps you invest on should be a learning experience.


You should get a mixpack all from different BINs and test them out one by one to see which ones work in your area.


Now you are thinking “How tha Hell can I test these cards since I dont know my bins and its a guessing game whether its a decline or not” even worse what happens if it shows Hold call or Stolen??!!, Dont worry! I will tell you all about it :) (But just for you to know how the evil persons do it! You should never ever do this).


What to do in order to test your card I will suggest


1. Go to one of those movie ticket vending machines where you can pay with CC,


2. Going to ANY self slide checkout, some areas have more than others


3. Coca Cola or vending machines that take CC


4. and nowadays even Cigarette machines accept credit card, so you can use them at will


Along the way you always need to be taking notes. Write down 1 by 1 which BIN actually work and which ones are “dead” or declined. That is how you can get a Bin List.


I went back to basics with this article. Was getting a little bored of writing about MS Windows on how to open an email account :)


Hope you like this Article and keep reading for some more real tips.

“Dark Fiber” and Google

On this article I will let you know about the Dark Fiber and Google relation to it.

Some of us have heard about the ever popular and the emerging usage of “Dark Fiber”.

What exactly is “Dark Fiber”? as opposed to the regular optical fibers we read about. Dark Fiber is the chunk of optical fiber wires that can potentially be used and utilized in order to facilitate the fiber optic related operations.

 

Since Dark Fiber are the cables that can be used to potentially for any operation related to fiber optics, The Tech Giant Google is currently eyeing to utilize all the dark fiber around the US to present its users with potentially the best internet speed they have ever seen.

This “plan” of Google seems to be in full flow as of now and is the one that could make Google an even bigger heavyweight within the tech market. If this plans “succeeds” then this could mean that Google could climb to the no. 1 spot in terms of connection speeds.

[quadradoadsense]a computer ethernet cable

Monday, March 7, 2016

Confessions about ghost writter

Hello, I have a confession to make.  Logo (1)

This blog is growing strongly and with the growth my "outdated" methods and skills on SEO, design, even CMS are starting to be a pain. I have to use far too much time on those areas to "learn" about them. But at the same time I felt it was very important for a blog just starting to keep the articles flowing.

In order to do that and still have a "life" my idea was to hire a ghost writer to do some basic articles for me and I would just do a few good ones whenever I could.

I went to freelancer.com and got some projects there looking for a ghost writer. But for god sake it was just too awful, using those article here. It just felt wrong. Full of inaccuracies due to lack of experience on the subject. It is very hard to write correctly about the deep web if you do not use it, because there are so many scams out there. You need to recognize them or the open web research, is not going to help you.

In my tries to get someone to write a few articles I ended up paying for someone I eventually had to teach about the deep web, how to research articles and how to post them to wordpress lol. Not only that but after they gave the "article" written I have to take over, review and fix all the inaccuracies which ends up taking me even more time then just writing them myself.

Even so I still need some help (as much as I can) for this blog. If you believe you can help me, please do contact me!

Please drop me a message telling me how you can help by using the contacts HERE Like I said before.

Iam looking for someone who can take some of the "load" out of me. You can use your own "sponsors" if you write good articles. Iam not only looking for writers, as I said my knowledge in blogging,  Internet design, plugin customization for wordpress, SEO, and a bunch of other fields you can think of are way too limited. My point is please don't just complain on the comments, the image does not load, you need to get sponsors etc. Click on the Contacts and offer a bit of help :) Thanks for reading my rant and I will wait for your help :)

 

 

[quadradoadsense]

Hidden Web Services and how to use them:

onionA hidden web-service is another word used within the Deep web community. Which denotes a specific service or a web site within the Tor infrastructure that uses the same level of security and anonymity by being accessible only through the Tor browser. That is why, if you are interested in using any of these “Hidden-services” then you must be a user of the Tor browser in order to gain access to these services.

[quadradoadsense]

Since Hidden web services, are anonymous, they will range from a wide variety of things. The user could find almost any sort of hidden service depending upon their interest, all while maintaining their anonymity.

Since there are numerous different variants of hidden web services and all of them randomly appear and disappear, it is very hard to keep track of their availability.

Here are five of the most useful hidden web services that Tor network has to offer for its users.


Sticky post on wordpress

How to create a Sticky post on your Word press blog.


This post is a bit offtopic of my blog theme. But just today I wanted to insert a "sticky post" on my frontpage and I was not sure how to do it.

So I just used a search engine to find it and I did it in a few seconds.

If you are here because you searched "how to insert a sticky post wordpress" then mission accomplished! :)

 

Here it is how you do it:



Deep web what it really is

Hello, I will keep this post very "simple" and make it "sticky"


In it I will talk once again about the Deep Web, but no images/bullshit. The point is, the more and more I approach people and try to find out what they know about the subject, the worst it gets :)

There is a huge amount of disinformation about this!


Iam not going technical on terms like Deep Web, Darknet, Dark web. I did it already along the way on this blog.

When I use the term Deep web on this post, Iam well aware that it is not technically correct, Iam using it on the most popular idea of what the deep web represents for the majority of people around the world...

First and foremost, utmost persons not "technology inclined" have no clue at all about the Deep web. 90% of the ones who have some idea, have the wrong idea...

So here it is the reality of the Deep Web (again this is technically incorrect at some levels, its just an easy approach Iam giving for everyone to understand)

When someone refers to the Deep web, they are talking about websites that are not reachable by normal "web browsers"

To access them you need to use the Tor browser because it connects to the network (Internet) where the deep web pages are located.

The Deep web is a place OPEN for EVERYONE where you can host several services like websites, all different kind of services, IM, Radio, Video, etc.

Exactly the same as open Internet, with the difference that it runs under the Tor network. This is an anonymous, non centralized Network which grants a huge level of anonymity to its users!

 

[quadradoadsense]







 

What the Deep web is NOT is a place were are all the hackers, were drugs/weapons are sold or a pedophile paradise!

What the Deep web is. An anonymous Internet open for everyone.

But not everyone is the same! And some groups like Hackers, pedophiles, drug dealers, etc. Found it quite useful to be anonymous :) So they use it as much as they can, and websites/markets offering "illegal" or not so "moral" items and articles. Created by them, started to emerge all over the Deep web, to that "section" of the Network we call it by Dark web.

The Dark web is not the Deep web and is far away from the real idea behind the Deep web.

 

Why people don't know anything about the deep web? Most don't even know it really exists. It's way beyond me! It seems to be the obvious reason is that, its not in Governments and even the Dark web users best interest's for the truth to be told. The deep web is under NO ONE control. The last real Anarchist bastion out there.

 

 

Some links on this page you may be interested in:

 

Tor Browser Using it and testing it for the first time

Deep web (basics myths and opinion)

Deep web and Dark web

Saturday, March 5, 2016

Bitcoin and the Deep-Web:

bitcoin and its connection with the deep-web has been well documented and well known to all that are interested in it. A Wikipedia definition states that Bitcoin, invented by Satoshi Nakamoto satoshi nakamoto, is an open-source software which is peer-to-peer; it allows its users to carry out transactions without a “middle man

Now we know what the Deep-web is and also its instrumental role in elevating Bitcoin to the level it is at today.

 

DoS and DDoS attacks - Basics


DoS and DDoS attacks - Basic notionsDDoS


DoS or (Denial of services) attacks are a way to exploit a user resources in a way the “services ” become unavaliable.

While DDoS stands for (Distributed Denial of Service) attacks. Are the same as DoS except that they use hundreds, or even thousands of machines to flood the services and cause the malfunction.

Usually this is performed by flooding the service with ICMP packets forcing a server to respond to the request by the attackers (this is achieved by the need to reply to the ICMP packet). Other attacks including sending malformed ICMP packets, flooding the site with resource requests, or SYN flood attacks.


Despite the ICMP traffic uses the TCP protocol, this kind of attack will not work on a Tor network. There are hundreds of reasons for .onion websites and markets to become unavailable, but rest assure a ICMP attack is not one of them.


But when this kind of attack is targeted at the Clearnet for example against www.facebook.com. Over and over again they keep being successful.


Or another method of achieving the same result- Ping of death attack (catchy name right!)ping-of-death


This attack is accomplished in two different ways, the first method is quite obvious, just send too many packages to flood the system. A system using Windows as the absolute packet size limit of 64K (65535 bytes).


This means that if you are able to send packets larger then the 64k limit, it will either completely crash down the system, or it will enable the attacker to successfully perform a privilege escalation attack. Flooding the site with requests for resources (videos, pictures, login requests, etc.)


To prevent this attacks you need to focus more on the hardware control then the implementations with the site itself. If you are hosting and managing both, the server and the website, you should try to enable ingress filtering over your network, to stop some of the attacks on the spot. If you use the backscatter traceback method  you will be able to do just that.


Also take care to block the ICMP packets looking for your external interface (the WAN). Take special attention to block all the "unallocated source address'".


Following these steps you will not stop a DDoS, but you certainly will weaken the effect.




Tools for DDos and DoS attacks


Microsoft PIN revolution the new “advance”

Hello, if you recently upgraded for Windows 10. You may have noticed this notification: pin notification
“Using a PN is faster and more secure than a password – we think you'll love it.”

This got me thinking, how can a 4 digits PIN code ever be safer then a long password with all the rules they require nowadays. 8 characters or more, special symbols, numbers, etc.

I could not figure it out, so I had to do some research on the topic, and this is what I found out in the end.

First and foremost the “PIN” code will not directly increase the security of your computer, but it definitely increases the security of your online account with Microsoft.

How is it possible?

  • The PIN is only used to log in a particular computer, but does not guarantee access to the all the accounts that the owner may have used on that computer before.



  • The idea seems to be: In case shit happens and someone manage to enter this PC he will only have access to this single computer, but will leave the rest of the network safe.


Friday, March 4, 2016

Boost your Alexa Rating

Hello, this blog is fairly new. I started it in 16 February. If you ever had a blog or a website then you already know how difficult it is to get visitors.

Success creates more success, specially if you are starting there is no way you can get success from one week to another.

This was before!

AlexaSurfing - Free Website Traffic Exchange

Great quality affordable graphic services

Hello, as I already mentioned frequently on this blog.

I care much more about creating content then I do about making the website look “nice”.

Despite that, some sort of design is needed for success and to create the identity of the website.

 

A few days ago I had some problems. I needed to create a logo and I also wanted a banner for securityfreak.info.

Because Iam on a very short budget and I do have some skills of Photoshop, design, etc, my first instinct was: No I will not pay for this, I will search for some (pre made) templates on free websites and then modify them for my needs.

It was a great plan! Except for the fact that at the same time I still had to research for new articles, write them, and comply with all the SEO rules, while still advertising my webpage :) Not to mention I also have my “day job” to get to.

Bottom line I had very few money and time, when I had to put in consideration Time was far more important for me then the money, still money was not that insignificant that I could just pay a huge amount of € for a banner.

My first step was to look on mr google for freelancers and I found this webpage:

www.freelancer.com

Improve Windows performance 3 simple tips

If you are using Microsoft Windows as your main operating system, you will notice that after sometime in use it gets much slower then what it was when you just started it.

Why?
This happens because Windows does a very poor job when it comes down to memory management.slow windows

Your System gets flooded with Idle Tasks that slowly but steadily will make your computer run slower and slower by taking up your RAM.

There are many ways to fix this when it happens.

On this article I will give you:


3 easy Tips on how to Improve Windows performance.


 

The first tip I will have for you so you can Improve Windows performance, is to restart your Windows frequently. And after you turn off you PC wait at least 7 seconds for the memory completely dissipate.

If you don't want to restart your Computer frequently (I know it is boring and time consuming) then you can use my second tip for speeding up your Windows System. Use some Ram saver software!

There are a lot of Free Ram cleaner software available on the Internet. But here are some more Links for you to use:

Click any of the links below:

 

                          > Cleanmem   > Minimem   > MaxMem   > RamRush

 



 

 

The way this memory optimizers work is by creating a virtual process that loads a lot of RAM memory and immediately releasing it. But be aware this is just a temporary solution to the problem. In a worst case scenario this applications can slow down even more your system, there is nothing better then a Reboot.

Thursday, March 3, 2016

Silk Road is dead. What next?

On this article I will talk about Silk Road from the beginning to the end, and I will talk about what's coming now that Silk Road is dead.

1- What Silk Road was
2- What happened to Silk Roadsilk road logo
3- Consequences
4- Whats happening now

1- Silk Road was a dark net Market best know for selling all kinds of drugs Worldwide.
Silk Road was launched on February of 2011 and operated under the Tor network.
The original onion address was http://silkroadvb5piz3r.onion untill it got seized by the FBI back in 2013

Silk_Road_Seized

 

2- What happened to Silk Road was that it got really big, the media started to be all over it and it got the attention of the US government.
After grabbing the atenttion from autoritys, small dealers started to get caught and convicted here and there.
Untill finally the FBI was able to locate the real location of the server, from there they infiltrated deep on the website and eventually were able to arrest the supposed owner/creator/administrator Ross William Ulbricht AKA"Dread Pirate Roberts"ross ulbritch linkedin
3- A consequence of all this, was that the Dark Web gained notoriety, more and more Illegal markets started to emerge. Inclusive soon after the FBI closed the Silk Road Market the Silk Road 2 Market was created by three administrators of the original Silk Road website relaunched it under the name Silk Road 2, this website was operational from Nov 06 2013 untill Nov 06 2014.
Silk Road 3 would follow, but this one was just a rebrand of another Dark Web Market "Diabolus"
4- What we have now is a crazy uprising of new dark web markets. It seems that for each market the authorities take down, 2 more appear to replace them.silk-road-2

 



Wednesday, March 2, 2016

News - The IRS was using a system that was hacked to protect victims of a hack

This is a funny story I just stumbled upon:


irsus

 

It seems that the American IRS got hacked again. The security researcher and reporter Brian Krebs  just announced yesterday 1 March 2016 that the system that IRS adopted to protect the citizens from getting hacked was already hacked! (There was a huge attack on the US IRS on the past two years were identity thieves would ask for tax returns, to accounts the real user don't control.) After analyzing the situation the IRS decided to implement a new security feature. And the solution was to give the users a PIN number to make sure they are dealing with the right person.

But this measure was not enough to keep the thieves away. Yes its true, the US IRS got hacked again.

The thieves used a kind of social engineering to manipulate the system. It was possible to get a new PIN number by logging in the IRS Website and using the KBA system (Knowledge-Based Authentication).

This is a system that asks for some private personal and financial details of the user, like "what is the name of the street were you live" or "how much did you receive last month" you probably have seen this system before. The funny part is that it was exactly this system that was hacked on the last years, so the IRS created the PIN to avoid the hack. All good except that you could get a new PIN by accessing the IRS online portal and using the old already hacked system. This is the story on how the US IRS hacked again this year :)

Now this is the link to the source:

Link to the news article: LINK

 

[ads1 adsenselinks=""]

 

As always if you like this article please do use the buttons below and share it to social media (Facebook, Twitter, Stumbleupon, etc)

 

 

[ads2 adsense2=""]

 

Socks Proxy Finder AKA Pfinder

Socks Proxy Finder or Pfinder is a program to scan for Socks proxies.
A comment from a person in China said that

Proxy Hunter could miss Socks proxies that Pfinder

would find. Pfinder does not allow entry of a

string to match up with a webpage, and it

does not allow a webpage URL to be entered

(unlike Proxy Hunter).

This time I will give you a great tool to download. No ads, virus, spyware. Not even going to use sharecash in this one, you just need to click the link and Download!

But the file is hosted on a free file sharing website on the deep web, so you need to access it through your Tor browser.

If you don't know how to get the Tor browser you can see on this Link

There is a lot of interest around the Dark Web to get some Socks proxies. Normally people will pay a lot of money for some Socks that will only work for a few days. With this small and old application (Socks Proxy Finder) you can find your own Socks proxy.

You do not need to install Socks Proxy Finder on your computer, you just need to unpack it and run.

[caption id="attachment_829" align="aligncenter" width="406"]This is a screenshot from the application running on my computer: Socks Proxy Finder This is a screenshot from the application running on my computer:[/caption]

[ads1 adsenselinks=""]

Tuesday, March 1, 2016

Security Culture by Resist


security culture


This text was "borrowed" from Resist!ca. Resist! is a Group of activist's from Vancouver Canada. This is a group following anarchist principles, with no clear lider. All the decisions must reach a consensus, you can read all about this group on their homepage here: https://resist.ca/about


I really like this text and it makes perfect sense to post it due to the theme of this blog. It is a big read, but I hope you make it and enjoy it :)




The first step in recognizing security risks in a community is working towards creating a security culture. Below we have compiled some relevant materials and links that should be used in conducting security workshops and educating activists that you work with. As our direct action movement becomes more effective, government harassment will only increase. To minimize the destructiveness of this government harassment, it is imperative that we create a "security culture" within our movement. Violations of security culture include behavior is inappropriate because it intensifies government harassment, jeopardizes the freedom of other activists, and destroys the trust within the movement.




Security Culture: What is it, Why we need it and How to Implement it...


 



Donald Trump Assassination charity

Stop Donald Trump

While surfing on the deep web I just stumbled on this website "Charity for Donald Trump Assassination"

I just find it hilarious so Iam posting it on the blog.


If you are thinking this is not "security related" you can bet getting assassinated is a security risk for mr.Donald Trump :)

This is what the website as to say:

[ads1 adsenselinks=""]