Posts Currently viewing the category: "infosec"

It is incredibly easy to add a malicious components (malware) to DMG files,  uploading them to file sharing websites like sourceforge.net, & infecting computers on a mass scale.  SHA checksum is added to DMG files like TransmissionBT1, & Handbrake.fr2 to detect file tampering. How to check SHA checksums: In terminal, find the file…(Read More)

SSH into your VPS host: ssh root@IP sudo apt-get update sudo apt-get install binutils libreadline5 libruby1.8 ruby ruby1.8 ssl-cert unhide.rb mailutils Once it has finished downloaded, extract the files and enter the resulting directory: tar xzvf rkhunter* cd rkhunter* Install RKHunter: sudo ./installer.sh Initial Test Runs The…(Read More)

DDoS Trojan attacks

by

Have you encountered with DDoS Trojan attack? It’s a familiar issue to all SysAdmins, when we work on DDoS attack. Normally, the top command shows a suspicious process with a random name like, Xdrgwdjd, jjiiyaykzg etc or some system commands like ls, ifconfig, pwd, ping, awk, telnet etc. When we kill that task another…(Read More)

Just saw an article I would like to read, but I noticed it was set up that you had to give all of your information to the business. Normally, I don’t mind, but this time I found how much I had to give away (personal information) wasn’t worth the skimming I’d most…(Read More)

pwn any Mac

by

Many people at my office come and go, with that, we often have computers locked and without admin rights access. You can easily gain access to any Mac by restarting the setup assistant (making the computer think its new again). Don’t worry, you won’t loose any information. All it does is sets up…(Read More)

PageLines