Often, you find yourself in a situation when it is not convenient to use your smartphone or get it out of pocket, such as when it rains, while driving a car, at a meeting... Or you may…
CONTINUE READING 🡒 Reach the root! How to gain privileges in Linux?
In the previous article we have already reviewed several methods regarding the boosting of privileges to a system ones in terms of Windows. As it turned out, there are plenty of ways to do that and which…
CONTINUE READING 🡒 How to build kernel modules and native Linux applications for…
Android devices are good by any definition, but sometimes they extremely lack features and utilities available in desktop Linux. Separate instruments, such as Terminal IDE, partly help, but anyway they do not have some of the desired…
CONTINUE READING 🡒 Let’s get rid of default settings!
When people prepare a server for their resource or set up some other software, they often leave most of the default options in configuration files unchanged. Then the project is provided with more and more functions, and…
CONTINUE READING 🡒 SharePoint Serving the Hacker
SharePoint is a corporate document storage system from Microsoft with CMS capabilities which is strongly bound to Active Directory. You can use Google to find general descriptions of its vulnerabilities but, given that the details of its…
CONTINUE READING 🡒 Pwn Plug R2
Instrumental bugs, radio interception — everyone's heard of these, right? The idea of introducing one's own device into a communication channel that carries important information is as old as the world. Such devices are well-known to everyone…
CONTINUE READING 🡒 The Smallest Trojan of Modern Age
This Trojan could have easily got lost among thousands of its fellows in the craft, if there wasn't one overriding reason. You probably would agree that in today's world of gigabytes, gigahertz and hundreds of thousands of…
CONTINUE READING 🡒 Spam with viruses
Spamming with malicious attachments is a popular way of malware spreading and infecting computers of Internet users. According to data of different antivirus companies, the share of messages with malicious attachments makes 3 to 5 percent in…
CONTINUE READING 🡒 Cryptography at gunpoint
Cryptography is perceived as a magic wand waving which one can protect any information system. However, surprisingly enough, cryptographic algorithms can be successfully attacked. All sophisticated cryptanalysis theories will be brought to naught if the smallest piece…
CONTINUE READING 🡒 The Bourne Identity
It is always stressed me out how Google AdSense palm me off with certain contextual advertising based on my previous searches. And it might seem that quite enough amount of time had passed and that all cachees…
CONTINUE READING 🡒 Apple forensic: advanced look onto Apple security
As of last July Apple sold over 800 million iOS devices. More than a half of them are various iPhone versions. With such number of devices in circulation it's not surprising at all that they often undergo…
CONTINUE READING 🡒 How to get sensitive data using social networks API?
Everybody knows that present-day social networks in fact are huge DBs containing a lot of interesting private information of the users. Why should you get by with the crumbs of information from index page when every network…
CONTINUE READING 🡒 A Detailed Analysis of the First Locking and File Encrypting…
It seems that, with increasing popularity, any operating system turns into Windows. It was hard to expect that the locking and file encrypting Trojans so familiar to Windows users will appear on the platform known for its…
CONTINUE READING 🡒 Learning to detect shell codes for ARM platform
The ubiquitousness of ARM based devices means that malefactors find them more "yummy" for an attack. It's no surprise that shell codes for this platform have long become reality. In spite of the fact that the researchers…
CONTINUE READING 🡒 Why do we need ARM on servers?
A small optimized kit of ARM chip commands is perfect for mobile devices. Thanks to lower power consumption, it is very popular today for being used in smartphones and tablets. However, recently there has been a lot…
CONTINUE READING 🡒 Monetizer Trojans
Today, we will leave aside the activities of outright web criminals and talk about the programs which, while being formally not malicious, have some features that get them flagged as "unwanted" by many antivirus tools.
CONTINUE READING 🡒 Coding on Android tablet: tips and tricks
Standard way to develop an Android application: sit down to table, turn on the computer, launch Google's SDK and, drinking a cup of tea, unhurriedly stamp a code. But such a cozy environment is not always available,…
CONTINUE READING 🡒 Root for HDD: expanding the HDD standard capabilities
HDD structure is surely known to everyone, to a certain extent. Basically, it consists of several platters which rotate with the speed of 15,000 rpm, position control device and control electronics module. All this is complemented by…
CONTINUE READING 🡒 In the Depths of iCloud Keychain
The secure storage of passwords and their synchronization between devices is definitely not a simple task. About a year ago, Apple introduced to the world the iCloud Keychain, its centralized password store for Mac OS X and…
CONTINUE READING 🡒 Tails, invisible Linux distributive
Recently, there has been a new release of Tails distribution — the same Tails, rumors said, that had been used by Snowden to hide his channels from the all-seeing eye of Big Brother aka NSA. In this…
CONTINUE READING 🡒