Mes liensShaared links2013-11-27T21:49:16+01:00https://xoofoo.org/paper/https://xoofoo.org/paper/https://xoofoo.org/paper/ShaarliTop 50 2013 | CyberPunkhttps://xoofoo.org/paper/?jgh5jw2013-11-27T21:49:16+01:002013-11-27T21:49:16+01:00— Permalink]]>Project Honey Pothttps://xoofoo.org/paper/?uxIGTQ2013-11-26T22:42:28+01:002013-11-26T22:42:28+01:00
Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
To participate in Project Honey Pot, webmasters need only install the Project Honey Pot software somewhere on their website. We handle the rest — automatically distributing addresses and receiving the mail they generate. As a result, we anticipate installing Project Honey Pot should not increase the traffic or load to your website.
— Permalink]]>MintEmail - Temporary, Disposable Email Addresshttps://xoofoo.org/paper/?rtuU6g2013-11-13T23:54:51+01:002013-11-13T23:54:51+01:00— Permalink]]>10 simple tips to use PuTTY effectivelyhttps://xoofoo.org/paper/?oueX8Q2013-11-02T22:43:58+01:002013-11-02T22:43:58+01:00— Permalink]]>MyWhisper.net - Text Encryption Toolhttps://xoofoo.org/paper/?IL4HvQ2013-10-31T23:02:25+01:002013-10-31T23:02:25+01:00
How it works:
Mark needs to send personal text to Sarah, and wants that only Sarah can read it.
Mark writes here in Input field the text.
A password is automatically created. Or Mark and Sarah can estabilish a password for every communications over a secure channel (by voice, for example).
Mark can send the encrypted field OR the sharing url field over an insecure channel (for example a chat, mail, Skype, Facebook etc) where Sarah can read it.
Sarah opens the sharing url (or opens this page and pastes the encrypted text), enters the password and can read the original message in the decrypted field.
Note:MyWhisper.net and NOBODY in the network can technically see neither the original text nor the password, and not even the encrypted text if sharing url version isn't used, because all stuffs are only in Mark and Sarah browsers and all encryption/decryption is performed by their browsers with javascript. Therefore HTTPS/SSL access is useless.
— Permalink]]>ArkOShttps://xoofoo.org/paper/?GHdkUg2013-09-03T00:59:10+02:002013-09-03T00:59:10+02:00
Securely self-hosting your websites, email, files and more has never been easier (or cheaper!). Decentralize your web and reclaim your privacy rights while keeping the conveniences you need.
— Permalink]]>MailPilehttps://xoofoo.org/paper/?Ahorzg2013-08-13T22:23:57+02:002013-08-13T22:23:57+02:00— Permalink]]>Cozy, a personal cloud you can hack, host and deletehttps://xoofoo.org/paper/?lABifA2013-07-30T23:44:09+02:002013-07-30T23:44:09+02:00
If you want the benefits of Cozy without the constraints of self-hosting, visit cozycloud.cc and try our hosting solutions!
— Permalink]]>RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.https://xoofoo.org/paper/?WNb_Dw2013-06-23T23:08:26+02:002013-06-23T23:08:26+02:00
Secure your communication with our mobile applications. It's that simple.
— Permalink]]>Cryptocathttps://xoofoo.org/paper/?ar8wzA2013-05-21T22:49:33+02:002013-05-21T22:49:33+02:00
Cryptocat is an open source experiment — the goal is to provide the easiest, most accessible way to chat while maintaining your privacy online, because we believe in Internet privacy.
— Permalink]]>SoftEther VPN, un projet anti-censure de VPN décentralisés et gratuitshttps://xoofoo.org/paper/?lK2bCg2013-04-14T13:50:23+02:002013-04-14T13:50:23+02:00
Son projet SoftEther signifiant Software Ethernet, est donc un service de VPN basé sur le partage des ressources serveurs selon la volonté de chacun. Un logiciel client et un logiciel pour les serveurs est mis à la disposition de tout le monde, gratuitement. Les volontaires installeront le client sur leurs serveurs afin de permettre aux utilisateurs du client sur leurs ordinateurs d'en profiter. Ces derniers pourront alors se connecter partout dans le monde de façon plus sécurisée et surtout contourner les censures mais on reste quand même dépendants des scripts potentiellement malveillants installés sur des serveurs par des "méchants".
Il ne s'agît bien sûr pas d'avoir un tunnel ultra-rapide, puisque les ressources d'un serveur seront partagées à plusieurs centaines, mais ce système se veut aussi être une alternative à TOR qui souffre un peu de lenteurs.
— Permalink]]>Kali Linux – A Teaser into the Future.https://xoofoo.org/paper/?ZKAHeg2013-01-22T21:05:55+01:002013-01-22T21:05:55+01:00
It soon became evident to us that with our 4 year old development architecture, we would not be able to achieve all of these new goals without a massive restructure so that’s exactly what we did and “Kali” was born. We’ve also posted a Kali Linux teaser on the BackTrack Linux site – and that’s all we’ll say for now…
— Permalink]]>A practical guide to protecting your identity and security when using mobile phoneshttps://xoofoo.org/paper/?YORSWw2013-01-15T22:29:47+01:002013-01-15T22:29:47+01:00
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
— Permalink]]>Assurer la confidentialité de ses emails avec Thunderbird et PGPhttps://xoofoo.org/paper/?hPaTRg2013-01-15T22:21:43+01:002013-01-15T22:21:43+01:00— Permalink]]>Sécurité, mots de passe et poissons volantshttps://xoofoo.org/paper/?-Hop0w2013-01-08T22:13:22+01:002013-01-08T22:13:22+01:00
Saler et hacher ne suffit pas
A la lecture de deux très bons articles sur le sujet : How to safely store a password (en), Exemple de stockage de mot de passe en Java : hashage et salage, est-ce suffisant ? ; on se rend compte que saler et hacher ne suffit pas !
— Permalink]]>Privlyhttps://xoofoo.org/paper/?VnT6Lg2013-01-02T16:33:28+01:002013-01-02T16:33:28+01:00— Permalink]]>5 More PHP Security Vulnerabilitieshttps://xoofoo.org/paper/?QuYIqA2012-11-12T20:54:44+01:002012-11-12T20:54:44+01:00— Permalink]]>Top 10 PHP Security Vulnerabilitieshttps://xoofoo.org/paper/?lcSXuA2012-11-04T16:10:56+01:002012-11-04T16:10:56+01:00
But, you can’t buck statistics. Nobody is going to read an article entitled “Coding for Security.” Everyone wants an article with a number in it: “The 8 Most Common PHP Security Attacks and How to Avoid Them”, “23 Things Not to Say to a Super Model”, and “15 Reasons to Avoid Radiation Poisoning.” So, here goes, the “Top 10 PHP Security Vulnerabilities.”
— Permalink]]>About Exploit Exerciseshttps://xoofoo.org/paper/?5MmMaw2012-08-28T14:50:55+02:002012-08-28T14:50:55+02:00— Permalink]]>Cryptez vos données sensibles dans le cloud avec BoxCryptorhttps://xoofoo.org/paper/?6tmpkQ2012-08-28T12:23:11+02:002012-08-28T12:23:11+02:00— Permalink]]>BackTrack 5 R3 Released!https://xoofoo.org/paper/?iJ4bhg2012-08-28T12:18:23+02:002012-08-28T12:18:23+02:00— Permalink]]>Encrypt USB - Portable file encryption softwarehttps://xoofoo.org/paper/?BZ29vg2012-07-19T19:37:36+02:002012-07-19T19:37:36+02:00
It uses users hashed password as key to encrypt & decrypt data,so it is strictly adviced to decrypt all files before changing password.
— Permalink]]>10 easy steps to writing the scariest cyberwarfare article everhttps://xoofoo.org/paper/?OPJ8Ow2012-07-19T18:53:48+02:002012-07-19T18:53:48+02:00— Permalink]]>Comment sécuriser Apachehttps://xoofoo.org/paper/?sdVO_Q2012-07-18T23:40:50+02:002012-07-18T23:40:50+02:00— Permalink]]>Performing DDoS attacks with HTML5 Cross Origin Requests & WebWorkershttps://xoofoo.org/paper/?HjdT-g2012-07-17T07:28:06+02:002012-07-17T07:28:06+02:00
This post is about a DDoS technique I spoke about at BlackHat Abu Dhabi that uses two HTML5 features - WebWorkers and Cross Origin Requests. It is a very simple yet effective technique - start a WebWorker that would fire multiple Cross Origin Requests at the target.
— Permalink]]>كيف تنشئ بروكسي خاص بك بـ3 خطوات « Syria News / Hacktivisthttps://xoofoo.org/paper/?cipSQw2012-07-15T21:20:52+02:002012-07-15T21:20:52+02:00— Permalink]]>Tutoriel #1 : Surfer anonymement et gratuitementhttps://xoofoo.org/paper/?RtG0JQ2012-07-14T19:30:04+02:002012-07-14T19:30:04+02:00
J’ai donc décidé de me rattraper aujourd’hui en vous donnant quelques astuces pour surfer sur le net de manière totalement anonyme.
Evidemment ce genre de sujet à déjà été traité 1000 fois sur d’autres blogs, mais un petit rappel ne fait pas de mal et j’ose croire que certains de mes lecteurs pourraient être intéressés par quelque chose d’un peu vulgarisé/simplifié.
— Permalink]]>