796 shaares
62 results
tagged
Hacktivism
ProxyCap enables you to redirect your computer's network connections through proxy servers. You can tell ProxyCap which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any of your Internet clients. ProxyCap has native support for the SSH protocol, allowing you to specify a SSH server as the proxy server.
Here is greeting from the maker... Dear Internets! My name is Simon and I am the director/producer of the film TPB AFK: The Pirate Bay Away From Keyboard. After 5 years of hard work, it's a great pleasure to finally upload a torrent about this great website onto the site itself. In a way, I guess TPB AFK has finally come home. This is not just a film about the founders of TPB, but also a film about all of you who use the site.
Weevely is a stealth PHP web shell that provides a telnet-like console. It is an essential tool for web application post exploitation, and can be used as stealth backdoor or as a web shell to manage legit web accounts, even free hosted ones.
Weevely is currently included in Backtrack and Backbox and all the major Linux distributions oriented for penetration testing.
Weevely is currently included in Backtrack and Backbox and all the major Linux distributions oriented for penetration testing.
The Serval Project consists of two systems.
The first is a temporary, self-organising, self-powered mobile network for disaster areas, formed with small phone towers dropped in by air.
The second is a permanent system for remote areas that requires no infrastructure and creates a mesh-based phone network between Wi-Fi enabled mobile phones, and eventually specially designed mobile phones that can operate on other unlicensed frequencies, called Batphone. The two systems can also be combined.
We have developed software which we’ve called Distributed Numbering Architecture (‘DNA’) that allows people in isolated or temporary networks to immediately use their existing phone numbers.
We believe that for a phone network to be useful, you must be able to call people, and have people call you on numbers that they know. This is especially true in disasters. This is the magic of DNA: it allows people to use their existing phone numbers, so that others can call them easily.
The first is a temporary, self-organising, self-powered mobile network for disaster areas, formed with small phone towers dropped in by air.
The second is a permanent system for remote areas that requires no infrastructure and creates a mesh-based phone network between Wi-Fi enabled mobile phones, and eventually specially designed mobile phones that can operate on other unlicensed frequencies, called Batphone. The two systems can also be combined.
We have developed software which we’ve called Distributed Numbering Architecture (‘DNA’) that allows people in isolated or temporary networks to immediately use their existing phone numbers.
We believe that for a phone network to be useful, you must be able to call people, and have people call you on numbers that they know. This is especially true in disasters. This is the magic of DNA: it allows people to use their existing phone numbers, so that others can call them easily.
It’s been 7 years since we released our first version of BackTrack Linux, and the ride so far has been exhilarating. When the dev team started talking about BackTrack 6 (almost a year ago), each of us put on paper a few “wish list goals” that we each wanted implemented in our “next version”.
It soon became evident to us that with our 4 year old development architecture, we would not be able to achieve all of these new goals without a massive restructure so that’s exactly what we did and “Kali” was born. We’ve also posted a Kali Linux teaser on the BackTrack Linux site – and that’s all we’ll say for now…
It soon became evident to us that with our 4 year old development architecture, we would not be able to achieve all of these new goals without a massive restructure so that’s exactly what we did and “Kali” was born. We’ve also posted a Kali Linux teaser on the BackTrack Linux site – and that’s all we’ll say for now…
Il se passe quelque chose d’assez extraordinaire actuellement sur Internet suite à la tragique disparition d’Aaron Swartz : des centaines de professeurs et scientifiques du monde entier ont décidé de publier spontanément leurs travaux en Libre Accès !
Il faut dire que sa mort devient chaque jour plus controversée, les pressions judiciaires dont il était l’objet n’étant peut-être pas étrangères à son geste. Comme on peut le lire dans Wikipédia : « En juillet 2011, le militant américain pour la liberté de l’Internet Aaron Swartz fut inculpé pour avoir téléchargé et mis à disposition gratuitement un grand nombre d’articles depuis JSTOR. Il se suicide le 11 janvier 2013. En cas de condamnation, il encourait une peine d’emprisonnement pouvant atteindre 35 ans et une amende s’élevant jusqu’à 1 million de dollars. »
On peut suivre l’évolution du mouvement derrière le hashtag #pdftribute (pdf hommage) qui a déjà son site et son compte Twitter dédiés.
Dans la foulée nous avons décidé de traduire ensemble un autre article important d’Aaron Swartz (rédigé à 21 ans), en lien direct avec la motivation de tous ceux qui lui rendent ainsi un vibrant, concret et utile hommage : Guerilla Open Access Manifesto.
Ce manifeste s’achève sur cette interrogation : « Serez-vous des nôtres ? »
Il faut dire que sa mort devient chaque jour plus controversée, les pressions judiciaires dont il était l’objet n’étant peut-être pas étrangères à son geste. Comme on peut le lire dans Wikipédia : « En juillet 2011, le militant américain pour la liberté de l’Internet Aaron Swartz fut inculpé pour avoir téléchargé et mis à disposition gratuitement un grand nombre d’articles depuis JSTOR. Il se suicide le 11 janvier 2013. En cas de condamnation, il encourait une peine d’emprisonnement pouvant atteindre 35 ans et une amende s’élevant jusqu’à 1 million de dollars. »
On peut suivre l’évolution du mouvement derrière le hashtag #pdftribute (pdf hommage) qui a déjà son site et son compte Twitter dédiés.
Dans la foulée nous avons décidé de traduire ensemble un autre article important d’Aaron Swartz (rédigé à 21 ans), en lien direct avec la motivation de tous ceux qui lui rendent ainsi un vibrant, concret et utile hommage : Guerilla Open Access Manifesto.
Ce manifeste s’achève sur cette interrogation : « Serez-vous des nôtres ? »
Un certain nombre de textes tournent actuellement sur le Net suite au décès d’Aaron Swartz. Parmi eux on trouve « La Conscience d’un hacker » (ou « Le Manifeste du hacker ») datant de… 1986 et que d’aucuns trouvent particulièrement adapté aux circonstances. Et pour cause…
Nous vous le proposons traduit ci-dessous[1]. Il a été rédigé par Loyd Blankenship, (alias The Mentor) juste après son arrestation.
« Oui, je suis un criminel. Mon crime est celui de la curiosité. »
Nous vous le proposons traduit ci-dessous[1]. Il a été rédigé par Loyd Blankenship, (alias The Mentor) juste après son arrestation.
« Oui, je suis un criminel. Mon crime est celui de la curiosité. »
Many activists have been tracked via their mobile phones, and some countries conduct surveillance more extensively than others. You need to assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Plus de 200 milliards d’emails sont envoyés dans le monde chaque jour. Si l’email est un moyen extrêmement pratique pour échanger des informations, c’est également un outil très vulnérable : interception, usurpation d’identité, surveillance de boîte mail etc., sont autant de problèmes auxquels peuvent être confrontés les utilisateurs de boîtes emails. Il existe pourtant des moyens simples d’assurer la confidentialité de vos échanges sur Internet.
Face à ces constats, la seule voie praticable semble être de devenir capables d’imaginer et de mettre en place des politiques de sécurité adéquates. Tout l’enjeu de ce guide est de fournir cartes, sextant et boussole à quiconque veut cheminer sur cette route.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Flash proxies are a new way of providing access to a censorship circumvention system such as Tor. A flash proxy is a miniature proxy that runs in a web browser. It checks for clients that need access, then conveys data between them and a Tor relay.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
« L’intelligence économique est l’ensemble des activités coordonnées de collecte, de traitement (d’analyse) et de diffusion de l’information utile aux acteurs économiques. On peut y ajouter les actions d’influence et de notoriété ainsi que celles liées à la protection de l’information indique Wikipédia.
Le nombre de guides méthodologiques ou de gestion de projets en intelligence économique pour les entreprises et les organisations se multiplie à mesure que l’Internet prend une place de plus en plus importante dans les processus de veille stratégique ainsi que l’utilisation des outils mobiles.
Le nombre de guides méthodologiques ou de gestion de projets en intelligence économique pour les entreprises et les organisations se multiplie à mesure que l’Internet prend une place de plus en plus importante dans les processus de veille stratégique ainsi que l’utilisation des outils mobiles.
Crypto.is is an organization designed to assist and encourage anonymity and encryption research, development, and use. As part of this goal, we seek to revitalize the Cypherpunk movement and provide better software, security, and anonymity to individuals worldwide.
WE FIGHT CENSORSHIP: Sheltering news and information
WeFightCensorship.org (WeFC) is a Reporters Without Borders project that aims to combat censorship and promote the flow of news and information.
Publishing censored and banned content : The WeFC website is used to publish content that has been censored or banned or has led to reprisals against its creator (murder, arrest, harassment, pressure and so on). The site hosts content (articles, photos, videos and sound files) in their original language (including Chinese, Arabic, Russian and Spanish) and in translation (above all in French and English). Reporters Without Borders took the initiative of creating this website because it wants to make censorship obsolete, to show that depriving content creators of their freedom, seizing copies of a newspaper or blocking access to a website containing a video will not prevent the content from being seen throughout the world – quite the contrary. The content posted on this website includes both raw content and content that has been written, edited or processed by journalists. So that its importance can be appreciated, WeFC adds an explanation of the context. Before selected content is posted on the site, the WeFC editorial committee verifies that it meets a series of very precise criteria.
WeFightCensorship.org (WeFC) is a Reporters Without Borders project that aims to combat censorship and promote the flow of news and information.
Publishing censored and banned content : The WeFC website is used to publish content that has been censored or banned or has led to reprisals against its creator (murder, arrest, harassment, pressure and so on). The site hosts content (articles, photos, videos and sound files) in their original language (including Chinese, Arabic, Russian and Spanish) and in translation (above all in French and English). Reporters Without Borders took the initiative of creating this website because it wants to make censorship obsolete, to show that depriving content creators of their freedom, seizing copies of a newspaper or blocking access to a website containing a video will not prevent the content from being seen throughout the world – quite the contrary. The content posted on this website includes both raw content and content that has been written, edited or processed by journalists. So that its importance can be appreciated, WeFC adds an explanation of the context. Before selected content is posted on the site, the WeFC editorial committee verifies that it meets a series of very precise criteria.
PHP Shell Detector is a php script that helps you find and identify php shells. It also has a “web shells” signature database that helps to identify “web shell” up to 99%. By using the latest javascript and css technologies, php shell detector has a light weight and friendly interface . The main features is that if you’re not sure about a suspicious file, you may send it to the websecure.co.il team. After submitting your file, it will be inspected and if there are any threats, it will be inserted into a “php shell detector” web shells signature database and the next time this file will be recognized positively.
We’ve covered a couple of DNS tools in the past, such as the DNS propagation checker, which are useful for anyone that owns a domain. The problem is that you generally have to jump around to a bunch of different sites in order to do simple things like reverse IP lookups, traceroutes, Chinese firewall tests, propagation checks, and more. Normally you need to find a site that is dedicated to do each of those things, but ViewDNS.info pulls that all together into a single site with a simple interface.
This site makes it extremely easy to perform all of the things I mentioned earlier plus some. In fact it has over 20 different tools you can use on any domain and IP address you might have. Many of the tests, such as the DNS report, are essential tools for determining the health of the DNS for your site.
This site makes it extremely easy to perform all of the things I mentioned earlier plus some. In fact it has over 20 different tools you can use on any domain and IP address you might have. Many of the tests, such as the DNS report, are essential tools for determining the health of the DNS for your site.
Dans son dernier éditorial pour Le Nouvel Observateur, Laurent Joffrin déplore que l'État ne puisse pas vérifier la véracité de ce qu'écrivent les gens par e-mail. Petit florilège des réactions suscitées, sur Twitter et du côté des journalistes Internet, par cette étonnante proposition.
Nos récents articles sur Reflets, celui sur Syria News, et celui sur le Parlement syrien, comme chaque fois lorsque l’on parle de la Syrie, ont soulevé quelques commentaires exprimant une certaine perplexité. Ces commentaires sont parfois parfaitement construits et expriment des interrogations et des réserves parfaitement légitimes. Nous essayons donc de répondre à ces commentaires, et c’est aussi un peu l’objet de ce billet.
Journaliste, animateur, écrivain, musicien, polémiste, débatteur, observateur, bidouilleur et, même s’il ne le revendique pas, surtout et avant tout, hacker.
Un discret, connu par ses projets, ses créations et ses articles.
Engagé, il présente avec un style clair et direct ses constats pour mieux ébaucher des solutions et des alternatives.
Un discret, connu par ses projets, ses créations et ses articles.
Engagé, il présente avec un style clair et direct ses constats pour mieux ébaucher des solutions et des alternatives.
Quel est le point commun entre feu Mouammar Kadhafi et Bachar el-Assad ? La dictature sanguinaire, oui. Mais pas que. Tous deux ont pu compter – directement ou non – sur le savoir-faire de sociétés françaises pour surveiller les télécommunications de leur population.