Monthly Archives: February 2009
Sniffing Out Illicit BitTorrent Files
A new tool promises to detect illegal files without slowing network traffic. A new technique has been developed for detecting and tracking illegal content transferred using the BitTorrent file-trading protocol. According to its creators, the approach can monitor networks without
“Tunisie Telecom” doubles ADSL internet speed at no additional cost
In a communiqué released on Saturday, Tunisia’s state owned, largest internet and telephone provider, “Tunisie Telecom” has announced that it is boosting broadband connections, as well as improving the quality of its ADSL connections to enable its new customers to
E-mail Tracking and SPAM Handling
E-mail crime is growing due to the ease at which it may be committed. Offenses committed using e-mail may be classified into crimes directly related to the sending of an e-mail (including phishing, spam, and mail bombs) and those that
Hackers attack antivirus firm's tech-support site
A Kaspersky Lab technical support site was hacked late last month, exposing private customer information for 11 days, the Moscow-based security company admitted last week. The company learned of and closed the breach on Feb. 7 after it was notified
Security Monitoring With Type80
With the widespread reliance on Information Technologies and in today’s computing environment, enterprise-wide monitoring of security events is very important and critical , not only for tracking malicious activity, but also to meet compliance requirements. It is essential to make
BackTrack 4 Beta released 2009
The Remote Exploit Development Team has just announced BackTrack 4 Beta and they consider the version to be stable and usable, there are a lot of new features including: * Kernel 2.6.28.1 with better hardware support. *Native support for Pico
BackTrack 4 Beta – Shmoo release
Backtrack needs no introduction in the security and hacking world. It is an excellent bootable live-CD Linux distribution, with a huge collection of security and hacking tools. After seven months of effort here comes the Remote Exploit Dev team with