mun.ohjain.fi

links that caught my eye and some words scrambled together ..maybe

Hacking starbucks for unlimited credit

Posted on | May 23, 2015 | No Comments

by Egor Homakov

This is a story about how I found a way to generate unlimited amount of money on Starbucks gift cards to get life-time supply of coffee or steal a couple of $millions.

read more

 

Surveillance system used for censorship in Europe

Posted on | May 17, 2015 | No Comments

Censorship attack combines packet injection and Heartbleed

We all know there is censorship online. It happens in China. It happens to “terrorists”. But we don’t believe it will happen to us.

As Eben Moglen and Kaspersky have pointed out, companies developing crypto are prime targets no matter where they are. So you don’t have to be a bad guy read more

Hard disk hacking

Posted on | November 30, 2014 | No Comments

Hard disks: if you read this, it’s pretty much certain you use one or more of the things. They’re pretty simple: they basically present a bunch of 512-byte sectors, numbered by an increasing address, also known as the LBA or Logical Block Address. The PC the HD is connected to can read or write data to and from these sectors. Usually, a file system is used that abstracts all those sectors to files and folders.

If you look at an HD from that naive standpoint, you would think the hardware should be pretty simple: all you need is something that connects to a SATA-port which can then position the read/write-head and read or write data from or to the platters. But maybe more is involved: don’t hard disks also handle bad block management and SMART attributes, and don’t they usually have some cache they must somehow manage? read more

More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack

Posted on | March 12, 2014 | No Comments

Distributed Denial of Service (DDOS) attacks are becoming a common trend on our blog lately, and that’s OK because it’s a very serious issue for every website owner. Today I want to talk about read more

Newegg trial: Crypto legend takes the stand, goes for knockout patent punch

Posted on | January 9, 2014 | No Comments

“Late post ,I know” -Ed [NP: Vinnie Paz – Bushmaster Music feat. Blaq Poet & Lateb (produced by Stu Bangas]

MARSHALL, TX—Newegg’s courtroom face-off with patent-licensing giant TQP Development is nearing its end. TQP has sued  hundreds of companies, saying it has patented the common Web encryption scheme… more

 

A breakthrough in AI solves CAPTCHAs better than most humans

Posted on | November 12, 2013 | No Comments

You’ve surely seen it before: a garbled string of letters and numbers that you retype before leaving a comment on a blog post. It’s a test called CAPTCHA, or Completely Automated Public Turing Test to Tell Computers and Humans Apart, and it exists to separate the flesh-and-blood folks from the spambots.

A test so simple could hardly be called foolproof. But now a Silicon Valley–based… read more

OS X Passwords Leaked During Login

Posted on | September 14, 2013 | No Comments

I was writing a script today to automatically mount shared folders for our users when they log in. I wanted the script to wait for the desktop to appear before it runs, … [read more]

UFC Just Sent the Most Embarrassing DMCA Notice Ever

Posted on | August 19, 2013 | No Comments

We’ve seen dozens of erroneous DMCA takedown notices in recent years, many of which have caused their senders embarrassment. However, notices sent to Google l… [read more]

[cryptography] skype backdoor confirmation

Posted on | May 19, 2013 | No Comments

I was disappointed the rumoured skype backdoor is claimed to be real, and
that they have evidence. The method by which they confirmed is kind of odd
– not only is skype eavesdropping but its doing head requests on SSL sites
that have urls pasted in the skype chat! read more

“Frost” Attack Unlocks Android Phones’ Data By Chilling Their Memory In A Freezer

Posted on | February 15, 2013 | No Comments

If you lose possession of an Android phone, your PIN or pattern unlock might not be enough to protect the sensitive data stored on it. Not, at least, after it’s spent an hour in a hacker’s freezer. Read more

keep looking »