测网速 网站优化诊断 广告招商QQ3066631932 CodeForge最好的源码站!   手机测速 测速APP

  
                       

网站页面信息

标题:Hack In The Box :: Keeping Knowledge Free for Over a Decade Go to hackinthebox.org
描述:Hack In The Box : Keeping Knowledge Free for Over a Decade
关键字:hitb, hack in the box, hitbsecconf, hitbsecnews, hitbsecphotos, hitb security conferece, security conference, it security
sponsored links:
连接:
图片:9 个图片, 5 个没有Alt标签    查看所有图片
网站历史:创建于:2000年08月16日 年龄:16年6月9日  查看历史记录
sponsored links:

网站流量与估价

网站流量:IP ≈20,005   PV ≈31,607
网站估价:¥69,406   日广告收入: ¥95  (注:不包含域名价值,不代表公司价值)

网站排名

Alexa全球排名:当日: -  一周: 100,129  三个月: 100,129  查看详情
Google Page Rank:
 5
真假PR鉴别:   (提示:若此处显示网站与查询网站不同,则疑为劫持PR)
Sogou Rank: 0  
百度快照日期:2010-12-27  查看详情

搜索引擎收录

搜索引擎收录情况反向链接
 谷歌Google:34,300  查看详情 -  查看详情
 百度Baidu:658  查看详情 2,910  查看详情
 微软Bing:0  查看详情 0  查看详情
 搜搜Soso:9  查看详情 880  查看详情
 雅虎Yahoo:32,957  查看详情 859,014  查看详情
 有道Youdao:13  查看详情 0  查看详情
 搜狗Sogou:1  查看详情 -  查看详情

服务器信息

Web服务器:Apache/2.4.7 (Ubuntu)
IP地址:    
IP所在地:美国
 , ,

域名注册信息

注册人:hackintheboxorg
Email:hackintheboxx
ICANN注册机构:Public Interest Registry
创建时间:2000-02-17
修改时间:2009-08-22
过期时间:2015-02-17
状态:CLIENT TRANSFER PROHIBITED
Name Server:ns1.easydns.com(66.225.199.10)
ns2.easydns.com(72.52.2.1)
remote1.easydns.com(66.225.199.10)
remote2.easydns.com(72.52.2.1)
revdns2.interunix.net(72.14.190.86)
Whois Server:org.whois-servers.net

Alexa 排名走势数据

流量统计: 当日 一周平均 三个月平均
排名: - 100,129 100,129
PV: 0 1.58000 1.58000
日独立IP: ≈0 ≈13,336 ≈13,336

网站在各国/地区的排名

国家排名

国家/地区访问比例

国家访问比例

下属子站点被访问比例

子站点域名访问比例

Alexa 排名走势图

Alexa Reach走势图

域名 Whois 记录

Who is hackinthebox.org at org.whois-servers.net

NOTICE: Access to .ORG WHOIS information is provided to assist persons in

determining the contents of a domain name registration record in the Public Interest Registry

registry database. The data in this record is provided by Public Interest Registry

for informational purposes only, and Public Interest Registry does not guarantee its

accuracy. This service is intended only for query-based access. You agree

that you will use this data only for lawful purposes and that, under no

circumstances will you use this data to: (a) allow, enable, or otherwise

support the transmission by e-mail, telephone, or facsimile of mass

unsolicited, commercial advertising or solicitations to entities other than

the data recipient's own existing customers; or (b) enable high volume,

automated, electronic processes that send queries or data to the systems of

Registry Operator or any ICANN-Accredited Registrar, except as reasonably

necessary to register domain names or modify existing registrations. All

rights reserved. Public Interest Registry reserves the right to modify these terms at any

time. By submitting this query, you agree to abide by this policy.



Domain ID:
D20018670-LROR

Domain Name:HACKINTHEBOX.ORG

Created On:17-Feb-2000 04:54:57 UTC

Last Updated On:22-Aug-2009 12:19:47 UTC

Expiration Date:17-Feb-2015 04:54:57 UTC

Sponsoring Registrar:Network Solutions LLC (R63-LROR)

Status:CLIENT TRANSFER PROHIBITED

Registrant ID:22004330-NSI

Registrant Name:hackinthebox.org

Registrant Organization:hackinthebox.org

Registrant Street1:Level 26, Menara IMC

Registrant Street2:No. 8 Jalan Sultan Ismail

Registrant Street3:

Registrant City:Kuala Lumpur

Registrant State/Province:Wilayah Persekutuan

Registrant Postal Code:50250

Registrant Country:MY

Registrant Phone:+1.60320394724

Registrant Phone Ext.:

Registrant FAX:+1.60320318359

Registrant FAX Ext.:

Registrant Email:hackintheboxx

Admin ID:22004331-NSI

Admin Name:Dhillon Kannabhiran

Admin Organization:Hack In The Box (M) Sdn. Bhd.

Admin Street1:Suite 26-3, Level 26, Menara IMC

Admin Street2:No. 8 Jalan Sultan Ismail

Admin Street3:

Admin City:Kuala Lumpur

Admin State/Province:Wilayah Persekutuan

Admin Postal Code:50250

Admin Country:MY

Admin Phone:+1.60320394724

Admin Phone Ext.:

Admin FAX:+1.60320318359

Admin FAX Ext.:

Admin Email:dhillon@hitb.org

Tech ID:22004331-NSI

Tech Name:Dhillon Kannabhiran

Tech Organization:Hack In The Box (M) Sdn. Bhd.

Tech Street1:Suite 26-3, Level 26, Menara IMC

Tech Street2:No. 8 Jalan Sultan Ismail

Tech Street3:

Tech City:Kuala Lumpur

Tech State/Province:Wilayah Persekutuan

Tech Postal Code:50250

Tech Country:MY

Tech Phone:+1.60320394724

Tech Phone Ext.:

Tech FAX:+1.60320318359

Tech FAX Ext.:

Tech Email:dhillon@hitb.org

Name Server:ns1.easydns.com

Name Server:ns2.easydns.com

Name Server:remote1.easydns.com

Name Server:remote2.easydns.com

Name Server:revdns2.interunix.net

Name Server:

Name Server:

Name Server:

Name Server:

Name Server:

Name Server:

Name Server:

Name Server:

DNSSEC:Unsigned

网站缩略图

Hack In The Box :: Keeping Knowledge Free for Over a Decade
sponsored links:

网站访问速度测试

1.00秒 很快
重新测速
国内Ping速度测试      国内TraceRoute路由测试
美国Ping速度测试      美国TraceRoute路由测试

网站关键字指数 (越高越热门)

NO.关键字指数
1hitb
2hack
3in
4the
5box
6hitbsecconf
7hitbsecnews
8hitbsecphotos

域名 hackinthebox 其他后缀注册情况   查看更多

后缀 注册时间 到期时间 是否注册
.com
.net
.org
.cn
.com.cn
.asia
.mobi

同类相似网站

查看更多
Alexa标题
100,129Hack In The Box :: Keeping Knowledge Free
73,989Hack In The Box :: Keeping Knowledge Free
343,387ILLEGAALTJE.NL ★ KNOWLEDGE IS POWER - MSN HACKEN AND MORE - Leer
15,250,876GameHome - World of Warcraft free gold level bot hack download,Age of
106,889Art Knowledge News | Keeping You in Touch with the World of Art... | A
5,848,374Hack - Mr Gà Kon Nice Sniper Hack đột kích 1049,Hack đột kích
7,348HACK VCOIN, hack cf, hack au, hack fifa, hack xu, hack lp, hack gp, qu
0Art Knowledge News | Keeping You in Touch with the World of Art...
422,372Free online hacking game - Slave hack, hack computers, banks and serve
422,372Free online hacking game - Slave hack, hack computers, banks and serve
1,857,501Hack / CYBERPROTEST - Hacker Sitesi, Türk Hackerlar, Hack Sitesi, Sos
859,598CyberAbrek TIM - Hack, Hacker Sitesi, Turk Hackerlar, Hack Sitesi, Msn
890,053CyberAbrek TIM - Hack, Hacker Sitesi, Turk Hackerlar, Hack Sitesi, Msn
311,130
536,474Ur I.T. Mate Group - Keeping it FREE! - Software, hosting, icons, gues
9,723,526Free Wifi – Hack a Network – WifiRobin Make wifi free for
491,618Omlet UK | Our fantastic chicken house and rabbit hutch the eglu! | Ke
434,879Chicken Keeping Secrets - Your Guide To Keeping Chickens
100,158Free-Hack.com
449,111PetParents.com - Keeping Your Cat Happy, Healthy and Worm-Free
1,270,214Health Doctor - health knowledge,cancer health knowledge, fitness heal
1,241,214Programas Hack - Programas hacker, hack msn, programas hack hotmail, t
234,452Center for Democracy & Technology | Keeping the Internet Open, Inn
0Auto kiem the,Auto Kiếm Thế, Game kiếm thế, Auto AU,Auto game,
0Auto kiem the,Auto Kiếm Thế, Game kiếm thế, Auto AU,Auto game,
0Free WoW Gold,WoW Gold Hack,MMORPG Free Currency Services
0Free WoW Gold,WoW Gold Hack,MMORPG Free Currency Services
4,581,777Free WoW Gold,WoW Gold Hack,MMORPG Free Currency Services
2,556,761Free WoW Gold,WoW Gold Hack,MMORPG Free Currency Services
0Монголын hack сонирхогч залуусын ертөнц

模拟搜索引擎蜘蛛抓取

Title:Hack In The Box :: Keeping Knowledge Free
Description:Keeping Knowledge Free
Keywords:
Body:
Hack In The Box :: Keeping Knowledge Free
::
hitb portal ::
hitb portal (SSL) ::
hitb forum (SSL) ::
hitb security conference ::
hitb training ::
hitb irc ::
hitb photos ::
hitb videos ::
center
HITB Search:
Who's Online
There are 182 unregistered users and 0 registered users on-line.
You can log-in or register for a user account here.
Main Menu
middot; HomeSub Menu middot; Latest Comments middot; HIT #066; #064; #065;vantGo middot; HIT #066; #064; #084;radepub middot; HITB E-Zine Archive middot; HITB Merchandise middot; HITB Lite middot; HITB GFX middot; Members List middot; Recommend Us middot; Search middot; Stats middot; Contact Us middot; Top 50
Top Stories for Today
[413] Sony CEO inadvertently reveals secret details about iPhone 5 [395] How do you begin an information security career?[376] iPad 2 supplies creep closer to demand[370] Disgruntled gamer hacks Xbox security chief's account[365] Is a secure, firewall-less network possible?[357] Comodo hack may reshape browser security[340] EMC buys NetWitness to boost RSA's security offerings [322] Google: SQL-injection attack not as large as first thought[320] Android rooters will soon be trackable[311] Anonymous takes aim at Sony [288] Samsung Galaxy Tab gets unofficial Android 3.0 Honeycomb port[262] Graphene chips promise fan-free computing[256] Comodo hacker says he's protesting U.S. policy[212] Pandora, other app makers subpoenaed over user data collectionView the Top 50 articles
Top 50 of the Last 2 Weeks
[2268] Anti-Virus Vendor Accused of Installing Viruses Onto Mobile Phones[2060] Firefox 4 Is Better Than Microsoft Internet Explorer 9: 10 Reasons Why[2032] GNU Free Call - An Open Source Skype Alternative [1957] Facebook Tip: Enable Encryption to Avoid Privacy Glitch [1935] Man jailed for putting porn on video billboard[1906] Massive SQL injection attack making the rounds—694K URLs so far[1824] Man finds divorce files, tax docs on 'new' laptop[1756] Why Microsoft declared war on Google over Android[1755] Experts weigh in on Comodo SSL certificate fraud [1752] Anonymous draws Congressional attention[1743] Ten years old today, how Mac OS X changed Apple's world[1740] Motorola may be developing its own OS for mobile devices[1738] Effect of Japan Quake on Semiconductor Industry Still Unclear[1720] Microsoft warns of hack attempt on Windows Live, Google, Yahoo, Skype, Mozilla[1704] Android vs. iPhone for business: 5 questions to answer[1651] Oracle signals strong tech spend, shares rise[1627] GFI apologizes for false alarm on Samsung keyloggers[1622] TripAdvisor reports email breach[1621] iPhone 5 4G? Could fall release mean LTE? [1538] RIM to Allow Android Apps on PlayBook[1525] RSA won't talk? Assume SecurID is broken[1516] Behind the curtain of a botnet business [1492] Top Five 2011 Linux Gurus announced [1480] Untethered iOS 4.3.1 is being Beta Tested[1469] Are We Looking at a New Tech Bubble? Will it Pop?[1460] Quarter of UK businesses risk breaking the law for not analysing employee call records[1443] The Only Secure Password Is The One You Can’t Remember[1430] Cisco patches password-stealing flaw in Secure Access Control[1428] HTML5 means the end of Silverlight[1420] If You Bought 100 Shares of MSFT 25 Years Ago[1413] Documents Obtained by EFF Reveal FBI Patriot Act Abuses[1412] Google Nixes Open Source For Honeycomb[1407] Network managers need to be ready for the cloud [1406] Cloud Storage Faceoff: Windows Live SkyDrive vs. Dropbox vs. Amazon Cloud Drive[1399] Fired Data Center Worker Wiped Out TV Show[1396] Mac OS X 10.7 Lion to introduce multi-user Screen Sharing[1392] Onboard computer proved that Top Gear faked review[1385] Facebook Fixes HTTP Fallback Mechanism, Makes It Temporary[1377] Cybersquatting reaches all-time high[1363] Serious security gaps found in NASA's computer network [1354] Apple releases Mac OS X 10.6.7[1348] Russian Security Team to Upgrade SCADA Exploit Tool[1347] Acer boss resigns amid board battle[1344] Iranian hacker 'claims revenge for Stuxnet'[1343] Android will be on almost half of smartphones by 2016, says ABI[1334] Apple sticking to March 25th for European iPad 2 launch[1328] IEEE approves next WiMax standard [1321] Firefox 4 sets unofficial download record[1319] Dell Ships New Ruggedized Notebook for Forensic Evidence Gathering[1317] Make Windows Sysinternals work better for you
ROKABEAR Hosting Services
HITB is proudly hosted by Rokabear.com!
Want a special discount off your hosting package with Rokabear? Tell them HACKINTHEBOX sent you!"
Follow us
Join our Facebook Group
Follow us on Twitter
Follow our RSS feed
THERE ARE LIMITED SEATS FOR THE QUAD TRACK CONFERENCE! PLEASE REGISTER EARLY! b
REGISTER ONLINE font
TECHNICAL TRAINING SESSIONS 17th 18th Mayp
TECH TRAINING 1 - Hunting Web Attackers
Trainer: Laurent Oudot (Founder, TEHTRI Security)
Seats Left: 9font
TECH TRAINING 2 - The Exploit Laboratory 5.0
Trainers: Saumil Shah (Founder, Net-Square) SK Chong (Security Consultant, SCAN Associates Bhd.)
Seats Left: 14
TECH TRAINING 3 - Windows Physical Memory Acquisition and Analysis
Trainer: Matthieu Suiche (Founder, Moonsols)
Seats Left: 17
TECH TRAINING 4 - Web Hacking 2.0: Attacks, Penetration and Exploits
Trainers: Shreeraj Shah (Founder, BlueInfy) amp; Vimal Patel (Director, BlueInfy)
Seats Left: 16
QUAD-TRACK SECURITY CONFERENCE Day 1 (19th May) Keynote Speakerp
center
Keynote 1: Joe Sullivan (Chief Security Officer, Facebook)
Day 1 Closing: OpenLeaks Exclusive - Daniel Domscheit-Berg (Founder, OpenLeaks)
Day 2 (20th May) Keynote Panel Discussion
#8220;The Economics of Vulnerabilities #8221;
center
Keynote Panelist 1: Lucas Adamski (Director of Security Engineering, Mozilla Corp)
Keynote Panelist 2: Steve Adegbite (Senior Security Strategist, Adobe Systems Inc.)
Keynote Panelist 3: Aaron Portnoy (Manager, Security Research Team, TippingPoint Technologies)
Keynote Panelist 4: Dave Marcus (Director, McAfee / AvertLabs)
Keynote Panelist 5: Chris Evans (Chrome Security, Google Corp)
Keynote Panelist 6: Katie Moussouris (Senior Security Strategist, Microsoft Security Response Center)
Moderator: Dr. Dinesh Nair
Closing Keynote: Richard Thieme (Founder, ThiemeWorks)
Disgruntled gamer hacks Xbox security chief's accountfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 03:43 AM (Reads: 370)
Source: MSNBC
In an ironic twist, the head of gaming security for Xbox LIVE had his own Xbox account, as well as his personal website, hacked by a disgruntled gamer.
The hacker, calling himself Predator, commandeered the Xbox LIVE account of Stephen Toulouse, the Director of Xbox LIVE Policy and Enforcement yesterday (April 3). Toulouse, who goes by the online handle “Stepto” and operates Stepto.com, is responsible for implementing and enforcing Xbox LIVE rules and policies. He spoke of the Xbox hack himself:
“Sigh. Please be warned. Network solutions has apparently transferred control of Stepto.com to an attacker and will not let me recover it,” Toulouse tweeted from his @Stepto account. (His domain name was restored later Sunday night.) In a YouTube video called “Stepto Head of Xbox LIVE Policy and Enforcement Team HACKED!!” Predator called himself “Xbox Live’s greatest account jacker.” DomainIncite reports that Predator launched the attack as a protest for being banned 35 times for violating gamer policies.
[0 comments posted]
[ ]
How do you begin an information security career?font
Posted by l33tdawg on Tuesday, April 05, 2011 - 03:40 AM (Reads: 395)
Source: Secure Computing (Australia)
My interest in information security began when my dad gave me The Cuckoos Egg, a book by Cliff Stoll written in 1989.
For those who haven't read it, in short, Cliff was responsible for managing computers at Lawrence Berkeley National Laboratory in California. He was asked to resolve a 75-cent accounting error in the computer usage accounts.He discovered an unauthorized user who used the system for a short period of time, incurring the 75-cent fee. Over the next few years, he traced the hacker to Hanover, Germany, had him arrested and eventually testified at the trial.
It is a fascinating story that left a strong impression on me. My career in information security began in earnest in mid-2007. I had recently joined a small retail bank headquartered in New York as a network administrator. I was the 18th hire, and the IT department was two people. As we opened additional branches in New York and our employee ranks grew, the complexity of our annual audits with the New York State Banking Department and Federal Deposit Insurance Corporation increased.
[0 comments posted]
[ ]
iPad 2 supplies creep closer to demandfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:29 AM (Reads: 376)
Source: Computer World
Apple's supply of the iPad 2 edged closer to demand today as the company's online store showed a two-to-three week shipping delay. That is an improvement on the three-to-four week delay between ordering and shipping that Apple was quoting customers last week.
All models of the iPad 2 now show availability in two to three weeks on the U.S. e-store, as well as the online stores for customers in France, Germany, Italy, the Netherlands and the U.K. Apple has had trouble keeping up with demand of the iPad 2, which rolled out in the U.S. early last month and started selling in more than two dozen other countries on March 25.
Last week, auction giant eBay released data caged from nearly 12,000 iPad 2 sales, saying that average selling prices were between 40% and 53% above list. Analysts attributed the high prices on eBay to overwhelming demand of the new tablet.
[0 comments posted]
[ ]
EMC buys NetWitness to boost RSA's security offerings font
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:28 AM (Reads: 340)
Source: IT Wire
EMC has acquired NetWitness Corporation a privately-held US based provider of network security analysis technologies that quot;provide precise and pervasive network visibility, enabling security teams to detect and remediate advanced threats while automating the incident investigation process, quot; according to EMC.
NetWitness will operate as a part of RSA, The security division of EMC and quot;will become a core element of RSA's advanced security management solutions, providing real-time visibility into network activity and adding efficiency to incident investigations and workflow. quot;
EMC says that, by combining the NetWitness network monitoring and analysis technology with RSA's enVision platform, RSA Data Loss Prevention Suite (DLP) and RSA CyberCrime Intelligence service, security teams will be able to quot;achieve deep insight into the security posture of their organisations. The precise intelligence and visibility that NetWitness provides, coupled with the RSA Archer eGRC platform, enables organisations to apply business context to security information for better identification and prioritisation of security risks while improving and streamlining the incident management process. quot;
[0 comments posted]
[ ]
Sony CEO inadvertently reveals secret details about iPhone 5 font
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:27 AM (Reads: 413)
Source: The Age (Australia)
Sir Howard Stringer, CEO of Sony, accidentally told everyone in the world that his company will be supplying image sensors for Apple's iPhone 5. In an interview late Friday with The Wall Street Journal's Walt Mossberg, the Sony chief was talking about earthquake damage to 15 of the Sony's factories in Japan, and inadvertently mentioned that a camera sensor made in one of those plants is on its way to Apple, and that sensor would be delayed because of the quake and tsunami.
Stringer didn't specifically say that Sony is building an 8-megapixel image sensor that will go into the iPhone 5, but since Sony is currently not manufacturing any image sensors for Apple, this confirmed that Sony plans to supply components of the iPhone 5.
This points to the distinct possibility that in the iPhone 5, Apple will no longer be using OmniVision 5-megapixel image sensors currently inside the iPhone 4. This is supported by an analyst's report from February of this year saying that OmniVision might lose out on supplying cameras for the iPhone 5 because OmniVision's 8-megapixel sensor won't be ready for the iPhone 5's rumored US mid-summer (June to September) launch.
[0 comments posted]
[ ]
Graphene chips promise fan-free computingfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:27 AM (Reads: 262)
Source: PC Authority (Australia)
Computers built around chips made of graphene – a wonder material touted as a replacement for silicon – could run without fans, according to researchers at the University of Illinois.
The electricity running through processors generates heat, which means computers require power-hungry and noisy cooling fans in computers. According to the Illinois scientists, graphene transistors cooled much more quickly than silicon, reducing core temperatures even when electricity was running through the material.
quot;In silicon and most materials, the electronic heating is much larger than the self-cooling, quot; said mechanical science and engineering professor William King. quot;However, we found that in these graphene transistors, there are regions where the thermoelectric cooling can be larger than the resistive heating, which allows these devices to cool themselves. This self-cooling has not previously been seen for graphene devices. quot;
[0 comments posted]
[ ]
Google: SQL-injection attack not as large as first thoughtfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:25 AM (Reads: 322)
Source: PC Authority
Google research suggests Lizamoon attack isn't as big as security firm claimed. An SQL-injection attack is now returning 1.5 million results over Google, but experts have raised doubts over the scale of the problem.
Last week, security firm Websense reported that hundreds of thousands of sites had been infected via an SQL-injection attack, which was dubbed quot;Lizamoon quot; after the name of the website it redirected users to, where it tries to trick them into installing fake antivirus.
Websense based its numbers on how many sites were infected by Googling for that web address, but some have said that method of counting isn't entirely accurate, and the attack isn't as big as first feared. Instead of simply Googling for the URL, the search engine's principal engineer, Niels Provos, counted the sites with a functioning reference, leaving out those that had the code but didn't actually redirect users.
[0 comments posted]
[ ]
Comodo hacker says he's protesting U.S. policyfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:24 AM (Reads: 256)
Source: CNet News
After a hacker obtained fraudulent digital certificates that could be used to impersonate Google, Yahoo, Skype, and other major Web sites, the security company that issued them blamed the Iranian government.
There is only quot;one conclusion, quot; Comodo, the Jersey City, N.J.-based issuer of digital certificates said in a report tracing the intrusion to Iran. quot;This was likely to be a state-driven attack. quot;
Well, not quite. The perpetrator claims to be a 21-year-old Iranian patriot--a quot;single programmer with the experience of 1,000 programmers quot;--who told CNET he carried out the intrusion in large part to protest the policies of the U.S. government. As proof, quot;ComodoHacker quot; has posted the private half of a digital certificate obtained during the intrusion into the network of GlobalTrust, a Comodo reseller in Italy. (ComodoHacker also uses the aliases quot;Sun Ich quot; and quot;Ichsun, quot; which he says are random.)
[0 comments posted]
[ ]
Pandora, other app makers subpoenaed over user data collectionfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:13 AM (Reads: 212)
Source: Arstechnica
A federal grand jury has opened an investigation into mobile apps and what kind of personal data they might transmit about users, Pandora has revealed. The streaming music company recently amended its S-1 filing with the Securities and Exchange Commission (SEC) to note that it had been subpoenaed to produce documents about its user data collection on Android and iOS devices, which the company believes is related to an industry-wide probe into how mobile apps capitalize on user information.
quot;[I]n early 2011, we were served with a subpoena to produce documents in connection with a federal grand jury, which we believe was convened to investigate the information sharing processes of certain popular applications that run on the Apple and Android mobile platforms, quot; Pandora wrote in its filing. quot;While we were informed that we are not a specific target of the investigation, and we believe that similar subpoenas were issued on an industry-wide basis to the publishers of numerous other smartphone applications, we will likely incur legal costs related to compliance with the subpoena, management’s attention could be diverted and there is no guarantee that we will avoid costly litigation. quot;
According to a quot;person familiar with the matter quot; speaking to the Wall Street Journal, the purpose of this grand jury investigation is to find out whether app makers fully describe to users the kinds of information they need, such as geolocation data or a device's unique identifier, and why they need it. Though most other app makers have not publicly commented on the subpoena, the creator of an iOS app called quot;Pumpkin Maker quot; told the Journal that he also got a subpoena that requested documentation about the workings of his app.
[0 comments posted]
[ ]
Comodo hack may reshape browser securityfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:09 AM (Reads: 357)
Source: CNet News
Major browser makers are beginning to revisit how they handle Web authentication after last month's breach that allowed a hacker to impersonate sites including Google.com, Yahoo.com, and Skype.com.
The efforts are designed to remedy flaws in the odd way Web security is currently handled. Currently, everyone from the Tunisian government to a wireless carrier in the United Arab Emirates that implanted spyware on customers' BlackBerry devices and scores of German colleges are trusted to issue digital certificates for the largest and most popular sites on the Internet.
Microsoft's manager for trustworthy computing, Bruce Cowper, told CNET that the company is quot;investigating mechanisms to help better secure quot; certificate authorities, which issue trusted digital certificates used to encrypt Web browsing, against this type of attack.
[0 comments posted]
[ ]
Is a secure, firewall-less network possible?font
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:05 AM (Reads: 365)
Source: SC Magazine (UK)
The message of the death of the firewall has been hanging over the infosecurity industry for the past three years, but could a network be run securely without one. Kevin Dowd, CEO of CNS Networks and Security, looks at a use case and looks at the challenges this has faced.
The recent Night Dragon attacks on energy companies demonstrate how an over-reliance on firewalls can leave companies vulnerable to data and intellectual property theft, should that firewall be breeched. A total dependence on your border firewall means that as soon as an attacker gets past it, your network is entirely defenceless, even if you are following current industry best practices.
The McAfee report on Night Dragon also describes the ‘methods and tools used in these attacks [as] relatively unsophisticated', which is presumably how they have managed to evade detection by standard security software and network policies. Hackers think differently to businesses and seek the simplest route into a network.
[0 comments posted]
[ ]
Anonymous takes aim at Sony font
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:04 AM (Reads: 311)
Source: International Business Times
The hacker collective Anonymous has posted a warning to Sony that it plans an attack of some kind as revenge for the legal action taken against another hacker who modified a PlayStation 3.
Sony Computer Entertainment America filed suit against George Hotz, also known as Geohot. Hotz had released a firmware modification that allowed a Sony PlayStation 3 to run other operating systems. Sony had removed that functionality some months before. The suit is still pending.
On the Anonnews site, a press release appeared that says, quot;You have abused the judicial system in an attempt to censor information about how your products work. You have victimized your own customers merely for possessing and sharing information, and continue to target those who seek this information. In doing so you have violated the privacy of thousands of innocent people who only sought the free distribution of information. quot;
[0 comments posted]
[ ]
Samsung Galaxy Tab gets unofficial Android 3.0 Honeycomb portfont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:02 AM (Reads: 288)
Source: Into Mobile
The NOOKcolor is no longer the only tablet to sport the SDK-based Honeycomb ROMs, as the Samsung Galaxy Tab has just received the unofficial Honeycomb treatment. While it may not be the most stable ROM out there, it’ll certainly occupy you for the time being, and give you one of the first unofficial tastes of Honeycomb on your pocket-able tablet.
For the most part, SDK-based ROMs aren’t as reliable as ROMs based on the actual source code. That said, the Galaxy Tab running Android 3.0 doesn’t look all that bad, and dare we say, it’s actually usable. To what extent is unknown, but we’d have a hard time not trying it out for ourselves. Like most Honeycomb ports we’ve seen before, this won’t become your daily ROM, but is usable enough to have some fun with.
ROMs like this will likely become the norm until Google does decide to release the source code for Android 3.0. This is to say that the search giant doesn’t take measures to block Honeycomb from other devices, and that developers want to put the effort into performing such feats. Spacemoose1 is one such developer, and we applaud him for giving CDMA Galaxy Tab users out there something to play with.
[0 comments posted]
[ ]
Android rooters will soon be trackablefont
Posted by l33tdawg on Tuesday, April 05, 2011 - 12:01 AM (Reads: 320)
Source: TG Daily
There's an ominous new movement that could spell bad news for anyone who likes to root their phones.
As long as there are electronic devices, there will always be hacking. But the hacking community within Android has a deep following and history that make it a way of life for many Android customers. And unlike most malicious hackers, a lot of people who root their Android phone don't have any criminal ideas in mind. They just want to tweak the device to make it more flexible and add custom software.
But none of that is illegal. It's part of the reason why it has become such a widespread phenomenon among Android users. In fact, some manufacturers have even turned a blind eye to customers who want to root the device. Nevertheless, carriers don't like it because users can perform actions like tethering mobile data to other devices for free, or bypassing the mobile network to make calls that don't use plan minutes.
[0 comments posted]
[ ]
Untethered Jailbreak for iOS 4.3.1 Released - No iPad 2 Supportfont
Posted by l33tdawg on Monday, April 04, 2011 - 01:00 PM (Reads: 723)
Source: Redmond Pie
L33tdawg: Stefan Esser will be at HITB Amsterdam in May if you want to come and buy him a beer for this untethered goodness...
The iPhone Dev-Team has finally released untethered jailbreak for iOS 4.3.1 via Redsn0w and PwnageTool. Except for the iPad 2, this new untethered jailbreak is compatible to work with all devices, including: iPhone 4, 3GS, iPad (1st-gen) and iPod touch 3G/4G on the newly released iOS 4.3.1 firmware.
This untethered jailbreak for iOS 4.3.1 is based on an exploit found by iPhone security expert and hacker Stefan Esser, who demoed it on his iPod touch last week before handing it over to the Dev-Team to do the rest.
iOS 4.3.1 was originally jailbroken last week using PwnageTool bundles (on Mac) and Sn0wbreeze (on Windows) but it was limited to tethered boot. But now with this new version of Redsn0w and PwnageTool, you can jailbreak on the above mentioned devices, fully untethered on iOS 4.3.1.
[0 comments posted]
[ ]
Mozilla cracks down on slow add-onsfont
Posted by l33tdawg on Monday, April 04, 2011 - 12:57 PM (Reads: 570)
Source: The Inquirer
SOFTWARE MAKER Mozilla is cracking down on slow add-ons that increase the start-up time of Firefox.
Mozilla discovered that on average each add-on increases Firefox start-up time by 10 per cent, meaning that ten add-ons effectively double the time it takes for Firefox to initially open. In reality some add-ons take less time and others take more, which means that it could take 20 to achieve this for one user and only five for another.
To address this problem Mozilla is introducing automated performance testing on all new versions of add-ons submitted to its database. The company already tests the top 100 add-ons, but rolling out tests to all add-ons will ensure that the performance of less popular ones is monitored.
[0 comments posted]
[ ]
Natty Narwhal With Unity: Worst Ubuntu Beta Everfont
Posted by l33tdawg on Monday, April 04, 2011 - 12:56 PM (Reads: 643)
Source: The Register (UK)
Last year, Mark Shuttleworth christened Ubuntu 11.04 quot;Natty Narwhal quot;, saying the disto would be stylish and create a good, lasting first impression. While its debut in beta form is smart looking and definitely chases the fashion in operating-system design it's also the single worst beta release of Ubuntu I've ever tested.
That's not to say there isn't much to love in Ubuntu 11.04 with the new Unity Interface being the primary news, but even for a beta this release is way too rough. Unity - regardless of what you think of it - isn't ready for prime time and it seems unlikely Canonical will iron out all its problems before the planned final release in April.
Bugs can be fixed, and there are numerous bugs to fix in this release of Unity, but the larger problem is that Unity, thus far, lacks the functionality of GNOME 2.32. Ubuntu, and its users, would be better served if Unity were not the default desktop for this release. Unity is a radical departure, but no less so than GNOME 3.0, which has wisely been pushed back until later this year. The problem isn't that everything you know and love about GNOME is suddenly gone, and Ubuntu 11.04 is, for all intents and purposes a completely different experience than everything that came before it.
[0 comments posted]
[ ]
Thieves are stealing children's identitiesfont
Posted by l33tdawg on Monday, April 04, 2011 - 04:18 AM (Reads: 781)
Source: Computer World
Identity theft has saddled thousands of children with debt, sometimes for years before they ever discover their personal information has been stolen, a study says.
Within a database of 42,232 children that was compiled by an identity-protection business, 4,311 -- 10.2% -- had someone else using their Social Security numbers, according to quot;Child Identity Theft, quot; a report by Richard Power, a distinguished fellow at Carnegie Mellon Cylab.
In one case, a 17-year-old girl's Social Security number was used by eight different people to amass $725,000 in debt. In another case, a 14-year-old boy had a 10-year-old credit history that included a mortgage on a $605,000 house, according to information supplied to Power by the identity-protection firm All Clear ID.
[0 comments posted]
[ ]
Pirated Android App Shames Freeloaders font
Posted by l33tdawg on Monday, April 04, 2011 - 01:19 AM (Reads: 792)
Source: Hot Hardware
A pirated version of an Android app is actually a Trojan that quot;shames quot; someone who installs it by sending an SMS message to all his contacts telling them of his piracy.
The original app is called Walk and Text, and costs $2.10 in the Android Market. The app uses the camera on the back of a smartphone to show a user a visual of his upcoming surroundings, which will supposedly prevent the user from running into the street or across a set of train tracks. The pirated version is available from unofficial Android app markets, and once installed and redirects the pirate to the legitimate app in the Android Market, while also sending the following SMS message to the phone's entire contact list:
quot;Hey, just downlaoded [sic] a pirated app off the internet, Walk and Text for Android. Im stupid and cheap, it costed [sic] only 1 buck. Don't steal like I did! quot; Finally, a message pops up on the phone's screen: quot;We really hope you learned something from this. Check your phone bill ;) Oh and dont forget to buy the App from the Market. quot;
[0 comments posted]
[ ]
Ubuntu 11.04 beta offers multitouch Unity experiencefont
Posted by l33tdawg on Monday, April 04, 2011 - 01:11 AM (Reads: 832)
Source: Desktop Linux
The Ubuntu project released the Beta 1 version of Ubuntu 11.04 ( quot;Natty Narwhal quot;), which switches the Linux distribution to the homegrown, 3D multitouch Unity desktop environment. Ubuntu 11.04 advances to Linux 2.6.38, adds LibreOffice 3.3.2, offers Firefox 4, and Software Center enhancements including a try-before-you-buy function.
With Ubuntu 11.04, the open source, Canonical-backed Ubuntu project has combined Ubuntu Netbook Edition (UNE) and Ubuntu Desktop Edition into a single release called quot;Ubuntu, quot; while Ubuntu Server Edition is now called quot;Ubuntu Server. quot;
Ubuntu Netbook lives on only in the ARM OMAP3 and OMAP4 images, which ship with the new Unity 2D interface by default, says the Ubuntu project. The beta release is also said to debut a quot;headless quot; developer image for Texas Instruments OMAP3 and OMAP4 hardware, featuring a serial port set-up and a minimal command line installation.
[0 comments posted]
[ ]
Login
User name
Password
Remember me
Log in Problems? New User? Sign Up!
HITB Magazine Issue 005
#HITB2011AMS
Register now for the 2nd annual HITB security conference in Europe!
Day 1 (19th May) Keynote Speaker
Keynote 1: Joe Sullivan (Chief Security Officer, Facebook)
Day 2 (20th May) Keynote Panel Discussion
The Economics of Vulnerabilities
Keynote Panelist 1: Lucas Adamski
Keynote Panelist 2: Steve Adegbite
Keynote Panelist 3: Aaron Portnoy
Keynote Panelist 4: Dave Marcus
Keynote Panelist 5: Chris Evans
Keynote Panelist 6: Katie Moussouris
Moderator: Dr. Dinesh Nair
Conference Speakers (alphabetical order)b
1.) Asia Slowinska (Independent Security Researcher, Vrije Universiteit)
2.) Andreas Wiegenstein (Team Lead, CodeProfiler Research Labs, Virtual Forge)
3.) Andrew Gavin (Creator, OpenDLP)
4.) Aditya K. Sood (Founder, SecNiche)
5.) Claudio Criscione (CTO, Secure Network)
6.) Daniel Mende (ERNW)
7.) Didier Stevens (Security Consultant, Contraste Europe NV)
8.) Don A. Bailey (Security Consultant, iSEC Partners)
9.) Elena Kropochkina (Devoteam Security)
10.) Enno Rey (ERNW)
11.) Guillaume Delugre (Sogeti / ESEC)
12.) Itzik Kotler (CTO, Security Art)
13.) Itzhak #8216;Zuk #8217; Avraham (Founder, Zimperium)
14.) Ivan Ristic (Qualys SSL Labs)
15.) Jean-Baptiste Bedrune (Sogeti / ESEC)
16.) Jean Sigwald (Sogeti / ESEC)
17.) Jim Geovedi (Independent Researcher)
18.) Joffrey Czarny (Devoteam Security)
19.) Laurent Oudot (Founder, TEHTRI Security)
20.) Mariano Nuñez Di Croce (Director of R #038;D, Onapsis)
21.) Mitja Kolsek (CTO, ACROS Security)
22.) Rosario Valotta (Tentacolo Viola)
23.) Shreeraj Shah (Founder, BlueInfy)
24.) Stefan Esser (Head of R #038;D, SektionEins GmbH)
25.) Thomas Caplin (Sogeti / ESEC)
26.) Travis Goodspeed (GoodFET Project)
There are very limited seats and registrants are encouraged to register early!
REGISTER NOW
Last 30 Postings to HITB Forum
Re: There's a lot of truth in this.. Re: if you were a billionaire.... Re: if you were a billionaire.... Re: How to block an ip address Re: How to block an ip address Auto Unlock in Window XP Re: Can I make a cell phone refill card last longer? Re: A new member of cyberia Re: How to block an ip address Re: Library Injection Library Injection Re: How to block an ip address Re: How to block an ip address Re: if you were a billionaire.... Re: How to block an ip address Re: Hi...came here to learn Re: Using TOR - can't register on popular website/forum Re: Using TOR - can't register on popular website/forum Re: Hi...came here to learn Using TOR - can't register on popular website/forum Hi...came here to learn Re: A new member of cyberia Re: A new member of cyberia A new member of cyberia Re: How to block an ip address Re: How to block an ip address Re: How to block an ip address How to block an ip address Re: Web programming Re: Web programming
Topics
middot; All topics middot; AMD News (Mar 11, 2011) middot; Apple News (Apr 05, 2011) middot; Articles (Mar 03, 2009) middot; Ask Us (Feb 01, 2003) middot; Audio/Video (Mar 08, 2011) middot; Encryption (Mar 23, 2011) middot; Games (Mar 24, 2011) middot; Hardware (Mar 30, 2011) middot; HITB News (Mar 14, 2011) middot; Industry News (Apr 05, 2011) middot; Intel News (Mar 21, 2011) middot; Law and Order (Apr 05, 2011) middot; Linux (Apr 04, 2011) middot; Microsoft (Apr 01, 2011) middot; Networking (Apr 01, 2011) middot; PDAs (Feb 09, 2007) middot; Privacy (Apr 05, 2011) middot; Red Hat (Mar 09, 2011) middot; Science (Mar 29, 2011) middot; Security (Apr 05, 2011) middot; Software Programming (Apr 05, 2011) middot; Spam (Mar 18, 2011) middot; Technology (Apr 05, 2011) middot; Transmeta (Jul 07, 2007) middot; Viruses Malware (Apr 01, 2011) middot; Wireless (Mar 03, 2011)
HITB Affiliates
FreshWap.net
Heroturko
Torrent Download
Torrent Gamez
Btscene
SecurityXploded
McGrhill-Warez
RS Download
Torrents
TorrentHound
Legendarydevils
The Pro Hack
FullDownloadShare.com
PassionDownload.com
TriniWarez
Rapidsharedownload.net
SCForum.info
Pogoed Full Downloads
Gu1337
Twistys Download
DirtyWarez.com
RaidPIC
Torrents Download
RapidShareLink
FreshDL
Warez Linkers
WarezFactor
FullDDL.net
Digital Vortex
TorrentHub
RealWarez
Fullversion Search
DreamDDL
HackersNews.org
Black-Zero
MyPDACafe.com
Guvenli.org
Dark-Hack.net
Dark Tavern
HardlineNews.com
ITDefence.ru
Xatrix Computer Security
shellcity.net
EyeonSecurity
HackerStickers.com
Astalavista
Go Hacking
XSSed.com
madirish.net
Secumania.org
Megapanzer
If you own a PR4+ (Page Rank) network security or computer related website with 5,000 unique visits and would like to affiliate with HITB, email us.
Recent News
Monday, April 04
middot;Apple steps up iPad 2 campaign to push functionality over hardware specifications
middot;TV Site Sued For Linking To Completely Legal Videos
middot;PornWikiLeaks reveals identities of porn stars
middot;RSA hackers exploited Flash zero-day bug
middot;Germany declares war on hackers with new cyber defense center
middot;Phishing and Flash flaw bagged RSA
middot;UK students lose loans in 'phishing' scam
middot;McKinsey, TiVo affected by email hack
Friday, April 01
middot;Massive SQL injection attack making the rounds—694K URLs so far
middot;iPhone 5 4G? Could fall release mean LTE?
middot;GFI apologizes for false alarm on Samsung keyloggers
middot;Cisco patches password-stealing flaw in Secure Access Control
middot;Facebook Fixes HTTP Fallback Mechanism, Makes It Temporary
middot;Quarter of UK businesses risk breaking the law for not analysing employee call records
middot;Acer boss resigns amid board battle
middot;Fired Data Center Worker Wiped Out TV Show
middot;Documents Obtained by EFF Reveal FBI Patriot Act Abuses
middot;IEEE approves next WiMax standard
middot;Mac OS X 10.7 Lion to introduce multi-user Screen Sharing
middot;Android will be on almost half of smartphones by 2016, says ABI
middot;Top Five 2011 Linux Gurus announced
middot;Cybersquatting reaches all-time high
middot;Onboard computer proved that Top Gear faked review
middot;Microsoft co-founder slams Bill Gates
middot;Make Windows Sysinternals work better for you
middot;Untethered iOS 4.3.1 is being Beta Tested
middot;IBM report: computer hackers getting smarter, unfortunately
middot;Former Teen Stock Swindler Sentenced to Three Years on New Hack
middot;2010 Threats Year in Review: Toolkits Dominated the Cybercriminal Scene
middot;A Security Practitioner's Guide to the Cloud
Thursday, March 31
middot;RIM: No BlackBerry Messenger on iOS in April
middot;Samsung to probe spyware claims
middot;Apple releases Mac OS X 10 Lion Developer Preview 2 to developers
middot;IEEE member database hacked
middot;Pwned by Phone - Vulnerabilities in Apple's iPhone and Next Generation Mobile Networks
middot;Creepy app warns of an end to privacy
middot;Android Honeycomb has 20 apps at launch
middot;RIM gains access to 30,000 patent catalogue
middot;Comodo Hacker Claims Another Certificate Authority
middot;U.S. spy agency also probing Nasdaq hackers
Older articles
Privacy Policy
For our privacy policy, please click here
Page created in 1.53021812439 seconds.
Page created in 1.53025197983 seconds.
Page created in 1.53027796745 seconds.

数据更新时间

正在更新   

常用工具

桌面软件: MyIP网站信息状态条  WebShot网页快照  SiteMapMaker网站地图生成 
网站信息: Alexa排名查询  PageRank查询/真假PR鉴别/PR劫持检测  外链检查  搜索引擎收录  搜索引擎反向链接  域名注册查询 
网页编辑: 颜色代码选择器  Html特殊符号 
网站调试: 蜘蛛抓取模拟  网站Header信息  网页源代码查看 
代码转换: 火星文查询  繁体/简体转换  Html/js代码转换  Html/UBB代码转换 
友情连接: CodeForge免费源码 CodeForge.com PCFans IT资讯 Ngnix Lighttpd GPhone中国    更多... (PR<5自动转内页)
网站地图: 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 200 250 300 350 400 450 500
免责声明 | 联系我们 | 交换友情链接 | 广告位招商QQ: 1967659002
© 2009 MyIP.cn Dev by MYIP Elapsed:273.397ms 黑ICP备09072263号