Geek magazine hacker daily blog

In MIT developed a network for the protected message exchange of Vuvuzela

3 years ago
image

In Laboratory of ADP equipment and artificial intelligence of Massachusetts Institute of Technology (CSAIL MIT) security experts created the messaging system which is protected from wiretap. Unlike normal approach with enciphering gain, they offer a network in which useful messages hide behind an avalanche of a "garbage" traffic.

Specialists called a network of messages "Vuvuzela". This remembered even by that who does not love sport, plastic horns with awful "voice", became known after the FIFA World Cup of 2010. Having inspired by the noise made by these devices, developers decided to call the network also.

In fact, the messages proceeding from senders are transferred to a network and stored on accidentally selected servers making it which developers called just "mailboxes". Before being saved in one of boxes, the message passes through several servers which send a false traffic to all the server, next to them, complicating tracking of network functioning and movement of messages.

Read more »


Julian Assange will be interrogated in Embassy of Ecuador

3 years ago
After six months of disputes Ecuador signed the agreement on Julian Assange's interrogation authorized by persons from Sweden. Interrogation will take place in Embassy of Ecuador in London where the founder of WikiLeaks took cover in 2012 from charges of rape.

Assange does not leave embassy, being afraid of attack of UAVs, and is afraid of an extradition in the USA.

image

Read more »


Plans of Roskomnadzor: blocking of prilozheniiya of iOS/Android, censorship of issue of searchers

3 years ago
Yesterday representatives of Roskomnadzor held a meeting with owners and online platforms. Officials reported about two new measures of regulation of the Internet.

First, the head of Roskomnadzor Alexander Zharov suggested to create the working group on blocking of applications in AppStore and Google Play shops with the pirated and other prohibited content.

Other working group will develop methods of regulation of issue of searchers. Owners want that search engines cleaned or lowered in issue the websites with pirated content which stand on the first lines in issue now. The producer Alexander Akopov declared that nevertheless it is time for "Yandex" to begin dialog with owners, "and if they do not want — it is necessary to do legislative initiatives".

Read more »


How much the hacker from Celestial Empire?

3 years ago
We welcome our reader's audience on pages of the blog iCover! In the end of the expiring year the analytical company Trend Micro published the updated report under the name "Innovations of the Chinese Cybercriminal Underground". This unrolled document, based on statistical data for the period 2014-2015, tells about the cost of "services" which are provided by the Chinese hackers and the current trends of cybercrime of Celestial Empire. Let's slightly open some curious pages of the report and briefly we will stop on the most "popular" directions of it as the published data testify, actively emerging market.

image

Read more »


SpeedTest provided the check of connection speed working without Flash

3 years ago
image

SpeedTest, the popular website for debate with provider and receipts of satisfaction after transition to faster rate of the Internet, after the general tendency gradually avoids use of a Flash-application. On the website to beta.speedtest.netthere was a new version the connection speed address тестирования, working at the HTML5 technologies.

Benefits of approach are obvious – support on different platforms, lack of need to install a plug-in which, besides, not only resursoyomok, but also is often unsafe. Adobe Flash Player became the most cracked software product (it is possible to study the list of its popular vulnerabilities in other our article). And to developers of the Mozilla browser at some point even bothered to potter with safety of Flash in the browser.

Read more »


As I unblocked the found phone by methods sots. engineering

3 years ago
The end of the working day, evening, I find phone on the street. Samsung Galaxy S5 Mini appears it, the screen is blocked with help CM Locker (it important).

On phone the Internet is connected, the notifications Instagram, Youtube but any of the missed call or the SMS are visible. And what's the use – to click the notification to pass to its parts, from the blocked status it is impossible. The panel of notifications cannot also be caused, it is only possible to start a small lamp, to include / turn off data transmission, Wi-Fi, bluetooth and the calculator. Well and to reduce/increase brightness/volume from where too not to reach a set of telephone number or the SMS.

Through a couple of hours phone rang out. We agreed that the owner will take away it from me tomorrow as it is on other end of the city now.

And at 6 in the morning on phone the alarm clock rang out. I shifted the notification to the right and laid down back in a bed. In a couple of minutes the alarm clock rang out again. Well, I shifted an icon to the left. Far from it – it rang out in a few minutes again (running beforehand, I will tell that it is not impossibility to disconnect an alarm clock at the blocked phone, and just its owner configured about ten alarm clocks with a difference in a couple of minutes among themselves). To leave phone calling in other room or to switch off it I did not want therefore it was decided to find a method to unlock it.

image
(a screenshot for an example)

Read more »


Concept of information security of children

3 years ago
On December 6 a number of the largest Russian a torrent portals among which there is Rutracker.org Kinozal.tv and Rutor.org decided to hold (and carried out) an action on training of the Russian users in tools and methods of restoring access to information in case of blocking of Internet resources.

On other side of barricades the document including the phrase was signed:

At the moment the existing system of inclusion (on a solution of the federal executive authorities authorized by the Government of the Russian Federation) five types of especially socially dangerous information, access to which certainly has to be prohibited, in the Unified register of domain names, pointers of pages of the websites in the Internet network and the network addresses allowing to identify the websites in the Internet networks containing information which distribution in the Russian Federation is forbidden proved the high performance.

Age and psychological approach to an assessment of harmful effects of information products on mental development, health and psychological wellbeing of children which formed the basis of the Federal law "About protection of children from information doing harm to their health and development" showed rather high performance.

We meet — the "Concept of information security of children" approved by the order of the Government of the Russian Federation of December 2, 2015 No. 2471-r.

Read more »


The woman left the place of road accident, but cops learned everything thanks to a machine security system

3 years ago
In Florida there was an unusual incident to participation of the 57-year-old resident of the state by the name of Cathie Bernstein (Cathy Bernstein). The woman ended up behind the bars after she, managing the Ford, struck others truck with a van and left the place of road accident, itself having received small damages and not having waited for police. Possibly, considering that everything for it managed safely, she received a call from police with a question of accident, but Mrs. Bernstein after a while did not find anything the best, than to lie to the officer, having told that it has no relation to road accident.

Read more »


"Bad Telegram" or As I did not take money for a sneer company of Telegram on Habrakhabr

3 years ago


Hi Geektimes!

In spite of the fact that history about which the speech will go concerned Habrakhabr, I decided to tell about it exactly here. Everything began with the fact that two weeks ago …

Read more »


Domestic defenders of the speech

3 years ago
In process of increase of threat of new world war in the 1930th years the manual USSR realized an urgent need of expansion of research and design works in the field of technology of communication. The large-scale project was without delay begun, and an objective with "honor", the price of the cracked human destinies, executed.



1930–1940 — the first stage. It was developed the equipment of a classification of telephone negotiations for short-wave communication. The group of future academician Kotelnikov was engaged in it.

1941-1947 — the second stage. The first Researches and Development were carried out, small series of the equipment are let out, groups of developers who were engaged in service of the equipment and development of service of decoding are brought together.

In 1948 the Marfinsky laboratory was formed that served as the beginning of the third stage. The purpose of this stage became - development of the equipment which would provide firmness of a classification of negotiations on standard express speaker circuit.

Read more »