Tagnetwork

Staying Security Smart

Today on the Edge of Innovation, we discuss how to be put safeguards on your computer to be safe from hacking.

Continue reading

Hackers can break Tor Network Anonimity with USD 3000

Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000. Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and not only, has found a way to compromise the Tor network. Last week I published a blog post that commented a report issued by the German broadcaster ARD in which is confirmed that the NSA XKeyscore was used to target two Germany-based Tor Directory Authority servers.

Original Article Can Be Found Here:

Hackers can break Tor Network Anonimity with USD 3000

Run a Router on Hyper-V – Naked ALM

I want to run a router on Hyper-V so that I can run many VM’s, each with internet access, on corporate and hotel networks. Microsoft touts Routing and Remote Access but there is no way I will go there. First it’s a total pain to setup and run. Second I need to run a whole Windows Server just to have basic DHCP and internet access. Overkill much! There must be a better way. The problem is that on most networks that I connect to there is some sort of one-MAC-one-IP rule. I am often onsite at companies on their Guest Wi-Fi and in hotel’s. I am not sure how it is implemented but if there is a pay-wall…

Original Article Can Be Found Here:

Run a router on Hyper-V – Naked ALM

How an Attacker Could Crack Your Wireless Network Security

It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks. This isn’t a “how to crack a wireless network” guide. We’re not here to walk you through the process of compromising a network – we want you to understand how someone might compromise your network. Spying on an Unencrypted Network First, let’s start with the least secure network possible: An open network with no encryption. Anyone can obviously connect to the network and use your Internet connection without providing a passphrase. This could put you in legal danger if they do something illegal and it’s traced back to…

Original Article Can Be Found Here:

How an Attacker Could Crack Your Wireless Network Security

© 2020 Paul Parisi

Theme by Anders NorénUp ↑