Tag: security

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program’s code. ‘Cleaned up’ code will get a new name, CipherShed, and a different open source license. When the developers of TrueCrypt delivered the bombshell that they were abandoning their popular open source encryption program, it left many organizations in a hugely difficult position. Should they continue to use it, or heed the developers’ advice that it was no longer secure and switch to another encryption product? On the face of it, the decision should be an easy one: If the developers of something as security sensitive as an encryption program say that their program is no longer secure, surely it would be rash not to heed the warning. But with TrueCrypt, nothing is quite …

See original article:

TrueCrypt Getting a New Life

9 Most Useful .htaccess Tricks for WordPress

Many WordPress users come across .htaccess file when fixing their permalinks. However you can do so much more. The .htaccess file is a powerful configuration file that allows you to improve your site’s security and performance. In this article, we will show you 9 most useful .htaccess tricks for WordPress that you can try on your site right away. Getting Started Before you make any changes, you need to backup your existing .htaccess file. Connect to your website using an FTP client and simply download the .htaccess file to your computer. If something goes wrong, then you can upload the backup file. If you cannot see the .htaccess file, then make sure your FTP client is configured to show hidden files. Read our guide on why you …

Original article:

9 Most Useful .htaccess Tricks for WordPress

How the NSA Targets Tor Users | Motherboard

In the latest NSA leak, published on the German site Tagesschau yesterday, we’re able to glean more about how one of the intelligence agency’s surveillance systems actually works. The “XKeyscore” system, first revealed by the Guardian in July 2013, allows NSA analysts an overview of millions of people’s data: emails, browsing history and social media activity, all stored in databases and accessible without prior authorisation. Conceptually, that’s a very powerful tool. Now an investigation led by Jacob Appelbaum, a security researcher and a member of the team behind the anonymous Tor browser, looks at portions of the source code that dictate what else the system is capable of. The full details, published on German site Das Erste, are dense and well worth …

Original Article Can be Found Here:

How the NSA Targets Tor Users | Motherboard

Hackers can break Tor Network Anonimity with USD 3000

Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000. Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and not only, has found a way to compromise the Tor network. Last week I published a blog post that commented a report issued by the German broadcaster ARD in which is confirmed that the NSA XKeyscore was used to target two Germany-based Tor Directory Authority servers.

Original Article Can Be Found Here:

Hackers can break Tor Network Anonimity with USD 3000

© 2024 Paul Parisi

Theme by Anders NorénUp ↑