Skip to main content

Posts

Secret Service Paid TJX Hacker $75,000 in Cash a Year

A convicted TJX hacker named Albert Gonzalez earned $75,000 a year working undercover for the U.S. Secret Service, informing on bank card thieves before he was arrested in 2008 for running his own multimillion-dollar card-hacking operation. The information comes from one of Gonzalez’s best friends and convicted accomplices, Stephen Watt. Watt pleaded guilty last year to creating a sniffer program that Gonzalez used to siphon millions of credit and.... Read More http://www.wired.com/threatlevel/2010/03/gonzalez-salary/#ixzz0iwuMzctK ----------------------------------------------------------

DTS OS Enterprise

Well here are screen-shots of the OS images that I am making. The Desktop Environment is KDE The web browser is Firefox with a simple theme in place. Overall DTS OS Enterprise has two versions and it was made for especially for the acer aspire one netbooks. The OS should work with other computers since it is Linux. Some of the network icons are going to replace with custom icons.    Different Edition s Network Security Restoration Edition  File name: DTS-NS.iso File size: 200 - 300 MB The release date is going to be sometime in the late spring 2010.

Installing Apache

Apache is an open source web server application that works with UNIX, Linux, or Windows. The differences of IIS (Internet Information Services) which windows version and control by GUI (Graphical User Interface) or CLI (Command Line Interface) and it is easy to setup. IIS works in all version of Windows NT execpt Windows XP Home Edition. Apache by default is only CLI, but if you install " Webmin " (Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and etc.) which makes it controllable by web interface. To install your basic apache installation follow these steps: root@DTS-Enterprise:~/Desktop$ lynx http://httpd.apache.org/download.cgi root@DTS-Enterprise:~/Desktop$ gzip -d httpd-NN.tar.gz root@DTS-Enterprise:~/Desktop$ tar xvf httpd-NN.tar root@DTS-Enterprise:~/Desktop$ cd httpd-NN root@DTS-Enterprise:~/Desktop/httpd-NN$ ./configure...

Kismet

As you setup your wireless access point you need to make sure it has encryption either it's WEP or WPA. My recommendation is WPA2 if you have that choice. More likely wireless network don't have a password on it - over 80% of them don’t. Using kismet the hacker watchs you check your email. Kismet records every packet you send on the network. Kismet records the email server you connected to, and the login name and password you used to get your email. The hacker lets Kismet collect wifi packets for several hours, usually during the peak times this wifi network is in use. If this is a nearby hotel the hacker collects packets through the evening, if it’s a cafe or sandwich shop the hacker collects packets during lunch. The hacker goes back home and runs dsniff on the capture files that kismet created. Dsniff dumps out all the servers and name/password combinations that kismet collected that day. The hacker gets your server and login name/password and sets up his email clien...

Setting up your Linux Firewall Distribution (Part 2)

Welcome to part 2 of setting up your Linux Firewall since I took a lot of pictures of the installment of setting up the Linux Firewall I decided to make a PDF file for you to view. enjoy! Download now File Name: DTS Enterprise IPCOP.pdf File Size: 810 KB (829,620 bytes) Date Created: 03/03/2010   Hosted by Microsoft Office Live

Setting up your Linux Firewall Distribution (Part 1)

Today I'm going to show you how to get start. In order to create a network you must design it in paper, visio, or any kind of drawing that shows your plan. If you don't create some kind of drawing your network will not be very efficient. This drawing was done Microsoft new version of visio which is still in beta it called visio 2010 and yes I do have a legit license for it. The way that I design this is setup as two networks instead of one. Reason why you may ask because Network A is does not have a speed restriction and not monitor. Network B is has a speed limit and it is monitor. This is a basic drawing for this configuration. Remember the computer that your going to use must have at least two network cards. Let's break it down the red line named eth0 is your unfilter internet access which your trying to protect. eth1 is the green line which is your internal network which means that anything inside that network is protected. The blue line is optional, but I use it f...