Skip to main content

Posts

Extract Embedded Media From Office Documents by Changing the Extension

Need to get one or more images out of a Microsoft Office such as Word with a extension of a .DOC or .DOCX file? This only works with Microsoft 2007 or later or another .DOCX compatible program. If it's a .DOC file, open it in Word and save as a .DOCX file. Make a duplicate of the file and rename the extension from .DOCX to .ZIP. Open the zip archive and you should see several folders. You're looking for the media folder which in this should be under the word folder. (from LifeHacker.com) Extract Embedded Media From Office Documents by Changing the Extension

What is Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Nikto is not designed as an overly stealthy tool. It will test a web server in the quickest time possible, and is fairly obvious in log files. (From: http://cirt.net/nikto2) Features of Nikto Here are some of the major features of Nikto. See the documentation for a full list of features and how to use them.   SSL Support (Unix with OpenSSL or maybe Windows with ActiveState's   Perl/NetSSL)   Full HTTP proxy support Read on more on the P...

SSH

SSH (Secure Shell) is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data. Read on by reading the PDF.  Title: Using & Configure SSH File Name: SSH.pdf File Type: PDF File Size: 1.23 MB Download Now

Keeping your software updated.

There is a software called " Secunia PSI ". Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus and are therefore increasingly popular among criminals. The only solution to block these kind of attacks is to apply security updates, commonly referred to as patches. Patches are offered free-of-charge by most software vendors, however, finding all these patches is a tedious and time consuming task. Secunia PSI automates this and alerts you when your programs and plug-ins require updating to stay secure.   Pro's Provides links to update programs Can be ran as background service   Free for personal use only Compares you to other users in the city/state Rates how updated the programs are Con's May not have all specific applications You can download beta version at ht...

Using GnuPG

GnuPG is a free software alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. GnuPG is a basic program that has a command line interface, there exist various front-ends that provide it with a graphical user interface. For example, GnuPG encryption support has been integrated into KMail and Evolution, the graphical e-mail clients found in the most popular Linux desktops KDE and GNOME. The cross-platform plugin Enigmail provides GnuPG support for Mozilla Thunderbird and SeaMonkey. Similarly, Enigform and FireGPG provide GnuPG support for Mozilla Firefox. “From Wikipedia”. To understand how PGP you can read about at http://en.wikipedia.org/wiki/Pretty_Good_Privacy .   GnuPG File Name: GnuPG.pdf File Type: PDF File Size: 2.36 MB Download Now

DTS Enterprise is back!!!

Get ready world that the new article/tutorials are going to be release tomorrow. Danny Tech Security was busy with reconstructing website at dtsenterprise.tech.officelive.com . Now that that site is almost fully functional here's a preview what type of new tutorials are coming in the next few weeks. GnuPG is the open source of PGP which means "Pretty Good Privacy" I can show more images of what is coming up in the next few week, but I don't to spoil anyone.

What is Metasploit?

The Metasploit is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development and a tool for developing and executing exploit code against a remote target machine. Metasplot can be installed in Microsoft Windows, Linux, or MAC OS X. Metasploit can check for the latest exploits on the web. Installation is simple for Microsoft Windows or Linux. As you see in the picture below. Read the PDF to get started. File Name: What is Metasploit.pdf File Type: PDF File Size: 991 KB Download Now