Showing posts with label IT amp; Technology. Show all posts
Showing posts with label IT amp; Technology. Show all posts

Dec 25, 2010

ge.tt : Share Files using The Browser.

,
Bored of using the hosting sites like Rapidshare to share a file with a friend especially when he get obliged to wait a long time to download this file?



Ge.tt is a free solution that help you to share you files (Legal files of course!) with you friends using your browser, all you have to do is access the website, load your file & share the link with your friends, whom can retrieve this file directly from your computer.

The file uploaded is also sent & uploaded on Ge.tt. servers (cloud!).

Read more →

Oct 22, 2010

Apple Spies on You!

,


Few weeks ago before the launch of visitors series on MBC, An ad was broadcasted thought the MBC’s Group channels, with a woman that show up on a white background after losing signal on TV, and said “We Came in Peace!”.; nothing special about that, it’s just an ad!( especially for the V lovers and people whom were waiting for it), but the strange about that is that Aljazeera Tv replies by a report, that said  that the MBC channels were hacked by the MOSSAD  ( the national intelligence agency of Israel)  to show that message and to communicate with Arabian people and to try to change their minds!

Recently another information was broadcasted by the same channel, this time is about Apple and The Iphone.

http://www.facebook.com/video/video.php?v=112100622187271

The Tv report in the video (Arabic only ) aims to prove that the Iphone is used by Apple to spy on the customers and to collect informations about them, their locations and even to use the front and back cameras, the microphone and the sensors to retrieve instant pictures and conversations.

The report is based on apple patent application that describes methods that may enable the iPhone and iPad to “sense” the user, detecting voice prints, faces, activity patterns and even heartbeats. If unauthorised use is detected, then many security measures could be activated.

But what aljazzera missed up is that the informations and data collected aren’t sent to apple but to the owner’s email, to allow him to track his phone, save data remotely or wipe out the device.

Maybe Aljazeera is going to release another rumor with the lunch of HTC Sense 3 which allow the same thing (not totally!), who could know?!?
Read more →

Aug 3, 2010

The Good Pentester.

,


I was looking around for some stuffs about pentesting and I found an excellent article talking about how to get hired as a pentester.

Being a good (Perfect!) pentester doesn’t mean to just be able to run some tools, exploit some systems, and charge the client, but a good Pentester should have certain criteria and methodology of work and some fluency in communication and listening skills, to explain the problems and recommendations and be understood by the clients.
Master the tools and principles of testing is important, but understanding their approaches and methodologies is paramount, by having perfect knowledge of the OSSTMM (Open Source Security Testing Methodology Manual), the OWASP (Open Web Application Security Project), ISSAF (Information Systems Security Assessment Framework) and the guidelines on Network Security Testing by NIST.
Regarding certifications (CEH, CISM, CISA, MCSE, CCNA, CWNP ...), they are not mandatory but favorable and desirable.
In addition to the technical side, the tester will have to meet clients and interact with them, with all confidence and with a professional strength of marketing and business, and should especially understand the value of the service he provide to the customer and respect the Non-Disclosure Agreements.

As there are many tools that perform the exact same function, the pentester must have its own customized list of tools that he had gathered and tested.
Read more →