Statistics on the botnet Carna

Analyst in Information Security Parth Shukla at the conference AusCERT prepared an interesting presentation dedicated to botnet Carna. Recall that it was through this global botnet that the largest scan of the Internet was carried out for research purposes – Internet Census 2012. For ten months of 2012, all IP-addresses in the address space of(…)

MitmProxy 0.9

The new version of one of the best MiTM HTTP-proxy with support for SSL, having a console interface and allows you to check and edit the traffic flow “on the fly”, and save them for later analysis. According to the words of the program’s Aldo Cortes (Aldo Cortesi), this major release, with numerous improvements in all modules.Previous version(…)

The new 0day-vulnerability in Linux 2.6.37 – 3.8.8

A few days ago an exploit ready was published, which carries an escalation of privileges in Linux 2.6.37 – 3.8.8. The code shown on the link, anyone can compile and run on your system, checking its operation. If it does not work, it’s not a reason to calm: it may just need a more qualitative exploit. Detailed explanation of(…)

Convert PDF to HTML5 without losing formatting

pdf2htmlEX – a great tool to convert PDF documents into normal HTML-page with formatting. Converter is surprisingly good at handling various documents, including research papers, journals, and other formulas. A few examples for demonstration. Typography (LaTeX): HTML / PDF Cheat Sheet (mathematical formulas): HTML / PDF The scientific article (text and graphics): HTML / PDF Full Circle Magazine (for Linux-based community): HTML / PDF Git guide : HTML / PDF You can try on their files converter(…)

Hardware acceleration of H.264 in Firefox

In this most recent build of Firefox Nightly (next stable Firefox 23) includes support for H.264 video hardware acceleration. This feature will be included in the stable releases for different operating systems.For example, in Firefox 21 (in a few days), hardware support for H.264 is scheduled for release on Windows 7. In the next release of Firefox 22 (a few(…)

USB-Trojan

In modern operating systems, there is an interesting feature – they have complete trust in devices such as a keyboard or mouse. Accordingly, if you build the device, which will emulate the desired input, and connect it to your computer, you can do anything. WARNING:The information is provided solely for educational purposes. Any use in improper purpose(…)