Category Archives: Security Tech

Register For NEPALESE HACKERS COMMUNITY (NHC)


Register For NEPALESE HACKERS COMMUNITY (NHC)

http://nhc.bijayacharya.com/

 “Hacker”? ….How will you define the term ? ….Bad Guy ?…..Or Good Guy ?.…Well, ‘Hacker’ a single term do not give full details. …. It depends on ‘legal’ & ‘illegal’ actions…..If hacker performs ‘illegal’ actions against account or sites or system then s/he is BAD A**hole. . . . And if hacker finds a bug in system and reports to concerned sector, then hacker is damn coolest guy. . . . I’m not going to write a long dirty & lengthy words describing hackers. Hackers are categorized into BLACK, GREY, & WHITE HAT. –BIJAY ACHARYA

DuckDuckGo


image

Time to breakUP with google ?

Invented : Untraceable SMS System > > MIT


Invented : Untraceable SMS System > > MIT > > Computer Addicted

image

Src : Foss Byte

“Hack The Pentagon” & earn some cash.


A pilot program aims to help the US Defense Department beef up its networks by finding any vulnerabilities that could be exploited.

image

For full news : CNET.com

Awesome !!! Apple vs FBI (Apple Won) – 2016


image

Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web


You’ve probably seen those deep-web images floating around on the Internet. Usually, it goes something like this: There is a towering iceberg and the deeper the underwater portion extends, the more “hidden” and “exotic” the content is described to be. Sometimes these images are accurate to a point, but most are just making things up.
Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web
So what exactly is ‘deep web’ then? Are there really hidden secrets and treasure buried under some cloak and dagger type conspiracy? Well, in short, the answer depends on your idea of treasure and conspiracy.

Encryption Is Not Enough !, Research & Conclusion (Part 1)


By : BIJAY ACHARYA
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it.

 

Image via traxarmstrong.com

Let’s begin, Why do we encrypt ?
-We encrypt, simply for privacy & secrecy
-We encrypt, in pro term : for Confidentiality & Integrity. Well, these are basics for encryption.

[In Nepali] Cyber Security & Ethical Hacking Mod 1 – SPY Phone as a Best Tracking Device


.This is module 1. In total there are 5 modules on Cyber Security and Ethical Hacking.

Objectives of this video :
– Introduction to cyber security and ethical hacking
– SPY phone in-depth-overview as a best tracking device
– Securing Mechanism for Smart Phones

Firewall for dummies – or, what do we mean by a next-generation firewall?


Faulty firewallThe term next-generation firewall is not well defined, so it’s worth clarifying a little before we proceed.

Put simply, a next-generation firewall offers more protection than a traditional firewall as it can look inside content, rather than just blocking based on sources and destination.

A useful analogy is the postal service. A traditional firewall just looks at the address on the envelope and uses simple rules to decide what’s permitted.

A next-gen firewall can look inside the envelope to check it also doesn’t contain dangerous content. Likewise, it can have smarter rules so you can say “block all known dodgy addresses” rather than having to explicitly state “don’t allow mail from Joe the scammer at number 23 Spam Lane.” SRC

The great thing about these smart rules is that you can transfer the responsibility for keeping an updated list of dodgy addresses to your firewall vendor rather than maintaining them manually yourself.

Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass


Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass

A simple script exploit can take down Google’s latest anti-phishing extension, Password Alert

Google had launched its latest anti-phishing extension called Password Alert onWednesday  to protect Chrome users from phishing attacks on Google products.  However within 24 hours of releasing the new extension, a security researcher has devised a simple script exploit to bypass it.

Paul Moore, a information security consultant at UK based Urity Group has written a simple code exploit for Password Alert extension.SRC