science and technology

b4b0-5.zip

No information is available for this file.




science and technology

b4b0-3.zip

No information is available for this file.




science and technology

kv5.zip

No information is available for this file.




science and technology

kv4.zip

No information is available for this file.




science and technology

kv3.zip

No information is available for this file.




science and technology

kv2.zip

No information is available for this file.




science and technology

tscmrule.q

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- RULES FOR INSURING PRIVACY IN AN ORGANIZATION. CONSTANT AWARENESS OF THREATS. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: -Q- -=-=-=-=-=-=-=-=-




science and technology

spyterms.q

-=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- =========================




science and technology

shotgun.mic

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Building a Long Range Directional Listening Device -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by -Q- ==============




science and technology

scram.ble

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COMMUNICATIONS SECURITY OVERVIEW A Non-Technical Discussion of Modern Transmission Methods -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= written by Alan Hoffman ("Q") =============================




science and technology

propagan.da

--------------------------------------------------- POLITICAL and SOCIAL PROPAGANDA "The brainwashing of a society" by, Alan Hoffman (a.k.a. "-Q-") 1 April 1997 [revision 1]




science and technology

opto

OPTOELECTRONIC EAVESDROPPING TECHNIQUES "Practical Guide to Constructing" "Lightwave Transmitters & Laser Listening Systems" Written for P.I.M.P. electronic-magazines on 15 April 1997 by Alan Hoffman (a.k.a. "Q").




science and technology

hackers.q

Internet Computer Crime Fact or Fiction?? Written by Alan Hoffman a.k.a. -Q-




science and technology

gp-amps.q

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Revision 2 Product Review and 1 January 1996 Technical Analysis of General Purpose Amplifiers -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: Alan Hoffman (a.k.a. -Q-)




science and technology

fisa2.txt

From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE




science and technology

comsec

-=-=-=-=-=-=-=-=-=-=-=-=-=-= Practical COMSEC Equipment for protecting YOUR privacy. -=-=-=-=-=-=-=-=-=-=-=-=-=-= written by -Q- ===============




science and technology

SkypeFinds Another Security Snafu




science and technology

Skype Squishes Cross-Zone Scripting Bug




science and technology

Cisco Plugs VoIP Malware Loophole




science and technology

Fring Brings VoIP To Hacked iPhones




science and technology

Hidden Messages Buried In VoIP Chatter




science and technology

Security Hack Allows VoIP Aboard Airlines




science and technology

Skype Ignores PayPal Siphoning Hijack Scheme




science and technology

VoIP System Users Can Be Targeted In Attacks




science and technology

Skype Admits Privacy Violation In China




science and technology

Chinese Skype Software Secretly Logs Political Chat Messages






science and technology

EU To Investigate VoIP-Tapping Techniques




science and technology

Skype Trojan Can Log VoIP Conversations




science and technology

Steganography Meets VoIP In Hacker World




science and technology

Scareware Scams Spill Onto Skype




science and technology

VoIP Hack Suspect Fugitive Extradited Back To US




science and technology

Fugitive VoIP Hacker Admits 10 Million Minute Spree




science and technology

Hacker Admits Stealing, Reselling VoIP Services




science and technology

Reverse Engineer Extracts Skype Crypto Secret Recipe




science and technology

Hackers Crack Skype's Proprietary VOIP Protocol




science and technology

Google And Skype Could Be Hit By India Data Curbs




science and technology

Venezualan VoIP Hacker Imprisoned




science and technology

Terrorists Build Secure VoIP Over GPRS Network





science and technology

Falco 0.16.0

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.




science and technology

Logwatch 7.5.2

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.




science and technology

Falco 0.17.0

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.




science and technology

Bro Network Security Monitor 2.6.3

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.




science and technology

Bro Network Security Monitor 2.6.4

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.




science and technology

Suricata IDPE 4.1.5

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.




science and technology

Falco 0.17.1

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.




science and technology

Zeek 3.0.0 (Formerly Known As Bro)

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.




science and technology

Suricata IDPE 5.0.0

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.