science and technology b4b0-5.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT No information is available for this file. Full Article
science and technology b4b0-3.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT No information is available for this file. Full Article
science and technology kv5.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:33 GMT No information is available for this file. Full Article
science and technology kv4.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:33 GMT No information is available for this file. Full Article
science and technology kv3.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:33 GMT No information is available for this file. Full Article
science and technology kv2.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:33 GMT No information is available for this file. Full Article
science and technology tscmrule.q By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- RULES FOR INSURING PRIVACY IN AN ORGANIZATION. CONSTANT AWARENESS OF THREATS. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: -Q- -=-=-=-=-=-=-=-=- Full Article
science and technology spyterms.q By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- ========================= Full Article
science and technology shotgun.mic By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Building a Long Range Directional Listening Device -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by -Q- ============== Full Article
science and technology scram.ble By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COMMUNICATIONS SECURITY OVERVIEW A Non-Technical Discussion of Modern Transmission Methods -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= written by Alan Hoffman ("Q") ============================= Full Article
science and technology propagan.da By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT --------------------------------------------------- POLITICAL and SOCIAL PROPAGANDA "The brainwashing of a society" by, Alan Hoffman (a.k.a. "-Q-") 1 April 1997 [revision 1] Full Article
science and technology opto By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT OPTOELECTRONIC EAVESDROPPING TECHNIQUES "Practical Guide to Constructing" "Lightwave Transmitters & Laser Listening Systems" Written for P.I.M.P. electronic-magazines on 15 April 1997 by Alan Hoffman (a.k.a. "Q"). Full Article
science and technology hackers.q By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT Internet Computer Crime Fact or Fiction?? Written by Alan Hoffman a.k.a. -Q- Full Article
science and technology gp-amps.q By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Revision 2 Product Review and 1 January 1996 Technical Analysis of General Purpose Amplifiers -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: Alan Hoffman (a.k.a. -Q-) Full Article
science and technology fisa2.txt By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE Full Article
science and technology comsec By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-= Practical COMSEC Equipment for protecting YOUR privacy. -=-=-=-=-=-=-=-=-=-=-=-=-=-= written by -Q- =============== Full Article
science and technology SkypeFinds Another Security Snafu By packetstormsecurity.com Published On :: Fri, 01 Feb 2008 11:42:41 GMT Full Article voip
science and technology Skype Squishes Cross-Zone Scripting Bug By packetstormsecurity.com Published On :: Wed, 06 Feb 2008 04:38:37 GMT Full Article voip skype
science and technology Cisco Plugs VoIP Malware Loophole By packetstormsecurity.com Published On :: Fri, 15 Feb 2008 13:47:08 GMT Full Article malware cisco voip
science and technology Fring Brings VoIP To Hacked iPhones By packetstormsecurity.com Published On :: Wed, 16 Apr 2008 14:43:00 GMT Full Article phone apple voip
science and technology Hidden Messages Buried In VoIP Chatter By packetstormsecurity.com Published On :: Tue, 03 Jun 2008 01:10:15 GMT Full Article voip
science and technology Security Hack Allows VoIP Aboard Airlines By packetstormsecurity.com Published On :: Mon, 25 Aug 2008 14:29:24 GMT Full Article voip
science and technology Skype Ignores PayPal Siphoning Hijack Scheme By packetstormsecurity.com Published On :: Tue, 02 Sep 2008 22:10:52 GMT Full Article paypal voip skype
science and technology VoIP System Users Can Be Targeted In Attacks By packetstormsecurity.com Published On :: Fri, 26 Sep 2008 08:10:30 GMT Full Article voip
science and technology Skype Admits Privacy Violation In China By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 09:58:16 GMT Full Article privacy china voip skype
science and technology Chinese Skype Software Secretly Logs Political Chat Messages By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 16:34:11 GMT Full Article government china voip skype
science and technology Italy Police Warn Of Skype Threat By packetstormsecurity.com Published On :: Sat, 14 Feb 2009 00:08:41 GMT Full Article government voip skype italy
science and technology Fugitive Hacker Indicted For Running VoIP Scam By packetstormsecurity.com Published On :: Wed, 18 Feb 2009 06:01:12 GMT Full Article hacker government cybercrime scam voip
science and technology EU To Investigate VoIP-Tapping Techniques By packetstormsecurity.com Published On :: Sat, 21 Feb 2009 11:10:04 GMT Full Article privacy voip
science and technology Skype Trojan Can Log VoIP Conversations By packetstormsecurity.com Published On :: Fri, 28 Aug 2009 00:14:17 GMT Full Article trojan voip skype
science and technology Steganography Meets VoIP In Hacker World By packetstormsecurity.com Published On :: Fri, 11 Sep 2009 14:47:15 GMT Full Article hacker voip
science and technology Scareware Scams Spill Onto Skype By packetstormsecurity.com Published On :: Tue, 06 Oct 2009 18:33:02 GMT Full Article scam voip skype
science and technology VoIP Hack Suspect Fugitive Extradited Back To US By packetstormsecurity.com Published On :: Mon, 19 Oct 2009 02:29:15 GMT Full Article usa voip
science and technology Fugitive VoIP Hacker Admits 10 Million Minute Spree By packetstormsecurity.com Published On :: Wed, 03 Feb 2010 16:58:09 GMT Full Article hacker voip
science and technology Hacker Admits Stealing, Reselling VoIP Services By packetstormsecurity.com Published On :: Thu, 04 Feb 2010 14:15:02 GMT Full Article hacker voip
science and technology Reverse Engineer Extracts Skype Crypto Secret Recipe By packetstormsecurity.com Published On :: Fri, 09 Jul 2010 03:54:59 GMT Full Article voip skype
science and technology Hackers Crack Skype's Proprietary VOIP Protocol By packetstormsecurity.com Published On :: Mon, 12 Jul 2010 11:15:31 GMT Full Article hacker voip skype
science and technology Google And Skype Could Be Hit By India Data Curbs By packetstormsecurity.com Published On :: Tue, 31 Aug 2010 15:56:40 GMT Full Article india google voip skype
science and technology Venezualan VoIP Hacker Imprisoned By packetstormsecurity.com Published On :: Mon, 27 Sep 2010 17:33:35 GMT Full Article hacker privacy voip
science and technology Terrorists Build Secure VoIP Over GPRS Network By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:23:13 GMT Full Article headline phone voip terror
science and technology Skype Flaw Allows For Collection Of User IP Addresses By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:23:32 GMT Full Article headline privacy flaw voip skype
science and technology Falco 0.16.0 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:37:49 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
science and technology Logwatch 7.5.2 By packetstormsecurity.com Published On :: Sat, 27 Jul 2019 10:22:22 GMT Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems. Full Article
science and technology Falco 0.17.0 By packetstormsecurity.com Published On :: Thu, 01 Aug 2019 17:02:23 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
science and technology Bro Network Security Monitor 2.6.3 By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 20:33:35 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
science and technology Bro Network Security Monitor 2.6.4 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 23:57:22 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
science and technology Suricata IDPE 4.1.5 By packetstormsecurity.com Published On :: Tue, 24 Sep 2019 17:25:18 GMT Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools. Full Article
science and technology Falco 0.17.1 By packetstormsecurity.com Published On :: Thu, 26 Sep 2019 16:42:50 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
science and technology Zeek 3.0.0 (Formerly Known As Bro) By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 13:21:53 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
science and technology Suricata IDPE 5.0.0 By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:13:29 GMT Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools. Full Article