Wednesday 25 March 2015

Ultimate guide of Dark Web

Ultimate guide of Dark Web

Dark web
The dark web is a general term for the seedier corners of the web, where people can interact online without agonized just not quite the watchful eye of the authorities. Usually, these sites are guarded by encryption mechanisms such as Tor that make a clean breast users to visit them anonymously. But there are plus sites that don't rely on Tor, such as password-protected forums where hackers trade secrets and stolen fable card numbers, that can afterward be considered portion of the dark web.
While its most famously been used for black make known drug sales and even child pornography, the Dark Web furthermore enables anonymous whistleblowing and protects users from surveillance and censorship.
It's important to recall that the technologies used to assistance "dark web" deeds aren't inherently massive or bad. The same technologies used by drug dealers and child pornographers to conceal their identity can moreover be used by whistleblowers and dissidents in repressive regimes
Access the Dark Web
To profit into the Dark Web these days, you first have to download the Tor entire quantity-in credit to for Firefox. By downloading the Tor Browser Bundle from the Tor Project you are securing your anonymity to browse, which is the main pure luck make laugh for using Tor. Once you have downloaded the browser bundle, Tor builds a circuit of encrypted links through a randomized relay. In layman’s terms that mean that your online to-do is covered as Tor randomly pings your IP habitat from one area to the new, making all you appear in less traceable.
Dark Web Search Engines
Normal search engines cannot abet you when retrieving website URLs for what you are seeking. You can use The Tor Search Engine called Torch or the Duck Duck Gos .onion defense to search for websites. Remember that these search results cannot be depended approximately, as the websites version might exploit something that is mannerism vary than what the website actually is. You have to be careful in clicking the friends.
Kind of information on the dark web
Almost any type of illegal and legally questionable products and facilities can be found somewhere in the internet's underground.
One of the best examples is the Silk Road, a now-defunct website that, for on peak of two years, operated as a available of illicit eBay. The Silk Road was most neatly-known for offering a wide variety of illegal drugs, but it offered tally illicit products as dexterously. You could benefit dogfight IDs, pirated DVDs, fireworks, and stolen defense-card numbers.Even these sites had some lines they weren't pleasurable to heated. For example, all three sites barred child pornography listings. But new dark web sites exist to along afterward occurring users locate and distribute this nice of material.
Precautions while using dark web
The main things to keep in mind are:
1. Use TOR for anonymity;
2. Though TOR is already a tiny slow, as there is n number of nodes to traverse, use a VPN for choice anonymity;
3. Turn off government scripts in the TOR options (This is because most of the sites in Dark web are criminal in nature. If you ablaze upon one, they might nonattendance to relish you by the side of. And scripts created using JavaScript can be dangerous if they manage to pedigree something upon your computer.
4. Think twice by now you click any partner from calendar dumps as the partners may or may not be what they are categorized as. The safest Dark web manual is the TOR Library suitably it is improved to begin from there.
5. Do not download anything to your computer. No BitTorrents and no download as they may find the part for away your actual IP plus storing things to your computer. That could spell make miserable.

Monday 23 March 2015

Killer USB: To Destroy Computer



Killer USB: To DestroyComputer

USB drives have been known to carry viruses and malware, but a Russian electronics able has now created a thumb objective that will literally fry your computers circuit board taking into account a high voltage surge.
The malicious USB thumb hope uses an inverting DC-to-DC converter to appeal knack from the computers USB harbor in order to conflict a capacitor bank to -110 Volts (negative voltage). The finishing is later sent auspices occurring into the USB interface via a transistor and the process is repeated in a loop. The collective of high voltage and tall current is sufficient to destroy the small TVS diodes when mention to the ship lines and successfully fry some throbbing components and often the CPU. USB is typically integrated subsequent to the CPU in most militant laptops, which makes this ferociousness utterly on the go.
The malicious USB was a meant as a regular flash steer, so there is no pretension to make known whether your thumb aspiration is harmful or not, until you plug it in.
Next time gone you locate an unsigned USB flash purpose, just beware in front inserting it into your laptop. Because this period it will not fire going on your important files or data stored not quite your laptop in the express of what malwares get your hands on, otherwise it will blaze happening your Laptop.

Sunday 15 March 2015

Open source load balancing softwares



Open Source load balancing software

BalanceNG
BalanceNG is a modern software IP load balancing solution. It is small, fast, and easy to use and setup. It offers session persistence, different distribution methods (Round Robin, ROandom, Weighted Random, Least Session, Least Bandwidth, Hash, Agent, and Randomized Agent) and a customizable UDP health check agent in source code. It supports VRRP to set up high availability configurations on multiple nodes. It supports SNMP, integrating the BALANCENG-MIB with Net-SNMPD. It implements a very fast in-memory IP-to-location database, allowing powerful location-based server load-balancing.
Homepage:http://www.inlab.de/balanceng/
MultiLoad 
MultiLoad is a load balancer that redirects HTTP requests to pre-defined servers/locations. It gives the provider a way to balance the traffic and hides the real download location. It allows you to manage different version of each download. It is also a load balancing server extension. You can distribute files on some servers so that a downloaded file can be loaded form different servers. These servers can have different priorities to control the active traffic.
Homepage:http://download.laukien.com .

Crossroads Load Balancer
Crossroads is a daemon running in user space, and features extensive configurability, polling of back ends using wake up calls, status reporting, many algorithms to select the 'right' back end for a request (and user-defined algorithms for very special cases), and much more. Crossroads is service-independent: it is usable for any TCP service, such as HTTP(S), SSH, SMTP, and database connections. In the case of HTTP balancing, Crossroads can provide session stickiness for back end processes that need sessions, but aren't session-aware of other back ends. Crossroads can be run as a stand-alone daemon or via inetd.
Homepage:http://crossroads.e-tunity.com/

Distributor load balancer
Distributor is a software TCP load balancer. Like other load balancers, it accepts connections and distributes them to an array of back end servers. It is compatible with any standard TCP protocol (HTTP, LDAP, IMAP, etc.) and is also IPv6 compatible. It has many unique and advanced features and a high-performance architecture.
Homepage:http://distributor.sourceforge.net/

HAproxy 
HAproxy is a high-performance and highly-robust TCP and HTTP load balancer which provides cookie-based persistence, content-based switching, advanced traffic regulation with surge protection, automatic failover, run-time regex-based header control, Web-based reporting, advanced logging to help trouble-shooting buggy applications and/or networks, and a few other features. Its own event-driven state machine achieves 20,000 hits per second and surpasses GigaEthernet on modern hardware, even with tens of thousands of simultaneous connections.
Homepage:http://haproxy.1wt.eu/

udpbalancer 
Udpbalancer is a reverse proxy that sorts UDP requests from your clients to your servers. It may operate in round-robin, volume balance, and load balance modes.
Homepage:http://dev.acts.hu/udpbalancer/

balance 
Balance is a simple but powerful generic TCP proxy with round-robin load balancing and failover mechanisms. Its behavior can be controlled at runtime using a simple command line syntax. Balance supports IPv6 on the listening side, which makes it a very useful tool for IPv6 migration of IPv4 only services and servers.
Homepage:http://www.inlab.de/balance.html





FREAK (CVE-2015-0204) SSL/TLS vulnerability

FREAK  (CVE-2015-0204) SSL/TLS vulnerability

FREAK (Factoring Attack vis--vis RSA-EXPORT Keys CVE-2015-0204) is a illness in some implementations of SSL/TLS that may meet the expense of leave to enter an assailant to decrypt safe communications in the midst of vulnerable clients and servers.

Who is vulnerable to FREAK?
The FREAK fierceness is attainable subsequent to a vulnerable browser connects to a susceptible web servera server that accepts export-grade encryption.
Servers
Servers that agree to on RSA_EXPORT cipher suites put their users at risk from the FREAK acrimony. Using Internet-wide scanning, we have been the theater arts daily tests of all HTTPS servers at public IP addresses to determine whether they divulge this weakened encryption. More than a third of all servers following browser-trusted certificates are at risk


Assistant Research Professor Matthew Green of Johns Hopkins University's Information Security Institute in Maryland summarizes the FREAK vulnerability in a blog post detailing how a hacker could perform MitM attack:
  • ·         In the client's Hello message, it asks for a standard 'RSA' ciphersuite.
  • ·         The MITM attacker changes this message to ask for 'export RSA'.
  • ·         The server responds with a 512-bit export RSA key, signed with its long-term key.
  • ·         The client accepts this weak key due to the OpenSSL/Secure Transport bug.
  • ·         The attacker factors the RSA modulus to recover the corresponding RSA decryption key.
  • ·         When the client encrypts the 'pre-master secret' to the server, the attacker can now decrypt  it to recover the TLS 'master secret'.
  • ·         From here on out, the attacker sees plain text and can inject anything it wants
 What should I reach?

If you control a server
You should tersely disable publicize for TLS export cipher suites. While youconcerning at it, you should along with disable adding together cipher suites that are known to be insecure and enable goodwill as soon as mystery. For instructions upon how to safe popular HTTPS server software, we recommend Mozillas security configuration also and their SSL configuration generator. We with recommend chemical analysis your configuration in front the Qualys SSL Labs SSL Server Test tool.
If you use a browser
Make sure you have the most recent version of your browser installed, and check for updates frequently. Updates that repair the FREAK violence should be comprehensible for all major browsers soon.
If you approaching a sysadmin or developer
Make in concord any TLS libraries you use are taking place to date. Unpatched OpenSSL, Microsoft Schannel, and Apple SecureTransport all vacillate from the vulnerability. Note that these libraries are used internally by many new programs, such as wget and curl. You after that dependence to ensure that your software does not manage to pay for export cipher suites, even as a last resort, by now they can be exploited though the TLS library is patched. We have provided tools for software developers that may be agreeable to pro for scrutiny.

Prevention Techniques: Cross-site request forgery (CSRF)

1. The best defense against CSRF attacks is unpredictable tokens, a piece of data that the server can use to validate the request, and wh...