Ubuntu introduces Thin revolution in UI

Great. Now its the season of single color themes. Now Ubuntu gets a “monochromatic makeover”. The creative route of the new design is “More outlines, Less solid”. We have seen it in the www space, but It’ll be a new experience in a full-fledged Desktop Operating System.

Ubuntu thin icon sprite

Nice work, Ubuntu Creative Team!


Hand of thief

Hand of Thief

OK. Many security experts now say that there is a real Linux Trojan is on market and it started its activity on web. It’s called Hand Of Thief (HOT). It is a commercial malware, comes with its own logo and command & control panel interfaces. Zdnet describes it as a semi-successful Linux Trojan. But still I don’t think it is a fully-functional malware that affects a Linux system which is automatically installed, it may need a basic user permission.

Basically HOT is affected on the web browsers of major popular distributions. Mozilla FireFox, Iceweasel, Epiphany, Chromium browsers are affected. But my concern is this – how this happened. I think it is not Linux vulnerable – but my computer habits are. Wonder why we add such fancy and complicated yet less useful features to the operating system. Doing so, it gets more fatty and thus weaker in the matter of security. A rule of thumb is: the more we make it fancy the less it become secure!

As an additional security, never use any in-built applications in a browser, be it Iceweasel, or Midori or whatever. Instead you open a PDF document in a PDF viewer installed inside your system. Likewise, open an mp4 file in Totem or VLC stand alone application. Please care to update security patches always.

‘Anonymous’ crashed child pornography sites offline

Hats off! Hallelujah. That’s the social responsibility. Anonymous taken down more than 40 websites containing child pornographic content. Here is the extract from their pastebin press note.

Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target. Read More

Stop child porn

Many of us still have no idea on what ANONYMOUS does for the society. They stand for some good motives. They are hackers. They hack for good.

Read more news

Many people who use internet in a regular basis encounter situations in making passwords. To the sake of easy remembering, many of them choose username as Username and password as Password. Some others simply choose their password as 123456 or some other sequential numbers. Just tell them about 2 way authentication. I bet their answer will be like this: “No way, its time consuming, dude, who has time to check sms to loging your email account?” Just remember, passwords are not silly things. If you are using a Weak passwords, you are just like living in BIG house having doors without locks 🙂


This is a brief post, and some may find it a bit “out there”. Having wrote this last night, I woke up this morning and realized I still remembered the password I created . Regardless, the following will focus on ideas for creating passphrases that are secure yet practical and easy to remember.

Firstly, passphrases. It’s a reoccurring event on twitter to read far-fetched tweets in regards to password complexity (and yes, the typos are meant to be).

Problem One: Passwords 10 years ago- “1234” Passwords now- “This password must contain an Uppercase letter, a number, haiku, gang sign, and a hieroglyph.”

Problem Two: “My kind of Relasionship…My boyfriend knows all my passwords to every social account I have and so do I…”

To reiterate, passwords are becoming more complex to the point that folks cannot remember them as well as individuals are handing out their passwords…

View original post 532 more words

Post Exploitation – Discovering Network Information In Windows

These are some of the basic and simple steps has to be taken after a successful penetration. Great post.

Penetration Testing Lab

In network infrastructure penetration tests if we manage to exploit one system then it is easy to obtain information for the network that this system is part of.This information is important because in almost every network penetration test the ultimate goal is to become domain administrator and in order to achieve that it is necessary to know the appropriate commands that will help us to gather information about the network that we are already inside.In this article we will see how we can gather information about windows networks that we are conducting the penetration test from the system that we have already exploited.

Lets say that we have exploited a windows system and we want to know more about the network that this system belongs to.The first and most common command is of course the ipconfig /all which it will display to us all the information about the network adapters…

View original post 256 more words

Very informative. I use this calendar in my google calendar. It works perfectly. A BIG thanks to Laura Arjona

The bright side

I decided to maintain a calendar about events related with Free, Libre, Open Source Software.

I think it’s interesting even if you cannot attend any conference or meeting, since there are a lot of resources that you can get: slides of the talks, videos, in some cases you can follow the video streaming live, and you can get the identi.ca/twitter hashtags to follow the event and get useful information. You can also contribute sending an article or talk proposal, I think it can be a nice experience, even if it’s not accepted!

I took many references from Jeff’s Open Source Resource Blog, and some others from Ada Initiative. Others simply I knew them, or I searched about them. I try to check all the information with the corresponding website, not just copy the event from elsewhere.

You can find events all around the world, but I live in…

View original post 148 more words