hack night http://hacknight.se/4/ Friday 19, Saturday 20, Sunday 21 of October, 2012.
forskningsavdelningen wiki http://hackerspaces.org/wiki/Forskningsavdelningen
forskningsavdelningen It’s a room in a social center on volframgatan 14 in malmö
hållplats Emilstorp (efter Annelund, busslinje 5 mot Stenkällan från Gustav via Centralen)
a forskningsavdelningen Malmö http://search.yahoo.com/search;_ylt=A0oGdVdRzXVO2nMAVXil87UF?fr=sfp&fr2=&iscqry=&p=forskningsavdelningen+Malm%C3%B6
Dokodare : Forskningsavdelningen: http://dokodare.kaywa.com/forskningsavdelningen
ruk forskningsavdelningen http://ruk.ca/content/forskningsavdelningen
FeedBurner Forskningsavdelningen http://feeds.feedburner.com/forskningsavdelningen
flickr Forskningsavdelningen http://www.flickr.com/groups/1892242@N20/pool/
“Forskningsavdelningen” raided in Malmö, Sweden http://grelbar.net/archives/353 Forskningsavdelningen means "Research Department" in English. A Swedish hackerspace, located in the south-western part of Sweden in Malmö, was raided recently. The reason for the raid was said to be an un-licenced party being held at the premise, and suspicion of alcohol being served to minors. Nothing strange here, the laws on alcohol are usually in place for a good reason. But why the police came in with Computer Forensics analysts is another issue entirely. Are they qualified to deal with minors on a drinking binge? Or maybe they were there to sieze interesting equipment housed there? Among the seized items are wireless routers and antennae. So far they have received no clear documents as to what crimes they may or may not have commited. There is a suspicion of "preparations for unauthorized computer access", based apparently on the nature of the equipment found in the premise. Also found were two old machines for copying keys, and other lock-picking paraphenelia. Which, as i understand, are not illegal, as long as it is a hobby and not used to break in to anywhere. But i am not a lawyer so. They do mention in one of their posts that owning machinery for the copying of your own keys is perfectly legal. Also, there were two other parties going on in the same block, which were not raided (probably because there were no computers there....) This is a disturbing thing, really, because this could lead the way to other such raids, where a minor supposed crime is used as the way to get a search warrant, and then "oh, look, computers. And we just happened to have our computer experts from the FBI with us, how lucky!". I'm just hoping that they don't bring that to Finland, or instate rules such as "sneak and peek"-warrants, which would allow law enforcement to enter my house without my permission or presence and "look around for evidence". Paranoia 101.
ruk forskningsavdelningen-raided http://ruk.ca/content/forskningsavdelningen-raided
firefoxurl: URL vulnerability http://msmvps.com/blogs/alunj/archive/2007/07/22/firefoxurl-url-vulnerability.aspx
Amazing Bluetooth Hack! http://www.youtube.com/watch?v=cwKWOdOHiWY
Lock picking - How to detect security pins http://www.youtube.com/watch?v=YBZTNBf9AEI
Webcam Super SpyScope! http://www.youtube.com/watch?v=YQPqlKNPvoI
Is Your Girlfriend Cheating? Here's one way to find out! http://www.youtube.com/watch?v=LyjKbMlaMbM
Password for any iPhone [Works Every Time!] http://www.youtube.com/watch?v=S1X4SxGvwdI
e WiFi Antenna Booster - Very Stable and Stays On The Signal http://www.youtube.com/watch?v=RMQfl20giM4
How to make a Cheap WiFi Antenna Booster - Systm www.youtube.com/watch?v=S1X4SxGvwdI
När http:// saknas är URL fel, så då instället högerklicka på webbsidan och välj "Visa sidinfo" och läs vad som står till höger om "Adress:" (Detta gäller Firefox.)
Condom Hack Pack! http://www.youtube.com/watch?v=oqFUxO9XuTw
Condom Hack Pack Volume 2! http://www.youtube.com/watch?v=H_3_DVUDlRM
American authorities charge UK man with hacking Army, Missile Defense Agency and NASA websites http://rt.com/usa/lauri-love-anonymous-lastresort-853/
A 28-year-old man from Stradishall, England has been charged in the United States with hacking into US government and military computers, stealing sensitive data and causing millions of dollars in damages. The New Jersey US Attorney’s Office announced on Monday that Lauri Love of the United Kingdom was indicted with breaching thousands of computer systems, including those belonging to the Army, the Pentagon’s Missile Defense Agency and NASA. A separate complaint filed in the Eastern District of Virginia also accuses Love of participating in an operation earlier this year spearheaded by the hacktivist movement Anonymous.
= Lauri Love's Speech at Muscatelli's Meeting with students http://www.youtube.com/watch?v=jwAHwy3YfZM
Hackman Suite (freeware) http://lib.giveawayoftheday.com/Hackman_Suite_57583/ is a multi-module all purpose debugging tool. It includes a hex... Hackman Suite 9.0 is a single installation package containing all the necessary and powerful software developed by its company TechnoLogismiki. This hackman suite 9.0 consists of many components such as Hackman Hex Editor 9.0, Hackman Disassembler 9.0, Hackman Template Editor 9.0, Hackman Template File Editor 9.0 and the Hackman Calculator 9.0. It also contains some extra and useful plugins such as Algorithm Editor v4.02, Script Editor v5.0, File filter, Shortcut editor, File Merger v6.0, Shredder, Split File, Plugin uninstaller and Version changer v3.05. A short introduction to the components of the Hackman Suite is given below. Hackman Hex Editor 9.0 is a fast,powerful and light weight multi-module hex editing software which can handle unlimited file sizes and has read only access to other media, such as memory and hard disk drive. Hackman Disassembler 9.0 is an ultra fast multi-processor disassembler having a flexible print engine to create professional reports, features great customization capabilities and a versatile and handy user interface. Hackman Template Editor 9.0 is a fast generic purpose data analyzer which creates customized structures using data stored in files or in disks. The output is editable thus making editing databases, custom structured files and EEPROM files a very easy task. Hackman Template File Editor 9.0 is a freeware utility that aims in accelerating and facilitating template creation and edit. Hackman Calculator 9.0 is a versatile scientific calculator that can operate in any mode (decimal, hex, binary and octal) up to 1024 bits. It is able to perform both signed and unsigned operations. It is necessary to install VISUAL BASIC RUNTIMES v6.0 sp6 prior to the installation of this package. Otherwise the suite may not work efficiently. Review licensed from . Publisher description . Hackman Suite is a multi-module all purpose debugging tool. It includes a hex editor, a disassembler, a template editor, a hex calculator and other everyday useful tools to assist programmers and code testers with the most common tasks. What's new in this version Brand new live update system, numerous enhancements and bug fixes. The Editor With Hackman Hex Editor you can edit any type of file in your hard disk, even your hard disk itself or a process in memory. Data are presented in 6 different ways (modes): ASCII, Hex, Binary, Octal, Decimal and Custom mode. The editor comes with unlimited undo/redo with undo/redo lists, full clipboard control: cut, copy, paste, paste special, clear clipboard, highly sophisticated find and replace, unlimited watches and bookmarks and numerous conversion modes, including Java, C++, VB, ASCII, text and more. You can always use the Patch Maker, the MS-DOS Executable Maker, Merger/Splitter and Checksums (CRC16/32, MD5, SHA1 and more) to check and / or manipulate files. Embedded cryptographic capabilities (Skipjack, NSA, RCA algorithms), support for macros, inline command bar, numerous plugins and external tools, configurable toolbar, shortcuts and menus, multilingual interface and online help consist a part of the features list.
PLEASE INSTALL VISUAL BASIC RUNTIMES v6.0 sp6 PRIOR TO THIS INSTALLATION.
HACKMAN MAY NOT WORK PROPERLY IF YOU FAIL TO DO SO. YOU CAN FIND THEM HERE (FREE):
ShadowExplorer http://lib.giveawayoftheday.com/ShadowExplorer_123629/ Version: 0.9 ShadowExplorer is a very simple and lightweight tool that allows you to access the data stored by the Volume Shadow Copy service of your Windows system. This basically allows you to view the data...
DK Finder (freeware) http://lib.giveawayoftheday.com/DK_Finder_11156/ is a sort of enhanced file explorer for Windows computers. The Windows Explorer application, which comes built-in with all Windows operative system, has proved over the years to lack advanced options. Thus, when the user needs to do anything other than copy a file or paste one, he finds himself at a loss for "actions." DK Finder is an application designed by a developer who wanted something more from his explorer. DK Finder is not easy on the eye but has quite a lot of features that allow you to do a lot more with your files. The most obvious examples of what I've just said are the ability to find specific files and the ability to create filters. When you first open DK Finder, it will index all your files. Then, you can place filters on your searches that will help you find files more efficiently. Of course, you can also sort files using a variety of views and parameters. You can also specify the number of files to show on each search. The application is actually quite fast to search files. The only drawback that I can find is that it doesn't look really refined, especially after seeing what Vista can do visually.
StopCut http://lib.giveawayoftheday.com/StopCut_11082/ Editor review . StopCut 1.7 is a free program that provides secure direct connections to your ISP. This way, you won´t be affected with spyware or hacking attacks using NetCut. NetCut is a program that, using the ARP protocol, can interfere the usage of your network, even through routers or switches. StopCut will prevent anybody to interfere, and being able to record your text and audio conversations in MSN or Yahoo Messengers, the passwords you use or the sites you´ve visited. During installation, StopCut installs WinPCap 4.0, a packet capture and network monitoring library, needed to run the program. StopCut uses the WinPCap abiltity to capture and ransmit network packets bypassing the protocol stack to achieve a direct secure connection to your ISP. The installation won´t place a shortcut to access StopCut in the StopCut group. The program is running since you installed it. If you want to access its Window (just to Stop it), you must go through the Start/Run/Browse procedure. The only available shortcut points to CheckCut 1.4, an added utility which search for users who uses NetCut. This program enables the users to clean their ARP table.
Memware http://lib.giveawayoftheday.com/Memware_9671/ is a great simple software that allows you to invent your own cheats or trainers for any game, even internet games. Now you can mess around with any number in your favorite games. Get infinite grenades, missiles, lives, or whatever it is you crave. Level-up your RPG characters 1000 levels at a time. You can stop searching in magazines and on the web for cheats and trainers to come out. Invent your own right away with Memware. It doesn't require any advanced knowledge in Windows at all. However advanced users can benefit more as they will be able to scan the memory, read and write in Hex and Ascii on memory, monitor and debug their own programs.
4.6 million Snapchat photo app usernames, phone numbers leaked http://rt.com/usa/snapchat-phones-usernames-leaked-062/
Stream Explorer version 1.0.3 (freeware) http://lib.giveawayoftheday.com/Stream_Explorer_24536/ is a utility that identifies streams in your NTFS files. It has been developed with from the keen knowledge of Jürgen Gärtner. If you are less familiar with the concept of streams, here is the short of it. Streams are the ‘strands’ in files, mostly on standard Windows NT files where hardware and operational information is kept, that contain data. In most cases files would contain one data stream, which is identified in the directory as an ‘unnamed’ stream. This will always be the default stream, which will become the main data source. However thanks to this program, multiple streams can now be identified in files. These additional streams contain useful information, but could also contain destructive data. Whatever the data you need, Stream Explorer 1.0.3 will allow users to trace these streams. It will be able to identify the number of streams. It will also reveal their format their type, their size and ultimately their content, making your PCs operational functions more transparent and manageable. One does not need to be a software engineer to understand that this is a valuable functionality as data flow and transparency on your PC is obviously an area where you would want to have the greatest control.
ShadowExplorer http://lib.giveawayoftheday.com/ShadowExplorer_123629/ is a very simple and lightweight tool that allows you to access the data stored by the Volume Shadow Copy service of your Windows system. This basically allows you to view the data stored by a “System Restore Point”, meaning the exact files, folders and directory structure of a drive at the time when that “System Restore Point” was created. But there’s more to come: despite being very small and simple, ShadowExplorer doesn’t only allow you to view this kind of data, but also retrieve and export files and folders from these “point-in-time copies”. The most obvious characteristic of this program is its simplicity. The main interface only displays the data contained by the detected restore points, letting you browse among the available ones and select the view mode (small icons, large icons, list or details). In order to retrieve a file or folder from these copies, just right-click them and select “Export” from the context menu. There are no intricate settings or options, ShadowExplorer being very lightweight and neat. There’s not much to say about such a simple and small application. It represents a viable choice for whenever you need to browse the restore points of your Windows system or even to retrieve files from them. ShadowExplorer is also free, so there’s no reason to avoid trying it. Review licensed from Publisher description Since the Volume Shadow Copy Service is included, and turned on by default, in all editions of Windows Vista / 7 / 8, why not take advantage of it? All it takes is an additional tool like ShadowExplorer, that can access the shadow storage and make the point-in-time copies accessible to the user.
Major encryption security bug ‘Heartbleed’ impacts two-thirds of the web http://rt.com/news/heartbleed-encryption-security-bug-269/
$5 DIY HDTV Antenna! Get FREE TV! https://www.youtube.com/watch?v=X_OhW02DmUs
se tldr.hackerspace http://tldr.hackerspace.se/
= ! http://www.tldr.hackerspace.se/
You can now follow all the swedish hackerspaces at the same place http://tldr.hackerspace.se/ to see whats happend around on other spaces. Enjoy! Se även: http://www.tldr.hackerspace.se/ , som är bättre!
twitter forskningsavd https://twitter.com/forskningsavd
twitter 1fromsweden https://twitter.com/1fromsweden
Workshops: IT-policy för allmänheten – Redux 2014 On 2014/02/23 · Leave a Comment · In Privacy, Workshop Nu är det dags igen! På tisdag den 25:e Februari kl. 19:00 börjar vi om med workshops för att undervisa allmänheten i grundläggande IT-säkerhet. Denna gången har vi 5 workshops planerade för sista tisdagen av varje månad, med början nu i Februari. Var: Norra Grängesbergsgatan 26b (Kontrapunkt Kreativa Verkstäder) När: 19:00 sista Tisdagen varje månad Ni kan se ett schema spikat på Kontrapunkt och på anslagstavlan utanför Fabriken/Cykelköket. Som vanligt är alla välkomna men vill man delta i praktiska övningar så bör man ha med sig en dator med WiFi-kort. Vi ska försöka rikta oss till alla vanliga operativsystem så som Windows NT, Macintosh OS och GNU/Linux. Det är ej obligatorisk anmälan på workshop.forskningsavd.se mest så att vi kan få en idé om hur många som kan tänkas dyka upp. Workshop #1: tisdag 25:e februari IT-policy for allmänheten, lär er knepen som håller IT-proffsen virusfria. Återblick Tack till er som kom till vår första workshop och vi hoppas att ni lärde er något som ni kunde ta hem med er. Annars har vi här en länk till presentationen från den kvällen. Här är även lite länkar som diskuterades. http://www.nsa.gov/ia/_files/factsheets/best_practices_datasheets.pdf XKCD Lösenordsstyrka XKCD Återanvända lösenord Wikipedia PKI SSLLabs.com för att testa webbsidors SSL-cert Gemenskapsdriven Certifikatutgivare Väl mött på nästa workshop. Workshop #2: tisdag 25:e mars Verktygen i vår vardag som kan skydda oss på internet. Få rekommendationer på webbläsare och hjälp med tillägg som kan hålla er säkra på internet. Workshop #3: tisdag 29:e april Kryptering för dödliga. Personer utan tidigare erfarenhet av IT ska kunna lära sig kryptera både lagrad data och kommunikation. Workshop #4: tisdag 27:e maj Tor, ett anonymt internet. Ni får lära er om ett så kallat DarkNet som heter Tor. Workshop #5: tisdag 24:e juni Alternativen till sociala media. För er som verkligen vill synas på internet, vem kan man lita på med sin information?
ej obl anm workshops http://workshop.forskningsavd.se/
Workshop #5: tisdag 24:e juni 2014-06-24
= Add money to your likes. Support creators directly on services you use!
Recent Comments Nicola Lunghi on Bitmap PCB to G-code for CNC http://forskningsavd.se/2011/05/27/bitmap-pcb-to-g-code-for-cnc/comment-page-1/#comment-3865 melhem http://none/ on Bitmap PCB to G-code for CNC http://forskningsavd.se/2011/05/27/bitmap-pcb-to-g-code-for-cnc/comment-page-1/#comment-3851 julbord uppsala http://www.zataskok.se/ on Workshop-series “IT security, for the public” http://forskningsavd.se/2013/10/17/workshop-series-it-security-for-the-public/comment-page-1/#comment-3824 Recent Posts Workshops: IT-policy för allmänheten – Redux 2014 http://forskningsavd.se/2014/02/23/workshops-it-policy-for-allmanheten-redux-2014/ IT-policy för allmänheten – Del 2 http://forskningsavd.se/2013/11/22/it-policy-for-allmanheten-del-2/ IT-policy för allmänheten – Del 1 beta1 http://forskningsavd.se/2013/11/04/it-policy-for-allmanheten-del-1-beta1/ Workshop-series “IT security, for the public” http://forskningsavd.se/2013/10/17/workshop-series-it-security-for-the-public/ Report from forsk monday at new hackerspace! http://forskningsavd.se/2013/08/21/report-from-forsk-monday-at-new-hackerspace/ Achtung Telia (pki debacle) http://forskningsavd.se/2013/04/18/achtung-telia/ Mail-liste-issues och Föredragsvisningar 3/3 @ Glassen http://forskningsavd.se/2013/03/01/mail-liste-issues-och-foredragsvisningar-33-glassen/ Tre år efter razzian.. http://forskningsavd.se/2012/12/01/tre-ar-efter-razzian/ Hacknight 4our, 19-21 October http://forskningsavd.se/2012/09/19/hacknight-4our-19-21-october/ Hackitat – A film about political hacking, world wide http://forskningsavd.se/2012/08/12/hackitat-a-film-about-political-hacking-world-wide/ Connect elsewhere Facebook http://facebook.com/forskningsavd , Youtube http://youtube.com/forskningsavd , Identi http://identi.ca/forskningsavd , Bambuser http://bambuser.com/channel/forskningsavd , Twitter http://twitter.com/forskningsavd , Flickr http://www.flickr.com/photos/forskningsavd , Vimeo http://vimeo.com/forskningsavd , Github http://github.com/forskningsavd
Catalog: Everything https://flattr.com/catalog/everything Music https://flattr.com/catalog/music Videos https://flattr.com/catalog/videos Software https://flattr.com/catalog/software Games https://flattr.com/catalog/games Podcasts https://flattr.com/catalog/podcasts Photos https://flattr.com/catalog/photos Comics https://flattr.com/catalog/comics Blogs & News https://flattr.com/catalog/text Charities https://flattr.com/catalog/charities Unclaimed https://flattr.com/catalog/unclaimed Profiles
What is Twisted? ¶ Twisted is an event-driven networking engine written in Python and licensed under the open source MIT license. Code Examples Echo Server Web Server Publish/Subscribe Mail Client Twisted makes it easy to implement custom network applications. Here's a TCP server that echoes back everything that's written to it: from twisted.internet import protocol, reactor class Echo(protocol.Protocol): def dataReceived(self, data): self.transport.write(data) class EchoFactory(protocol.Factory): def buildProtocol(self, addr): return Echo() reactor.listenTCP(1234, EchoFactory()) reactor.run() Learn more about writing servers, writing clients and the core networking libraries , including support for SSL, UDP, scheduled events, unit testing infrastructure, and much more. More Protocols Twisted also supports many common network protocols, including SMTP, POP3, IMAP, SSHv2, and DNS. For more information see our documentation and API reference. Community https://twistedmatrix.com/trac/raw-attachment/wiki/AttachmentBucket/oreilly_book_cover.jpg Get in touch with the Twisted community through email, Stack Overflow or IRC; Learn about the Twisted development process and how to contribute; Read about software using Twisted and their success stories; Find out what Twisted Matrix Laboratories is; Learn about the individuals and organisations that aid Twisted with donations of hardware, software, hosting and other things; Help improve Twisted on Windows! https://twistedmatrix.com/trac/
= Var: Norra Grängesbergsgatan 26b (Kontrapunkt Kreativa Verkstäder) När: 19:00 sista Tisdagen varje månad
tisdag 24:e juni Alternativen till sociala media. För er som verkligen vill synas på internet, vem kan man lita på med sin information?
Hack Check: RT's special coverage from the cyber frontline http://rt.com/news/219043-cyber-war-hackers-report/
Hur möts vi nu? Ett porträtt av San Franciscos konstscen i förändring http://sverigesradio.se/sida/avsnitt/579034?programid=767
Toppolitikernas konton hackade http://www.svt.se/nyheter/inrikes/topppolitikernas-konton-hackade
Testa om lösenordet är hackat: https://dold.svt.se/
Vault 7: CIA Hacking Tools Revealed https://www.wikileaks.org/ciav7p1/
Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base https://www.rt.com/usa/384082-shadow-brokers-nsa-password-trump/
US Navy strike group heads towards N. Korea over Pyongyang’s ‘nuclear threat’ https://www.rt.com/news/384094-us-strike-group-korea-nuclear/