Source: Leadership 12 lessons from Navy Seals Forever on the lookout for the keys to leadership, the ability that some people have to guide others to reach their goals and be successful together, I was eager to share with you the 12 keys to leadership from the book « Extreme Ownership, how US Navy Seals lead and win » by Jocko Willink and Leif […]
Category Archives
Allgemein
1984 – How to send an e-mail !
Very awsome !
Secure Linux for Non-Tech Users
Read more details at The Hacker News
Motto
Iran’s Re-emergence on Global Energy Markets
Source: Study of Kings College, Department of War Stadies Opportunities, Chellanges and Implications by Kalina K. Damianova Download here
Vulnerability in Apache Web-Server Could Unmask the Onion (Tor-) Network
Source: The Hackernews A unknown Computer Science Student has uncovered a one year old loophole in Apache Web Server, which could could potentially unmask the real identity of .onion-domains and servers hidden behind the Tor-network. Although the loophole was reported on Reddit and to the Tor Project months back, it recently came to the limelight soon […]
A New Linux Based Pentest OS – PARROT SECURITY OS 2.1 „MURDOCK
Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Further details at Hackinsight
Neue EU-Richtlinie zur Verbesserung der Cyber-Sicherheit
Vertreter der EU-Kommission, des Europaparlaments und des Rates haben sich am 08.12.2015 auf die sogenannte NIS-Richtlinie zur Netzwerk- und Informationssicherheit geeinigt, die vorsieht, dass Internetkonzerne schwere Hackerangriffe auf ihre Systeme melden müssen, andernfalls drohen ihnen Strafen. Die Vorgabe gilt nicht für Kleinunternehmen. Zudem enthält die Richtlinie Vorgaben für Cybersicherheit für wichtige Infrastrukturbetreiber aus den Bereichen […]
Playstation 4 has been Hacked
A previously created kernel exploid (by CTurt) injects a malicious code in the PS4 and gain control of the gamming platform. Source: http://www.hackinsight.org/news,534.html
Cyber Teterrence – What you need to do
Derived from military tactical procedures, the article describes in detail the different aspects. Source: http://securityaffairs.co/wordpress/43080/cyber-warfare-2/zero-knowledge-proof.html