IT security

Page 2 of 5 Previous  1, 2, 3, 4, 5  Next

View previous topic View next topic Go down

Re: IT security

Post by Guest on 10/10/2015, 23:12

eto na..ja ispa gonic robova... No

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 11/10/2015, 07:32

Meni menadžiranje nikad nije išlo...na žalost... ostaje mi oranje i kopanje... confused

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 11/10/2015, 11:27

Trinity wrote:Meni menadžiranje nikad nije išlo...na žalost... ostaje mi oranje i kopanje... confused
zaprepastila bi se kako je u biti jednostavno..samo moras biti arogantna i bahata dusa..poput mene... jocolor

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 13/10/2015, 20:06


 

 

 [size=11] 108
  110  11  250[/size]


From today, every phone call you make, every text message you send and every email you write will compulsorily be tracked by the government agencies under a new metadata retention scheme.
Yes, you heard right. If you are a citizen of Australia with a mobile phone and an Internet connection, your digital activity will be recorded.
As the government's new data retention law comes into effect, the Australian telecommunications companies will now keep large amounts of your telecommunications metadata for two years.
The law has allegedly been implemented to protect the country against organized terrorist and criminals, like every government agencies including the United States' intelligence agency NSAand British intelligence agency GCHQ claim.
But…
This new scheme vastly expands the retention of personal data, which has triggered a debate among Australians as it is a major invasion of privacy.




WHAT IS BEING COLLECTED?


Until today, data retention by mobile phone and Internet providers was inconsistent. Data about who called or texted whom was generally stored by major companies for billing purposes.

However, much more data will now be held, for a mandatory period of 2 years.

What Phone Data is Retained?



  • Who you called

  • Who you texted

  • Missed numbers

  • Time and Date of calls and SMS

  • Duration of calls

  • Your Location at the time of call or SMS

  • Device data



What Internet Data is Retained?



  • Your IP address

  • Location and geographical data

  • The volume of your uploads and downloads

  • Time and duration of your web connections

  • Your email data including emailed Date, Time and Attachment data volumes (If you use an Australian email service)

  • While not mandatory, some internet providers may record the IP address of the sites you visit, mainly your Internet history


The Australian government emphasized that the type of data collected is only Metadata, and not the content of calls and messages.

However, civil liberties advocates have argued that the metadata, in an aggregate, paints a very accurate picture of a user's life. Like iiNet said"If you have the metadata, you have the content."

Metadata might seem like it does not give much away, and one shouldn’t bother about, but with the help of metadata, it will be no harder for even the local police to figure out if you called a phone sex service for half an hour at 2 am.

For many, the new scheme seems to be a great step towards protecting the country from terrorist, but many believe it is the biggest invasion of privacy in the history of Australia and a massive security risk as well.

Who can Access My Data?


Besides Australian security agencies and law enforcement agencies, the collected data of citizens can be accessed by even local police station all the way up to the Australian Federal Police and ASIO.

While child abuse and terrorism investigations are often cited, the new scheme will allow the local police to request data for much more minor crimes.

Though Journalist are still on the safer side, as it will still take a court warrant to access a journalist's data in an attempt to identify their sources, but that proceedings will take place in private and without their knowledge.

Also, no warrant is required for government agencies to gather data belonging to its own employees for contact with journalists.

How Can I Circumvent the Data Retention Scheme?


Its easy to circumvent the new data retention scheme by Australian government. You can follow these simple instruction to protect your personal data to be tracked by the government:


  • Instead of using the cellular network, use free apps to make calls or send text messages. For e.g., TextSecure for encrypted text messaging, RedPhone for encrypted phone calls andSignal for both encrypted messaging and phone calls.

  • Use Virtual Private Networks (VPNs) that help hide your Internet traffic by encrypting the connection. For the guide, check this.

  • Use non-Australian email, video, and social media platforms, such as GmailHotmail,Facebook and Skype, as these are exempted from some of the data retention requirements. (Note: Government will be able to see that you use these services, but they won’t know whom you're talking to)

  • Use Public Wi-Fi hotspots. We usually don’t advice to use public hotspots but Australians can consider using public hotspots as they aren't included in the data retention scheme.


http://thehackernews.com/2015/10/data-retention-law.html

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 13/10/2015, 23:04

I sto ce im to budalama??..

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 14/10/2015, 10:23

A valjda već imaju u planu što će s tim podacima... krampusi...

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 14/10/2015, 16:55

Nek si ebeju mtr sa tim podacima..napravit cu selfi mog Kitonje,pa nek to skidaju i daju svojim mamama

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 14/10/2015, 17:11

Ne žuri se, to vrijedi samo za Australce. Navodno. :)

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 14/10/2015, 20:44

A....ja sam samo zabrinut za razne beyeve i gudize na njima.. :clown

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 29/10/2015, 13:18

Facebook koristi WhatsApp za špijuniranje korisnika da bi im prikazivao odgovarajuće reklame
Mobilni telefoni29.10.2015, 00:00 AM


Google, WhatsApp i Facebook praktično špijuniraju svoje korisnike da bi otkrili njihova interesovanja na osnovu kojih se korisnicima servisa ovih kompanija prikazuju odgovorajuće reklame. Ovo je izjavio direktor kompanije Avast, Vinsent Stekler, koji je rekao i da korisnici verovatno znaju za ovu praksu.
On je podsetio da Googeovi prihodi u suštini dolaze od AdWords.
Stekler je rekao da je špijuniranje korisnika da bi se saznalo šta ih interesuje i prikazivanje odgovrarajućih reklama poslovni model ovih kompanija, i da u tome nema ničeg lošeg, ako se pretpostavi da korisnici znaju da se to dešava.
Facebook i Google su poznati po ovakvoj praksi. Međutim, u društvu "špijuna", kako tvrdi direktor Avasta, nalazi se i WhatsApp. Prema njegovim rečima, podaci prikupljeni iz WhatsAppa se koriste za prikazivanje odgovarajućih reklama korisnicima Facebooka.
“Dobijate reklamu na Facebooku na osnovu razgovora koje ste imali na WhatsAppu”, kaže Stekler.
On kaže i da korisnici WhatsAppa narušavaju privatnost svojih kontakata u telefonu, deleći njihove detalje da bi mogli da koriste aplikacije na mobilnim telefonima.
“Da bi ste koristili WhatsApp, morate da podelite celu bazu svojih konatakta. To znači da vi dajete Facebooku kontakt podatke svih svojih prijatelja i kolega. Da li imate prava da to uradite?” upitao je Stekler.
Facebook za sada nije komentarisao tvrdnje direktora Avasta.

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Triny on 29/10/2015, 13:19

Ima li koga da ne špijunira ? :)

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 29/10/2015, 14:02

Pa..ne koristim te drustvene servise..bedasto mi...nek spijaju..moraju opravdati svoje dobivanje placi....
Ej Triny,zasto ti ne spijas malo ozbiljnije..sklopi neki freelancer ugovor i dobivaj tantijeme.. king

Guest
Guest


Back to top Go down

Re: IT security

Post by Triny on 29/10/2015, 14:15

Pa i dobijam...od Googla... ;) B-)

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Triny on 31/10/2015, 22:05

Hakeri prodaju 13 miliona lozinki korisnika 000webhosta za 2000 dolara
Vesti30.10.2015, 01:00 AM


Nepoznati haker je u martu ove godine hakovao popularni web hosting servis 000webhost.com i ukrao 13 miliona lozinki koje se sada prodaju za njih 2000 dolara.
Na ovo je upozorio Troj Hant, vlasnik i administrator servisa “Have I been pwned?” pomoću koga korisnici mogu proveriti da li su njihovi lični podaci procureli negde na webu zbog nekog hakerskog napada.
Hant je saznao za ovo kada ga je kontaktirao neko ko ga je uputio kompromitovanu bazu podataka sa 000webhost.com da bi mogao da je doda svom servisu “Have I been pwned?”.
Kada je proverio bazu podataka koju je dobio, Hant je mogao da potvrdi da su podaci autentični i obavesti kompaniju 000Webhost o ovome.
Hant je zatim pokušao da kontakira nekog u 000Webhostu ko bi mogao da mu pomogne i naišao na brojne probleme. Posle šest dana koliko je kompanija ignorisala Hanta, on je objavio informacije o ovom incidentu na Twitteru, gde je zamolio korisnike 000webhosta.com za pomoć. On je svoje iskustvo sa 000Webhostom podelio i sa čitaocima svog bloga.
Kada su se vesti o incidentu proširile na internetu, Hantu se javio još neko ko mu je rekao da je baza podataka prodaje za 2000 dolara i da mu nije jasno zbog čega neko njemu (Hantu) nudi bazu podataka besplatno kada neki zarađuju ozbiljan novac od ukradenih informacija.
Istinitost ovih tvrdnji potvrdila je i osoba koja je prva obavestila Hanta o ovome koja je rekla da bi volela da niko ne obavesti 000Webhost o incidentu jer njegovi prijatelji zarađuju od prodaje ukradenih informacija.
Tek onda je 000Webhost objavio vesti o ovom incidentu na Facebooku, započeo poništavanje lozinki svojih korisnika i primenio enkripciju.
Kompromitovana baza podataka korisnika servisa sadrži 13 545 468 korisničkih naloga.
Haker je uspeo da ukrade korisnička imena, email adrese, informacije o IP adresama i lozinke u formi običnog teksta.
Korisnicima koji praktikuju da iste lozinke koriste na različitim sajtovima se savetuje da ih promene ako su na drugim sajtovima koristili email ili ime sadržano u njihovim 000webhost.com nalozima.
Cela baza podataka korisnika 000webhost.com je dodata Hantovom servisu, gde se nalazi na trećem mestu, posle baze podataka kompanije Adobe sa 152 miliona ukradenih naloga i sajta Ashley Madison koji je hakovan ovog leta kada je ukradeno 30 miliona naloga.

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Triny on 31/10/2015, 22:11

Lozinke bez enkripcije ? :doh

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Triny on 13/11/2015, 14:33

Tor Project optužio FBI da je platio naučnike sa univerziteta da hakuju Tor
Vesti13.11.2015, 09:30 AM


Direktor Tor Projecta Rodžer Dingldajn optužio je FBI da je istraživačima sa Univerziteta Karnegi Melon platio najmanje milion dolara da pronađu način za hakovanje Tora i otkrivanje IP adresa korisnika Tora.
Prema tvrdnjama koje su iznete na blogu Tor Project, reč je o privatnom dogovoru FBI i istraživača sa Univerziteta Karnegi Melon. Nema naznaka da je FBI imao sudski nalog niti da je bilo institucionalnog nadzora nadležnog univerzitetskog odbora. U Tor Projectu veruju da FBI nije mogao imati validan sudski nalog za ovakav napad na Tor, jer napadi nisu isključivo bili usmereni kriminalce ili kriminalne aktivnosti, već neselektivno na mnoge korisnike.
Za ovu saradnju FBI i istraživača sa univerziteta u Tor Projectu su saznali zahvaljujući sudkom postupku koji se vodi protiv Brajana Farela, koji je bio jedan od administratora sajta Silk Road 2.0. Sudska dokumenta su otkrila da je da je Farelova uloga u radu sajta Silk Road 2.0 otkrivena zahvaljujući informacijama do kojih su došli istraživači sa jednog univerziteta. Farelova odbrana je insistirala da dobije više detalja o odnosu između istraživača sa univerziteta i federalnih vlasti, kao i sredstava korišćenih da bi se identifikovao Farel koji je bio korisnik sajta koji je trebalo da bude anoniman. Ime univerziteta se nigde ne spominje u dokumentima, ali postoje posredni dokazi koji ukazuju na Univerzitet Karnegi Melon.
Prema sudskim dokumentima, napadi na Tor dogodili su se u periodu između januara i jula prošle godine. Ovi napadi su dokumentovani u istraživačkom radu koji su naučnici sa univerziteta želeli da predstave na konferenciji Black Hat 2014.
Iz Tor Projecta su saznali za ovo istraživanje iz kratkog abstrakta na web sajtu konferencije, i zatim kontaktirali istraživače da bi saznali više detalja, ali sa univerziteta su odbili da komentarišu to. Međutim, u email prepisci istraživači sa univerziteta su bili dovoljno neoprezni da daju neke nagoveštaje o predstojećoj prezentaciji.
Tor Project je iskoristio to, kao i logove iz napada da bi objavio ispravku za Tor softver, 30. jula, nekoliko dana pre prezentacije na konferenciji, koju su istraživači na kraju otkazali.
Razlog za otkazivanje je bio taj što rukovodstvo univerziteta nije odobrilo javno prezentovanje ovog istraživanja.
Ovaj događaj je pokrenuo rasprave o etici istraživanja i profesionalizmu istraživača sa Univerziteta Karnegi Melon.
Sada, godinu dana kasnije, tim Tor Project je ponovo pokrenuo ova pitanja, ukazujući na to da je ova afera ustvari možda bila orkestrirana od strane FBI, koji je tražio način za špijuniranje korisnika Tora.
S obzirom da nema naznaka da je FBI imao sudski nalog, iz Tor Projecta kažu da je ovaj napad na Tor “uznemirujući presedan”: “Građanske slobode su napadnute ako policija veruje da je moguće zaobići pravila i poveriti posao policije univerzitetima”, kažu iz Tor Projecta.

_________________
Every government interference in the economy consists of giving an unearned benefit, extorted by force, to some men at the expense of others.
avatar
Triny

Female
Posts : 11453
2014-04-17


Back to top Go down

Re: IT security

Post by Guest on 13/11/2015, 14:46

TOR je provaljen..nije bas niti nova vijest..

Guest
Guest


Back to top Go down

Re: IT security

Post by BB-8 on 10/2/2016, 10:51


_________________
avatar
BB-8

Posts : 3498
2016-01-25


Back to top Go down

Re: IT security

Post by BB-8 on 10/2/2016, 10:52


_________________
avatar
BB-8

Posts : 3498
2016-01-25


Back to top Go down

Re: IT security

Post by veber on 12/2/2016, 22:24

Nakon godinu dana kaj imam, pazite ovo, novi mob. Nije vise nov, skuzio jebenu funkciju precaca i pogledao upute. Taman ce riknut kada procitam upute.

_________________
sezona gotova
avatar
veber

Male
Posts : 23871
2014-12-30


Back to top Go down

Re: IT security

Post by Sponsored content


Sponsored content


Back to top Go down

Page 2 of 5 Previous  1, 2, 3, 4, 5  Next

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum