Wednesday, March 20, 2013

Space...

 ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ
๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ๐Ÿ‘พ

๐ŸŽฎ

Tuesday, March 19, 2013

Sources: Amazon and CIA ink cloud deal



In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up to $600 million over 10 years.

Amazon Web Services will help the intelligence agency build a private cloud infrastructure that helps the agency keep up with emerging technologies like big data in a cost-effective manner not possible under the CIA's previous cloud efforts, sources told FCW.

Amazon officials would not confirm the existence of the contract, and a CIA spokesperson likewise declined to comment on the matter.

"As a general rule, the CIA does not publicly disclose details of our contracts, the identities of our contractors, the contract values, or the scope of work," a CIA spokesperson told FCW.

More:
fcw.com/articles/2013/03/18/amazon-cia-cloud.aspx


Wednesday, March 13, 2013

DCAA gets its own bad review



The Defense Contract Audit Agency got a bit of a slap from the Defense Department's inspector general.

DCAA audits are the bane of many contractors existence because they are seen as nitpicking and slow. It takes years for some audits to be closed. One executive told me that he has audits just now being closed from 2007.

The inspector general looked at 50 cases from fiscal 2010, and found deficiencies in 37 of them; in fact, the IG is recommending that some reports be rescinded, or have supplemental information added to them.

More:
http://washingtontechnology.com/blogs/editors-notebook/2013/03/dcaa-audit-review.aspx

 

Sunday, March 10, 2013

Is BYOD helping or hurting your company’s productivity?



In 2012, any remaining arguments against BYOD were seemingly put to rest, and the practice of "bring your own device" to work gained broad acceptance.

Most companies approving a BYOD policy consider it a win-win situation — at least at first. Employees are free to use their favorite devices, and can seamlessly integrate their professional and personal digital worlds. Companies save some money and enjoy a productivity boost since employees tend to stay more connected to their jobs when they're using their own devices.

More:
http://venturebeat.com/2013/03/10/it-byod-productivity/

Crack Hashes using Hashcat




In this tutorial will describe the main options of Hashcat. Will explain the basic operation of using it to crack Hashes Passwords (LM, NTML, MD5, etc) with different attack methods such as Brute-Force attack, Combinator attack, Dictionary attack, Hybrid attack and much more.

More:
http://mobile.dudamobile.com/site/liatsisfotis?url=http%3A%2F%2Fwww.liatsisfotis.com%2F2013%2F02%2Fcrack-hashes-using-hashcat.html%3Fm%3D1#2855

Friday, March 8, 2013

About ISSA - Information Systems Security Association



Developing and Connecting Cybersecurity Leaders Globally.

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Join today.

Goals

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government.

ISSA is dedicated to providing the following services to the information security community

  • Promote the education and expand the knowledge and skills of its members in the interrelated fields of information systems security and information data processing
  • Encourage a free exchange of information security techniques, approaches, and problem solving by its members
  • Provide communication to keep members abreast of current events in information processing and security, providing benefits to them and their employers
  • Communicate to management, and to systems and information processing professionals the importance of establishing controls necessary to ensure the secure organization and utilization of information processing resources

Activities

More:
http://www.issa.org/?page=AboutISSA

InfraGard - Public Private Partnership -Federal Bureau of Investigation (FBI)



InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the Federal Bureau of Investigation and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.InfraGard Chapters are geographically linked with FBI Field Office territories. Learn more about InfraGard

More:
https://www.infragard.net/

Tuesday, March 5, 2013

Venezuelan Leader Chรกvez Dies After Cancer Battle



CARACAS, Venezuela—Hugo Chรกvez, a former tank commander turned populist politician who used Venezuela's oil riches to pursue his vision of socialism and challenge the U.S., died Tuesday from complications related to cancer. He was 58 years old.

With Mr. Chavรฉz just months into his fourth term, his death plunged Venezuela into political uncertainty. Vice President Nicolรกs Maduro will succeed Mr. Chรกvez as interim president, but must hold a new election within 30 days, according to the constitution.

http://m.wsj.com/articles/a/SB10001424052970203458604577265460960140008?mg=reno64-wsj

pwnieexpress/Raspberry-Pwn · GitHub


 _____      ___  _ ___ ___   _____  _____ ___ ___ ___ ___   | _ \ \    / / \| |_ _| __| | __\ \/ / _ \ _ \ __/ __/ __|   |  _/\ \/\/ /| .` || || _|  | _| >  <|  _/   / _|\__ \__ \   |_|   \_/\_/ |_|\_|___|___| |___/_/\_\_| |_|_\___|___/___/  

Raspberry Pwn : A Raspberry Pi pentesting suite by Pwnie Express (pwnieexpress.com)

Release 0.2 (December 2012)