Guide to change your MAC address on Linux that really works If you are paranoid enough you might want to change your MAC address every time you connect to a new Internet access point. After you do a little research with your favorite search engine, and I presume it is not Google and alike, you see a lot of results suggesting you use macchanger or ifconfig utilities.
I wanted to learn more about telephone communication for a while, and finally I took some time to do that. Here I talk about modern telephony and make an overview of the telephony evolution history. I make a lot of references to “Computer Networks” by Tanenbaum. I don’t want to cover very low-level details related to physical layer data exchange.
The real philosophy of non-existent world The main thesis of Zen is there is no “real” world, but the comprehension of the world. This is only the exterior side of Zen school, which doesn’t help to reach the truth but helps to destroy the fallacies of beginning Zen follower and make the first step to the final destination.
Blue pill/red pill - the matrix has windows longhorn The advancement of stealth-technologies concluded with emerging of totally new rootkits(circa mid. 2006), which are impossible to detect. Once a computer swallows a “blue pill”, the OS transits into virtual world fully controlled by the rootkit. The old real world ceases to exist.
hiding traffic from network administrators So far all the techniques we were using deployed hiding network connections, but anyone can reveal “wrong” traffic on physical level with sniffers and similar defense mechanisms. Hackers made their effort and invented covert passive channels which transfer useful information without generating any traffic. Source code is released, and now we have to realize how to screw it into our keyloggers or remote shells.
I hope I’m the first person in Internet to do this, though it’s getting increasingly hard to become a pioneer in something nowadays… I want to publish the compilation of translated articles from Kris Kaspersky. Not related to the Kaspersky AV. As Wiki says, he was a Russian hacker, writer and IT security researcher.
You are welcome to read this if you often visit my blog to see some updates. You can see several days ago I changed my site layout altogether. I also switched off from Wordpress because I didn’t like much its idea to install a lot of plugins for nearly any (simple) functionality you want your site to implement.
If you know some cryptography terminology, you should be familiar with concepts of encryption, hashing and signing. These concepts constitute the technology to provide human beings with secure means of information storage and transmission. Probably I missed something else, anyway these are the ones which you frequently confront everytime you deal with modern digital communication forms.
Programming structures in assembly code While reversing, sometimes it is good to know what high-level construction this piece of code belongs to. There are several constructions which can be expressed in assembly language, if-code, switch-code, loop-code(for, while, do). These exist in all(presumably) high-level languages. You can check examples I made here to this simple C code:
In this part, I want to tell more about how exactly x86 processors store memory, and develop kind of intuition on how to work with memory when you’ll have to deal with it. For example, it can happen when you try to lookup some values stored in stack(i.e. when you need to look at function parameters).