Sunday 17 June 2012 Traduction français
Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.
Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)
1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case
2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.
3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...
The ’libre’ and open source event of the year 2017. 8th to 10th September. Cité des sciences et de l’industrie. Parc de la Villette, Paris, France. After Germany, France was (...)
Dear Riseup Users, The internet can be a cold and hard place full of nasty people, surveillance, and data mining. Last summer, Riseup was in a really bad place. We were broke (...)
What is SPIP? SPIP is a publishing system for the Internet. It consists of a collection of files installed on a web server which allow you to take advantage of a number of (...)
Fast reliable VPN. PureVPN encrypts all online activities. Protect your identity, data and network with PureVPN’s highly secure military-grade encryption, and amplify your online security from end-to-end.