Sarah Palin’s Email? A Lesson Learned!

Sarah Palin

Sarah Palin

First off all, I know this is an old incident that occurred last year Wednesday, Sep. 17, 2008.

Anyhow, by checking around all the search engines you would find tons of results about the Alaskan governor and republican Vice-Presidential candidate Sarah Palin hacked email (gov.palin@yahoo.com). The hackers named themselves as anonymous activist group according to many websites.

I just cannot image how embarrassing is to be exposed to billions of people worldwide!

OK… Lets continue Continue reading

Share/Bookmark

الجدار الناري

إذا كنت من مستخدم الشبكة الانترنتية فربما سبق لك وسمعت بمصطلح “الفايروول” الجدار الناري ، أو برنامج الحماية بشكل عام سواءً كان حماية من الفايروسات أو الحماية من الاختراقات… سوف أتحدث هنا تحديداً عن الجدار الناري ، وكيفية عمله…

ما هو “الفايرول” أو الجدار الناري؟

هو عبارة عن برنامج/جهاز ينظم أو يتحكم بعملية تدفق المعلومات ويحمي الأجهزة خلفه من اختراقات كامنة ربما تحصل عن طريق الانترنت مثلا أو عن طريق أجهزة مجاورة على مستوى الشبكة المحلية (الآي بي) على منافذ محددة مسبقا حتى يتم التعرف على مخاطر فتح تلك المنافذ على أي جهاز معين ، على سبيل المثال… يوجد على جهازك الشخصي جدار ناري مسبق الإعداد ملحق بمايكروسوفت اكس بي أو غيره ويعمل بشكل برنامج يحدد المنافذ التي يتم لها السماح بالعبور أو لا ، لذلك إذا واجهت مشكلة اتصال إلى جهازك Continue reading

CCIE Security… Written + Lab

CCIE Security

I have tried to type this post on Arabic into a proper way but it does not seem to be straighten up with me. However, I divide it into part so it would be easier to edit. My post today will be about getting CCIE (Cisco Certified Internetwork Export) in the security track. I am preparing myself to take the written exam but I haven’t decide and agreed on a defined date.

تعتبر هذه الشهادة من أقوى الشهادات الإحترافية في مجال الشبكات وخصوصا مجال امن المعلومات حيث تشمل العديد من الجوانب ومعرفة بلغة اليونكس ومعرفة بروتكولات الشبكة و التشفير بجميع أنواعه وكيفية صيانة وتطبيق الشبكات الخاصة… وتنقسم هذا الشهادة لعدة أقسام وهي كالتالي

  1. Routing & Switching
  2. Security
  3. Storage Networking
  4. Service Provider
  5. Voice
  6. Wireless

المتطلبات

لا يوجد اي متطلبات مسبقة للدخول لهذه الشهاة Continue reading

GRC – Security Now!

Steve Gibson is the creator of SpineRite the magnetic storage data recovery software. Gibson always claims his proudness for the innovation of this software. However, I got into the Podcasting world so I started listening to some English language enhancement podcast. After a while I ended up listening to some of the information security podcasts since I am concern with that filed because it is my field of work. So I filled up my IPOD with so many episodes Continue reading

Kaspersky’s Protection on the Edge!

Kaspersky Lab

A few months ago, specifically, on Sunday, 20 July 2008 a Kaspersky Lab website in Malaysia based on Russia was hacked by Turkish hackers, the attack was performed by injecting an SQL command (Structured Query Language) into the mentioned website’s server to upgrade the privilege in order to obtain higher rights into a targeted system. Ironically, the same hacker have hacked another website for the brand also in Malaysia  www.kaspersky.com.my which the offcial Kaspersky Anti-Virus SES online shop. The hacker claim that his attacked was driven by his patriotism (which I don’t understand what that has to do with Kaspersky in Malaysia). This attacked came after another attacked was targeting a french-based Kaspersky Technical Support website by Algerian hackers named c02.

Hack

These multiple attacks will be are very damaging to the Continue reading

Suspicious Emails “Money Laundry” Or “Phishing”?

Recently, I’ve been receiving lots of suspected emails telling about wining a million dollar prize or have been selected for certain job offer. It is very annoying to receive such an emails in a periodic term even though I’ve tried to filter them but unfortunately they come from different source. Do they send them just in random way based on a stolen database could be found somewhere online.

would that mean that my identity has been stolen? Credit Card Number, Social Security Number/National ID number, and DOB? I don’t know but it is scary a bit. Here it comes the importance of the information security and its awareness toward a lot of people join this wide network without reserving any attention to what exactly you are going through.

Have you ever tried to search your name online through Google and see if there any matches for you?

Below is the email that I’ve received recently Continue reading