Mr. Robot

| 0 comments

If you’re a geek like myself then you have probably seen many television shows that fall flat dealing with the topic of cyber security in this day of the Internet of things. Two shows that I watched were Scorpion and CSI Cyber and both of them made me laugh. I mean listening to the cast speak all the correct buzz words and having flashing gadgets does not make a great, or even good television series. If you have not seen either of these shows, give the following trailers a watch. Scorpion Trailer CSI Cyber Trailer Mr. Robot With the release …

Continue reading

Rip music from YouTube using youtube-dl, ffmpeg, and lame

| 0 comments

In a previous post I wrote about how to Rip DEFCON videos from YouTube and this got me to thinking about music. Is it possible to take a video that contains a music track and extract the audio to MP3 format? Well the answer surprisingly enough is yes. Now before you get to excited, you must understand that doing this clearly violates copyright laws and for that reason, I am writing about this purely from an educational point of view. Everything I am covering here is done on OS X and I used the homebrew package manager to install the required …

Continue reading

Life in a digital world means little or no privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who …

Continue reading

Time to go phishing with the Social Engineering Toolkit (SET)

| 0 comments

Social Engineering is a very intriguing art of exploiting trust of others. For the most part people are trusting of one another and because of this trust, a person may be tricked into performing and action even if in the back of their mind the feel something is wrong. Think about for a moment. The act of Social Engineering is not anything new because since the dawn of man there has always been those who carry out a confidence trick, which is also better known as a con game. The difference today is these con games are often carried out …

Continue reading

What is ping all about?

| 0 comments

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this is an utility that you should take time to learn about and appreciate. Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping operates by sending …

Continue reading