Rip music from YouTube using youtube-dl, ffmpeg, and lame

| 0 comments

In a previous post I wrote about how to Rip DEFCON videos from YouTube and this got me to thinking about music. Is it possible to take a video that contains a music track and extract the audio to MP3 format? Well the answer surprisingly enough is yes. Now before you get to excited, you must understand that doing this clearly violates copyright laws and for that reason, I am writing about this purely from an educational point of view. Everything I am covering here is done on OS X and I used the homebrew package manager to install the required …

Continue reading

Life in a digital world means little or no privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who …

Continue reading

Time to go phishing with the Social Engineering Toolkit (SET)

| 0 comments

Social Engineering is a very intriguing art of exploiting trust of others. For the most part people are trusting of one another and because of this trust, a person may be tricked into performing and action even if in the back of their mind the feel something is wrong. Think about for a moment. The act of Social Engineering is not anything new because since the dawn of man there has always been those who carry out a confidence trick, which is also better known as a con game. The difference today is these con games are often carried out …

Continue reading

What is ping all about?

| 0 comments

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this is an utility that you should take time to learn about and appreciate. Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping operates by sending …

Continue reading

20 introductory Nmap command examples for the technology professional

| 0 comments

I’m not going to attempt to cover what Nmap is and what it can do. Rather the author states: Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of …

Continue reading

Technology is the government’s oldest best friend

| 0 comments

Recently we have all most likely have heard the news concerning the National Security Agency (NSA) is currently collecting the telephone records of millions of US customers of Verizon. This is extremely disturbing and while I have my own personal opinions as to what is or is not acceptable, this has clearly crossed the lines of trust in my humble opinion. In what world do we live that the government can simply cast a net so vast as to have this type of data for the purpose of seeking out those who are conducting illegal activities? I have heard others …

Continue reading