Tor Messenger is an effort similar to Tor Browser Bundle, it uses the existing Instantbird messaging solution from Mozilla and routes the data through the Tor network. However, unlike the existing solutions like ricochet, which targets anonymity, Tor Messenger works with services you already use like Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others. It also enables Off-the-Record (OTR) Messaging automatically. As you are chatting with your existing contacts, you are not anonymous. However, the communication is encrypted and much more difficult to trace by a man in the middle. Continue reading Tor Messenger: secure chat with existing IM buddies
Steel is a purely cmdline sqlite based password manager. Though my favourite pick for a password manager is KeePassX (v2), a terminal based utility is always welcome. Steel works offline and hence there’s little chance of someone else snooping into your password unless they have physical access to your system. Continue reading Steel: cmdline password manager
Adobe has announced a new critical security vulnerability (CVE-2015-7645) and it looks ugly. A “successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system” and this time it has already been used for “limited, targeted attacks” exploits as per the report. Continue reading Flash flashes again, it’s an ugly sight
Users tend not to change their passwords often due to the apparent inconvenience caused. However, in a multi-user environment, it is preferred that users change their passwords regularly. This also applies if the admin wants users to change their password on their very first login, i.e., immediately after their account details are handed over to them. Continue reading Manage password expiry on Linux
Hope you haven’t counted Opera browser out of the equation yet. While Firefox is focussing on browser security and tracking protection, Opera has just integrated SurfEasy, a VPN service it acquired recently. Using a VPN ensures that even your ISP can’t snoop into your browsing information. Continue reading Opera includes SurfEasy VPN, not for Linux yet
Rootkits are a kind of malicious software which typically enable access to unauthorized users to a computer. It’s quite difficult to detect a rootkit as it may be able to subvert the software that is intended to find it. rkhunter (Rootkit Hunter) is a Linux utility to detect rootkits (and other system problems). Continue reading rkhunter: detect rootkits
Fern is a tool to discover weaknesses in a network. It uses aircrack-ng behind the scenes to achieve this. The best feature of Fern is its excellent GUI written in Python-Qt4. For those who don’t want to get into the cmdline options of complex tools like aircrack-ng, Fern is Godsent. Continue reading Fern: crack WiFi in minutes!
Dear Truecaller Team,
Many users find Truecaller handy to track unknown numbers. Sometimes it is really useful. However, there are other ways of tracking down a number. In addition, if someone wants to remain untraced on purpose he can always call from a public phone booth. Continue reading Truecaller, here’s a feature request!
What if you are at a public WiFi hub and want to ensure that your data cannot be sniffed? If you are connecting to the open hotspots and transferring data over the ether, there are high chances that someone might be able to decode it. sshuttle comes to your rescue. Continue reading sshuttle: poor man’s VPN