Search This Blog


Thursday, April 4, 2013

Access Netflix & Hulu (No need for VPN, Proxy)

It's all really simple, what you need is a Netflix or Hulu account

Now pick the browser you use (Only Firefox or Chrome will work) and install the plugin.

[Image: firefox.png]Firefox:
[Image: google_chrome.png]Chrome:

How to install on Chrome:

[Image: windows_1.png]

[Image: windows_2.png]

[Image: windows_3.png]

After you installed it, you're done.
You can now access and
When ever you want, without using a VPN or Proxy


Thursday, March 28, 2013

Global internet slows after 'biggest attack in history'

The internet around the world has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history.
A row between a spam-fighting group and hosting firm has sparked retaliation attacks affecting the wider internet.
It is having an impact on popular services like Netflix - and experts worry it could escalate to affect banking and email systems.
Five national cyber-police-forces are investigating the attacks.
Spamhaus, a group based in both London and Geneva, is a non-profit organisation that aims to help email providers filter out spam and other unwanted content.
To do this, the group maintains a number of blocklists - a database of servers known to be being used for malicious purposes.

Tuesday, March 26, 2013

Becoming a malware analyst

There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to continue a complex game not unlike the Glass Bead Game from the eponymous novel by Herman Hesse - a pure pursuit of the mind that makes connections where there are seemingly none, all for the sake of solving intricate puzzles in order to satisfy their curiosity and cravings for intellectual challenges. But I was wrong!

To satisfy my own personal craving to know what it was all about, I decided to contact a number of malware analysts working for some of the most high-profile security companies out there and ask them a few questions.

The traits and skills of good malware analysts

Some malware researchers, like McAfee Lab’s Principal Research Architect Igor Muttik, entered the field in the '80s, when the anti-virus programs were only appearing and there was no multi-billion AV industry yet. Others, like Jana Barborikova, a Junior Virus Analyst at Avast, have been in it for less than a year.

The difference between C, C++, Obj-C, and C#


C is, compared to most other languages today, low-level. It supports only procedural and structured programming. There are no classes, generics, or lambda expressions. Recognizable snippets of C code include the following:
  • #include <stdio.h>
  • fopen("", "r")
  • malloc(256)
The following are not elements of the C programming language:

Tuesday, March 5, 2013

Malware: Dollar Equals Tilde Square Brackets

Recently Avast Virus Lab encountered a very suspicious piece of code on some Joomla-powered webpages. The code looks as if garbled and without any special meaning, and starts like this:
Upon closer observation, several strange things are to be noted. First, there are no alphanumerical symbols to be seen in any part of the code. Second, on the line before this code starts, there is actually an HTML tag indicating a start of Javascript code (<script>), preceded by 37 tabs. Therefore, when opening an infected file in a text editor, one cannot normally see the starting tag, because it is shifted all the way to the right. To be able to see it, you either have to horizontal scroll, or have word wrap on. The same trick is performed with the script closing tag as well. Why would anyone try to hide these tags? The answer is simple, to trick people into thinking this is not actually a Javascript code.

Friday, January 25, 2013

Zero-Day PDF Exploit Caught, 6/45 Detect. Also: Rise of the Malicious jentrate.php

I was looking at some images on Google and was looking at this particular site when I noticed that there was a unusual url request. I did some investigations and found out that the URL request was a malicious hXXp://
Please note that when I tried using automated analysis on the site, using the same referrers and different scanners, the return didn’t include a jentrate.php. You may also want to see the urlQuery results. Maybe there is a time limit between intervals? Or maybe it’s because I’m using a newer version of Firefox?

Saturday, October 13, 2012

Bing is the most heavily poisoned search engine, study says

Bing search results are more affected by poisoning than those of other search engines, according to a study by SophosLabs.
Search engine poisoning attacks are designed to skew results so that dodgy sites - anything from malware infected websites to payday loan sites - appear prominently in the index of sites related to popular search terms. In many cases the tactic is so successful that malware sites appear in the first page of results for popular search terms, in sometimes much higher than legitimate websites. More recently, miscreants have began trying to manipulate image search results.