Ambition was high, oceans of time available it seemed…Then reality came knocking on the door, as usual and the site became less and less maintained with no new content and so forth. That said it doesn’t mean that nothing has happened. It just hasn’t been added to the site. I’ll try to change that and make the site more alive. Every entry does not have to have hours of work behind them and so forth. And to make life easier, I’ve changed the framework too.
Things may be a bit shaky the next couple of weeks regarding contents, visual representation, availability or similar.
This guide is the first one in a planned series of three. It guides the beginner and intermediate malware analyst in the art of malware analysis, by setting up a basic virtual analysis machine. It is focused on free and open source tools in order to make it available to all. This is a strategic choice on my part as we need to join forces, as many as possible, in the battle against malware and the forces behind it.
Continue reading Malware analysis – Part I
Perhaps you’ve heard about them? The Indian Microsoft technical support that has detected that your computer is infected with viruses and infested by hackers. And there they are like knights in shining armour promising to help you…and of course at a small fee… Continue reading Indian tech support scam
In Sweden the Huawei datacard is probably one of the most widely used datacards around. They are offered by operators to attract consumers to their services by offering them very cheap at low rates and such. However this comes at a price. Sometimes the consumers are locked to a single operator for up to 24 months. Even when this time has passed, the data card remains locked, which can be very unfortunate for the consumer. Let’s go about and see how they can be unlocked…
Continue reading Unlock Huawei Datacards
More and more use bar codes outside the retail industry as a source or pointer to information. If you think about it, this also serves as a teaser to the observer as the information is not there in clear text. The target is bound to try to find out what it says…
Continue reading Owned by a QR code