On Ars Technica, Sean Gallagher delves into the Anonymosus-OS, an Ubuntu Linux derivative I wrote about yesterday that billed itself as an OS for Anonymous, with a number of security/hacking tools pre-installed. Sean's conclusions is that, contrary to rumor, there's not any malware visible in the package, but there's plenty of dubious "security" tools like the Low Orbit Ion Cannon: "I don't know how much more booby-trapped a tool can get than pointing authorities right back at your IP address as LOIC does without being modified."
As far as I can tell, Sean hasn't compared the package checksums for Anonymosus-OS, which would be an important and easy (though tedious) step for anyone who was worried about the OS hiding malware to take.
Update: Sean's done the checksum comparison and found 143 files that don't match up with the published versions.
Some of the tools are of questionable value, and the attack tools might well be booby-trapped in some way. But I don't know how much more booby-trapped a tool can get than pointing authorities right back at your IP address as LOIC does without being modified.
Most of the stuff in the "Anonymous" menu here is widely available as open source or as Web-based tools—in fact, a number of the tools are just links to websites, such as the MD5 hash cracker MD5Crack Web. But it's clear there are a number of tools here that are in daily use by AnonOps and others, including the encryption tool they've taken to using for passing target information back and forth.
Lame hacker tool or trojan delivery device? Hands on with Anonymous-OS
Chloe from Portland’s Reading Frenzy writes, “Six of our favorite Social Justice Kittens are back in postcard form! Next up: MRA Puppies! Postcards by Sean Tejaratchi/LiarTownUSA (previously) published by Show & Tell Press!”
China’s Internet censors are capricious and impossible to predict — but this isn’t because China’s censors are incompetent, rather, they’re tapping into one of the most powerful forms of conditioning, the uncertainty born of intermittent reinforcement.
Rogue archivist Carl Malamud writes, “In 1993, I started a radio station on the Internet, engaging in activities that later became known as podcasting and webcasting. I’m pleased to say that I’ve finished uploaded the archive of Internet Talk Radio to the Internet Archive.”
White hat hackers get paid to find holes in their own employers’ online systems, and plug those holes before they become serious security risks. It’s a job that pays handsomely…mostly because few job candidates, even experienced IT professionals, have the skills to scamper over firewalls and infiltrate the deepest recesses of a battle-tested network. But […]
Why buy one of those expensive and confusing universal remotes, clogged with enough buttons to launch a space shuttle, when you could accomplish the same electronic control right on your favorite mobile device? The Blumoo Universal Remote, now just $52.99 in the Boing Boing Store, harnesses the audio power of all your household equipment right […]
You may not love Microsoft Word, but you’ve definitely used it. Other than being one of the most ubiquitous programs on the planet, it’s been the go-to word processing system for more than a quarter-century because it’s as basic as it gets. But occasionally, you’ve got assignments that beg for a lot more options than simple […]