Apple's Macbook proThe Apple community has, since the beginning of time or well… atleast since its inception, has largely been immunie to attacks that regularly plague the internet community. Remember Nimda, Blaster, Slammer… yup. While you spend your time cursing Microsoft or your not so smart Anti Virus solution so prone to failure from zero day attacks, the Apple fanboys respond — they don’t have to worry about such nonsense. Apple’s general lack of concern towards viruses and malware was based on solid grounds. Their core kernel, based on secure Unix components for its underlying Operating System foundation, in itself makes the mac less vulnerable to malicious code. The other significant factor was that the Apple base wasn’t simply big enough for hackers to devote their attention to. Hackers crave attention … they want headlines also if possible bring in some moolah through their efforts among other things. The Apple community comprised of less that 5% of the overall PC market,so why not spend as much time, maybe even less creating something that will affect the remaining 95%.

However that is all changing. The iPod craze is translating into more customers for Apple. According to Apple’s most recent earning statement, Apple sold a bit north of 830,000 Macs in their last quarter, up 6% from their previous quarter. Apple’s market share is still in the single digits, but I can say for a fact that Apple is back. Thus, the slow but steady growth in the number of Mac users, is starting to make it an attractive target for malicious hackers.

And, we are starting to see this happen. This interest is translating into the discovery of more system vulnerabilities. Security vendor Internet Security Systems found that there were three times as many vulnerabilities found for the Macintosh in May of this year as there. Security supplier McAfee found that the number of vulnerabilities for the Macintosh went up 228 percent, compared to a 78 percent increase for Microsoft Windows, from 2003 to 2005.

In February 2006, the first worm designed for Mac OS X appeared. Named “OSX/Leap.A,” it is an instant messaging worm capable of infecting Mac applications. In addition, a handful of other attacks, focusing on items such as the Apple’s Safari browser and the Mac’s Bluetooth connectivity, have taken place.

In November 06, we see the release of a new worm for Apple named ‘Opener’. As first reported on The Mac Observer October 25, security experts discovered the virus entitled ‘Opener’, or ‘Renepo’ (opener spelled backwards), disguising itself as a shell script.

I am sure for many of your assignments or questions in general, you have used Google or any of the search engines to get a headstart into your research in your quest to get an answer to your problem. However, what you get in return from your search result is a whole bunch of irrelevant information thrown at you. Using advanced operators usually helps solve this problem, however sometimes you get lucky and the answer is usually staring at your face. Most likely the answer you are seeking is usually provided by a pay/subscription site. One of the more prominent ones in this category is Experts Exchange. Here, I am going to tell you probably one of the more wide known secrets in accessing hidden information from pay/subscription sites and in general for this article, targetted towards getting answers for FREE from experts exchange.

 

Method # 1: Using Google Cache

For demonstration, I am trying to look on how to covert C code into Assembly. Now, if I enter this query in Google, I get some pretty decent results. Now, we are trying to look for a solution at Experts Exchange. So, I go to google.com and type in covert c code to assembly site:experts-exchange.com. The ‘site:’ is an advanced operator in google which limits our search results to that particular website and in this case, it is experts-exchange.

After the article on cracking a WEP key using a MAC, many users have requested similar *testing* of their security procedures using a popular LINUX distro and WinXP. This article delves into cracking a WEP key and a WEP key force using the most popular and user friendly LINUX distro out there : UBUNTU. All you need is a laptop with a wireless card and a copy of Ubuntu Linux. NOTE: Most of the Intel wireless adapters that come in built in most laptops these days should work.

Ubuntu (IPA pronunciation: /u’buntu/) is a Linux distribution offering an operating system predominantly targeted at desktop computers. Based on Debian GNU/Linux, Ubuntu concentrates on usability, freedom from restriction of use, regular releases, and ease of installation. Ubuntu is sponsored by Canonical Ltd., by South African Mark Shuttleworth; the name of the distribution comes from the African concept of ubuntu (roughly, “humanity towards others”).

First step, obviously, is to install Ubuntu. Just boot from the CD and follow the directions. If you have problems or need help installing UBUNTU, follow this guide straight from Ubuntu. Once you have the OS installed and configured/customized to your liking we can proceed with the first step. I’d suggest performing the following steps in order, otherwise you may have problems.

Next, install the extra repositories and all the programs that Ubuntu doesn’t preinstall. Make sure your machine is able to establish a connection to the Internet. If you can only connect via wireless and are having problems, there is a package called Wi-Fi radar that is helpful. To install the extra repositories, open a terminal window and type the following: