Tổng quát về Tội phạm máy tính

- Khái niệm - Đặc điểm - Tính chất

Tố giác tội phạm máy tính như thế nào?

Cách thức, thể thức và trình tự

Miễn phí bản quyền phần mềm

Tập hợp bản quyền miễn phí theo ngày

25 May 2012

[Báo cáo] Tội phạm máy tính ở Mỹ năm 2011 theo IC3


In 2011, the Internet Crime Complaint Center (IC3) actively pursued its mission to address crimes committed using the Internet, providing services to both victims of online crimes and to law enforcement. Statistics in this report reveal IC3’s success. IC3 marked the third year in a row that it received over 300,000 complaints, a 3.4-percent increase over the previous year. The adjusted dollar loss of complaints was $485.3 million.

The 2011 IC3 Internet Crime Reportreveals both the scope of online crime and IC3’s battle against it. The most common victim complaints included FBI-related scams, identity theft and advance fee fraud.

IC3 received and processed more than 26,000 complaints per month. Based on victim complaints, the top five states were California (34,169), Florida (20,034), Texas (18,477), New York (15,056) and Ohio (12,661). Victims in California reported the highest dollar losses with a total of $70.5 million. For victims reporting financial losses, the average was $4,187.
IC3 serves as a powerful conduit for law enforcement to share information and pursue cases that often span jurisdictional boundaries. Collaboration within this partnership has produced a number of technological advancements to streamline how the public’s complaints are processed and referred to investigators. Initially established as simply a convenient method for citizens to report Internet crime information, IC3 has evolved into a vital resource for both victims of online crime and for law enforcement across the country that investigate and prosecute a wide range of cases.


Download 2011_IC3Report.pdf

[Tool] Free download Nmap 6 2012


Major Improvements in v6.00


NSE Enhanced – The Nmap Scripting Engine (NSE) has exploded in popularity and capabilities. This modular system allows users to automate a wide variety of networking tasks, from querying network applications for configuration information to vulnerability detection and advanced host discovery. The script count has grown from 59 in Nmap 5 to 348 in Nmap 6, and all of them are documented and categorized in our NSE Documentation Portal. The underlying NSE infrastructure has improved dramatically as well.




Better Web Scanning – As the Internet has grown more web-centric, Nmap has developed web scanning capabilities to keep pace. When Nmap was first released in 1997, most of the network services offered by a server listened on individual TCP or UDP ports and could be found with a simple port scan. Now, applications are just as commonly accessed via URL path instead, all sharing a web server listening on a single port. Nmap now includes many techniques for enumerating those applications, as well as performing a wide variety of other HTTP tasks, from web site spidering to brute force authentication cracking. Technologies such as SSL encryption, HTTP pipelining, and caching mechanisms are well supported.




Full IPv6 Support – Given the exhaustion of available IPv4 addresses, the Internet community is trying to move to IPv6. Nmap has been a leader in the transition, offering basic IPv6 support since 2002. But basic support isn’t enough, so we spent many months ensuring that Nmap version 6 contains full support for IP version 6. And we released it just in time for the World IPv6 Launch. We’ve created a new IPv6 OS detection system, advanced host discovery, raw-packet IPv6 port scanning, and many NSE scripts for IPv6-related protocols. It’s easy to use too—just specify the -6 argument along with IPv6 target IP addresses or DNS records. In addition, all of our web sites are now accessible via IPv6. For example, Nmap.org can be found at 2600:3c01::f03c:91ff:fe96:967c.




New Nping Tool – The newest member of the Nmap suite of networking and security tools is Nping, an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping’s novel echo mode lets users see how packets change in transit between the source and destination hosts. That’s a great way to understand firewall rules, detect packet corruption, and more.



Better Zenmap GUI results viewer – While Nmap started out as a command-line tool and many (possibly most) users still use it that way, we’ve also developed an enhanced GUI and results viewer named Zenmap. One addition since Nmap 5 is a “filter hosts” feature which allows you to see only the hosts which match your criteria (e.g. Linux boxes, hosts running Apache, etc.) We’ve also localized the GUI to support five languages besides English. A new script selection interface helps you find and execute Nmap NSE scripts. It even tells you what arguments each script supports.


Faster scans – In Nmap’s 15-year history, performance has always been a top priority. Whether scanning one target or a million, users want scans to run as fast as possible without sacrificing accuracy. Since Nmap 5 we’ve rewritten the traceroute system for higher performance and increased the allowed parallelism of the Nmap Scripting Engine and version detection subsystems. We also performed an intense memory audit which reduced peak consumption during our benchmark scan by 90%. We made many improvements to Zenmap data structures and algorithms as well so that it can now handle large enterprise scans with ease.

Download for WINDOW nmap-6.00-win32.zip
Via http://nmap.org/6/

08 May 2012

[Ebook] Cyber Criminology | Free download


I am very pleased to be asked to write the foreword to this interesting book. I first met Dr. Jaishankar (Jai) at a conference in Bangalore in early 2009 and again some months later in November of that year when he visited the University of Leeds for 6 months on a Commonwealth Fellowship. While he was in Leeds, Jai engaged energetically in many fruitful activities, one of which was the compilation of this edited collection of chapters by interna-tional scholars.
I got to know Jai during those 6 months, and we had many lively dis-cussions about cyber crime and especially the different ways that it has affected the people of the Indian subcontinent. I am very grateful to him for this knowledge because it has helped me to begin to understand just how ubiquitous the Internet has become and how this ubiquity has, in fact, begun to spiral in the new millenium.
Even today, some 20 years or so since the graphic user interface made the Internet user friendly and popular, networked technologies are still becom-ing further embedded in each and every aspect of our daily lives. Even if we do not use the Internet, much of our personal information will be stored somewhere on a networked computer, so in one way or another it affects all of us. Because of this reality, the potential for our data to be used maliciously is much greater, and it therefore becomes increasingly important that we study the impacts of the Internet, especially as the freedom it brings comes at the cost of the new risks we experience.
Regardless of whether you are a member of the academic community, a practitioner, a media commentator, or just someone who is interested—yes, you do exist—this book will provide you with a provocative and thoughtful collection of viewpoints upon which to develop your thoughts and strengthen your debate. So I invite you, the reader, to read on.

David S. Wall, PhD
Chair of Criminal Justice and Information Society
School of Law
University of Leeds
Leeds, United Kingdom
May 2010

Download cybercrime_toiphammaytinh.pdf

[Security] Trộm cắp thông tin thẻ ATM

"DAB" adv:

ICQ:

NCR: (images blurred for obvious reason)




































"skimer4you" adv:

ICQ:

 NCR:


Nano:


 Diebold: