Use TLS? Ե Twitter Ƀ Tip Us?
 
 

Home

An NGO Web Portal Security Audit 2.0
Wednesday, 15 June 2016
A previous version of this article initially appeared on »House of Hackers« in June 2008, posted by seconded agent A. Denton of directorate I: intelligence (ICT). Some aspects of it long remained significant for the organization's sectret day-to-day operations. On these grounds the article could not be unclassified and distributed prior to the above date.

In 2008 ED Denton used to work as an apprentice in the field of web engineering and security, when she was asked to assist GD Hollstein in an NGO web portal security audit. A subsequent report, which included a CoA along with a security and QA statement, had to be composed in due time. Step 1: System Lookup+Scans: The team first gathered target information, i.e. ISP and location, DNS records, OS and web/app server details. Further everything about the ISP's infrastructure itself, as well as information for later social engineering, was ascertained. To accomplish that, unixoid OSs and programs, i.e the 2007 BackTrack 3 GNU/Linux, next to publicly available database records from several authorities were employed. Of course every such software also required basic knowledge about ISO models, protocols, RFCs, networks and OSs to avoid potential hazards. Eventually the team discovered the targets were Gentoo GNU/Linux systems w/ kernel v2.4.22,  hardened with grsecurity.
Last Updated (Wednesday, 15 June 2016)
Read more...
 
 
 History  of  the  ✛ Δ O :  The Portals
Tuesday, 15 December 2015
This article is the first one in a new series of articles, which cover the history of our organization. After constant inquiries we felt the need to publicize.

The very first version of the official TRON-DELTA .ORG / ✛ΔO website was released back in spring 2005, and hosted on the internet by our trusted provider 1&1 Internet AG. Since then we never migrated web services, or any other important services at ✛ΔO, to a different service provider. Throughout the years we evaluated several offers, but eventually concluded that prices as such are not the most important subject-matters of a contract with an internet service provider.
Last Updated (Friday, 01 April 2016)
Read more...
 
 
The NSA QUANTUM Pro- ject (Part 1)
Friday, 01 May 2015
The QUANTUM project was one of the most top-secret ventures of the NSA. During the last months several news agencies re- ported on that specific technology.

As Bruce Schneier wrote in his book »Data and Goliath«, the clandestine QUANTUM project was meant to be kept as secret as possible. In the meantime though various reports indicated that this project was not the only one of its kind, but that the Chinese government is in possession of a very capable »Great Firewall of China«, for a longer period of time already. Quite often authors confused that one with the »Great Cannon of China« which is a different system indeed.
Last Updated (Friday, 01 May 2015)
Read more...
 
 
 
Folding@Home
 

DOCUMENT TIME

  2016-08-17  ☀  06:00 UTC

CYBER THREATCON

  ✛ΔO CYBER THREATCON: Level BETA

SECURITY MODULE

  ᐅ REQUESTOR / YOU
  ᐊ 1&1 INTR. AG  CDN

POLL / VOTE

  Should ✛ΔO engage more
  in counter-intelligence?
⚫ Yes, there is demand for such intel operations.
⚫ No, because it may be too dangerous to do that.

BOOKMARK

Press Cmd or Ctrl + D
Press Cmd or Ctrl + D

STATISTICS

  Visitors: 579.000+

CAMPAIGNS

  25 Years of Linux

TECHNOLOGY BASE

COAT OF ARMS

  Code Of Arms: Frankfurt

OPERATING STATUS

  Facility: open and operational
 
©  2003 - 2016   TRON-DELTA.ORG  (NGO)   –   Nongovernmental  Intelligence  Organization
Portal v5.03.160 R 1 on ✛ΔO LXCMS v1.1