Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

There's a lot that's been said to new people arriving from bluesky about mastodon, how it works etc, and so in a similar vein I'd really just like to say to our new bsky friends:'nshow me a picture of your cat

Uncategorized
7 5 0

Gli ultimi otto messaggi ricevuti dalla Federazione
  • OK, it turned out to be pretty fun. A lot of the work was looking up various arguments for pox classes and methods, but in the end it's a pretty tight firewall implementation that is passing the test suite. Yippee!

    read more

  • @evan Oooh, you caught a new Teeny Void Demon in the cat trap! What a perfectly seasonal addition to the family, congrats.

    And welcome, Corvus! My black-but-for-that-silly-pointing-mutation Sudo sez "YOOOOWWWWWLLLOOOOooooo".

    read more

  • Making a Virtual Machine Look like Real Hardware to Malware

    Running suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.

    Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.

    In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.

    Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.

    youtube.com/embed/-On6bWFXuM8?…

    hackaday.com/2025/10/27/making…

    read more

  • On that note, we have a new member of our family. His name is Corvus. He is smol but mighty. We like him alot. /cc @maj @amita @Stavro

    read more

  • read more

  • @evan Can I write it in PHP as long as I call the python library somehow?

    read more

  • Tutti gli psicodrammi in Apple sull’Ai

    L'articolo proviene da e viene ricondiviso sulla comunità Lemmy @informatica
    Presa in contropiede da Trump, che l'ha costretta a indirizzare 500 miliardi in piani di sviluppo negli Usa, Apple continua a essere in difficoltà sul fronte Ai. Siri, dopo tanti rinvii, non può certo più mancare il debutto del prossimo

    read more

  • Are you on the Fediverse because you love social networking, or because you hate social networking?

    read more
Post suggeriti
  • 0 Votes
    1 Posts
    0 Views
    Making a Virtual Machine Look like Real Hardware to MalwareRunning suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.youtube.com/embed/-On6bWFXuM8?…hackaday.com/2025/10/27/making…
  • Tutti gli psicodrammi in Apple sull’Ai

    Uncategorized startmag
    1
    0 Votes
    1 Posts
    0 Views
    Tutti gli psicodrammi in Apple sull’AiL'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @informaticaPresa in contropiede da Trump, che l'ha costretta a indirizzare 500 miliardi in piani di sviluppo negli Usa, Apple continua a essere in difficoltà sul fronte Ai. Siri, dopo tanti rinvii, non può certo più mancare il debutto del prossimo
  • 0 Votes
    1 Posts
    0 Views
    Europol has asked governments to work together on measures to prevent caller ID spoofing.International traceback mechanisms are needed to track down and identify the origin of spoofed calls.https://www.europol.europa.eu/media-press/newsroom/news/fake-number-real-damage-europol-urges-action-against-caller-id-spoofing
  • 0 Votes
    1 Posts
    0 Views
    Trump s’intesta la fine di un’altra guerra: la console warL'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @informaticaPer molti osservatori Microsoft sarebbe pronta a ritirarsi dal mercato dei videogiochi come produttrice di piattaforme Xbox e la decisione di rendere la sua esclusiva di punta, Halo, disponibile anche sulla rivale di