Sunday 29 March 2015

How to quick split an .mp4 file using Linux

I recently wanted to split an .mp4 file in order to use it in one of my presentations. I used to have all the necessary software installed for editing and transcoding video files, but not any more. I was looking for an off-line, quick and reliable solution using only what I had in my disposal. 

Using my Kali distribution, I installed the ffmpeg package. 

apt-get install ffmpeg

After that, everything was easy. Lets assume the name of the video is CyberSecurity.mp4 and its length is 04 minutes and 37 seconds. Also, lets assume that you want the chunk of the video needs to start from the beginning until the 03 minutes and 18 seconds mark.

In order to split this video from the beginning (00:00:00) until the 03 minutes and 18 seconds mark (00:03:18), you will need to run the following command. 

ffmpeg -acodec copy -vcodec copy -ss 0 -t 00:03:18 -i CyberSecurity.mp4 CyberSecurity_new.mp4

Or, you can use the exact "start time" by specifying it: 

ffmpeg -acodec copy -vcodec copy -ss 00:01:00 -t 00:03:18 -i CyberSecurity.mp4 CyberSecurity_new.mp4

In case you need a script to automate the splitting of a video file in equal chunks, you may find this link very useful.

I hope this post was helpful to you as it was for me.

Sunday 15 March 2015

Raspberry Pi 2 Model B and Kali Linux - quick setup

The new Raspberry Pi 2 Model B is approximately 6 times faster that its predecessor. It comes with:
  • QUAD Core Broadcom BCM2836 CPU
  • 1 GB RAM
  •  40 pin extended GPIO
  • Micro SD slot
  • 4x USB ports
  • HDMI
  • 4 pole Stereo output and Composite video port
  • CSI camera port & DSI display port
  • Micro USB power source
In order to install Kali Linux on the new Raspberry Pi you will need to download the new image for Raspberry Pi 2 (0.48G) version 1.1.0  from https://www.offensive-security.com/kali-linux-vmware-arm-image-download/ (filename: kali-1.1.0-rpi2.img.xz). 

Thursday 12 March 2015

EU Data Protection Regulation

The globalisation of data and the enormous technological developments of the last decade raises a number of new challenges when it comes to data protection and privacy. Current privacy legislation has not yet caught up with the technology boom when it comes to personal data, and fails to consider aspects such as cloud storage and the wide spread use of social networks. This is set to change with the launch of the proposed EU Data Protection Regulation.

Friday 27 February 2015

How to prevent a business from being the next exploited target

Over the past few years, Cybersecurity has become a high priority task on the agenda of every organisation that wants to: prevent unpleasant security incidents, avoid being breached by sophisticated attacks and Advance Persistent Threats, detect malicious activity which is specifically designed to evade detection and last but not least respond proactively to the emerging cyber threat landscape. During 2014 in particular, cyberattacks became the norm making headlines on a regular basis with a number of high profile breaches being in the spotlight which as a result affected the number of online transactions. More specifically, it was reported that the levels of fraud increased in 2013-2014 by 12% which accounts for 37% of the total £603m cost of retail crime as reported by the BRC Retail Crime Survey


Thursday 19 February 2015

Good luck Lenovo and thank you for the Superfish!


When you purchase a laptop it comes with some default, pre-installed applications. I personally hate this and it is quicker to format the laptop with a fresh install than go down the route of uninstalling all the <r@p-ware one by one. 

Have you ever bought a new Vaio? The amount of extras installed and running in the background take upon most of the resources. 
However, this post is about the Lenovo laptops which also contain a number of added "features". One of the added "features" is an adware which activates when taken out of the box for the first time. This adware ships with all consumer PCs from Lenovo and uses a certificate to perform a man-in-the-middle attack in order to inject ads into the user's browser.