Computer
Mois de l’assembleur x86, semaine 1 – Introduction | Hackfest.ca
SecurityTube Linux Assembly Expert « SecurityTube Trainings
Code raw sockets in C on Linux
Lab of a Penetration Tester: Poshing the hashes: Using PowerShell to play with hashes
Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | Wired Science | Wired.com
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
Debian paste error
Samsung Smartphone Vulnerable to Remote Wipe Hack - IBTimes UK
Windows NT - Windows 8 EPATHOBJ Local Ring 0 Exploit
Gmane -- Re: exploitation ideas under memory pressure
phpMyAdmin Authenticated Remote Code Execution via preg_replace()
Regalado (In) Security: Unauthorized Access: Bypassing PHP strcmp()
skype-open-source: Skype User IP-address Disclosure
Netgear WPN824v3 - Unauthorized Config Download
Plesk Apache Zeroday Remote Exploit
Microsoft Internet Explorer textNode Use-After-Free
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Linux kernel perf_swevent_init - Local root Exploit
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Serious Remote Execution Exploit in Zpanel 10.0.0.2!
EXFiLTRATED
Winamp 5.12 (.m3u) - Stack Based Buffer Overflow
FreeBSD 9.0-9.1 mmap/ptrace Privilege Esclation Exploit
Linux/x86 Reverse TCP Bind Shellcode (92 bytes)
ZPanel 10.0.0.2 htpasswd Module Username Command Execution
ZPanel zsudo Local Privilege Escalation Exploit
Unleashing MAYHEM on Binary Code - Automated hybrid binary analysis that results in shell-spawning exploits : netsec
Staged Payloads – What Pen Testers Should Know | Strategic Cyber LLC
Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
Computer viruses: A thing of threads and patches | The Economist
Bombing BitTorrent and File-Sharing Websites Back to the Stone Age | TorrentFreak
Paddle Over
One-click/key attack forces IE and Chrome to execute malicious code | Ars Technica
Wireshark ASN.1 BER Dissector CVE-2013-3557 Denial of Service Vulnerability
Microsoft Internet Explorer 'jsdbgui' Buffer Overflow Remote Code Execution Vulnerability
VMware vCenter Chargeback Manager CVE-2013-3520 Remote Code Execution Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-1693 Information Disclosure Vulnerability
Microsoft Internet Explorer CVE-2013-3123 Memory Corruption Vulnerability
Wireshark DCP ETSI Dissector Integer Overflow Denial of Service Vulnerability
Wireshark DCP ETSI Dissector 'dissect_pft_fec_detailed()' Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0776 URI Spoofing Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird CVE-2012-1942 Local Privilege Escalation Vulnerability
OpenSSL CVE-2012-2686 Remote Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0753 Remote Code Execution Vulnerability
Oracle Java SE CVE-2013-1486 Remote Java Runtime Environment Vulnerability
MySQL and MariaDB Geometry Query Denial Of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4186 Remote Buffer Overflow Vulnerability
SecurityFocus
Wireshark MS-MMC Dissector Denial of Service Vulnerability
Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3660 Local Privilege Escalation Vulnerability
Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-2432 Remote Java Runtime Environment Vulnerability
Adobe Acrobat and Reader CVE-2013-2729 Unspecified Remote Integer Overflow Vulnerability
Apple QuickTime CVE-2013-0986 Buffer Overflow Vulnerability
Apple QuickTime CVE-2013-1021 Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2727 Remote Integer Overflow Vulnerability
http://t.co/8tgusXp6C5
Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability
KDE Plasma Paste Applet Local Password Generation Vulnerability
Apple QuickTime CVE-2013-0988 Buffer Overflow Vulnerability
Microsoft .NET Framework CVE-2013-1337 Authentication Bypass Vulnerability
Microsoft .NET Framework XML Digital Signature CVE-2013-1336 Security Bypass Vulnerability
Microsoft Internet Explorer XML Object Zone Restriction Bypass Vulnerability
Microsoft Internet Explorer BR549.DLL ActiveX Control Buffer Overflow Vulnerability
Microsoft Internet Explorer Cached Web Credentials Disclosure Vulnerability
Linux Kernel 'b43' Wireless Driver Local Privilege Escalation Vulnerability
http://t.co/WW2oQVrpfI
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Linux Kernel 'perf' Multiple Denial of Service and Information Disclosure Vulnerabilities
Linux Kernel CVE-2013-3222 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3223 Local Information Disclosure Vulnerability
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
Cisco Linksys E1200 N300 Router 'submit_button' Parameter Cross Site Scripting Vulnerability
RETIRED: Xen 'ELF' Parser Multiple Security Vulnerabilities
Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
Linux Kernel CVE-2013-0310 NULL Pointer Dereference Denial of Service Vulnerability
X.Org libFS 'FSOpenServer()' Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1571 Frame Injection Vulnerability
Oracle Java SE CVE-2013-2467 Local Security Vulnerability
Oracle Java SE CVE-2013-2451 Local Security Vulnerability
Oracle Java SE CVE-2013-1500 Local Security Vulnerability
SecurityFocus
http://www.freebsd.org/security/advisories/FreeBSD-SA-13:06.mmap.asc
Egor Homakov: Camjacking: Click and say Cheese
Camjacking, как эволюция Clickjacking, или «Гюльчатай! Открой личико!» / Хабрахабр
Oracle Solaris CVE-2012-3199 Local Security Vulnerability
Linux Kernel JFS xattr Namespace Rules Security Bypass Vulnerability
SecurityFocus
Linux Kernel CVE-2012-0810 Local Denial of Service Vulnerability
Linux Kernel 'inotify_init1()' Double Free Local Denial of Service Vulnerability
Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability
Oracle Java SE CVE-2013-2466 Remote Security Vulnerability
Oracle Java SE CVE-2013-2462 Remote Security Vulnerability
Oracle Java SE CVE-2013-2463 Remote Code Execution Vulnerability
Oracle Java SE CVE-2013-2464 Memory Corruption Vulnerability
Oracle Java SE CVE-2013-2455 Remote Code Execution Vulnerability
Oracle Java SE CVE-2013-2461 Remote Security Vulnerability
Oracle Java SE CVE-2013-2443 Remote Security Vulnerability
SecurityFocus
Xen CVE-2013-2195 Pointer Dereference Privilege Escalation Vulnerability
Xen CVE-2013-2194 Remote Privilege Escalation Vulnerability
Xen CVE-2013-2196 Remote Privilege Escalation Vulnerability
Linux Kernel CVE-2010-2066 Donor File Security Bypass Vulnerability
PHP CVE-2013-2110 Heap Based Buffer Overflow Vulnerability
Mozilla Firefox SeaMonkey Thunderbird Modal Calls Cross Domain Information Disclosure Vulnerability
Mozilla Firefox and Thunderbird CVE-2010-3175 Multiple Memory-Corruption Vulnerabilities
Mozilla Firefox and SeaMonkey Gopher Parser Cross Site Scripting Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird 'document.write' Memory Corruption Vulnerability
Linux Kernel 'tg3.c' Integer Overflow Vulnerability
Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Mozilla Firefox SeaMonkey and Thunderbird 'nsBarProp' Use-After-Free Memory Corruption Vulnerability
Xen CVE-2013-2077 Remote Denial of Service Vulnerability
Xen CVE-2013-2076 Information Disclosure Vulnerability
Xen CVE-2013-2078 Remote Denial of Service Vulnerability
WordPress 'crypt_private()' Method Remote Denial of Service Vulnerability
cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
FreeBSD CVE-2013-2171 Local Privilege Escalation Vulnerabiity
OpenSSH CVE-2010-5107 Denial of Service Vulnerability
Oracle VM VirtualBox 'tracepath' Local Denial of Service Vulnerability
Mozilla Firefox CVE-2013-1696 Clickjacking Vulnerability
Mozilla Firefox CVE-2013-1698 Security Vulnerability
Mozilla Firefox CVE-2013-1699 Homograph Domain Spoofing Vulnerability
SecurityFocus
SecurityFocus
[Kitty Bomber]
Mozilla Firefox and Thunderbird CVE-2013-1692 Cross-Site Request Forgery Vulnerability
Oracle Java SE CVE-2013-2440 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-0446 Remote Java Runtime Environment Vulnerability
# ls -lh total 33896 -r-xr-xr-x 1 root wheel 46.2K May 27 18:39 boot -rwxr - Pastebin.com
Five ways to hack Facebook accounts
Computer {Hacking Basic 4} - YouTube
Computer {Hacking Basic 6} - YouTube
Hacker Term {Chipping} - YouTube
Hardware Backdooring is Practical - Jonathan Brossard - YouTube
Biohackers. The politics of open science | Alessandro Delfanti
Twitter / PrometricCyber: The 5 most common #hacking ...
A simple VPN guide for the beginning Anonymous and online activist
Ce que je n’aime pas d’Android « TECHNOSTÉRONE Le blogue de Pascal Forget
Transform a USB stick into a boot device packing multiple Linux distros using GRUB
RŌNIN linux security distribution released. : netsec
NST USB FAQ - NST Wiki
Home » OpenStack Open Source Cloud Computing Software
http://www.pensezcybersecurite.gc.ca/cnt/rsrcs/nfgrphcs/nfgrphcs-2012-10-19-fra.aspx
Les logiciels qu'il ne fallait pas manquer cette semaine (AVS Media Player, Startup Delayer, CCleaner...)
http://www.naik-online.com/php,cygwin,windows
A small script to detect Linux/Cdorked.A malware on a linux system using the tool from ESET
http://prism-break.org/#fr
https://www.ixquick.com/
https://startpage.com/
Index of /pub/
Korben - Site d'actualité geek et tech
Economy
http://1-ps.googleusercontent.com/h/www.searchenginejournal.com/wp-content/uploads/2013/05/googles-200-ranking-factors.jpg.pagespeed.ce.S-B77K3ca5.jpg
Three Myths about What Customers Want - Karen Freeman, Patrick Spenner and Anna Bird - Harvard Business Review
Canadian Virtual Assistant Connection - Home
Ten tips for using your blog to launch a business - The Globe and Mail
The Quantified Man: How an Obsolete Tech Guy Rebuilt Himself for the Future | Wired Enterprise | Wired.com
How to identify high-probability reversal zones - MarketWatch
Technical Analysis: What Can This Advanced System Do For You? - Seeking Alpha
5 charts to tell if stock buyers are too bullish - Slide Show - MarketWatch
Don't Let Fear Or Greed Influence Your Portfolio Management. - Seeking Alpha
New Doomsday poll: 98% risk of 2014 stock crash - Paul B. Farrell - MarketWatch
Roubini: Why gold, 'that barbarous relic,' will trade below $1,000 by 2014 - The Tell - MarketWatch
18 Signs That Massive Economic Problems Are Erupting All Over The Planet - BlackListedNews.com
15 Signs That The Economy Is Rapidly Getting Worse As We Head Into 2013 - BlackListedNews.com
America's economy: Which way America? | The Economist
AP - Portugal endures worst recession in 37 years
Bitcoin, Blessing or a Trap? - BlackListedNews.com
Comment créer une boutique en ligne - Créer un Site W
So You Think Bitcoin is a Great Way to Remain Anonymous in Your Financial Transactions? - BlackListedNews.com
Bitcoin's Big Bank Problem: Why Did Mt. Gox Halt U.S. Payouts? | Wired Enterprise | Wired.com
The financially forgotten generation: Economically raising the Millennials in a debt strapped financial world. - BlackListedNews.com
CHARTS: You Won't Believe How Much Disasters Cost Last Year | Mother Jones
17 Signs That Most Americans Will Be Wiped Out By The Coming Economic Collapse - BlackListedNews.com
Canada soars in ranking of nations adored by foreign investors - The Globe and Mail
Focus: World GDP | The Economist
Detroit’s Default May Spark U.S. Death Spiral of Debt - BlackListedNews.com
PayPal conçoit une monnaie intergalactique. - La Libre.be
Entertainement
John McAfee Fed Up with Users Asking Him How to Uninstall McAfee Antivirus – Video
YouTube
The Humble Bundle with Android 6 (pay what you want and help charity)
Who's <i>really</i> in charge? Bill Belichick's savvy clear in AFC East - NFL.com
Bill Belichick, Ted Thompson headline NFL's top power brokers - NFL.com
Hardware
Téléphone: un chargeur de téléphone au coin du feu, grâce à son feu de camp (VIDÉO)
MIT researchers can see through walls using 'Wi-Vi' - Network World
Instrumentation of the Sapphire Rocket and Ground Support Equipment — For Download | Wired Science | Wired.com
Les drones sont désormais capables de s’accrocher aux murs pour mieux vous surveiller | Daily Geek Show
http://hothardware.com/Reviews/HOT-Raspberry-Pi-DIY-Mini-Desktop-PC-Build/
Tiny Computers That Collect Data from Anywhere | MIT Technology Review
Google Glass Teardown
Une puce AMD franchit la barri\E8re des 5 GHz - Le Monde Informatique
Researcher Dreams Up Machines That Learn Without Humans | Wired Enterprise | Wired.com
How Intel, HP & Compaq Killed The Fastest Processor In The World - Popular Science and Technology Blog by Jos Kirps
Recycling, solar, and wind power team up to make a terrifying crab robot | Grist
Ancient Roman Concrete Is About To Revolutionize Modern Architecture - Slashdot
Tapping: It's not just for phones anymore - Cabling Install
BBC News - Drayson Racing electric car sets new world speed record
Practice makes perfect B12 69 EV Le Mans ahead of breaking record - YouTube
Howto TOW
Install Windows XP using USB Flash Disk/ Flash Drive - Step by Step Guide
Install XP from USB without extra tools - MSFN Forum
63 - Install XP and Win7 onto a computer from one USB flash drive containing ISO files! - RMPrepUSB
inportb » Install Windows 7 from USB Pen Drive Using Grub2 and Grub4Dos
Skynet to Launch October, 2013 - BlackListedNews.com
TeleGeography Submarine Cable Map 2012
Science
Spectacular Cosmographic Maps Chart Galaxies and Superclusters in Local Universe | Wired Science | Wired.com
Un trou noir dormant dans la galaxie du Sculpteur | Ciel et Espace
26 New Black Hole Candidates Found In Andromeda - Slashdot
Trois «super-Terres» habitables détectées dans un système voisin du nôtre - 20minutes.fr
http://www.gizmodo.fr/2013/06/04/superordinateur-importante-decouverte-sida.html
Video: Bioengineers invent light-controlled gel - The Globe and Mail
Vous pourriez bientôt régénérer des parties endommagées de votre corps comme le fait la salamandre | Daily Geek Show
Emiliania huxleyi: le secret de l'algue qui s'adapte à tout | Slate.fr
Whole human brain mapped in 3D : Nature News & Comment
http://www.newser.com/story/169875/potent-weapon-against-superbugs-is-silver.html
700,000-Year-Old Horse Genome Shatters Record for Sequencing of Ancient DNA | Wired Science | Wired.com
http://www.gizmodo.fr/2013/06/27/greffes-tete-humaine-2-ans.html
Biohacking : quand les fab-labs s'attaquent au vivant
Quantum-Tunneling Electrons Could Make Semiconductors Obsolete - Slashdot
Intel demos real-time code compression for die shrinkage, power saving • The Register
Temporal cloak erases data from history : Nature News & Comment
The Scale of the Universe 2
Mysterious Subatomic Particle May Represent Exotic New Form of Matter | Wired Science | Wired.com
Teen's biofuel invention turns algae into fuel | Tampa Bay Times
Research Gives New Permanence to Quantum Memory | Wired Enterprise | Wired.com
Des chercheurs cr\E9ent des flammes froides dans la Station spatiale internationale
Lopsided Map of the Cosmos Offers New Clues to the Universe's Origins | Wired Science | Wired.com
Cute Robots Will Be Launched Into Space : Discovery News
Researchers Build A Robot That Will Beat You At Air Hockey - Forbes
Une météorite de Mars contient les éléments clefs de la vie
Video: NASA launches solar telescope - The Globe and Mail
Wired Space Photo of the Day | Wired Science | Wired.com
Un sous-marin miniature pour rechercher des traces de vie dans l'océan du satellite de Jupiter | Slate.fr
http://www.begeek.fr/curiosity-la-nasa-devoile-un-sublime-panorama-interactif-de-mars-95657?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
http://www.begeek.fr/mars-la-planete-rouge-se-devoile-dans-une-video-de-trois-minutes-95855?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
NASA : Spirit confirme que Mars a eu une atmosphère riche en oxygène dans le passé
Social
Des chercheurs créent de faux souvenirs de guerre chez des soldats | Passeur de sciences
Noam Chomsky: Les USA accélèrent l’Apocalypse « GLOBAL RELAY NETWORK
Archaeologists Discover Lost City In Cambodian Jungle : The Two-Way : NPR
L'avenir du socialisme se joue \E0 l'\E9chelle europ\E9enne
Les perles de la commission | Vidéos LaPresse.ca
Are We On the Brink of World War III? - BlackListedNews.com
Daily chart: Mutually assured ambiguity | The Economist
A country armed to the teeth | Photographers Blog
Daily chart: Syria v Libya v Iraq | The Economist
The UN prepares to go to war for the first time, with a 3,000-strong task force sent to fight rebels in the Congo | Mail Online
Is Central Australia the geostrategic centrepiece in the USA’s new look east policy? — Phantom Report
The grim reality of war with a nuclear Iran - Public Service Europe
The 9 Largest Private Armies In The World. What Are They Fighting For? - BlackListedNews.com
The Age of Gloom? Implications for Key NATO Armies - BlackListedNews.com
Taliban thriving on Afghanistans opium economy - BlackListedNews.com
The Origins of War in the DRC - Armin Rosen - The Atlantic
FreeBSD 9 Address Space Manipulation Privilege Escalation
Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO) - YouTube
7 graphs that prove America is overrated | GlobalPost
Twitter / WSJGraphics: Americans worked less, watched ...
Underground
This is, hands down, the scariest part of the NSA revelations | FP Passport
NSA as ‘Big Brother’? Not even close | The Great Debate
Se protéger de la cyber surveillance | Data Security Breach
Que sait-on exactement sur PRISM ? | SecurityVibes Magazine – Qualys Security Community
Canada has tracked phone and Internet data for years | Toronto Star
403 Forbidden
Overview | Onion Pi | Adafruit Learning System
The intelligence establishment's dream supercomputer will make Raytheon's RIOT program seem like child's play | Privacy SOS
Google tracks you. We don't. An illustrated guide.
RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn't Let Them)
Use of Tor and e-mail crypto could increase chances that NSA keeps your data | Ars Technica
Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard
India’s new surveillance network will make the NSA green with envy – Quartz
Google-owned Motorola reveals stomach acid-powered tablet that turns your body into a password - BlackListedNews.com
The 25 Rules of Disinformation - BlackListedNews.com
Disclose.tv - Best Conspiracy Theories Site | UFO Sightings Videos
Before It's News | Alternative News | UFO | Beyond Science | True News| Prophecy News | People Powered News
Alex Jones' Infowars: There's a war on for your mind!
Activist Post: Basel III: How The Bank For International Settlements Is Going To Help Bring Down The Global Economy
http://m.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
Forget phones, PRISM plan shows internet firms give NSA everything • The Register
BREAKING!!! UFO ALIEN DISCLOSURE by Canadian Minister of Defense May 2013 - YouTube
Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 - BlackListedNews.com
NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System - BlackListedNews.com
Pentagon bracing for public dissent over climate and energy shocks| Nafeez Ahmed
Anonymous • Pretext for a New War: Obama Lies About Syrian Chemical Weapons
PRISM is just 'the tip of the iceberg' in an Orwellian society - Public Service Europe
Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines - BlackListedNews.com
NOVA | The New Thought Police
Nazi Germany vs. Modern Britain: Some Similarities That Should Disturb You | Scriptonite Daily
http://www.presse-citron.net/wordpress_prod/wp-content/uploads/InfographieGeantsWebTrack.png
– China vs US, cyber superpowers comparedInfoSec Institute Resources
NSA director says dozens of attacks were stopped by surveillance programs - The Washington Post
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com
What are those words that trigger Echelon? • The Register
http://www.undernews.fr/anonymat-cryptographie/vie-privee-la-nsa-soctroie-un-backdoor-dans-tous-les-systemes-windows.html
Timeline of NSA Domestic Spying | Electronic Frontier Foundation
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
http://cryptome.org/jya/esnoop.htm
http://cryptome.org/2013/06/nsa-arch-spy.htm
Exactly How the NSA Is Getting Away With Spying on US Citizens
#PRISM : let’s have a look at the big picture : Reflets
Meet PRISM’s little brother: Socmint | Ars Technica
Dans la peau d’un hacker black hat | Korben
Réseau Libre
Wireless mesh network - Wikipedia, the free encyclopedia
http://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/
http://cryptome.org/jya/nsa-bot.htm
http://cryptome.org/nsa-bot-spy.htm
How Hackers Changed the World - BBC documentary 2013 - YouTube
Root Force
P'tain c'est epic, comment j'ai pu passé a coté de ce blog.
RépondreSupprimerCe commentaire a été supprimé par l'auteur.
RépondreSupprimer