Computer
Pwgen – Créez facilement vos mots de passe | La vache libre
MyWhisper.net - Text Encryption Tool
What is Hydra the Password Cracking Tool and how does it work?
bdpurcell/bully · GitHub
Good tutorial for WinDbg? - Stack Overflow
Free online WPA cracker with stats - besside-ng companion
How to Crack a Wi-Fi Password
Digital Attack Map
glibc and eglibc 2.5, 2.7, 2.13 - Buffer Overflow Vulnerability
Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit
Reverse Engineering a D-Link Backdoor - /dev/ttyS0
Messagebox Shellcode (113 bytes) - Any Windows Version
Insolite : attaquer un radar avec une injection SQL – Blogmotion
D-Link DIR-605L Captcha Handling Buffer Overflow
Apache / PHP 5.x Remote Code Execution Exploit
WordPress Think Responsive Themes Arbitrary File Upload Vulnerability
WordPress Switchblade Themes Arbitrary File Upload Vulnerability
DIY: Android Malware Analysis - Taking apart OBAD (part 1)
IT Books Free Share | Scoop.it
ExtraTorrent.cc The World's Largest BitTorrent System
50 Ways to Inject Your SQL - YouTube
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1719 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1728 Security Vulnerability
Cisco Wireless LAN Controller CVE-2013-5519 Cross Site Scripting Vulnerability
Cisco Unified Computing System CVE-2012-4103 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4111 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4102 Local Arbitrary Command Execution Vulnerability
Cisco Unified Computing System CVE-2012-4109 Local Command Injection Vulnerability
Microsoft Windows CVE-2012-1864 Local Privilege Escalation Vulnerability
Oracle Java SE CVE-2013-2449 Remote Security Vulnerability
Oracle Java SE CVE-2013-2444 Remote Security Vulnerability
PHP 'header()' HTTP Header Injection Vulnerability
Oracle Sun Products Suite CVE-2012-3128 Local SPARC T-Series Servers Vulnerability
Cisco Nexus 7000 Series Switches NX-OS CVE-2012-4090 Remote Information Disclosure Vulnerability
Xinetd CVE-2013-4342 Remote Code Execution Vulnerability
Microsoft Windows Kernel 'dxgkrnl.sys' CVE-2013-3888 Local Privilege Escalation Vulnerability
Another Day, SpiderLabs Discovers Another IE Zero-Day - SpiderLabs Anterior
Microsoft Internet Explorer CVE-2013-3872 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3873 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3874 Memory Corruption Vulnerability
Xen CVE-2013-1442 Information Disclosure Vulnerability
Cisco NX-OS CVE-2012-4121 Arbitrary File Access Vulnerability
Cisco NX-OS 'file name' Parameter Arbitrary File Write Vulnerability
Cisco Identity Services Engine CVE-2013-5524 Cross Site Scripting Vulnerability
Cisco NX-OS CVE-2012-4077 Local Arbitrary Command Execution Vulnerability
Cisco IOS CVE-2013-5499 Remote Denial of Service Vulnerability
Microsoft Internet Explorer CVE-2013-3886 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3897 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3882 Memory Corruption Vulnerability
Cisco NX-OS CVE-2012-4076 Local Arbitrary Command Execution Vulnerability
Cisco NX-OS CVE-2012-4122 Arbitrary File Creation or Overwrite Vulnerability
Cisco NX-OS CVE-2012-4075 Local Arbitrary Command Execution Vulnerability
Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
Cisco Prime Central for HCS 'Credentials' Information Disclosure Vulnerability
Cisco Unified Communications Manager CVE-2013-5528 Directory Traversal Vulnerability
Xen CVE-2013-4355 Information Disclosure Vulnerability
Xen CVE-2013-4361 Information Disclosure Vulnerability
Linux Kernel CVE-2013-4387 Memory Corruption Vulnerability
Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
Cisco Unified Computing System CVE-2012-4106 Local Privilege Escalation Vulnerability
Cisco Unified Computing System CVE-2012-4105 Local Denial of Service Vulnerability
X.Org X Server 'dixfonts.c' Use-After-Free Remote Memory Corruption Vulnerability
Oracle Sun Products Suite CVE-2013-3838 SPARC Enterprise T & M Series Servers Security Vulnerability
Mozilla Firefox Cookie Verification Denial of Service Vulnerability
Oracle Java SE CVE-2013-5772 Remote Security Vulnerability
Oracle Java SE CVE-2013-5830 Remote Security Vulnerability
Oracle Java SE CVE-2013-5803 Remote Security Vulnerability
Oracle Java SE CVE-2013-5810 Remote Security Vulnerability
Oracle Java SE CVE-2013-5842 Remote Security Vulnerability
Oracle Java SE CVE-2013-5797 Remote Security Vulnerability
Oracle Java SE CVE-2013-5800 Remote Security Vulnerability
Oracle Java SE CVE-2013-5832 Remote Security Vulnerability
Oracle Java SE CVE-2013-5848 Remote Security Vulnerability
Oracle Java SE CVE-2013-5783 Remote Security Vulnerability
Oracle Java SE CVE-2013-5789 Remote Security Vulnerability
Oracle Java SE CVE-2013-5780 Remote Security Vulnerability
Oracle Java SE CVE-2013-5844 Remote Security Vulnerability
Oracle Java SE CVE-2013-5774 Remote Security Vulnerability
Cisco Unified Computing System CVE-2012-4113 Local Arbitrary File Access Vulnerability
Oracle Java SE CVE-2013-5840 Remote Security Vulnerability
Xen CVE-2013-4371 Use After Free Remote Denial of Service Vulnerability
Oracle Java SE CVE-2013-5804 Remote Security Vulnerability
Oracle Java SE CVE-2013-5814 Remote Security Vulnerability
Cisco Secure Access Control System CVE-2013-5536 Remote Denial of Service Vulnerability
Cisco Identity Services Engine CVE-2013-5530 Remote Arbitrary Command Execution Vulnerability
WordPress Landing Pages Plugin 'post' Parameter SQL Injection Vulnerability
WordPress Portable phpMyAdmin Plugin Multiple Security Bypass Vulnerabilities
Linux Kernel CVE-2013-4299 Information Disclosure Vulnerability
Joomla! Maian15 Component 'name' Parameter Arbitrary Shell Upload Vulnerability
Cisco Catalyst 3750 Series Switches Default Credentials Security Bypass Vulnerabilities
Oracle Java SE CVE-2013-5824 Remote Security Vulnerability
Oracle Java SE CVE-2013-5819 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5599 Remote Memory Corruption Vulnerability
Mozilla Firefox CVE-2013-5592 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5596 Remote Code Execution Vulnerability
Mozilla Firefox CVE-2013-5591 Remote Memory Corruption Vulnerability
Mozilla Firefox 'PDF.js' Javascript Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5602 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5600 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5601 Remote Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1474 JavaFX Remote Security Vulnerability
Want To Hijack a Domain? Just Get a Fax Machine - Slashdot
Un expert en sécurité crée des malwares indétectables sur Mac OS X
Local Linux Enumeration & Privilege Escalation - Rebootuser
Computer Security Student Home Page|->Security Lesson, Tools, Exploits, Topics, Forensics, Clothing
Hackers Can Hijack Facebook Accounts by Exploiting Flaw in Android Apps – Video
Network Investigator: Network Protocols
ROM Installer - Android Apps on Google Play
CyanogenMod | Android Community Rom based on Jelly Bean
How to install/remove different Desktop/Window Manager in Kali Linux 1.x
Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone - Forbes
SIGOPSCreate Your Own Operating System Adventure
Gimp – Installer et utiliser les plugins Ofnuts | La vache libre
http://www.macg.co/news/voir/261401/un-script-pour-faciliter-la-creation-de-cartes-sd-pour-raspberry-pi
Skype Call Recorder – Un utilitaire simple et efficace pour enregistrer vos conversations Skype | La vache libre
WhiteHat Aviator - The most secure browser online
The Gimp – Installer les plugins Akkana | La vache libre
QuickTweet: pour basculer entre les comptes Twitter sur google chrome
Security and So Many Things
BinaryTides - Linux how to guides, php web development, mysql, python, network security, socket programming and more
Halloween theme, midi files and binary file editing - YouTube
Economy
Recherche et analyse de mots clés... Like a boss ! | Htitipi
PageRank et corpus sémantiques
Les principaux critères de référencement de Google !
How to get your first 10 customers « Dan Shipper – Distilled Thinking
http://niviti.com/espace/
The seven skills you need to land your dream job - The Globe and Mail
https://yeswehack.com/
investmentwatchblog.com | 522: Connection timed out
Entertainement
Floppy Music by Minihui - Super Mario Bros - YouTube
40 Creative Food Hacks That Will Change The Way You Cook
Hardware
La super-batterie au graphène, chargée en un éclair, autonome pendant des semaines
More Drive Bays, Cooling, and Power for a DIY Raid Box
Hack a Day — Fresh hacks every day
Make Your Own Cell Phone Jammer - wikiHow
The Navy’s newest warship is powered by Linux | Ars Technica
Killer Robots With Automatic Rifles Could Be on the Battlefield in 5 Years | Danger Room | Wired.com
20-ton attack drone under development in Russia - NBC News.com
Taiwanese soldiers wearing ballistic masks look like ‘the cavalry from hell’ | StratRisks
U.S. to deploy ‘stealth destroyers’ in the Pacific next year | StratRisks
Bigger, Lighter, Deadlier! Navy launches new stealth destroyer – CNN Security Clearance - CNN.com Blogs
Technical Machine
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Vous pouvez maintenant utiliser du feu pour recharger votre smartphone | Daily Geek Show
Aluminum Foil Does Not Stop RFID
An Emergency Shelter That's Open Source and Locks Together Like Legos | Wired Design | Wired.com
Howto TOW
21 Times "The Simpsons" Bizarrely Predicted The Future
The end of the New World Order | Seumas Milne | Comment is free | The Guardian
La Terre en 2100: invivable? | Sciences et santé - lesoir.be
NSA Codewords | cypherpunks
Open Exoplanet Catalogue
Misc
NSA Haiku Generator
Science
La première carte de la couverture nuageuse d’une planète géante au-delà de notre système solaire | GuruMeditationGuruMeditation
Découverte d’une étrange planète flottant seule dans l’espace | Sciences et santé - lesoir.be
26 % d'eau dans les vestiges d'un astéroïde - Sciences et Avenir
Un astéroïde géant va-t-il anéantir la Terre le 16 mars 2880? - RTL info
http://www.begeek.fr/lasteroide-2013tv135-frole-terre-reviendra-en-2032-107771?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Les techniques envisagées pour détruire les astéroïdes qui nous menacent | Atlantico
http://www.begeek.fr/galaxie-z8-gnd-5296-hubble-fait-decouverte-majeure-108500?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
20 minutes - L exoplan\E8te Kepler-78b, une Terre d enfer - Science
Cyborg Cockroach Sparks Ethics Debate | Science/AAAS | News
Les bact\E9ries r\E9sistent aux antibiotiques en communiquant entre elles
Skull sparks human evolution controversy - CNN.com
Chemists find biological complexes that beat chance | Ars Technica
The Human Brain Project - Human Brain Project
Predicting Protests and Cyber Attacks With Web Intelligence
BBC News - Nuclear fusion milestone passed at US lab
Two-laser boron fusion lights the way to radiation-free energy : Nature News & Comment
A grand unified theory of exotic superconductivity?
Albert Einstein's Theory of Relativity - YouTube
Quantum Mechanics: Animation explaining quantum physics. - YouTube
The Moon And NASA Now Communicate Via Lasers | Popular Science
New Technology For Converting a Metal To a Semiconductor With a Laser - Slashdot
MIT Researchers Unveil Self-Assembling Robot Swarm - Slashdot
Introducing WildCat - YouTube
Insect-Inspired Flying Robot Handles Collisions And Keeps Going - Slashdot
Astéroïdes : la NASA s'intéresse aux mini lunes
Watch: SpaceX Grasshopper Rocket Launch Reaches Record Height | Autopia | Wired.com
Actualité > Mission habitée vers Mars : la Russie affiche ses ambitions
Les méduses nées dans l’espace ne supportent pas la gravité terrestre et il en sera de même pour l’homme | GuruMeditationGuruMeditation
http://www.francetvinfo.fr/entre-l-inde-et-la-planete-mars-le-systeme-d_450186.html
Social
http://www.gutenberg.org/files/25717/25717-h/25717-h.htm
Elites’ strange plot to take over the world - Salon.com
France Prepares for War in the Central African Republic — Phantom Report
AFRICOM builds up military bases in Italy for small-scale “secret wars” in Africa — Phantom Report
L'OTAN lance un centre de réaction contre les cyberattaques
Underground
Se protéger sur les réseaux sociaux : Le grand guide Bitdefender | UnderNews
It was DPR, in the Tor HS, with the BTC - Hacker OPSEC
chycho: How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations
La commissaire à la vie privée enquêtera sur la nouvelle politique de Bell | Radio-Canada.ca
Ubuntu's Mark Shuttleworth wins Austria's Big Brother Award | Muktware
Facebook peut deviner avec qui vous partagez votre vie
Odin - Secure Networking
Radiation experts confirm polonium on Arafat clothing - FRANCE 24
The Capitalist Conspiracy (1969) by G. Edward Griffin - Full Official Movie - Great Quality Film :) - YouTube
Lockheed Martin Surveillance Project Informational CD DVD | eBay
milo2012/osintstalker · GitHub
The Daily Dot - Pro-Palestinian hackers attack 2 security corporations with a fax machine
Syrian Electronic Army Confirms they took over Barack Obama's Campaign Website, email, twitter and Facebook Account ~ Techworm
Aucun commentaire:
Enregistrer un commentaire