Computer
Le guide du Robots.txt, cet outil puissant et parfois méconnu des SEO
Créer des CSS dynamiques avec PHP sans LessCSS ou SCSS… - Blog Internet-Formation - Poitiers (86)
[PHP] Twitter Brute Force - Pastebin.com
[Bash] check if twitter username is available - Pastebin.com
wortlisten
http://news.silobreaker.com/cb0cat-5_2267319119126724608
301 Moved Permanently
DoS attacks that took down big game sites abused Web’s time-sync protocol | Ars Technica
Remote Code Execution exploit in WordPress 3.5.1 - VaGoSec
Intelligent Exploit Aggregation Network - IEAN
http://www.bugsearch.net/en/14915/ms13-101-windows-kernel-win32ksys-integer-overflow-anonymoused.html?ref=3&utm_source=twitterfeed&utm_medium=twitter&utm_campaign=Feed%3A+bugsearch-security-rss+%28www.BugSearch.net+security+rss%29
Microsoft Windows ndproxy.sys - Local Privilege Escalation
Windows Kernel win32k.sys - Integer Overflow (MS13-101)
Snapchat Crypto Flaws ≈ Packet Storm
D-Link DSL-2750U ME_1.09 - CSRF Vulnerability
Hack Like a Pro: How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection « Null Byte
Haktip 85 - Netcat 101: Port Scanning in Netcat
How to use HTML5 geolocation | Webdesigner Depot
Man-in-the-Browser Session Hijacking | Strategic Cyber LLC
404 Not Found
Adsense Clickjacking
JavaScript for hackers - Dev.Opera
[GUIDE] Use aircrack-ng on android phone using Wireless USB Adapter - xda-developers
GIMP XWD File Handling CVE-2013-1913 Heap-Based Buffer Overflow Vulnerability
GIMP XWD File Handling Heap Buffer Overflow Vulnerability
Oracle Java SE CVE-2013-5852 Remote Security Vulnerability
Oracle Java SE CVE-2013-5825 Remote Security Vulnerability
Oracle Java SE CVE-2013-5809 Remote Security Vulnerability
PHP OpenSSL Extension 'openssl_x509_parse()' Remote Memory Corruption Vulnerability
PHP CVE-2013-6712 Remote Denial of Service Vulnerability
D-Link DAP-1522 Wireless Router Hardcoded Credentials Security Bypass Vulnerability
Linux Kernel CVE-2013-2929 Local Privilege Escalation Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-6673 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5618 Use After Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5613 Multiple Memory Corruption Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5609 Multiple Memory Corruption Vulnerabilities
Linux Kernel Netfilter 'ipt_CLUSTERIP.c' Buffer Overflow Vulnerability
Apache Subversion 'mod_dav_svn' Module Denial of Service Vulnerability
Apache Subversion CVE-2013-4505 Security Bypass Vulnerability
Linux Kernel '/bcm/Bcmchar.c' CVE-2013-4515 Local Information Disclosure Vulnerability
Linux Kernel '/drivers/scsi/aacraid/commctrl.c' Pointer Dereference Denial of Service Vulnerability
Wireshark TCP Dissector CVE-2013-6340 Denial of Service Vulnerability
Wireshark IEEE 802.15.4 Dissector CVE-2013-6336 Denial of Service Vulnerability
Wireshark NBAP Dissector CVE-2013-6337 Denial of Service Vulnerability
cURL/libcURL SSL Certificate Host Name Validation Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2012-3993 Arbitrary Code Execution Vulnerability
Mozilla Firefox CVE-2013-5611 Security Bypass Vulnerability
Oracle Java SE CVE-2013-5802 Remote Security Vulnerability
Microsoft Internet Explorer Enhanced Protected Mode CVE-2013-5045 Security Bypass Vulnerability
OpenSSL 'ssl_get_algorithm2()' Function Remote Denial of Service Vulnerability
Mozilla Firefox and Seamonkey CVE-2013-5614 Security Bypass Vulnerability
Samba 'dcerpc_read_ncacn_packet_done()' Function Heap Buffer Overflow Vulnerability
Microsoft Windows 'Win32k.sys' CVE-2013-3903 Denial Of Serivce Vulnerability
Mozilla Firefox/SeaMonkey CVE-2013-5612 Cross Site Scripting Vulnerability
Linux Kernel CVE-2013-3226 Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-5838 Remote Security Vulnerability
Oracle Java SE CVE-2013-5850 Remote Security Vulnerability
Oracle Java SE CVE-2013-5831 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5616 Use After Free Memory Corruption Vulnerability
Oracle Java SE CVE-2013-5809 Remote Security Vulnerability
Linux Kernel AACRAID Driver Compat IOCTL Local Security Bypass Vulnerability
Linux Kernel 'drivers/staging/wlags49_h2/wl_priv.c' Local Buffer Overflow Vulnerability
Linux Kernel CVE-2013-6763 Integer Overflow Vulnerability
Linux Kernel 'oz_cdev_write()' Function Local Buffer Overflow Vulnerability
Linux Kernel 'ieee80211_radiotap_iterator_init()' Function Denial of Service Vulnerability
IBM Java CVE-2013-5375 Unspecified Security Bypass Vulnerability
302 Found
Not found.
How to be a hacker | Technology | theguardian.com
On Hacking MicroSD Cards « bunnie's blog
A chain is only as strong as its weakest link – DNS Hijack Monitoring | Corelan Team
Research Archives | HeX-OR Forensics
Hack Like a Pro: How to Hack Remote Desktop Protocol (RDP) to Snatch the Sysadmin Password « Null Byte
Marco Ramilli's Blog: Hacking through image: GIF turn
dark-rose/droidlog2timeline · GitHub
Cyanogenmod dépollué de Google grâce à Freecyngn « Korben Korben
Announcing Ubuntu and Android dual boot developer preview | Ubuntu Developer
SmoothSec | Intrusion detection made simple.
A power user’s guide to OS X Server, Mavericks edition | Ars Technica
[Bash] random password generator - Pastebin.com
MyCryptoChat, version 0.1 et code source en ligne - HowTommy
ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects » Lynis The Unix/Linux Hardening tool updated to v1.3.8
Svenito/usblock · GitHub
MultCloud, gérer ses services de stockage en ligne (Dropbox, Google Drive, Skydrive…) | Autour du Web
My WeeChat configuration | pascalpoitraspascalpoitras
Self-Destructing Cookies :: Add-ons for Firefox
http://shelr.tv/about
Advanced Youtube API
Economy
Tipeee - Comment ça marche ?
Les 20 critères de l’audit SEO
7 conseils de pro pour adapter votre stratégie SEO à Google | Webmarketing & co'm
https://pbs.twimg.com/media/BcX6raKIYAAbl5Z.jpg:large
Why Bitcoin (And Other Cryptocurrencies) Will Inevitably Become Tools Of The Rich, Powerful, and Criminal - Business Insider
Hardware
DIY : Starter de voiture RFID | Semageek
Drone Nation, The Infographic
Army Laser Passes Drone-Killing Test
Bullseye from 1,000 yards: Shooting the $17,000 Linux-powered rifle | Ars Technica
Premier vol d'un avion de combat Tornado équipé de pièces imprimées en 3D
Navy's 757-Sized Drone Will Provide Big-Time Surveillance | Danger Room | Wired.com
Government Lab Reveals It Has Operated Quantum Internet For Over Two Years | MIT Technology Review
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Gift Ideas for Survivalists | #TheShortAnswer w/Jason Bellini - YouTube
Howto TOW
http://www.frogz.fr/RSLN/post/2013/12/26/David-Rothschild-predire-lavenir-avec-les-donnees-.aspx
Science
Actualité > Naines brunes vs étoiles : la distinction se précise
http://www.begeek.fr/europe-et-des-jets-la-decouverte-du-telescope-hubble-sur-le-satellite-de-jupiter-113807?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
La Voie lactée a bien quatre bras - Sciences et Avenir
Deux \E9toiles d\E9couvertes aux "portes" de la Terre - L'Express
Le télescope spatial Hubble découvre des nuages sur une exoplanète
Le champ magn\E9tique du Soleil s'est totalement invers\E9
Stellar Trio Could Put Einstein's Theory of Gravity to the Test | Science/AAAS | News
New Views of Supernova 1987A Reveal Giant Dust Factory - Slashdot
403 Forbidden
BBC News - Dinosaur asteroid 'sent life to Mars'
Des scientifiques inventent un robot bionique à base de sperme de taureau | Daily Geek Show
2013/12/16 > BE Espagne 132 > Des molécules de synthèse capables de bloquer la réplication du virus du SIDA
Tomtato : Une plante hybride produit à la fois des tomates et des pommes de terre | CitizenPost
Bionics, Transhumanism, and the end of Evolution (Full Documentary) - YouTube
Growing human organs inside pigs in Japan | KurzweilAI
Oublier ses mauvais souvenirs? Des scientifiques y sont arrivés grâce à des électrochocs
Solar variability has a small effect on climate change | Ars Technica
https://pbs.twimg.com/media/BdhMs9-IgAAnuBr.png:large
Scientists demonstrate quantum phenomenon for the first time using a plastic film
"Perfect" Electron Roundness Bruises Supersymmetry - Slashdot
Actualité > Trou noir (1/2) : le monde est-il un hologramme ?
Actualité > Trou noir (2/2) : le monde est-il un hologramme ?
Inside Piston-Powered Nuclear Fusion Company General Fusion - Slashdot
http://www.ufunk.net/techno/levitate-objects-with-sound-waves/?utm_source=dlvr.it&utm_medium=twitter
La NASA présente Valkyrie, un robot proche d'Iron Man
Scientists develop 'robotic muscle' -- thousand times stronger than human!
Curiosity découvre un lac d'eau douce sur Mars, preuve de vie - BFMTV.com
Curiosity finds evidence of ancient freshwater lake on Mars | Ars Technica
Nos futurs colons de l’espace pourraient finalement résister aux radiations martiennes | GuruMeditationGuruMeditation
China safely lands rover on the moon | Al Jazeera America
http://www.begeek.fr/la-chine-et-la-lune-video-de-lalunissage-de-change-3-la-sonde-chinoise-113836?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
NASA testing lighter space suits for asteroid work
Social
Defcon 21 - Social Engineering: The Gentleman Thief - YouTube
The History Of The Decline And Fall Of The Roman Empire by Edward Gibbon - Free Ebook
http://www.nature.com/news/ancient-times-table-hidden-in-chinese-bamboo-strips-1.14482
The Cheerleader Effect: New Research on What Men Do to Impress - WSJ.com
How to Build a Mind - Artificial Intelligence Reloaded [30c3] - YouTube
http://leflow.tumblr.com/post/72593610174/la-carte-corporelle-des-emotions-nos-ressentons
Russia and China conduct their First Joint Military Operations
File:Military expenditure by country map.png - Wikipedia, the free encyclopedia
Underground
How Twitter tracks the websites you visit, and how to stop it | Naked Security
Meet Jack. Or, What The Government Could Do With All That Location Data | American Civil Liberties Union
Un mouchard dans votre poche… la preuve | Data Security Breach
Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic | Ars Technica
twister | P2P microblogging platform
The Rothschild Family – The World’s Only Trillionaires
Former Canadian minister Paul Hellyer claims 'Aliens already walk among us' | Mail Online
Aucun commentaire:
Enregistrer un commentaire