Computer
Sélection des plugins Wordpress indispensables pour votre stratégie de contenu | Propulzr
Delivering a powershell payload in a client-side attack | enigma0x3
offensive-security/exploit-database · GitHub
Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities
http://www.exploit-db.com/exploits/31175/
Linux 3.4+ Arbitrary write with CONFIG_X86_X32
linux 3.4+ local root (CONFIG_X86_X32=y)
How To Import Nmap XML Results Into Nessus
HowToUseGeoIP - The Wireshark Wiki
Demonoid Returns, BitTorrent Tracker is Now Online | TorrentFreak
Chrome Bugs Lets Sites Listen to Your Private Conversations
http://ca.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html
New iFrame Injections Leverage PNG Image Metadata | Sucuri Blog
iwScanner - A Simple GUI Wireless Scanner for Linux
Mozilla Firefox/SeaMonkey CVE-2013-5619 Out of Bounds Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5610 Multiple Memory Corruption Vulnerabilities
OpenSSL DTLS Implementations Man in the Middle Multiple Security Bypass Vulnerabilities
OpenSSL TLS Handshake Null Pointer Dereference Denial Of Service Vulnerability
X.Org libXfont BDF Font File Handling Stack Buffer Overflow Vulnerability
Linux Kernel 'fpu-internal.h' Local Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd?utm_content=buffer4f201&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Oracle Java SE CVE-2013-5910 Remote Security Vulnerability
Oracle Java SE CVE-2014-0428 Remote Security Vulnerability
Oracle Java SE CVE-2014-0368 Remote Security Vulnerability
Oracle Java SE CVE-2014-0373 Remote Security Vulnerability
Oracle Java SE CVE-2014-0411 Remote Security Vulnerability
SecurityFocus
SecurityFocus
Oracle Java SE CVE-2014-0422 Remote Security Vulnerability
Oracle Java SE CVE-2014-0416 Remote Security Vulnerability
Oracle Java SE CVE-2014-0376 Remote Security Vulnerability
Oracle VM VirtualBox CVE-2014-0405 Local Security Vulnerability
Oracle VM VirtualBox CVE-2014-0407 Local Security Vulnerability
IBM Java CVE-2013-5458 Unspecified Arbitrary Code Execution Vulnerability
OpenStack Heat CFN Policy CVE-2013-6426 Security Bypass Vulnerability
OpenStack Heat ReST API Validation Privilage Escalation Vulnerability
OpenStack python-keystoneclient CVE-2013-2167 Security Bypass Vulnerability
Multiple OpenStack Products SSL Certificate Validation CVE-2013-2255 Security Bypass Vulnerability
Oracle Java SE CVE-2013-5805 Remote Security Vulnerability
WordPress WP Forum Server Plugin SQL Injection and Cross Site Scripting Vulnerabilities
Linux Kernel 'x25_parse_facilities()' Remote Denial of Service Vulnerability
Linux Kernel 'IFF_TX_SKB_SHARING' Local Denial of Service Vulnerability
Linux Kernel 'net/ieee802154/dgram.c' Local Information Disclosure Vulnerability
Linux Kernel 'semtimedop' OABI Wrapper Heap Buffer Overflow Vulnerability
Oracle Java SE and Java for Business CVE-2010-3548 Remote JNDI Vulnerability
Oracle Java SE CVE-2013-5778 Remote Security Vulnerability
Oracle Java SE CVE-2013-5884 Remote Security Vulnerability
NVIDIA Graphics Driver GPU Access CVE-2013-5986 Local Privilege Escalation Vulnerability
NVIDIA Graphics Driver GPU Access Local Privilege Escalation Vulnerability
Linux Kernel 'compat_sys_recvmmsg()' Function Remote Memory Corruption Vulnerability
ASTALAVISTA - Cloud-Based Security Scans
http://pwnwiki.io/#!index.md
HackerspaceWiki
Bing : l'application Android affectée d'une faille de sécurité
Collectl is a powerful tool to monitor system resources on Linux
http://www.floodgap.com/software/ttytter/
afaqurk/linux-dash · GitHub
http://www.suso.com/infosheets/shell-commands20050327.png
MacBreaker
Dites adieu aux fenêtres Pop-up grâce à Poper Blocker (google chrome only)
Raspberry Pi: Ad Blocking | CyberPunk
http://www.begeek.fr/umoove-controle-des-mouvements-par-le-visage-les-yeux-116364?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Economy
How startups can compete with big company perks
http://cdn.business2community.com/wp-content/uploads/2014/01/original_word-science3.png
Quelques astuces pour garder une longueur d’avance sur Google Update ! |Miss SEO Girl
Outil SEO indispensable #1 : Identifier le contenu en double sur votre site - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
Le SEO est mort ? Non, il a simplement évolué - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
8 questions à se poser pour faire progresser son entreprise
Bitcoin Stares Down Impending Apocalypse (Again) | Wired Enterprise | Wired.com
The Next Big Thing You Missed: There's a Sure-Fire Way to Control the Price of Bitcoin | Wired Business | Wired.com
Why Bitcoin Matters - Seeking Alpha
Bitcoin v Banks: 'Annoyance with system brings on virtual cash boom' - YouTube
Entertainement
7 incroyables secrets cachés sur Google accessibles à tous | Piwee
Hardware
Powering Phones, PCs Using Sugar
How I Built a Raspberry Pi Tablet | MAKE
Hypersonic arms race: China tests high-speed missile to beat U.S. defenses - Washington Times
http://www.reuters.com/article/2014/01/15/us-china-missile-idUSBREA0E0US20140115?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637
https://medium.com/war-is-boring/d89b9ce721de
I Became a Robot with Google Glass
SOL, le premier Laptop solaire réellement autonome en énergie ! - GinjFo
http://shop.geeksphone.com/en/phones/5-peak.html
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Could a Mix of Sand and Pee Be a Super-Green Replacement for Concrete? | Wired Design | Wired.com
New laser-printed material is lighter than water, as strong as steel | Ars Technica
Science
Trois nouvelles exoplan\E8tes d\E9couvertes dans la constellation du Cancer
Water Plumes Discovered on the Solar System's Largest Asteroid - Wired Science
Une étoile explose « à proximité » de la Terre › Espace › Le Journal de la Science
La m\E9t\E9o d'une naine brune cartographi\E9e pour la premi\E8re fois
First Global Map Outside the Solar System - Slashdot
Ast\E9ro\EFdes : la ceinture principale d\E9voile les secrets de sa composition
Un fossile bouscule les th\E9ories sur l'apparition des pattes des animaux terrestres
Superbugs public health | Homeland Security News Wire
Neanderthal lineages excavated from modern human genomes | UW Today
Cellules souches: Une nouvelle technique simple et prometteuse - 20minutes.fr
Genetically modified monkeys created with cut-and-paste DNA | Science | theguardian.com
Une colle ultra robuste qui répare les tissus humains à une vitesse vertigineuse va révolutionner la chirurgie | Daily Geek Show
Physicists Claim First Observation of a Quantum Cheshire Cat - Slashdot
Why we think there’s a Multiverse, not just our Universe — Starts With A Bang! — Medium
The Experiment That Forever Changed How We Think About Reality - Wired Science
MIT Develops Inexpensive Transparent Display Using Nanoparticles - Slashdot
http://www.nature.com/news/stephen-hawking-there-are-no-black-holes-1.14583
A New Thermodynamics Theory of the Origin of Life | Simons Foundation
Watching electrons move within an atom | Ars Technica
Actualité > La téléportation quantique... de l'énergie
Poppy Project
The new bot on the block - O'Reilly Radar
Des scientifiques ont mis au point un muscle artificiel 1000 fois plus puissant que celui d’un humain | Daily Geek Show
Mars Rover Opportunity Finds Life-Friendly Niche : Discovery News
La Nasa veut fabriquer de l'eau et de l'oxygène sur d'autres planètes - Le Nouvel Observateur
Social
How I Lost My $50,000 Twitter Username — Medium
How Vladimir Putin came to power (full documentary) Russia - YouTube
Nos anc\EAtres utilisaient d\E9j\E0 le feu il y a 300.000 ans
The History Of The Decline And Fall Of The Roman Empire by Edward Gibbon - Free Ebook
Al Qaeda Now Controls More Territory In The Arab World Than Ever Before
Underground
Google va laisser de parfaits inconnus vous contacter sur Gmail: voici comment désactiver la fonctionnalité | Slate.fr
Creepy Facial-Recognition App Perfect for Stalkers – Tom's Guide
NSA able to target offline computers using radio-waves for surveillance, cyber-attacks — RT USA
Anonymous peer to peer download inside browsers and distributed database inside browsers, Torrent like but untrackable
Ce que Google sait de vous... et ce qu'il veut apprendre en plus | ICI.Radio-Canada.ca
Scientists detect “spoiled onions” trying to sabotage Tor privacy network | Ars Technica
nsa-observer
Aucun commentaire:
Enregistrer un commentaire