Pages

lundi 6 mai 2013

ZeBookmark avril 2013



Computer


Secure Coding Guidelines for the Java Programming Language, Version 4.0
Secretbook : une app Chrome qui inscrit des messages codés dans les images Facebook
5 Myths of Password Security | Stormpath
Download Windows 8.1 (Codename Blue) Build 9369 x64 Torrent | 1337x.org
ircd-hybrid 8.0.5 - Denial of Service
Windows Light HTTPD 0.1 - Buffer Overflow
D-Link DNS-323 - Multiple Vulnerabilities
sudo v1.8.0-1.8.3p1 (sudo_debug) - Root Exploit + glibc FORTIFY_SOURCE Bypass
phpMyAdmin Authenticated Remote Code Execution via preg_replace()
Wordpress W3 Total Cache PHP Code Execution
phpMyAdmin Authenticated Remote Code Execution via preg_replace()
sudo v1.8.0-1.8.3p1 (sudo_debug) - Root Exploit + glibc FORTIFY_SOURCE Bypass
Crimeware - Présentation de PONY Botnet 1.9 | UnderNews
Linux/Cdorked.A - A new Apache backdoor is being used in the wild to serve Blackhole
Virus Bulletin : Independent Malware Advice
FinFisher : Un spyware qui imite Firefox pour passer inaperçu | UnderNews
: qnx iso

Computer {Wireless Hacking} - YouTube
How To Crack Wpa2 With Backtrack 5 r3 - YouTube
Botnet - Le panel de commande Cythosia victime d'une faille XSS | UnderNews
NVIDIA Unix GPU Driver CVE-2013-0131 Local Privilege Escalation Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-0789 Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0800 Out of Bounds Denial of Service Vulnerability
Mozilla Firefox and Seamonkey CVE-2013-0792 Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey/Thunderbird CVE-2013-0793 Cross Site Scripting Vulnerability
Samba CIFS Attributes CVE-2013-0454 Remote Security Bypass Vulnerability
Apache CXF CVE-2012-5633 Security Bypass Vulnerability
Apache CXF SOAP Action Spoofing Security Bypass Vulnerability
Adobe Flash Player and AIR CVE-2013-1379 Memory Corruption Vulnerability
Adobe Flash Player and AIR CVE-2013-1380 Memory Corruption Vulnerability
Adobe Flash Player and AIR CVE-2013-1378 Memory Corruption Vulnerability
Linux Kernel CVE-2012-6538 Local Information Disclosure Vulnerability
phpMyAdmin 'tbl_gis_visualization.php' Multiple Cross Site Scripting Vulnerabilities
Linux Kernel KVM CVE-2013-1796 Buffer Overflow Vulnerability
Linux Kernel KVM 'MSR_KVM_SYSTEM_TIME' Use After Free Memory Corruption Vulnerability
ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
Apache Subversion 'mod_dav_svn/lock.c' Remote Denial of Service Vulnerability
Linux Kernel Multiple Local Security Bypass Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0772 Out-of-Bounds Read Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0784 Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0795 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0791 Out of Bounds Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-0796 Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-0788 Memory Corruption Vulnerability
Linux Kernel CVE-2013-0313 NULL Pointer Dereference Denial of Service Vulnerability
Linux Kernel CVE-2012-6547 Local Information Disclosure Vulnerability
Linux Kernel CVE-2012-6546 Multiple Local Information Disclosure Vulnerabilities
Linux Kernel CVE-2012-6542 Local Information Disclosure Vulnerability
Linux Kernel CVE-2012-6537 Multiple Local Information Disclosure Vulnerabilities
Apache 'mod_proxy' Remote Denial Of Service Vulnerability
Mozilla Firefox/SeaMonkey CVE-2013-0794 Information Disclosure Vulnerability
Oracle Java SE CVE-2013-2420 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-1537 Remote Code Execution Vulnerability
avast! Mobile Security for Android CVE-2013-0122 Local Denial of Service Vulnerability
Oracle MySQL Server CVE-2013-0371 Remote Security Vulnerability
Oracle Java SE CVE-2013-1558 Remote Java Runtime Environment Vulnerability
Oracle MySQL CVE-2013-1526 Remote MySQL Server Vulnerability
Oracle MySQL Server CVE-2013-1544 Remote Security Vulnerability
Oracle MySQL CVE-2013-1552 Remote MySQL Server Vulnerability
Oracle MySQL CVE-2013-2375 Remote MySQL Server Vulnerability
Oracle MySQL CVE-2013-1531 Remote MySQL Server Vulnerability
Oracle Java SE CVE-2013-2415 Remote Java Runtime Environment Vulnerability
phpMyAdmin 3.5.8 and 4.0.0-RC2 - Multiple Vulnerabilities
GNU glibc 'getaddrinfo()' Stack Buffer Overflow Vulnerability
Joomla! <= 3.0.3 (remember.php) - PHP Object Injection Vulnerability
Linux Kernel CVE-2013-3233 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3076 Multiple Local Information Disclosure Vulnerabilities
Linux Kernel ext4 Local Denial of Service Vulnerability
phpMyAdmin CVE-2013-3238 Multiple Arbitrary PHP Code Execution Vulnerabilities
Linux Kernel CVE-2013-1827 Multiple NULL Pointer Dereference Local Denial of Service Vulnerability
Linux Kernel CVE-2013-1767 Local Privilege Escalation Vulnerability
Google Chrome CVE-2013-0926 Unspecified Security Vulnerability
Linux Kernel 'SCM_CREDENTIALS' Local Security Bypass Vulnerability
phpMyAdmin 'filename_template' Remote Code Execution Vulnerability
SecurityFocus
SecurityFocus
SecurityFocus
Oracle Java SE CVE-2012-3213 Remote Code Execution Vulnerability
Oracle Java SE CVE-2012-3342 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2012-1541 Remote Java Runtime Environment Vulnerability
Linux Kernel CVE-2013-3232 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3228 Local Information Disclosure Vulnerability
Computer {VOIP Hacking} - YouTube
Computer Hacking Basics - YouTube
7 ways hackers setup a router in computer hacking - YouTube
How to change your MAC ADDRESS - YouTube
What to know as a Beginner before Hacking Computers - YouTube
CyberGuerrilla soApboX » #ro0ted Hack Windows 8 Using Metasploit Tutorial
CyberGuerrilla soApboX » #ro0ted Find online windows machines using metasploit Tutorial – This week we will teach you how to use Metasploit like a pro!
CyberGuerrilla soApboX » #ro0ted Metasploit an IP Address for Dumbies – Tutorial
Wark, A Hacker Manifesto
http://www.android-mt.com/
Rename filenames to lowercase - Installation of Ubuntu
15 interesting and extremely helpful #Linux CLI tricks | 57un
https://code.google.com/p/google-glass-kernel-source/
Security In A Box | Tools and tactics for your digital security
Using Nessus to Discover Malware and Botnet Hosts | Tenable Network Security
Audit the security of your Unix/Linux systems using lynis | Unixmen
BitTorrent’s Secure Dropbox Alternative Goes Public | TorrentFreak
YouTweak Fixes All Kinds of YouTube Annoyances
Penetrate : Comment craquer un réseau WiFi depuis un smartphone Android
SeCurité infos et web | Scoop.it
http://www.linformaticien.com/actualites/id/28753/confessions-hacker-ma-premiere-fois-sur-internet.aspx
installing eggdrop tutorial


Economy


Explorer les projets | La Ruche
Seven steps to make better decisions - The Globe and Mail
Receive SMS Online for FREE and with NO Registration
Ressources Entreprises | Accueil
http://seekingalpha.com/article/1312531-zynga-continues-to-rachet-down-its-reliance-on-facebook?source=kizur
Cisco Bolsters Enterprise Cloud Portfolio With SolveDirect's Acquisition - Seeking Alpha
New Opportunity For Solar Bears - Seeking Alpha
Auto Makers Scheduled To Report March Sales Results On April 2 - Seeking Alpha
5 Tech Names With Recent Rises In Short Interest - Seeking Alpha
Why Zynga Is Still Not A Buy - Seeking Alpha
BlackBerry's Gross Margins And Z10 Shipments Support Bullish Case - Seeking Alpha
BlackBerry: 'Holy Smokes, They Did It' - Seeking Alpha
Even At A Low Payout Ratio, Wells Fargo Has An Amazing Dividend Yield - Seeking Alpha
Elpida Acquisition Will Be Accretive To Micron - Seeking Alpha
Intel Will Hit A Share Price Of $36 By 2016 - Seeking Alpha
BlackBerry - Is The End Near? - Seeking Alpha
Date Intel, Marry Apple, Kill Blackberry - Seeking Alpha
Nokia's India Strategy Paying Off Perfectly - Seeking Alpha
Why Ford Shares Should Be Sold Now And Bought Back At $11 - Seeking Alpha
FINVIZ.com - Stock Screener
Earnings.com: Event Calendar - Highlights
The value of social sentiment - The Tell - MarketWatch
Reuters Next — Lasers, microwave deployed in high-speed trading arms race
Evaluating The Quality Of Earnings - Seeking Alpha
Bitcoin Hits $100 - Business Insider
This is Where the World’s Richest People Hide Their Money - The Daily Beast
Bitcoin Market Not A Bubble And Still Highly Undervalued - Seeking Alpha
10 Things You Don't Know About Bitcoin But Should - Seeking Alpha
Yes, people are hoarding bitcoins – Quartz
More On Bitcoin - Seeking Alpha
YouTube
Economic growth | The Economist
Bitcoin Forum - The Unofficial Bitcoin Forum - Index
In Canada, a Government-Backed Electronic Currency - Slashdot
22 Facts That Prove That The Bottom 90 Percent Of America Is Systematically Getting Poorer - BlackListedNews.com
U.S. Mint Sales of Gold Coins Jump to Highest in Three Years - Bloomberg
Daily chart: Money can buy happiness | The Economist
Understanding The Painfully Slow Jobs Recovery - Seeking Alpha
Let's Cut Through the Bitcoin Hype: A Hacker-Entrepreneur's Take | Wired Opinion | Wired.com
Top 10 Ways to Save Money on Tech


Entertainement


http://www.geekbecois.com/jeux-video-mes-jeux-iosandroid-du-moment-avril-2013/?utm_campaign=WPtwitter&utm_medium=twitter&utm_source=twitter
Here's What It Takes to be a Real Life Iron Man
Tiny Toon: IBM Makes a Movie Out of Atoms | TIME.com
STAR WARS ASCIIMATION - Main Page
The Wall Street Journal - Breaking News, Business, Financial and Economic News, World News & Video - Wall Street Journal - Wsj.com
Business & Financial News, Breaking US & International News | Reuters.com
Latest news, sport and comment from the Guardian | The Guardian
Team-by-team strength of schedule for 2013 - NFL.com
Packers.com | Green Bay Packers QB Aaron Rodgers: By The Numbers (Infographic)
http://i.huffpost.com/gen/1113442/original.jpg


Hardware


Actualit\E9 > Une microbatterie ultrapuissante et rechargeable en une seconde
The World's First Entirely 3D Printed Gun
http://lifehacker.com/build-your-own-hidden-lair-with-this-secret-bookshelf-489898695
Meet Drone Shield, an ambitious idea for a $70 drone detection system | Ars Technica
China emerging as new force in drone warfare
Tiny Device Will Detect Domestic Drones - US News and World Report
The Secret and Experimental Military Aircraft of the Past and Present - Tested
New Israeli Anti-Tank Missile - YouTube
Watch This Navy Robot Make a Top-Gun Move | Danger Room | Wired.com
Mantis - Two Tonne Turbo Diesel Hexapod Walking Machine - YouTube
IBM researchers model human blood system to build solar power prototype


Howto TOW


Mathematicians Predict the Future With Data From the Past | Wired Enterprise | Wired.com
http://labs.alienvault.com/labs/


Misc


Daily chart: Born on the fourth of June* | The Economist


Science


http://www.radio-canada.ca/nouvelles/science/2013/04/18/002-galaxies-pouponnieres-alma.shtml
La Terre a ses propres extraterrestres capables de survivre au vide de l’espace | Daily Geek Show
Radioactive Microbes Nuke Tumor Cells | Wired Science | Wired.com
The Most Bizarre, Surprising, and Disgusting Animal Superpowers | Wired Science | Wired.com
The Most Bizarre, Surprising, and Disgusting Animal Superpowers | Wired Science | Wired.com
3-D Printed Ear Made From Calf Cells and Nanoparticles 'Hears' Radio Frequencies | Wired Design | Wired.com
Un virus mutant créé en Chine inquiète les scientifiques - Le Nouvel Observateur
NASA : 1 an d'orbite terrestre en vidéo
BBC News - Earth's core far hotter than thought
Report: Energy Remains As “Dirty” As Ever Despite Rise Of Renewable Energy | Singularity Hub
http://bluemoon.ucsd.edu/co2_400/mlo_one_month.png
http://www.gizmodo.fr/2013/04/27/futur-eclairez-vous-avec-des-plantes.html
What If The Sun Disappeared? - YouTube
2013/04/11 > BE Royaume-Uni 120 > Avancées mathématiques dans le domaine de la téléportation
Higgs Data Could Spell Trouble For Leading Big Bang Theory - Slashdot
Tech Breakthrough: Will Open Air Plasma Pave the Way for Practical Fusion Energy? - BlackListedNews.com
Physicist Proposes New Way To Think About Intelligence - Slashdot
'Time Crystals' Could Upend Physicists' Theory of Time | Wired Science | Wired.com
Computer Code Discovered In Superstring Equations - YouTube
The Coolest and Most Terrifying Biomimetic Robots | Wired Science | Wired.com
NASA : 100 millions de dollars pour capturer un astéroïde
The Many Mysterious Forms of Water on Mars | Wired Science | Wired.com
How Far is it to Mars?
Super-Earth search: Newfound 'water worlds' could be just right for life - Cosmic Log
3 new planets could host life - CNN.com
Your Odds of Becoming an Astronaut Are Going Up | Wired Science | Wired.com
La NASA envoie trois smartphones sous Android dans l'espace !!! Projet PhoneSat
Un ouragan géant capturé par la Nasa sur Saturne - francetv info
Our Solar System: Rare Species in Cosmic Zoo : Discovery News


Social


It’s not just the drought treaty. Canada is vanishing from the United Nations - The Globe and Mail
http://www.reuters.com/article/2013/04/01/centralafrican-opposition-idUSL5N0CO1O120130401
http://falkvinge.net/2013/04/28/icelandic-pirate-party-wins-enters-parliament/
Google, la startup qui voulait se faire aussi grosse qu'un Etat
BBC News - Iceland vote: Centre-right opposition wins election
The PKK's withdrawal: An historic step | The Economist
The Diplomat
http://www.reuters.com/article/2013/04/01/us-iraq-violence-akkas-idUSBRE9300IE20130401
http://www.reuters.com/article/2013/04/01/us-korea-north-park-idUSBRE93001O20130401
U.S. moves warship, sea-based radar to watch North Korea - CNN.com
Twitter / _cypherpunks_: Military spending 2012 - ...
The World's Most Powerful Mercenary Armies - BlackListedNews.com
NATO’s Worldwide Expansion in the Post-Cold World Era - BlackListedNews.com
L'arm\E9e fran\E7aise \E0 l'horizon 2020
US think tank report weighs up “grim future” of nuclear war - World Socialist Web Site
Why Beijing Could Win the Great China-America Showdown of 2030 | Danger Room | Wired.com
Anonymous • WW3 Countdown | China Moves Against The Dollar
Exposed: the US black ops/death squads continuum – systematic terrorism in all but name | Darker Net
Population Density
"Best of Chomsky" (2013) - 10 Hour Compilation - YouTube


Underground


“The True Story of the Bilderberg Group” and What They May Be Planning Now | Global Research
Empire's Double Edged Sword: Global Military + NGOs - BlackListedNews.com
Institutionalized Spying on Americans: Big Brother is No Longer a Fiction | Global Research
Europe Has Become A Totalitarian State - BlackListedNews.com
Index of /mk
Are all telephone calls recorded and accessible to the US government? | Glenn Greenwald | Comment is free | guardian.co.uk
How Facebook Exploits Your Private Information | LinkedIn
A history of Wild Rose Rebellion, 2007-2009 | libcom.org
I CREATED AIDS to DELIBERATELY DEPOPULATE HUMANITY - Dr Robert Gallo - YouTube
South Korea and United States Are Planning Cyberwar Scenarios
NSA Building Colossal New Data Center: Spying on Americans | Stink News | News that Matters
Wisconsin Man Linked To Anonymous And Arrested - Technology News - redOrbit
https://www.facebook.com/OperationColombia/posts/427988400624459
Anonymous declares war on North Korea, disables government websites - National Anonymous | Examiner.com
ARTICLES - FREEANONS SOLIDARITY NETWORK
Les Anonymous, qui sont-ils ? | UnderNews
“Building a Better Anonymous” Series: Part 5 | Cognitive Dissidents
Anonymous takes charge, the Web takes down governments - Salon.com
Andrew Tipp: Welcome to Generation Hack
Faille pour BitCoin Central | Data Security Breach
https://darkode.com/login.php?redirect=index.php&sid=36da99dbc8c2b5a3716e6dfc16c09a75
The rise of everyday hackers

Aucun commentaire:

Enregistrer un commentaire