Pages

Affichage des articles dont le libellé est Entertainement. Afficher tous les articles
Affichage des articles dont le libellé est Entertainement. Afficher tous les articles

dimanche 9 mars 2014

ZeBookmark Fevrier 2014


Art and Design


18 banques d’images gratuites, libres & sans inscription | Smop It


Computer


21 erreurs HTML et CSS à éviter |Miss SEO Girl
Against Mass Scanner / SSH Brute Forcer 0.2 ≈ Packet Storm
http://www.exploit-db.com/exploits/31435/
VLC 2.1.2 - (.asf file) Crash PoC
Android Browser and WebView addJavascriptInterface - Code Execution
PHP Webcam Video Conference - Multiple Vulnerabilities
http://www.exploit-db.com/exploits/31459/
D-Link DSL-2750B ADSL Router - CSRF Vulnerability
Wordpress Frontend Upload Plugin - Arbitrary File Upload
Windows TrackPopupMenuEx Win32k NULL Page
NetGear DGN2200 N300 Wireless Router - Multiple Vulnerabilities
http://www.exploit-db.com/exploits/31683/
Dlink DIR-615 Hardware vE4 Firmware v5.10 - CSRF Vulnerability
Wordpress BP Group Documents Plugin 1.2.1 - Multiple Vulnerabilities
Wordpress AdRotate Plugin 3.9.4 - (clicktracker.php, track param) - SQL Injection
Mini HTTPD 1.21 - Stack Buffer Overflow POST Exploit
Notepad++ CCompletion Plugin 1.19 - Stack Buffer Overflow
VLC 2.1.3 - (.avs file) Crash PoC
Why I removed my sensitive files from Google - VaGoSec
Scientists demonstrate first contagious airborne WiFi virus | ScienceBlog.com
Oracle Java SE CVE-2014-0417 Remote Security Vulnerability
Oracle Java SE CVE-2013-5888 Local Security Vulnerability
Oracle MySQL Server CVE-2014-0431 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1478 Multiple Memory Corruption Vulnerabilities
Pidgin 'asn_getUtf8()' Function Buffer Overflow Vulnerability
Pidgin 'gg_http_watch_fd()' Function Buffer Overflow Vulnerability
IBM Java CVE-2013-5457 Unspecified Arbitrary Code Execution Vulnerability
Linux Kernel KVM 'apic_get_tmcct()' Function Denial of Service Vulnerability
Adobe Flash Player CVE-2014-0497 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-0423 Remote Security Vulnerability
Oracle MySQL Server CVE-2014-0402 Remote Security Vulnerability
Linux Kernel CVE-2013-6368 Local Privilege Escalation Vulnerability
OpenStack Glance Information Disclosure Vulnerability
Microsoft Internet Explorer CVE-2014-0281 Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey CVE-2014-1483 Multiple Information Disclosure Vulnerabilities
Microsoft Internet Explorer CVE-2014-0289 Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey/Thunderbird CVE-2014-1487 Information Disclosure Vulnerability
Oracle MySQL Client 'main()' Function Buffer Overflow Vulnerability
Pidgin 'libpurple' Multiple Denial of Service Vulnerabilities
Pidgin 'sipmsg_parse_header()' Function Buffer Overflow Vulnerability
Linux Kernel CVE-2013-7263 Multiple Information Disclosure Vulnerabilities
Linux Kernel 'pn_recvmsg()' Function Local Information Disclosure Vulnerability
D-Link DAP-2253 Router Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
Mozilla Firefox/SeaMonkey/Thunderbird Use-After-Free Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1481 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1482 Remote Code Execution Vulnerability
Oracle MySQL Server CVE-2014-0386 Remote Security Vulnerability
Oracle MySQL Server CVE-2014-0401 Remote Security Vulnerability
Linux Kernel KVM 'recalculate_apic_map()' Function Denial of Service Vulnerability
Linux Kernel CVE-2013-4470 Multiple Local Memory Corruption Vulnerabilities
Microsoft .NET Framework CVE-2014-0253 Remote Denial of Service Vulnerability
Microsoft .NET Framework CVE-2014-0295 ASLR Security Bypass Vulnerability
Microsoft .NET Framework CVE-2014-0257 Remote Privilege Escalation Vulnerability
Microsoft Internet Explorer CVE-2014-0322 Use-After-Free Remote Code Execution Vulnerability
Linux Kernel 'ipc_rcu_putref()' Function Local Denial of Service Vulnerability
Oracle Java SE CVE-2013-5887 Remote Security Vulnerability
Oracle Java SE CVE-2013-5889 Remote Security Vulnerability
Microsoft Internet Explorer CVE-2014-0285 Memory Corruption Vulnerability
Linux Kernel '/fs/cifs/file.c' Local Memory Corruption Vulnerability
Alert: Android WebView addJavascriptInterface Code execution Vulnerability | trustlook news
Oracle Java SE CVE-2014-0410 Remote Security Vulnerability
New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
Background Monitoring on Non-Jailbroken iOS 7 Devices — and a Mitigation | FireEye Blog
Google Chrome CVE-2013-6643 Unspecified Security Vulnerability
Oracle Java SE CVE-2013-5896 Remote Security Vulnerability
Linux Kernel CVE-2014-2039 Local Denial of Service Vulnerability
Xen 'xc_cpupool_getinfo()' Function Use After Free Memory Corruption Vulnerability
This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate - Forbes
Ethical Hacking Tutorials, Tips and Tricks. Free Tutorials, How to's
Hackvids – a list of documentaries about hackers
Hacked X-Rays Could Slip Guns Past Airport Security | Threat Level | Wired.com
Hack.me · The house of rising sandbox
IT Security and Hacking knowledge base - SecDocs
Attention Required! | CloudFlare
Optimiser son SSD sous Linux - P3ter.fr
Firewall Builder – Une interface graphique pour configurer vos règles iptables, OpenBSD PF, ipfilter, ipfw, Cisco PIX – La vache libre
da667/unlimited · GitHub
How to access Twitter from the command line on Linux - Linux FAQ
http://contentstaging.com/wp-content/uploads/2014/02/6-shadowy-companies-edit.jpg


Economy


Outil SEO indispensable #2 : Ubersuggest pour trouver des idées de contenu - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
6 façons de renforcer son SEO sans passer par la création de contenu | Blog de Markentive, agence de référencement (SEO) à Paris
Les outils SEO gratuits pour suivre le positionnement de votre site - JDN Web & Tech


Entertainement


Neuromancer - William Gibson - Audiobook Full - YouTube
Linux eBooks Library and other useful IT eBooks (For Free) - Ubuntu/Linux News, Reviews, Tutorials, Apps


Hardware


New Polymer Could End Battery Fires, Quadruple Efficiency | Autopia | Wired.com
http://www.begeek.fr/aquacelle-pile-qui-se-recharge-en-5-minutes-avec-de-leau-119753?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Technical Machine
Will Hypersonic Capabilities Render Missile Defense Obsolete? | The Diplomat
New US Military Space Plane Aims for 2017 Liftoff | Space.com
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20140223000011&cid=1101
Naval Open Source INTelligence: Navy develops 'world's smallest guided missile'
At Last, a Google Glass for the Battlefield | Danger Room | Wired.com
Naval Open Source INTelligence: Israel successfully tests anti-missile system for commercial planes
The Aviationist » First images of the new Iraqi Mi-28 Night Hunter attack helicopters
Army's Robotic Arsenal Adds $11M Driverless Trucks: Video - Bloomberg
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Actualité > IBM réalise la première puce radio à base de graphène
Graphene Conducts Electricity Ten Times Better Than Expected - Slashdot
http://www.gizmodo.fr/2014/03/06/cent-kilos-plume-exosquelette.html


Science


Meet the Kraken: Hydrocarbon seas spotted at Titan’s north pole | Ars Technica
La plus vieille étoile connue est âgée de 13,6 milliards d'années - France Info
6-billion-year-old quasar spinning nearly as fast as physically possible | Ars Technica
Actualité Météo : Un astéroïde à la trajectoire indéterminée près de la Terre mardi - La Chaîne Météo
New Bionic Hand Gives Amputee a Grip — And a Sense of Touch - Wired Science
World's first genetically modified babies born | The Change Within
Self-Assembling Molecules Like These May Have Sparked Life on Earth - Wired Science
Gene therapy: Ingenious | The Economist
http://www.nature.com/nature/journal/v506/n7488/full/nature13013.html
GMO Human Embryos Have Already Been Created | The Alliance for Natural Health USA
Scientists revive largest virus yet from 30,000-year-old permafrost | Ars Technica
http://www.nytimes.com/2014/03/04/health/a-powerful-new-way-to-edit-dna.html?src=twr&smid=tw-nytimes&_r=0
Des scientifiques ont découvert que l’être humain pourrait vivre jusqu’à 500 ans | Daily Geek Show
Quarks Know Their Left From Their Right | Science/AAAS | News
We're One Step Closer to Nuclear Fusion Energy - Wired Science
Mysterious Quantum 'Dropletons' Form Inside Semiconductors Shot With Lasers - Wired Science
Un drone qui mange et digère l'herbe - Sciences et Avenir
NASA is now accepting applications from companies that want to mine the moon | The Verge


Social


Des empreintes d'hommes datant de plus de 800 000 ans découvertes en Angleterre
4.4 bn year old zircon reveals life on Earth appeared earlier than believed — RT News
The Human Brain Now Reacts to Emoticons Like Real Faces | Underwire | Wired.com
Five Futuristic Weapons That Could Change Warfare | StratRisks
How to Annex Another Nation's Territory - Popular Mechanics


Underground


NSA uses Google cookies to find targets for hacking, spying
Ghetto Forensics: Is Google Scanning Malware Email Attachments Between Researchers
Mapping Hacking Team’s “Untraceable” Spyware
Blackphone Designed to Make Crypto Sexy, Simple
Facebook sait tout de vous et garde en mémoire votre historique de recherche: voici comment l’effacer - sudinfo.be
Page cannot be found
New drone technology “equivalent to the capabilities of 100 Predator drones”
Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The Intercept
How a Hacker Intercepted FBI and Secret Service Calls With Google Maps
The Globe goes inside Canada’s top-secret spy agency - The Globe and Mail
Schneier on Security: COTTONMOUTH-II: NSA Exploit of the Day

mardi 4 février 2014

ZeBookmark Janvier 2014

Computer


Sélection des plugins Wordpress indispensables pour votre stratégie de contenu | Propulzr
Delivering a powershell payload in a client-side attack | enigma0x3
offensive-security/exploit-database · GitHub
Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities
http://www.exploit-db.com/exploits/31175/
Linux 3.4+ Arbitrary write with CONFIG_X86_X32
linux 3.4+ local root (CONFIG_X86_X32=y)
How To Import Nmap XML Results Into Nessus
HowToUseGeoIP - The Wireshark Wiki
Demonoid Returns, BitTorrent Tracker is Now Online | TorrentFreak
Chrome Bugs Lets Sites Listen to Your Private Conversations
http://ca.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html
New iFrame Injections Leverage PNG Image Metadata | Sucuri Blog
iwScanner - A Simple GUI Wireless Scanner for Linux
Mozilla Firefox/SeaMonkey CVE-2013-5619 Out of Bounds Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5610 Multiple Memory Corruption Vulnerabilities
OpenSSL DTLS Implementations Man in the Middle Multiple Security Bypass Vulnerabilities
OpenSSL TLS Handshake Null Pointer Dereference Denial Of Service Vulnerability
X.Org libXfont BDF Font File Handling Stack Buffer Overflow Vulnerability
Linux Kernel 'fpu-internal.h' Local Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd?utm_content=buffer4f201&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Oracle Java SE CVE-2013-5910 Remote Security Vulnerability
Oracle Java SE CVE-2014-0428 Remote Security Vulnerability
Oracle Java SE CVE-2014-0368 Remote Security Vulnerability
Oracle Java SE CVE-2014-0373 Remote Security Vulnerability
Oracle Java SE CVE-2014-0411 Remote Security Vulnerability
SecurityFocus
SecurityFocus
Oracle Java SE CVE-2014-0422 Remote Security Vulnerability
Oracle Java SE CVE-2014-0416 Remote Security Vulnerability
Oracle Java SE CVE-2014-0376 Remote Security Vulnerability
Oracle VM VirtualBox CVE-2014-0405 Local Security Vulnerability
Oracle VM VirtualBox CVE-2014-0407 Local Security Vulnerability
IBM Java CVE-2013-5458 Unspecified Arbitrary Code Execution Vulnerability
OpenStack Heat CFN Policy CVE-2013-6426 Security Bypass Vulnerability
OpenStack Heat ReST API Validation Privilage Escalation Vulnerability
OpenStack python-keystoneclient CVE-2013-2167 Security Bypass Vulnerability
Multiple OpenStack Products SSL Certificate Validation CVE-2013-2255 Security Bypass Vulnerability
Oracle Java SE CVE-2013-5805 Remote Security Vulnerability
WordPress WP Forum Server Plugin SQL Injection and Cross Site Scripting Vulnerabilities
Linux Kernel 'x25_parse_facilities()' Remote Denial of Service Vulnerability
Linux Kernel 'IFF_TX_SKB_SHARING' Local Denial of Service Vulnerability
Linux Kernel 'net/ieee802154/dgram.c' Local Information Disclosure Vulnerability
Linux Kernel 'semtimedop' OABI Wrapper Heap Buffer Overflow Vulnerability
Oracle Java SE and Java for Business CVE-2010-3548 Remote JNDI Vulnerability
Oracle Java SE CVE-2013-5778 Remote Security Vulnerability
Oracle Java SE CVE-2013-5884 Remote Security Vulnerability
NVIDIA Graphics Driver GPU Access CVE-2013-5986 Local Privilege Escalation Vulnerability
NVIDIA Graphics Driver GPU Access Local Privilege Escalation Vulnerability
Linux Kernel 'compat_sys_recvmmsg()' Function Remote Memory Corruption Vulnerability
ASTALAVISTA - Cloud-Based Security Scans
http://pwnwiki.io/#!index.md
HackerspaceWiki
Bing : l'application Android affectée d'une faille de sécurité
Collectl is a powerful tool to monitor system resources on Linux
http://www.floodgap.com/software/ttytter/
afaqurk/linux-dash · GitHub
http://www.suso.com/infosheets/shell-commands20050327.png
MacBreaker
Dites adieu aux fenêtres Pop-up grâce à Poper Blocker (google chrome only)
Raspberry Pi: Ad Blocking | CyberPunk
http://www.begeek.fr/umoove-controle-des-mouvements-par-le-visage-les-yeux-116364?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter


Economy


How startups can compete with big company perks
http://cdn.business2community.com/wp-content/uploads/2014/01/original_word-science3.png
Quelques astuces pour garder une longueur d’avance sur Google Update ! |Miss SEO Girl
Outil SEO indispensable #1 : Identifier le contenu en double sur votre site - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
Le SEO est mort ? Non, il a simplement évolué - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
8 questions à se poser pour faire progresser son entreprise
Bitcoin Stares Down Impending Apocalypse (Again) | Wired Enterprise | Wired.com
The Next Big Thing You Missed: There's a Sure-Fire Way to Control the Price of Bitcoin | Wired Business | Wired.com
Why Bitcoin Matters - Seeking Alpha
Bitcoin v Banks: 'Annoyance with system brings on virtual cash boom' - YouTube


Entertainement


7 incroyables secrets cachés sur Google accessibles à tous | Piwee


Hardware


Powering Phones, PCs Using Sugar
How I Built a Raspberry Pi Tablet | MAKE
Hypersonic arms race: China tests high-speed missile to beat U.S. defenses - Washington Times
http://www.reuters.com/article/2014/01/15/us-china-missile-idUSBREA0E0US20140115?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637
https://medium.com/war-is-boring/d89b9ce721de
I Became a Robot with Google Glass
SOL, le premier Laptop solaire réellement autonome en énergie ! - GinjFo
http://shop.geeksphone.com/en/phones/5-peak.html
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Could a Mix of Sand and Pee Be a Super-Green Replacement for Concrete? | Wired Design | Wired.com
New laser-printed material is lighter than water, as strong as steel | Ars Technica


Science


Trois nouvelles exoplan\E8tes d\E9couvertes dans la constellation du Cancer
Water Plumes Discovered on the Solar System's Largest Asteroid - Wired Science
Une étoile explose « à proximité » de la Terre › Espace › Le Journal de la Science
La m\E9t\E9o d'une naine brune cartographi\E9e pour la premi\E8re fois
First Global Map Outside the Solar System - Slashdot
Ast\E9ro\EFdes : la ceinture principale d\E9voile les secrets de sa composition
Un fossile bouscule les th\E9ories sur l'apparition des pattes des animaux terrestres
Superbugs public health | Homeland Security News Wire
Neanderthal lineages excavated from modern human genomes | UW Today
Cellules souches: Une nouvelle technique simple et prometteuse - 20minutes.fr
Genetically modified monkeys created with cut-and-paste DNA | Science | theguardian.com
Une colle ultra robuste qui répare les tissus humains à une vitesse vertigineuse va révolutionner la chirurgie | Daily Geek Show
Physicists Claim First Observation of a Quantum Cheshire Cat - Slashdot
Why we think there’s a Multiverse, not just our Universe — Starts With A Bang! — Medium
The Experiment That Forever Changed How We Think About Reality - Wired Science
MIT Develops Inexpensive Transparent Display Using Nanoparticles - Slashdot
http://www.nature.com/news/stephen-hawking-there-are-no-black-holes-1.14583
A New Thermodynamics Theory of the Origin of Life | Simons Foundation
Watching electrons move within an atom | Ars Technica
Actualité > La téléportation quantique... de l'énergie
Poppy Project
The new bot on the block - O'Reilly Radar
Des scientifiques ont mis au point un muscle artificiel 1000 fois plus puissant que celui d’un humain | Daily Geek Show
Mars Rover Opportunity Finds Life-Friendly Niche : Discovery News
La Nasa veut fabriquer de l'eau et de l'oxygène sur d'autres planètes - Le Nouvel Observateur


Social


How I Lost My $50,000 Twitter Username — Medium
How Vladimir Putin came to power (full documentary) Russia - YouTube
Nos anc\EAtres utilisaient d\E9j\E0 le feu il y a 300.000 ans
The History Of The Decline And Fall Of The Roman Empire by Edward Gibbon - Free Ebook
Al Qaeda Now Controls More Territory In The Arab World Than Ever Before


Underground


Google va laisser de parfaits inconnus vous contacter sur Gmail: voici comment désactiver la fonctionnalité | Slate.fr
Creepy Facial-Recognition App Perfect for Stalkers – Tom's Guide
NSA able to target offline computers using radio-waves for surveillance, cyber-attacks — RT USA
Anonymous peer to peer download inside browsers and distributed database inside browsers, Torrent like but untrackable
Ce que Google sait de vous... et ce qu'il veut apprendre en plus | ICI.Radio-Canada.ca
Scientists detect “spoiled onions” trying to sabotage Tor privacy network | Ars Technica
nsa-observer

samedi 28 décembre 2013

Circulaire IGA 0050 dernière semaine de Decembre 2013

   _________________   _________________    __________________
 /                  | |                 \ /           Beta 6  |
| xxxx              , |            _____/|            xxxxxxx |
;  xxx              : ;           <     |;        .   xxxxx   |
:  xxx              ; :                 |:        |   xx      |
 _ __ ___ __________|  _________________| ________|___________|
[Circulaire 0050, derniere Semaine de Decembre 2013,  netlord ]


Pour nous joindre :

#sector_X on Freenode, efnet, undernet




My Google Glass weekly fix
Google Glass Does Solar Panel Installs in the California Sun | Wired Enterprise | Wired.com
Google Glass real-time facial recognition arrives with “NameTag” - SlashGear
Google Glass Lead: How Wearing Tech on Our Bodies Actually Helps It Get Out of Our Way | Wired Opinion | Wired.com


SEO is good for SEO.. the SEO corner ;)
Les 20 critÚres de l’audit SEO


Gaming Zone
0.A.D 15 Alpha (Osiris) disponible | La vache libre



Government Lab Reveals It Has Operated Quantum Internet For Over Two Years | MIT Technology Review










-=[Theorical Vulnerability]=-
 [Firefox]
Mozilla Firefox/Thunderbird/Seamonkey CVE-2012-3993 Arbitrary Code Execution Vulnerability
Mozilla Firefox CVE-2013-5611 Security Bypass Vulnerability
Mozilla Firefox and Seamonkey CVE-2013-5614 Security Bypass Vulnerability
 [Java]
Oracle Java SE CVE-2013-5802 Remote Security Vulnerability
 [Internet explorer]
Microsoft Internet Explorer Enhanced Protected Mode CVE-2013-5045 Security Bypass Vulnerability
 [Open SSL]
OpenSSL 'ssl_get_algorithm2()' Function Remote Denial of Service Vulnerability
 [Samba]
Samba 'dcerpc_read_ncacn_packet_done()' Function Heap Buffer Overflow Vulnerability



-=[Tutorial & paper & stuff]=-
 [how to be a hacker]
 How to be a hacker | Technology | theguardian.com 
 [cracking]
Acoustic cryptanalysis
10,000 Top Passwords
 








End Ecocide in Europe | A European Citizen Initiative to give the Earth Rights









3D Printed, Solderless Circuits

Addressable RGB LED Coffee Table

DIY 3D Projector from an LCD

Flying Spaghetti Monster Display

Roboxotica (Barbot Festival in Vienna)

You Built What?!: A Tesla Coil Gun That Produces Foot-Long Sparks | Popular Science








MyCryptoChat, version 0.1 et code source en ligne - HowTommy



Announcing Ubuntu and Android dual boot developer preview | Ubuntu Developer



Advanced Youtube API


http://http.kali.org 






An MIT Project That Lets You Spy On Yourself : Planet Money : NPR

http://rutube.ru/video/8d394c602806d77a02a28f6e7e3cc76b/

Out in the Open: Ex-Google Ad Man Saves You From Ad Hell | Wired Enterprise | Wired.com

AT&T offers gigabit Internet discount in exchange for your Web history | Ars Technica

Awesome Privacy Tools in Android 4.3+ | Electronic Frontier Foundation

Bletchley's cybersecurity exhibit will not mention Edward Snowden; McAfee's sponsorship blamed - Boing Boing

Google Removes Vital Privacy Feature From Android, Claiming Its Release Was Accidental | Electronic Frontier Foundation

NSA Struggles to Make Sense of Flood of Surveillance Data - Wall Street Journal - WSJ.com








-=[Astronomy]=-
[Space, Galaxys, Planets, Quasar]
Deux étoiles découvertes aux "portes" de la Terre - L'Express

Astronomers Predict Titanic Collision: Milky Way vs. Andromeda  - NASA Science

Exoplanets' Life-Giving Potential Just Got Bigger : Discovery News

First exomoon glimpsed – 1800 light years from Earth - space - 18 December 2013 - New Scientist

How to Map a Galaxy When You’re Right in the Middle of It - Facts So Romantic - Nautilus

Hubble discovers water vapour venting from Jupiter’s moon Europa | Press Releases | ESA/Hubble

Is the Solar System Really a Vortex?

http://www.nature.com/news/mercury-shrinking-more-than-thought-1.14331

Smack! A New Crater Appears on the Moon/ Yutu Rover Update

Nearby Failed Star Binary May Hide Alien World : Discovery News

Max-Planck-Institut für Astronomie

http://www.nature.com/news/water-seems-to-flow-freely-on-mars-1.14343

Sun AIA 193 Nov-Dec - Photosynth

http://boingboing.net/2013/12/18/moon.html

The Overprotection of Mars?


-=[Biologie]=-
[Medical, Drugs, DNA, Virus, Health]
How It Works: A 3-D Printer For Liver Tissue | Popular Science

Scientists discover how immune cells die during HIV infection; identify potential drug to block AIDS

 The science of hangovers | Science | theguardian.com 

To Sleep, Perchance to Clean - News Room - University of Rochester Medical Center


-=[Computer Science]=-
[Computer Oriented Tech Developpment]
How Does WATSON Think? | World Science Festival

Robots Rule the Internet - Blog About Infographics and Data Visualization - Cool Infographics

The Future of Computer Science ← 


-=[Earth]=-
[Climate Change, Earth Views, Nature]
Solar variability has a small effect on climate change | Ars Technica

Earth from the International Space Station in 4k - YouTube

http://www.nature.com/news/earth-is-only-just-within-the-sun-s-habitable-zone-1.14353

UXBlog | IDV Solutions' User Experience: A Breathing Earth


-=[Future/Exoteric]=-
[Conspiracy, E.T., Future, What-if?]
Producing electricity on the moon at night

The VASIMR Plasma Rocket: Bridging the Gap in Space Travel | Space Industry News


-=[Physics]=-
[Atoms, Black Holes, Dark Matter]
Actualité > Trou noir (1/2) : le monde est-il un hologramme ?

Actualité > Trou noir (2/2) : le monde est-il un hologramme ?

Tara Shears - Antimatter: Why the anti-world matters - YouTube

Awkward Cosmology | World Science Festival

Pressure transforms a semiconductor into a new state of matter

http://boingboing.net/2013/12/23/supersonic-airflow-in-a-rocket.html

This Harvard Prof's Printed Batteries Could Revolutionize Our Gadgets | Wired Design | Wired.com

Thorium put to use, kills a few more versions of Supersymmetry | Ars Technica

Twisted light beats quantum light | Ars Technica

What Is The Big Rip?



-=[Psychology]=-
[Human behaviour, Social behavior]
  5 Steps to Being More Creative [INFOGRAPHIC]

Flowchart: How not to design a "woman’s" tech product | Ars Technica

  The Art of Persuasion in the Job Hunt [INFOGRAPHIC]


-=[Psycho-Historic]=-
[Non-Zero sum, Patturns, Deduction]
Skybox Imaging Captures World's First High-Resolution, HD Video of Earth from Space (1080p HD) - YouTube


-=[Robotics]=-
[Machines, Robots, AI, Drones]
Foom! Morpheus Project Lander Roars In Free Flight Test


-=[Space Exploration]=-
[Probe, Rocket, Space Science]
Apollo Image Atlas, 70mm Hasselblad Image Catalog

ESA’s Gaia Mission Launches to Map the Milky Way

In Memoriam: The Space Robots We Lost This Year - Wired Science

NASA's Plan To Deal With Pesky Moon Dust | Popular Science


-=[Misc.]=-
[Gen. Science, Tech, Devices]
Top Scientific Discoveries of 2013 - Wired Science

http://boingboing.net/2013/12/18/does-your-cat-love-you.html?utm_source=dlvr.it&utm_medium=twitter

Gaia space telescope's billion pixel camera to map Milky Way - CNN.com







-=[GLOBAL WARNING (1 to 5) : 2]=-



[Syria]
 Treath level : 2 ( = )
 Field operation
http://www.reuters.com/article/2013/12/22/us-syria-crisis-aleppo-idUSBRE9BL09Y20131222?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

Russia sends armoured trucks to Syria to transport chemical arms - The Globe and Mail

http://www.reuters.com/article/2013/12/24/us-syria-crisis-chemical-idUSBRE9BN0BL20131224?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

In message to Pope, Syrian President says he's ready for peace talks - CNN.com


[The whole Africa]
 Treath level : 1 ( = )
 Field "operation"
Libyan car bombing kills six, wounds up to 15, sources say - The Globe and Mail

http://www.reuters.com/article/2013/12/23/us-southsudan-unrest-idUSBRE9BL07320131223?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

http://www.reuters.com/article/2013/12/24/us-nigeria-violence-idUSBRE9BN07H20131224?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

Security Council OKs thousands more troops to South Sudan - CNN.com

http://www.reuters.com/article/2013/12/25/us-sudansouth-unrest-idUSBRE9BN0GR20131225?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

US sends Marines to Uganda to aid South Sudan evacuations

http://www.reuters.com/article/2013/12/26/us-centralafrican-fighting-idUSBRE9BP08O20131226?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

http://www.reuters.com/article/2013/12/26/us-southsudan-unrest-talks-idUSBRE9BP0AG20131226?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

http://www.reuters.com/article/2013/12/26/us-southsudan-unrest-idUSBRE9BP0F720131226?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

http://www.reuters.com/article/2013/12/27/us-centralafrican-fighting-idUSBRE9BP08O20131227?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

Official: 4 U.S. military personnel detained by Libya released - CNN.com

South Sudan: 'White Army' militia marches to fight

http://www.reuters.com/article/2013/12/28/us-southsudan-unrest-idUSBRE9BR04P20131228?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637


[Israel]
 treath level 1 ( =  )
 field operation
Sources: Israeli killed by sniper; girl in Gaza killed in airstrike - CNN.com

Israeli jets strike Gaza weapons facilities after rocket attacks - UPI.com


-=[Under heavy terrorisme activity]=-

[Iraq]
 threath level 1 ( = )
 Field operation
Iraqi defense minister unhurt as convoy hits roadside bomb - CNN.com

http://www.aljazeera.com/news/middleeast/2013/12/blast-hits-near-church-iraqi-capital-201312259356502237.html

18 dead in Christmas Day attacks near Iraq churches - CNN.com

http://www.reuters.com/article/2013/12/26/us-iraq-violence-usa-idUSBRE9BP0HM20131226?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637


[Afghanistan]
 threath level 1 ( = )
 Field operation
Suicide attack in Kabul kills 3 troops - CNN.com


[Pakistan]
 threath level 0 ( = )
 Field operation
http://www.reuters.com/article/2013/12/23/us-pakistan-offensive-idUSBRE9BM05720131223?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637

US drone strike kills three in northwest Pakistan - Yahoo News

[Yemen]
 threath level 0 ( = )
 Field operation
Yémen: Al Qaïda plaide l'erreur pour l'hÎpital

http://www.nytimes.com/2013/12/28/world/middleeast/artillery-shells-kill-mourners-in-southern-yemen.html?_r=1&


-=[Manif on the brinks of revolution]=-


[Egypte]
 treath level 0 ( = )
 field operation
http://www.reuters.com/article/2013/12/24/us-egypt-explosion-idUSBRE9BM0W420131224?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637


[Thailand]
 treath level 0 ( = )
 field operation
http://www.reuters.com/article/2013/12/26/us-thailand-protest-idUSBRE9BP00X20131226?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637








    "Il n"en tien qua toi pour que largent coule a flot"



[love money]
UPDATED: Iron Maiden makes millions by touring countries where their music is most pirated - Boing Boing


[Le coin du bitcoin, le bit...coin!]
http://dealbook.nytimes.com/2013/12/21/into-the-bitcoin-mines/?_r=0

Crazy currency: The more I report on Bitcoin, the weirder it gets | Ars Technica

Twitter / _cypherpunks_: ASIC Bitcoin Mining on Raspberry ...

Libertarian enclaves: Bitcoin paradise | The Economist



[Stock Market forecast]
$AMD  buy-keep
$BAC  buy-keep
$CSCO buy-keep
$CSIQ buy-keep
$FSLR buy-keep
$GTAT buy-keep
$HIMX buy-keep
$IBM  buy-keep
$MU   buy-keep
$NFLX buy-keep
$YHOO buy-keep




Pour ceux qui voudrait suivre les rendements des actions proposées
nous avons créés une game sur marketwatch. 

http://www.marketwatch.com/game/circulaireiga2/


 - password circiga

N'hésitez pas à vous crééz un accompte pour nous challenger ;)
 
 




 
- Monsanto   (terminator seed) 

- Church of Scientology 







[Are you ready for some football]

the maning show 
Peyton's Pace


2013 NFL playoff scenarios for Week 17 - NFL.com



prédiction of last week (#11 : 7/16 (43%))
prédiction total (139/224 (62.5%))


dimanche 29/12/2013 : Carolina vs Atlanta           : Carolina
                      Baltimore vs Cincinnati       : Cincinnati
                      Jacksonville vs Indianapolis  : Indianapolis
                      New York Jets vs Miami        : Miami
                      Detroit vs Minnesota          : Detroit
                      Washington vs New York Giants : New York Giants
                      Cleveland vs Pittsburg        : Pittsburg
                      Houston vs Tennesse           : Tennesse
                      San Francisco vs Arizona      : San Francisco
                      Green Bay vs Chicago          : Green Bay
                      Buffalo vs New England        : New England
                      Tampa Bay vs New Orleans      : New Orleans
                      Denver vs Oakland             : Denver
                      Kansas City vs San Diego      : San Diego
                      Saint Louis vs Seattle        : Seattle
Lundi 30/12/2013    : Philadelphia vs Dallas        : Philadelphia






Everything Wrong With ‘Die Hard’ in 7 Minutes or Less


Fukushima: Wave of Radiation Will Be Ten Times Bigger than All of the Radiation from Nuclear Tests Combined | Global Research


http://www.frogz.fr/RSLN/post/2013/12/26/David-Rothschild-predire-lavenir-avec-les-donnees-.aspx


http://www.theonion.com/articles/slowwitted-conspiracy-theorist-convinced-governmen,


mercredi 6 novembre 2013

ZeBookmark octobre 2013



Computer


Pwgen – Créez facilement vos mots de passe | La vache libre
MyWhisper.net - Text Encryption Tool
What is Hydra the Password Cracking Tool and how does it work?
bdpurcell/bully · GitHub
Good tutorial for WinDbg? - Stack Overflow
Free online WPA cracker with stats - besside-ng companion
How to Crack a Wi-Fi Password
Digital Attack Map
glibc and eglibc 2.5, 2.7, 2.13 - Buffer Overflow Vulnerability
Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit
Reverse Engineering a D-Link Backdoor - /dev/ttyS0
Messagebox Shellcode (113 bytes) - Any Windows Version
Insolite : attaquer un radar avec une injection SQL – Blogmotion
D-Link DIR-605L Captcha Handling Buffer Overflow
Apache / PHP 5.x Remote Code Execution Exploit
WordPress Think Responsive Themes Arbitrary File Upload Vulnerability
WordPress Switchblade Themes Arbitrary File Upload Vulnerability
DIY: Android Malware Analysis - Taking apart OBAD (part 1)
IT Books Free Share | Scoop.it
ExtraTorrent.cc The World's Largest BitTorrent System
50 Ways to Inject Your SQL - YouTube
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1719 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1728 Security Vulnerability
Cisco Wireless LAN Controller CVE-2013-5519 Cross Site Scripting Vulnerability
Cisco Unified Computing System CVE-2012-4103 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4111 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4102 Local Arbitrary Command Execution Vulnerability
Cisco Unified Computing System CVE-2012-4109 Local Command Injection Vulnerability
Microsoft Windows CVE-2012-1864 Local Privilege Escalation Vulnerability
Oracle Java SE CVE-2013-2449 Remote Security Vulnerability
Oracle Java SE CVE-2013-2444 Remote Security Vulnerability
PHP 'header()' HTTP Header Injection Vulnerability
Oracle Sun Products Suite CVE-2012-3128 Local SPARC T-Series Servers Vulnerability
Cisco Nexus 7000 Series Switches NX-OS CVE-2012-4090 Remote Information Disclosure Vulnerability
Xinetd CVE-2013-4342 Remote Code Execution Vulnerability
Microsoft Windows Kernel 'dxgkrnl.sys' CVE-2013-3888 Local Privilege Escalation Vulnerability
Another Day, SpiderLabs Discovers Another IE Zero-Day - SpiderLabs Anterior
Microsoft Internet Explorer CVE-2013-3872 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3873 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3874 Memory Corruption Vulnerability
Xen CVE-2013-1442 Information Disclosure Vulnerability
Cisco NX-OS CVE-2012-4121 Arbitrary File Access Vulnerability
Cisco NX-OS 'file name' Parameter Arbitrary File Write Vulnerability
Cisco Identity Services Engine CVE-2013-5524 Cross Site Scripting Vulnerability
Cisco NX-OS CVE-2012-4077 Local Arbitrary Command Execution Vulnerability
Cisco IOS CVE-2013-5499 Remote Denial of Service Vulnerability
Microsoft Internet Explorer CVE-2013-3886 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3897 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3882 Memory Corruption Vulnerability
Cisco NX-OS CVE-2012-4076 Local Arbitrary Command Execution Vulnerability
Cisco NX-OS CVE-2012-4122 Arbitrary File Creation or Overwrite Vulnerability
Cisco NX-OS CVE-2012-4075 Local Arbitrary Command Execution Vulnerability
Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
Cisco Prime Central for HCS 'Credentials' Information Disclosure Vulnerability
Cisco Unified Communications Manager CVE-2013-5528 Directory Traversal Vulnerability
Xen CVE-2013-4355 Information Disclosure Vulnerability
Xen CVE-2013-4361 Information Disclosure Vulnerability
Linux Kernel CVE-2013-4387 Memory Corruption Vulnerability
Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
Cisco Unified Computing System CVE-2012-4106 Local Privilege Escalation Vulnerability
Cisco Unified Computing System CVE-2012-4105 Local Denial of Service Vulnerability
X.Org X Server 'dixfonts.c' Use-After-Free Remote Memory Corruption Vulnerability
Oracle Sun Products Suite CVE-2013-3838 SPARC Enterprise T & M Series Servers Security Vulnerability
Mozilla Firefox Cookie Verification Denial of Service Vulnerability
Oracle Java SE CVE-2013-5772 Remote Security Vulnerability
Oracle Java SE CVE-2013-5830 Remote Security Vulnerability
Oracle Java SE CVE-2013-5803 Remote Security Vulnerability
Oracle Java SE CVE-2013-5810 Remote Security Vulnerability
Oracle Java SE CVE-2013-5842 Remote Security Vulnerability
Oracle Java SE CVE-2013-5797 Remote Security Vulnerability
Oracle Java SE CVE-2013-5800 Remote Security Vulnerability
Oracle Java SE CVE-2013-5832 Remote Security Vulnerability
Oracle Java SE CVE-2013-5848 Remote Security Vulnerability
Oracle Java SE CVE-2013-5783 Remote Security Vulnerability
Oracle Java SE CVE-2013-5789 Remote Security Vulnerability
Oracle Java SE CVE-2013-5780 Remote Security Vulnerability
Oracle Java SE CVE-2013-5844 Remote Security Vulnerability
Oracle Java SE CVE-2013-5774 Remote Security Vulnerability
Cisco Unified Computing System CVE-2012-4113 Local Arbitrary File Access Vulnerability
Oracle Java SE CVE-2013-5840 Remote Security Vulnerability
Xen CVE-2013-4371 Use After Free Remote Denial of Service Vulnerability
Oracle Java SE CVE-2013-5804 Remote Security Vulnerability
Oracle Java SE CVE-2013-5814 Remote Security Vulnerability
Cisco Secure Access Control System CVE-2013-5536 Remote Denial of Service Vulnerability
Cisco Identity Services Engine CVE-2013-5530 Remote Arbitrary Command Execution Vulnerability
WordPress Landing Pages Plugin 'post' Parameter SQL Injection Vulnerability
WordPress Portable phpMyAdmin Plugin Multiple Security Bypass Vulnerabilities
Linux Kernel CVE-2013-4299 Information Disclosure Vulnerability
Joomla! Maian15 Component 'name' Parameter Arbitrary Shell Upload Vulnerability
Cisco Catalyst 3750 Series Switches Default Credentials Security Bypass Vulnerabilities
Oracle Java SE CVE-2013-5824 Remote Security Vulnerability
Oracle Java SE CVE-2013-5819 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5599 Remote Memory Corruption Vulnerability
Mozilla Firefox CVE-2013-5592 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5596 Remote Code Execution Vulnerability
Mozilla Firefox CVE-2013-5591 Remote Memory Corruption Vulnerability
Mozilla Firefox 'PDF.js' Javascript Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5602 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5600 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5601 Remote Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1474 JavaFX Remote Security Vulnerability
Want To Hijack a Domain? Just Get a Fax Machine - Slashdot
Un expert en sécurité crée des malwares indétectables sur Mac OS X
Local Linux Enumeration & Privilege Escalation - Rebootuser
Computer Security Student Home Page|->Security Lesson, Tools, Exploits, Topics, Forensics, Clothing
Hackers Can Hijack Facebook Accounts by Exploiting Flaw in Android Apps – Video
Network Investigator: Network Protocols
ROM Installer - Android Apps on Google Play
CyanogenMod | Android Community Rom based on Jelly Bean
How to install/remove different Desktop/Window Manager in Kali Linux 1.x
Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone - Forbes
SIGOPSCreate Your Own Operating System Adventure
Gimp – Installer et utiliser les plugins Ofnuts | La vache libre
http://www.macg.co/news/voir/261401/un-script-pour-faciliter-la-creation-de-cartes-sd-pour-raspberry-pi
Skype Call Recorder – Un utilitaire simple et efficace pour enregistrer vos conversations Skype | La vache libre
WhiteHat Aviator - The most secure browser online
The Gimp – Installer les plugins Akkana | La vache libre
QuickTweet: pour basculer entre les comptes Twitter sur google chrome
Security and So Many Things
BinaryTides - Linux how to guides, php web development, mysql, python, network security, socket programming and more
Halloween theme, midi files and binary file editing - YouTube


Economy


Recherche et analyse de mots clés... Like a boss ! | Htitipi
PageRank et corpus sémantiques
Les principaux critères de référencement de Google !
How to get your first 10 customers « Dan Shipper – Distilled Thinking
http://niviti.com/espace/
The seven skills you need to land your dream job - The Globe and Mail
https://yeswehack.com/
investmentwatchblog.com | 522: Connection timed out


Entertainement


Floppy Music by Minihui - Super Mario Bros - YouTube
40 Creative Food Hacks That Will Change The Way You Cook


Hardware


La super-batterie au graphène, chargée en un éclair, autonome pendant des semaines
More Drive Bays, Cooling, and Power for a DIY Raid Box
Hack a Day — Fresh hacks every day
Make Your Own Cell Phone Jammer - wikiHow
The Navy’s newest warship is powered by Linux | Ars Technica
Killer Robots With Automatic Rifles Could Be on the Battlefield in 5 Years | Danger Room | Wired.com
20-ton attack drone under development in Russia - NBC News.com
Taiwanese soldiers wearing ballistic masks look like ‘the cavalry from hell’ | StratRisks
U.S. to deploy ‘stealth destroyers’ in the Pacific next year | StratRisks
Bigger, Lighter, Deadlier! Navy launches new stealth destroyer – CNN Security Clearance - CNN.com Blogs
Technical Machine
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Vous pouvez maintenant utiliser du feu pour recharger votre smartphone | Daily Geek Show
Aluminum Foil Does Not Stop RFID
An Emergency Shelter That's Open Source and Locks Together Like Legos | Wired Design | Wired.com


Howto TOW


21 Times "The Simpsons" Bizarrely Predicted The Future
The end of the New World Order | Seumas Milne | Comment is free | The Guardian
La Terre en 2100: invivable? | Sciences et santé - lesoir.be
NSA Codewords | cypherpunks
Open Exoplanet Catalogue


Misc


NSA Haiku Generator


Science


La première carte de la couverture nuageuse d’une planète géante au-delà de notre système solaire | GuruMeditationGuruMeditation
Découverte d’une étrange planète flottant seule dans l’espace | Sciences et santé - lesoir.be
26 % d'eau dans les vestiges d'un astéroïde - Sciences et Avenir
Un astéroïde géant va-t-il anéantir la Terre le 16 mars 2880? - RTL info
http://www.begeek.fr/lasteroide-2013tv135-frole-terre-reviendra-en-2032-107771?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Les techniques envisagées pour détruire les astéroïdes qui nous menacent | Atlantico
http://www.begeek.fr/galaxie-z8-gnd-5296-hubble-fait-decouverte-majeure-108500?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
20 minutes - L exoplan\E8te Kepler-78b, une Terre d enfer - Science
Cyborg Cockroach Sparks Ethics Debate | Science/AAAS | News
Les bact\E9ries r\E9sistent aux antibiotiques en communiquant entre elles
Skull sparks human evolution controversy - CNN.com
Chemists find biological complexes that beat chance | Ars Technica
The Human Brain Project - Human Brain Project
Predicting Protests and Cyber Attacks With Web Intelligence
BBC News - Nuclear fusion milestone passed at US lab
Two-laser boron fusion lights the way to radiation-free energy : Nature News & Comment
A grand unified theory of exotic superconductivity?
Albert Einstein's Theory of Relativity - YouTube
Quantum Mechanics: Animation explaining quantum physics. - YouTube
The Moon And NASA Now Communicate Via Lasers | Popular Science
New Technology For Converting a Metal To a Semiconductor With a Laser - Slashdot
MIT Researchers Unveil Self-Assembling Robot Swarm - Slashdot
Introducing WildCat - YouTube
Insect-Inspired Flying Robot Handles Collisions And Keeps Going - Slashdot
Astéroïdes : la NASA s'intéresse aux mini lunes
Watch: SpaceX Grasshopper Rocket Launch Reaches Record Height | Autopia | Wired.com
Actualité > Mission habitée vers Mars : la Russie affiche ses ambitions
Les méduses nées dans l’espace ne supportent pas la gravité terrestre et il en sera de même pour l’homme | GuruMeditationGuruMeditation
http://www.francetvinfo.fr/entre-l-inde-et-la-planete-mars-le-systeme-d_450186.html


Social


http://www.gutenberg.org/files/25717/25717-h/25717-h.htm
Elites’ strange plot to take over the world - Salon.com
France Prepares for War in the Central African Republic — Phantom Report
AFRICOM builds up military bases in Italy for small-scale “secret wars” in Africa — Phantom Report
L'OTAN lance un centre de réaction contre les cyberattaques


Underground


Se protéger sur les réseaux sociaux : Le grand guide Bitdefender | UnderNews
It was DPR, in the Tor HS, with the BTC - Hacker OPSEC
chycho: How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations
La commissaire à la vie privée enquêtera sur la nouvelle politique de Bell | Radio-Canada.ca
Ubuntu's Mark Shuttleworth wins Austria's Big Brother Award | Muktware
Facebook peut deviner avec qui vous partagez votre vie
Odin - Secure Networking
Radiation experts confirm polonium on Arafat clothing - FRANCE 24
The Capitalist Conspiracy (1969) by G. Edward Griffin - Full Official Movie - Great Quality Film :) - YouTube
Lockheed Martin Surveillance Project Informational CD DVD | eBay
milo2012/osintstalker · GitHub
The Daily Dot - Pro-Palestinian hackers attack 2 security corporations with a fax machine
Syrian Electronic Army Confirms they took over Barack Obama's Campaign Website, email, twitter and Facebook Account ~ Techworm