Pages

Affichage des articles dont le libellé est Howto Tow. Afficher tous les articles
Affichage des articles dont le libellé est Howto Tow. Afficher tous les articles

mercredi 2 avril 2014

ZeBookmark Mars 2014



Computer


Wi-Fi Password Dump v2.0 | SecTechno
Google DDoS « Korben
QNX 6.4.x/6.5.x pppoectl - Information Disclosure
QNX 6.5.0 x86 phfont - Local root Exploit
QNX 6.5.0 x86 io-graphics - Local root Exploit
Buffer Overflow - Definition, detection and remediation
Steal WhatsApp database (PoC) | Bas Bosschert
http://www.exploit-db.com/exploits/32385/
http://www.exploit-db.com/exploits/32438/
http://www.exploit-db.com/exploits/32477/
http://ipinfo.io/
demonoid.ph
WPA2 wireless security cracked « Science Spot
[Phoronix] Replicant Developers Find Backdoor In Android Samsung Galaxy Devices
Piratage à distance possible des routeurs Cisco Small Business | Data Security Breach
An7i Security
Error
How I got root with Sudo | Securus Global Blog
Vie privée et compteurs intelligents: dangers niés par Hydro | Anarcat. Blog.
Security Onion
How to watch live streaming video from the command line on Linux - Linux FAQ
Lakka : Une distribution linux pour fabriquer sa console de retro-gaming | Semageek
Linux Journal | The Original Magazine of the Linux Community
Unix Toolbox
http://www.nixtutor.com/linux/finding-files-in-linux/
OhHeyItsLou Tutorials: How to Optimize SSD Drives in Linux
http://www.begeek.fr/microsoft-rend-public-code-source-premieres-versions-ms-dos-word-123872#utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Comment cacher des fichiers privés sur son téléphone Android?
Ncdu (NCurses) – Connaître rapidement le taux d’occupation de vos disques et de vos répertoires sous GNU/Linux – La vache libre
Cool, but obscure unix tools :: Software architect Kristof Kovacs
Downloads Master PDF Editor Mac OS X, Windows and Linux
Tribler/tribler · GitHub
http://dnscrypt.org/
Make your Ubuntu/Linux home file server using BitTorrent Sync with GUI [PPA] - Ubuntu/Linux News, Reviews, Tutorials, Apps


Economy


Comment faire une veille SEO de qualité? |Miss SEO Girl
All SEO Software: Search Engine Optimization Tools Compilation
50+ Google Analytics Resources - The 2014 Edition
Researchers Use Game Theory to Identify Potential Problems for Bitcoin | MIT Technology Review
http://www.wired.com/business/2014/03/charts-show-bitcoin-turning-vicious/?mbid=social_twitter
http://www.bloomberg.com/news/2014-03-28/bitcoin-2-0-shows-technology-evolving-beyond-use-as-money.html


Hardware


Fabriquer un émetteur FM pirate avec un Raspberry Pi « Korben
Ce drone Taser envoie 80 000 volts
Naval Open Source INTelligence: Excalibur Prototype Extends Reach of High-Energy Lasers
2014/02/24 > BE Slovaquie 34 > Biomimétisme : du lotus à la tenue militaire
Naval Open Source INTelligence: Advances in Electronic Warfare Fly Under the Public’s Radar
http://www.wired.com/dangerroom/2014/03/space-solar/
Pentagon Goes Hypersonic With Long-Range Rapid Attack Weapon | Fortuna's Corner
http://www.wired.com/autopia/2013/08/genshock/?mbid=social11395084
Scientists discover material that can be solar cell by day, light panel by night


Howto TOW


Une étude américaine met en garde contre la chute de l'Empire occidental - RTBF Societe
We Need Three Planets to Keep the Human Race Alive, NASA Scientist Says | Motherboard


Misc


Edward Snowden: Here's how we take back the Internet - YouTube


Science


Découverte de l’une des dix plus grosses étoiles de notre galaxie | Autour du Ciel
http://www.wired.com/wiredscience/2014/03/black-hole-snack-time/
http://www.begeek.fr/voici-grosse-etoile-jaune-jamais-decouverte-122353?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Mercure, la planète qui rétrécit | Astronomie et espace
ScienceShot: Pluto Regains Its Title as Largest Object in Its Neighborhood | Science/AAAS | News
http://www.generation-nt.com/nasa-decouverte-premiere-exoplanete-taille-similaire-terre-dans-zone-habitable-actualite-1868022.html
Small World Discovered Beyond Pluto : Discovery News
http://www.wired.com/design/2014/03/moss-solar-panels-power-pocket-radio/
Pour éviter la folie, votre cerveau se débarrasse d’une partie de votre mémoire | GuruMeditationGuruMeditation
http://www.wired.com/wiredscience/2014/03/the-moss-is-still-alive/
http://www.wired.com/wiredscience/2014/03/rootworm-resistance-bt-corn/
http://www.wired.com/wiredscience/2014/03/nanobionic-plants-photosynthesis/
RISE of the LIVING CHAIR: Boffins recruit E coli to build futuristic materials • The Register
First Human Brain-to-Brain Interface, The New MK Ultra?
http://www.begeek.fr/chercheurs-reussi-creer-chromosome-artificiel-levure-124240#utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Ancient Virus DNA Gives Stem Cells the Power to Transform
Ancient Virus DNA Discovery Could be a Breakthrough in How Diseases are Treated
Une importante réserve d'eau se cacherait au centre de la Terre
First Mathematical Model of 13th Century 'Big Bang' Cosmology - Slashdot
Actualité > Un disque de matière noire a-t-il tué les dinosaures ?
Théorie du Big Bang : des physiciens américains ont fait une découverte majeure | Atlantico
http://www.wired.com/wiredscience/2014/03/bicep-physics-shakeup/
Could Earth's infrared emissions be a new renewable energy source?
Big Bang Discovery Opens Doors to the "Multiverse"
Going deep underground in Canada in search of dark matter - The Globe and Mail
Le 1er milliardième de seconde de la création de notre Univers !
Le robot lunaire chinois observé par la Nasa
http://www.wired.com/wiredscience/2014/03/paper-microscope/


Social


Overcoming the Shock Doctrine | Guerrilla Translation!
Rule from the Shadows – The Psychology of Power – Part 1 « Underground Documentaries


Underground


http://www.wired.com/threatlevel/2014/03/webcams-mics/
Sécuriser ses correspondances : mails qui s’autodétruisent, chiffrés … | Data Security Breach
Comment créer son propre site sur le deep web… mais pourquoi ? | Atlantico
Facebook's working on facial verification that's 'nearing human-level performance' | The Verge
IBM Develops Algorithm to Predict Where You Live Based on Your Last 200 Tweets | Bytegeist
Are You Ready for Life Under Total Surveillance?
Surprise, surprise: my online metadata actually reveals where I’ve been | Ars Technica
NSA’s automated hacking engine offers hands-free pwning of the world | Ars Technica

mardi 10 décembre 2013

ZeBookmark novembre 2013

Computer


Embedded Programming on the Mac
announce - [openwall-announce] php_mt_seed went beyond PoC
[PHP] Twitter Brute Force - Pastebin.com
Mathy Vanhoef: Unmasking a Spoofed MAC Address (CVE-2013-4579)
MySQL 5.0.x IF Query Handling Remote Denial Of Service Vulnerability
PHP-Nuke 8.2.4 - Multiple Vulnerabilities
MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
PS4 Jailbreaking (with OrbisOS 0day) - Pastebin.com
Notepad++ Plugin Notepad# 1.5 - Local Exploit
D-Link DSR Router Series - Remote Root Shell Exploit
Wordpress page-flip-image-gallery plugins Remote File Upload
RaiderSec: Mapping Tor Relays and Exit Nodes
AnonGhost Shell Priv8 - Pastebin.com
Botnets of the Web – How to Hijack One
New Linux worm targets routers, cameras, “Internet of things” devices | Ars Technica
Analyzing Malicious PDFs - InfoSec Institute
http://ht.ly/rtpXi
np1/pms · GitHub
Free music download | Listen to music online on the best mp3 player
Google Bots Doing SQL Injection Attacks | Sucuri Blog
https://code.google.com/p/aidsql/
aidSQL SQL Injection penetration testing tool - YouTube
Bypassing Internet Explorer’s Anti-Cross Site Scripting Filter | WhiteHat Security Blog
Lamp Security 5 : Solution et explications | IT-Connect
xtr4nge/FruityWifi · GitHub
Wireless Attacks with Python: Part One - The "Dnspwn Attack" - jordan-wright
Mozilla Firefox/Thunderbird/SeaMonkey JavaScript Engine Multiple Buffer Overflow Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5597 Use After Free Memory Corruption Vulnerability
Oracle MySQL Server CVE-2013-3839 Remote Security Vulnerability
Oracle MySQL Server CVE-2013-5807 Remote Security Vulnerability
Apache Struts Multiple Cross Site Scripting Vulnerabilities
Linux Kernel AACRAID Driver Local Security Bypass Vulnerability
Libxml2 Entities Expansion CVE-2013-0338 Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey XSLT Processing Denial of Service Vulnerability
Mozilla Firefox CVE-2013-5590 Remote Memory Corruption Vulnerability
Cisco Prime Central for Hosted Collaboration Solution CVE-2013-5564 Denial of Service Vulnerability
Cisco ASA CX Remote Safe Search Policy Security Bypass Vulnerability
Microsoft Outlook 'S/MIME EmailAddress' Attribute Mismatch Security Weakness
Multiple Microsoft Products CVE-2013-3906 Remote Code Execution Vulnerability
Linux Kernel CVE-2013-2895 NULL Pointer Dereference Denial of Service Vulnerability
Possible remote code execution in OpenSSH vuln: AES-GCM : netsec
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method | FireEye Blog
OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
Xen CVE-2013-4494 Denial of Service Vulnerability
Oracle Java SE CVE-2013-5849 Remote Security Vulnerability
Oracle Java SE CVE-2013-5843 Remote Security Vulnerability
Oracle Java SE CVE-2013-5823 Remote Security Vulnerability
Google Chrome CVE-2013-6632 Multiple Unspecified Memory Corruption Vulnerabilities
Oracle Java SE CVE-2013-3829 Remote Security Vulnerability
Oracle Java SE CVE-2013-5790 Remote Security Vulnerability
Wordpress Highlight Premium Theme - CSRF File Upload Vulnerability
WordPress Tweet Blender Plugin 'tb_tab_index' Parameter Cross Site Scripting Vulnerability
Wordpress Make A Statement (MaS) Theme - CSRF Vulnerability
Wordpress Amplus Theme - CSRF Vulnerability
Wordpress Euclid Theme - CSRF Vulnerability
Wordpress Dimension Theme - CSRF Vulnerability
Oracle Java SE CVE-2013-5788 Remote Security Vulnerability
Oracle Java SE CVE-2013-5787 Remote Security Vulnerability
Google Chrome CVE-2013-2926 Use After Free Remote Code Execution Vulnerability
Linux Kernel IP Virtual Server Multiple Stack Buffer Overflow Vulnerabilities
Oracle Java SE CVE-2013-5817 Remote Security Vulnerability
Oracle Java SE CVE-2013-5851 Remote Security Vulnerability
Oracle Java SE CVE-2013-5782 Remote Security Vulnerability
Google Chrome CVE-2013-6632 Multiple Unspecified Memory Corruption Vulnerabilities
Oracle Java SE CVE-2013-5812 Remote Security Vulnerability
Oracle Java SE CVE-2013-5818 Remote Security Vulnerability
Oracle Java SE CVE-2013-5801 Remote Security Vulnerability
Oren Hafif: Google Account Recovery Vulnerability
Oracle Java SE CVE-2013-5829 Remote Security Vulnerability
Wireshark CVE-2013-4933 Denial of Service Vulnerability
Google Chrome CVE-2013-6627 Out of Bounds Memory Corruption Vulnerability
Google Chrome CVE-2013-2931 Multiple Unspecified Security Vulnerabilities
Linux Kernel 'madvise_remove()' Function Local Denial of Service Vulnerability
Linux Kernel 'kvm_main.c' Local Denial of Service Vulnerability
Linux Kernel 'qeth_core_main.c' File Local Buffer Overflow Vulnerability
UnrealIRCd Unspecified Multiple Denial of Service Vulnerabilities
AMD 16h Model Processor CVE-2013-6885 Local Denial of Service Vulnerability
Linux Kernel 'xfs_attrlist_by_handle()' Function Local Buffer Overflow Vulnerability
Linux Kernel CVE-2013-4511 Multiple Integer Overflow Vulnerabilities
https://code.google.com/p/autosploit/
Injecting Logon Credentials With PowerShell | clymb3r
Watch "Demo of Google account password recovery hack" Video at SCMagazine
SkyJack : Un drone capable de hacker et prendre le contrôle d'autres drones
SkyJack - autonomous drone hacking
CyanogenMod Installer Guides You Through Installing CM on Your Phone
Not Found
http://susestudio.com/home
How to Setup Reverse SSH Tunnel on Linux
explainshell.com - match command-line arguments to their help text
Operating Systems and System Programming - Academic Earth
The second operating system hiding in every mobile phone
Hide PHP and Apache web server versions from response header | GeekW3
Secure your Apache server from DDoS, Slowloris, and DNS Injection attacks - TechRepublic
TeeJee Tech: TimeShift
turses 0.2.20 : Python Package Index
PDF Mod – Un outil d’édition sympa pour vos fichiers PDF | La vache libre
5 conseils pour surveiller son e-réputation et faire sa veille grâce à Hootsuite | Webmarketing & co'm
F*EX – Freecode
http://geekpauvre.com/20-codes-utiles-pour-customiser-wordpress/
Chrome Web Store - OneClick Cleaner for Chrome
Gate One ✈ Web Terminal Emulator and SSH Client | Liftoff Software
https://code.google.com/p/hash-identifier/
AppSecUSA 2013 - YouTube


Economy


Avez-vous une cellule de réussite dans votre PME? | Succès 100 limites
Quelques erreurs essentielles dans la rédaction web |Miss SEO Girl
6 Common SEO Mistakes to Avoid - Jeffbullas's Blog
SEOmoz is now Moz. Software and Community for Better Marketing. - Moz
Quick Sprout — I'm Kind of a Big Deal
Screaming Frog SEO – Une application pour tout savoir sur vos sites Web | La vache libre
10 astuces SEO à garder en tête lors de la création d'un site
Le guide de l’évaluateur SEO de Google, version 2013 - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
Les conseils SEO du responsable de Google Webmaster Tools - #Arobasenet
SEO Changed Forever In 2013. How To Adjust And Thrive In 2014
How Your Twitter Profile Picture Influences Your Follower Count | Geeks are Sexy Technology News
The best, and cheapest, online brokers in Canada - The Globe and Mail
Ultimate n00b guide to Bitcoin client installation and security/cold storage! | The Blog Pirate
Bitcoin Survival Guide: Everything You Need to Know About the Future of Money | Wired Enterprise | Wired.com
Bitcoin Is Flawed, But It Will Still Take Over the World | Wired Enterprise | Wired.com
http://bitcoinity.org/markets
Bitcoin: Bitcoin under pressure | The Economist


Hardware


Better batteries through biology? - MIT News Office
Raspberry Pi Radio Transmitter
Create your own Bullet time camera rig with Raspberry Pi | Muktware
North Korea developing electromagnetic pulse weapons: report
Navy christens newest, most efficient carrier – the USS Gerald Ford – CNN Security Clearance - CNN.com Blogs
U.S. successfully launches drone from submerged submarine - CNN.com
New Stealth Spy Drone Already Flying Over Area 51 | Danger Room | Wired.com
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com


Howto TOW


VEillEurs.info【ツ】 | [Livre] Sun Tzu – L’art de la guerre


Misc


Des ruches intelligentes open-source pour sauver les abeilles


Science


The moon’s face doesn’t tell its whole story - MIT News Office
Puzzled Scientists Say Strange Things Are Happening On the Sun - Slashdot
Astronomers Discover Largest Structure in the Universe — The Physics arXiv Blog — Medium
http://www.begeek.fr/mars-la-decouverte-du-passe-de-la-planete-rouge-avec-maven-110792?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Actualité > L'étrange astéroïde à six queues
http://www.gizmodo.fr/2013/11/22/bebes-galaxie-fusion.html?utm_source=twitterfeed&utm_medium=twitter
Découverte : cinq exoplanètes contiennent de l’eau dans leur atmosphère - Sciences - Actualité - LeVif.be
Massive Black Hole Duo: Possible Sighting by NASA's WISE - NASA Jet Propulsion Laboratory
http://www.begeek.fr/saturne-la-sonde-cassini-offre-une-vue-epoustouflante-de-son-hexagone-113061?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Une planète géante découverte dans l'orbite la plus lointaine jamais observée | Atlantico
Les scientifiques découvrent le jumeau de notre système solaire
Printed human organs for testing and transplantation - News | Heriot-Watt University Edinburgh
Bionic Eye Implant Will Become Available in U.S. in Coming Weeks | Singularity Hub
Video: Experimental wheat could change farming forever - The Globe and Mail
L'ADN d'un humain vieux de 400.000 ans reconstitué, un exploit génétique
Desert Farming Experiment Yields First Results | Science/AAAS | News
http://www.gizmodo.fr/2013/12/04/fukushima-gravite-terre.html
BBC - Future - Science & Environment - We must become a multi-planet species
Un jour le thorium sera l’énergie la plus utilisée sur la planète | Slate.fr
South Pole detector spots 28 out-of-this-world neutrinos | Ars Technica
Scientists Forced To Reexamine Theories In Light of Massive Gamma-Ray Burst - Slashdot
Scientists Invent Urine-Powered Robots - Slashdot
Nasa to send seeds to Moon to grow lunar salad - Telegraph


Social


Reuters Investigates - Assets of the Ayatollah
Pirate Party Gets Observer Status at World Trade Organization | TorrentFreak
http://www.reuters.com/article/2013/11/27/us-ukraine-eu-georgia-idUSBRE9AQ0DZ20131127?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637
A Neuroscientist's Radical Theory of How Networks Become Conscious - Wired Science
Money on the Mind (VOSTFR) - YouTube
Future Army: Telepresence Battledroids and Smartguns Will Change Warfare Forever — Phantom Report
China boasts about new submarine fleet capable of launching nuclear warheads at cities throughout the United States | Mail Online
Civil wars and armed conflicts: Inner turmoil | The Economist
United States Army global quick-response forces — Phantom Report
http://www.yalibnan.com/2013/11/11/cia-says-87-nations-now-possess-drones/
U.S. military may have 10 robots per soldier by 2023 - Computerworld


Underground


These Four Organizations Are Also Spying On You, And You Had No Idea
Les pièces-jointes bientôt lues directement dans Gmail, grâce à Google Drive
Cross-browser fingerprinting test 2.0
Embracing big brother: How facial recognition could help fight crime - CNN.com
The Daily Dot - NSA admits tracking location data through cell phones
NSA tracking cellphone locations worldwide, Snowden documents show - The Washington Post
Le FBI peut activer la webcam en toute discrétion
The Silk Road Founder financially linked to Bitcoin Creator Satoshi Nakamoto
Is Bitcoin a Government Conspiracy? | Motherboard
13 Bloodlines of The Illuminati
http://cryptome.org/2013/11/fierce-domain.htm
Usa surveillance tools - La Quadrature du Net
Déclaration de Jeremy Hammond, hacker anarchiste et anti-guerre, condamné à 10 ans de prison - L'Atelier - médias libres

mercredi 6 novembre 2013

ZeBookmark octobre 2013



Computer


Pwgen – Créez facilement vos mots de passe | La vache libre
MyWhisper.net - Text Encryption Tool
What is Hydra the Password Cracking Tool and how does it work?
bdpurcell/bully · GitHub
Good tutorial for WinDbg? - Stack Overflow
Free online WPA cracker with stats - besside-ng companion
How to Crack a Wi-Fi Password
Digital Attack Map
glibc and eglibc 2.5, 2.7, 2.13 - Buffer Overflow Vulnerability
Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit
Reverse Engineering a D-Link Backdoor - /dev/ttyS0
Messagebox Shellcode (113 bytes) - Any Windows Version
Insolite : attaquer un radar avec une injection SQL – Blogmotion
D-Link DIR-605L Captcha Handling Buffer Overflow
Apache / PHP 5.x Remote Code Execution Exploit
WordPress Think Responsive Themes Arbitrary File Upload Vulnerability
WordPress Switchblade Themes Arbitrary File Upload Vulnerability
DIY: Android Malware Analysis - Taking apart OBAD (part 1)
IT Books Free Share | Scoop.it
ExtraTorrent.cc The World's Largest BitTorrent System
50 Ways to Inject Your SQL - YouTube
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1719 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1728 Security Vulnerability
Cisco Wireless LAN Controller CVE-2013-5519 Cross Site Scripting Vulnerability
Cisco Unified Computing System CVE-2012-4103 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4111 Local Command Injection Vulnerability
Cisco Unified Computing System CVE-2012-4102 Local Arbitrary Command Execution Vulnerability
Cisco Unified Computing System CVE-2012-4109 Local Command Injection Vulnerability
Microsoft Windows CVE-2012-1864 Local Privilege Escalation Vulnerability
Oracle Java SE CVE-2013-2449 Remote Security Vulnerability
Oracle Java SE CVE-2013-2444 Remote Security Vulnerability
PHP 'header()' HTTP Header Injection Vulnerability
Oracle Sun Products Suite CVE-2012-3128 Local SPARC T-Series Servers Vulnerability
Cisco Nexus 7000 Series Switches NX-OS CVE-2012-4090 Remote Information Disclosure Vulnerability
Xinetd CVE-2013-4342 Remote Code Execution Vulnerability
Microsoft Windows Kernel 'dxgkrnl.sys' CVE-2013-3888 Local Privilege Escalation Vulnerability
Another Day, SpiderLabs Discovers Another IE Zero-Day - SpiderLabs Anterior
Microsoft Internet Explorer CVE-2013-3872 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3873 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3874 Memory Corruption Vulnerability
Xen CVE-2013-1442 Information Disclosure Vulnerability
Cisco NX-OS CVE-2012-4121 Arbitrary File Access Vulnerability
Cisco NX-OS 'file name' Parameter Arbitrary File Write Vulnerability
Cisco Identity Services Engine CVE-2013-5524 Cross Site Scripting Vulnerability
Cisco NX-OS CVE-2012-4077 Local Arbitrary Command Execution Vulnerability
Cisco IOS CVE-2013-5499 Remote Denial of Service Vulnerability
Microsoft Internet Explorer CVE-2013-3886 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3897 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3882 Memory Corruption Vulnerability
Cisco NX-OS CVE-2012-4076 Local Arbitrary Command Execution Vulnerability
Cisco NX-OS CVE-2012-4122 Arbitrary File Creation or Overwrite Vulnerability
Cisco NX-OS CVE-2012-4075 Local Arbitrary Command Execution Vulnerability
Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
Cisco Prime Central for HCS 'Credentials' Information Disclosure Vulnerability
Cisco Unified Communications Manager CVE-2013-5528 Directory Traversal Vulnerability
Xen CVE-2013-4355 Information Disclosure Vulnerability
Xen CVE-2013-4361 Information Disclosure Vulnerability
Linux Kernel CVE-2013-4387 Memory Corruption Vulnerability
Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
Cisco Unified Computing System CVE-2012-4106 Local Privilege Escalation Vulnerability
Cisco Unified Computing System CVE-2012-4105 Local Denial of Service Vulnerability
X.Org X Server 'dixfonts.c' Use-After-Free Remote Memory Corruption Vulnerability
Oracle Sun Products Suite CVE-2013-3838 SPARC Enterprise T & M Series Servers Security Vulnerability
Mozilla Firefox Cookie Verification Denial of Service Vulnerability
Oracle Java SE CVE-2013-5772 Remote Security Vulnerability
Oracle Java SE CVE-2013-5830 Remote Security Vulnerability
Oracle Java SE CVE-2013-5803 Remote Security Vulnerability
Oracle Java SE CVE-2013-5810 Remote Security Vulnerability
Oracle Java SE CVE-2013-5842 Remote Security Vulnerability
Oracle Java SE CVE-2013-5797 Remote Security Vulnerability
Oracle Java SE CVE-2013-5800 Remote Security Vulnerability
Oracle Java SE CVE-2013-5832 Remote Security Vulnerability
Oracle Java SE CVE-2013-5848 Remote Security Vulnerability
Oracle Java SE CVE-2013-5783 Remote Security Vulnerability
Oracle Java SE CVE-2013-5789 Remote Security Vulnerability
Oracle Java SE CVE-2013-5780 Remote Security Vulnerability
Oracle Java SE CVE-2013-5844 Remote Security Vulnerability
Oracle Java SE CVE-2013-5774 Remote Security Vulnerability
Cisco Unified Computing System CVE-2012-4113 Local Arbitrary File Access Vulnerability
Oracle Java SE CVE-2013-5840 Remote Security Vulnerability
Xen CVE-2013-4371 Use After Free Remote Denial of Service Vulnerability
Oracle Java SE CVE-2013-5804 Remote Security Vulnerability
Oracle Java SE CVE-2013-5814 Remote Security Vulnerability
Cisco Secure Access Control System CVE-2013-5536 Remote Denial of Service Vulnerability
Cisco Identity Services Engine CVE-2013-5530 Remote Arbitrary Command Execution Vulnerability
WordPress Landing Pages Plugin 'post' Parameter SQL Injection Vulnerability
WordPress Portable phpMyAdmin Plugin Multiple Security Bypass Vulnerabilities
Linux Kernel CVE-2013-4299 Information Disclosure Vulnerability
Joomla! Maian15 Component 'name' Parameter Arbitrary Shell Upload Vulnerability
Cisco Catalyst 3750 Series Switches Default Credentials Security Bypass Vulnerabilities
Oracle Java SE CVE-2013-5824 Remote Security Vulnerability
Oracle Java SE CVE-2013-5819 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5599 Remote Memory Corruption Vulnerability
Mozilla Firefox CVE-2013-5592 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5596 Remote Code Execution Vulnerability
Mozilla Firefox CVE-2013-5591 Remote Memory Corruption Vulnerability
Mozilla Firefox 'PDF.js' Javascript Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5602 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5600 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5601 Remote Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1474 JavaFX Remote Security Vulnerability
Want To Hijack a Domain? Just Get a Fax Machine - Slashdot
Un expert en sécurité crée des malwares indétectables sur Mac OS X
Local Linux Enumeration & Privilege Escalation - Rebootuser
Computer Security Student Home Page|->Security Lesson, Tools, Exploits, Topics, Forensics, Clothing
Hackers Can Hijack Facebook Accounts by Exploiting Flaw in Android Apps – Video
Network Investigator: Network Protocols
ROM Installer - Android Apps on Google Play
CyanogenMod | Android Community Rom based on Jelly Bean
How to install/remove different Desktop/Window Manager in Kali Linux 1.x
Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone - Forbes
SIGOPSCreate Your Own Operating System Adventure
Gimp – Installer et utiliser les plugins Ofnuts | La vache libre
http://www.macg.co/news/voir/261401/un-script-pour-faciliter-la-creation-de-cartes-sd-pour-raspberry-pi
Skype Call Recorder – Un utilitaire simple et efficace pour enregistrer vos conversations Skype | La vache libre
WhiteHat Aviator - The most secure browser online
The Gimp – Installer les plugins Akkana | La vache libre
QuickTweet: pour basculer entre les comptes Twitter sur google chrome
Security and So Many Things
BinaryTides - Linux how to guides, php web development, mysql, python, network security, socket programming and more
Halloween theme, midi files and binary file editing - YouTube


Economy


Recherche et analyse de mots clés... Like a boss ! | Htitipi
PageRank et corpus sémantiques
Les principaux critères de référencement de Google !
How to get your first 10 customers « Dan Shipper – Distilled Thinking
http://niviti.com/espace/
The seven skills you need to land your dream job - The Globe and Mail
https://yeswehack.com/
investmentwatchblog.com | 522: Connection timed out


Entertainement


Floppy Music by Minihui - Super Mario Bros - YouTube
40 Creative Food Hacks That Will Change The Way You Cook


Hardware


La super-batterie au graphène, chargée en un éclair, autonome pendant des semaines
More Drive Bays, Cooling, and Power for a DIY Raid Box
Hack a Day — Fresh hacks every day
Make Your Own Cell Phone Jammer - wikiHow
The Navy’s newest warship is powered by Linux | Ars Technica
Killer Robots With Automatic Rifles Could Be on the Battlefield in 5 Years | Danger Room | Wired.com
20-ton attack drone under development in Russia - NBC News.com
Taiwanese soldiers wearing ballistic masks look like ‘the cavalry from hell’ | StratRisks
U.S. to deploy ‘stealth destroyers’ in the Pacific next year | StratRisks
Bigger, Lighter, Deadlier! Navy launches new stealth destroyer – CNN Security Clearance - CNN.com Blogs
Technical Machine
New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
Vous pouvez maintenant utiliser du feu pour recharger votre smartphone | Daily Geek Show
Aluminum Foil Does Not Stop RFID
An Emergency Shelter That's Open Source and Locks Together Like Legos | Wired Design | Wired.com


Howto TOW


21 Times "The Simpsons" Bizarrely Predicted The Future
The end of the New World Order | Seumas Milne | Comment is free | The Guardian
La Terre en 2100: invivable? | Sciences et santé - lesoir.be
NSA Codewords | cypherpunks
Open Exoplanet Catalogue


Misc


NSA Haiku Generator


Science


La première carte de la couverture nuageuse d’une planète géante au-delà de notre système solaire | GuruMeditationGuruMeditation
Découverte d’une étrange planète flottant seule dans l’espace | Sciences et santé - lesoir.be
26 % d'eau dans les vestiges d'un astéroïde - Sciences et Avenir
Un astéroïde géant va-t-il anéantir la Terre le 16 mars 2880? - RTL info
http://www.begeek.fr/lasteroide-2013tv135-frole-terre-reviendra-en-2032-107771?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Les techniques envisagées pour détruire les astéroïdes qui nous menacent | Atlantico
http://www.begeek.fr/galaxie-z8-gnd-5296-hubble-fait-decouverte-majeure-108500?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
20 minutes - L exoplan\E8te Kepler-78b, une Terre d enfer - Science
Cyborg Cockroach Sparks Ethics Debate | Science/AAAS | News
Les bact\E9ries r\E9sistent aux antibiotiques en communiquant entre elles
Skull sparks human evolution controversy - CNN.com
Chemists find biological complexes that beat chance | Ars Technica
The Human Brain Project - Human Brain Project
Predicting Protests and Cyber Attacks With Web Intelligence
BBC News - Nuclear fusion milestone passed at US lab
Two-laser boron fusion lights the way to radiation-free energy : Nature News & Comment
A grand unified theory of exotic superconductivity?
Albert Einstein's Theory of Relativity - YouTube
Quantum Mechanics: Animation explaining quantum physics. - YouTube
The Moon And NASA Now Communicate Via Lasers | Popular Science
New Technology For Converting a Metal To a Semiconductor With a Laser - Slashdot
MIT Researchers Unveil Self-Assembling Robot Swarm - Slashdot
Introducing WildCat - YouTube
Insect-Inspired Flying Robot Handles Collisions And Keeps Going - Slashdot
Astéroïdes : la NASA s'intéresse aux mini lunes
Watch: SpaceX Grasshopper Rocket Launch Reaches Record Height | Autopia | Wired.com
Actualité > Mission habitée vers Mars : la Russie affiche ses ambitions
Les méduses nées dans l’espace ne supportent pas la gravité terrestre et il en sera de même pour l’homme | GuruMeditationGuruMeditation
http://www.francetvinfo.fr/entre-l-inde-et-la-planete-mars-le-systeme-d_450186.html


Social


http://www.gutenberg.org/files/25717/25717-h/25717-h.htm
Elites’ strange plot to take over the world - Salon.com
France Prepares for War in the Central African Republic — Phantom Report
AFRICOM builds up military bases in Italy for small-scale “secret wars” in Africa — Phantom Report
L'OTAN lance un centre de réaction contre les cyberattaques


Underground


Se protéger sur les réseaux sociaux : Le grand guide Bitdefender | UnderNews
It was DPR, in the Tor HS, with the BTC - Hacker OPSEC
chycho: How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations
La commissaire à la vie privée enquêtera sur la nouvelle politique de Bell | Radio-Canada.ca
Ubuntu's Mark Shuttleworth wins Austria's Big Brother Award | Muktware
Facebook peut deviner avec qui vous partagez votre vie
Odin - Secure Networking
Radiation experts confirm polonium on Arafat clothing - FRANCE 24
The Capitalist Conspiracy (1969) by G. Edward Griffin - Full Official Movie - Great Quality Film :) - YouTube
Lockheed Martin Surveillance Project Informational CD DVD | eBay
milo2012/osintstalker · GitHub
The Daily Dot - Pro-Palestinian hackers attack 2 security corporations with a fax machine
Syrian Electronic Army Confirms they took over Barack Obama's Campaign Website, email, twitter and Facebook Account ~ Techworm

mercredi 2 octobre 2013

ZeBookmark Septembre 2013

Computer


Psst. Your Browser Knows All Your Secrets. | Diary Discussions | Community Forums | SANS Internet Storm Center; Cooperative Network Security Community - Internet Security
EchoVNC Viewer Remote DoS Vulnerability
Samba nttrans Reply - Integer Overflow Vulnerability
http://achelois.tweakers.net/~crisp/nu.html
Wordpress Booking Calendar 4.1.4 - CSRF Vulnerability
Metasploit: Here's that FBI Firefox Exploit for... | SecurityStreet
D-Link Devices Unauthenticated Remote Command Execution
Firefox onreadystatechange Event DocumentViewerImpl Use After Free
OpenX Backdoor PHP Code Execution
Open-FTPD 1.2 Arbitrary File Upload
MiniWeb (Build 300) Arbitrary File Upload
Ultra Mini HTTPD Stack Buffer Overflow
Joomla Media Manager File Upload Vulnerability
Java storeImageArray() Invalid Array Indexing Vulnerability
http://www.exploit-db.com/exploits/27699/?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A%20exploit-db%2FAbaxNet%20%28Exploit-DB%20updates%20Feeds%29
http://www.exploit-db.com/exploits/27698/?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A%20exploit-db%2FAbaxNet%20%28Exploit-DB%20updates%20Feeds%29
VLC Player 2.0.8 (.m3u) - Local Crash PoC
freeFTPd 1.0.10 (PASS Command) - SEH Buffer Overflow
Oracle Java BytePackedRaster.verify() Signed Integer Overflow
Joomla! VirtueMart Component 2.0.22a - SQL Injection
PenturaLabs/Linux_Exploit_Suggester · GitHub
WinAmp 5.63 (winamp.ini) - Local Exploit
Firefox XMLSerializer Use After Free
Oracle Java ByteComponentRaster.verify() Memory Corruption
Mac OS X Sudo Password Bypass
OSX <= 10.8.4 - Local Root Priv Escalation (py)
How to Inject Shellcode from Java | Strategic Cyber LLC
Wireshark basics 101: A very simple tutorial for beginners
AndroRAT drives the rise for DIY Android hacking tools
DEF CON Hackers Unveil a New Way of Visualizing Web Vulnerabilities - Slashdot
Pay Attention To Me: Hacking PHP sessions by running out of memory
Wireless Computer Hacking - YouTube
marxy's musing on technology: Reverse engineering network traffic with a Raspberry Pi
Apache HTTP Server CVE-2013-1896 Remote Denial of Service Vulnerability
Apache HTTP Server CVE-2013-2249 Unspecified Remote Security Vulnerability
Apache suEXEC Privilege Elevation / Information Disclosure
https://twitter.com/favorites
Bitcoin : Alerte de sécurité pour les wallets sous Android | UnderNews
Bitcoin Bitcoind 'bitcoinrpc.cpp' Password Information Disclosure Vulnerability
Chrome’s insane password security strategy
D-Link DIR-600 and DIR-300 Multiple Security Vulnerabilities
D-Link DIR-600 and DIR-300 Multiple Security Vulnerabilities
Dropbox a Public enemy | PhrozenBlog
Google Chrome CVE-2013-2883 Use After Free Remote Code Execution Vulnerability
Google Chrome CVE-2013-2884 Use After Free Remote Code Execution Vulnerability
Google Chrome CVE-2013-2886 Multiple Unspecified Security Vulnerabilities
Google Chrome CVE-2013-2900 Unspecified Security Vulnerability
Not Found
https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt
IBM Java CVE-2013-3009 Unspecified Arbitrary Code Execution Vulnerability
IBM Java CVE-2013-4002 Denial of Service Vulnerability
Joomla redSHOP Component 1.2 - SQL Injection
Joomla Sectionex Component 2.5.96 - SQL Injection Vulnerability
Joomla! 'media.php' Arbitrary File Upload Vulnerability
Linux Kernel 'perf_event.c' Local Privilege Escalation Vulnerability
Linux Kernel Ceph CVE-2013-1059 Remote Denial of Service Vulnerability
Linux Kernel CVE-2013-4127 Use After Free Memory Corruption Vulnerability
Linux Kernel CVE-2013-4163 Local Denial of Service Vulnerability
Linux Kernel CVE-2013-4220 Multiple Local Denial of Service Vulnerabilities
Linux Kernel CVE-2013-4247 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3184 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3186 Remote Code Execution Vulnerability
Microsoft Internet Explorer CVE-2013-3193 Use After Free Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3199 Use After Free Memory Corruption Vulnerability
Microsoft Security Advisory (2876146): Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure
Microsoft Windows CVE-2013-3175 Remote Privilege Escalation Vulnerability
Microsoft Windows Print Spooler CVE-2012-1851 Remote Code Execution Vulnerability
Microsoft Windows Uniscribe Font Parsing CVE-2013-3181 Remote Code Execution Vulnerability
Mozilla Firefox and SeaMonkey 'libpr0n' GIF Parser Heap Based Buffer Overflow Vulnerability
Mozilla Firefox WOFF-Based Font Decoder Integer Overflow Remote Code Execution Vulnerability
Mozilla Firefox, SeaMonkey, and Thunderbird CVE-2013-1717 Information Disclosure Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0754 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-1701 Multiple Memory Corruption Vulnerabilities
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-1702 Multiple Memory Corruption Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1709 Cross Site Scripting Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1710 Arbitrary Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1712 Local Privilege Escalation Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1713 Same Origin Policy Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1714 Same Origin Policy Security Bypass Vulnerability
RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2013-63 through -75 Multiple Vulnerabilities
Mozilla Network Security Services CVE-2013-1620 Information Disclosure Vulnerability
Multiple Cisco Products CVE-2013-0149 Remote Security Bypass Vulnerability
Open-FTPD Multiple Command Authentication Bypass Vulnerabilities
OpenStack Keystone CVE-2013-2013 Password Information Disclosure Vulnerability
OpenStack Nova CVE-2013-2256 Security Bypass Vulnerability
OpenStack Nova CVE-2013-4185 Denial of Service Vulnerability
Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow
Oracle Java SE CVE-2013-2425 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-2445 Remote Security Vulnerability
Oracle Java SE CVE-2013-2452 Remote Security Vulnerability
Oracle Java SE CVE-2013-2470 Memory Corruption Vulnerability
Oracle Java storeImageArray() Invalid Array Indexing
Oracle Java storeImageArray() Invalid Array Indexing
Oracle MySQL Server CVE-2012-0114 Local Security Vulnerability
Oracle MySQL Server CVE-2012-0487 Remote MySQL Server Vulnerability
Oracle MySQL Server CVE-2012-3167 Remote Security Vulnerability
Oracle MySQL Server CVE-2012-3180 Remote Security Vulnerability
Oracle MySQL Server CVE-2013-2392 Remote Security Vulnerability
Oracle Solaris CVE-2013-3745 Local Security Vulnerability
Oracle Solaris CVE-2013-3787 Remote Security Vulnerability
Oracle Solaris CVE-2013-3799 Local Security Vulnerability
Oracle Sun Products Suite CVE-2012-3131 Remote Solaris Vulnerability
PHP 'tidy_diagnose()' NULL Pointer Dereference Denial Of Service Vulnerability
PHP CVE-2011-4718 Session Fixation Vulnerability
PHP SSL Certificate Validation CVE-2013-4248 Security Bypass Vulnerability
PrestaShop : Un défaut de paramétrage rend vulnérable des milliers de sites e-commerce | UnderNews
PuTTY 'getstring()' Function Multiple Integer Overflow Vulnerabilities
PuTTY 'modmul()' Function Buffer Underrun Vulnerability
PuTTY DSA Signature CVE-2013-4207 Remote Buffer Overflow Vulnerability
PuTTY Private Key 'putty/sshdss.c' Multiple Information Disclosure Vulnerabilities
PuTTY SSH keyboard Interactive Authentication Password Information Disclosure Weakness
Samba CVE-2013-4124 Local Denial of Service Vulnerability
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
SecurityFocus
Winamp CVE-2013-4694 Multiple Stack Buffer Overflow Vulnerabilities
Wireshark CVE-2013-4080 Denial of Service Vulnerability
Wireshark CVE-2013-4081 Stack Buffer Overflow Vulnerability
Wireshark MPEG DSM-CC Dissector 'packet-mpeg-dsmcc.c' Denial of Service Vulnerability
Wordpress HMS Testimonials Plugin 2.0.10 - Multiple Vulnerabilities
Wordpress Usernoise Plugin 3.7.8 - Persistent XSS Vulnerability
http://bits.blogs.nytimes.com/2013/08/02/a-cheap-spying-tool-with-a-high-creepy-factor/?_r=0
IOActive Labs Research: Car Hacking: The Content
http://labofapenetrationtester.blogspot.ca/2013/08/powerpreter-and-nishang-Part-1.html
BinaryRF.com • View topic - Sniffing GSM with HackRF
http://www.tripwire.com/state-of-security/security-hardening/top-five-hacker-tools-every-ciso-should-understand/
[EXCLU] Rebooter n’importe quel iPhone à distance – Blogmotion
Actualité android, application et test pour smartphone sur le blog | phonandroid
Restaurer votre mot de passe root oublié sous Ubuntu et Debian GNU/Linux - crowd42
Un pirate dans votre smartphone | Data Security Breach
http://www.pcinpact.com/news/81703-ovh-protection-ddos-capable-d-encaisser-nimporte-quelle-attaque.htm?skipua=1
301 Moved Permanently
TOR pour Android avec Orbot - une application proxy sur Google Play
Send Files Online - TempSend.com
Defcon 21 : Un syst\E8me de fichiers distribu\E9s bas\E9 sur un botnet - Le Monde Informatique
PirateBrowser - No More Censorship!
Brackets | Downloads
Seeking Alpha's Mobile Apps - Seeking Alpha
http://media.begeek.fr/2013/08/infographie-stockage.jpeg
Darknet, la face cachée du web


Economy


Six key skills leaders need - The Globe and Mail
Le PAF-SEO, l'arme fatale en référencement
Les principaux opérateurs et commandes de Google pour le SEO - JDN Web & Tech
D\E9cryptage de l'outil de comparaison SEO / SEA de Google
L'actualité SEO qu'il ne fallait pas manquer cet été - JDN Web & Tech
L'évolution du SEO : infographie des anciennes et nouvelles pratiques - Polynet
4 Dirty Negotiating Tricks (and How to Counter Them) | Inc.com
How Bitcoin Works - Forbes
Raspberry Pi-powered briefcase converts loose change into bitcoin
Judge to Bitcoin: You Are Money | Wired Enterprise | Wired.com
Germany recognizes Bitcoin as a “private money,” subject to capital gains tax | Ars Technica
The global oil industry: Supermajordämmerung | The Economist
America’s new $60 trillion deadliest enemy - Paul B. Farrell - MarketWatch
The economy: A bubble in pessimism | The Economist
Get rich in the ‘Age of Megafires’: 2014-20 - Paul B. Farrell - MarketWatch
Get rich in the ‘Age of Megafires’: 2014-20 - Paul B. Farrell - MarketWatch
Emerging markets negative feedback cycle could play out like this - The Tell - MarketWatch


Hardware


Arduino Blog » Blog Archive » My open-source, do-it-yourself cellphone (built with Arduino).
World's Smallest Drone Autopilot System Goes Open Source | Wired Enterprise | Wired.com
Compact laser weapons inch closer to battlefield | StratRisks
WSJ Video - the Wall Street Journal - Wsj.com
Solar-powered Ubuntu laptop boasts 10-hour battery, 2-hour charge time
http://www.geekbecois.com/hot-watch-kickstarter/?utm_campaign=WPtwitter&utm_medium=twitter&utm_source=twitter
Zalman launches world’s first CPU liquid cooler using nanofluids | Chips | Geek.com
SpaceGlasses : des lunettes de réalité augmentée plus ambitieuses que Google Glass
Wide-band WebSDR in JO32KF
Un sac à dos qui protège du piratage
inWatch One : une montre intelligente chinoise avec Android 4.2 | FrAndroid
Ces nano-capteurs sont capables de convertir la pression de vos doigts en lumière | Daily Geek Show
NASA to test frickin' laser communications link with new lunar mission | ITworld
http://www.gizmodo.fr/2013/08/26/fusil-usb-bb.html


Howto TOW


About the Lifeboat Foundation
Building a Modern-Day Ark for the World's Rarest Farm Animals - Wired Science
Explorer les données publiques de Google - Ramenos
Entreprendre à travers ses erreurs et ses échecs avec la méthode des 4A


Science


A cometary graveyard
L’éblouissant nouveau portrait de notre voisine galactique, Andromède | GuruMeditationGuruMeditation
http://science.nasa.gov/science-news/science-at-nasa/2013/05aug_fieldflip/
From The Planetary Society: Pluto's Surprising Problem of Cartography - Wired Science
GJ 504b, une exoplan\E8te rose d\E9couverte \E0 57 ann\E9es-lumi\E8re de la Terre
Hubble solves the 40-year-old mystery of the Magellanic Stream | Ars Technica
Un flash \E0 l'aube de l'Univers a illumin\E9 une galaxie toute enti\E8re
Mapping the magnetic field of our galaxy’s supermassive black hole | Ars Technica
NASA : Nos chances de collision avec un astéroïde dans une effrayante illustration
WSJ
WSJ
'Nightmare Bacteria' Attack an ICU and Close a Burn Unit - Wired Science
Finding Cancer Cells in the Blood | MIT Technology Review
301 Moved Permanently
Adam et Eve ont vraiment existé, c'est prouvé génétiquement | Slate.fr
4 Billion-Year-Old Fossil Protein Resurrected, Thioredoxin May Have Lived On Mars
Near-death experiences: the brain's last hurrah | Anil Seth | Comment is free | theguardian.com
De l'engrais et de l'électricité... à partir de légumes rejetés | Jean-François Cliche | Science
A 16 ans, elle invente un bioplastique issu de peaux de bananes | Courant Positif
Human Guinea Pig: 8 Year Old Girl May Hold Key to Immortality - BlackListedNews.com
Des scientifiques ont construit un cœur de souris qui bat | GuruMeditationGuruMeditation
New drug mimics the beneficial effects of exercise
Emergence of H7N9 avian flu hints at broader threat : Nature News & Comment
Could we soon be reading people's MINDS? Software uses brain scans to identify exactly what people are looking at | Mail Online
On ne voit que ce qu'on le croit | Agence Science-Presse
D\E9couverte d'un nouveau r\F4le pour le sodium dans le cerveau
Stem cells used to create mini-brains in the lab | Ars Technica
U. of Washington Researchers Perform First Noninvasive Human-to-Human Brain Interface, Sending Signal via Internet to Control Hand Motions | LeakSource
On a découvert la protéine responsable de l’usure de la mémoire | Slate.fr
Scientists create “impossible material”—dubbed Upsalite—by accident | Ars Technica
Nerve agents the most deadly of recognized chemical weapons, can kill within 10 minutes - The Washington Post
Des chercheurs mettent au point un nouveau moyen de stocker vos données pour plusieurs millions d’années | Daily Geek Show
Report: IBM developing computer system that thinks like a human | National Monitor
The First Quantum Teleportation In A Computer Chip - Forbes
Des processeurs au graphène à 400 GHz ! Oui, 400GHz ! - Mac4Ever.com
Le r\E9chauffement climatique s'est stabilis\E9 depuis 15 ans - L'EXPRESS
http://www.begeek.fr/vie-terre-venait-mars-102453?utm_campaign=Twitter+Begeek&utm_medium=twitter&utm_source=twitter
Human Body Version 2.0
Could Humanity Really Build 'Elysium'? - Slashdot
Le recul de la mort: L'immortalité à brève échéance?: Laurent Alexandre at TEDxParis 2012 - YouTube
https://physics.le.ac.uk/journals/index.php/pst/article/viewArticle/558
KQEDScience • Here’s an excellent short animation about the...
BBC News - University of St Andrews scientists create 'fastest man-made spinning object'
VIDEO. Carl, un robot-barman, pour vous servir - Le Nouvel Observateur
Twelve Months in Two Minutes; Curiosity's First Year on Mars - YouTube
NASA and ESA To Demonstrate Earth-Moon Laser Communication - Slashdot
Private Space Race Heats Up With Some Key Breakthroughs | Autopia | Wired.com
DIY Space Suit Testing - Slashdot
Canada could send first astronaut to the moon within two decades - The Globe and Mail
Space Capsule Emergency Egress – Space Suit Session Day 07 - Wired Science
NASA test-fires 3D printed rocket parts: low cost, high power innovation | Ars Technica
La NASA découvre de l'eau au centre de la Lune
Tokyo remet en marche ses machines \E0 pluie pour lutter contre le manque d'eau


Social


Comment éviter les folles - Guide de survie pour l'homme moderne
Neandertals made the first specialized bone tools in Europe
Des civilisations m\E9diterran\E9ennes d\E9truites par la s\E9cheresse il y a 3\A0200 ans
Someone beat the Vikings into the North Atlantic by 500 years | Ars Technica
Ancient Egyptian Sphinx Mysteriously Unearthed In Israel - BlackListedNews.com
Pirate Party of Canada
PP International
Taking pills for unhappiness reinforces the idea that being sad is not human | The Raw Story
New meta-analysis checks the correlation between intelligence and faith | Ars Technica
Your Thoughts Can Release Abilities beyond Normal Limits: Scientific American
404 - Page Not Found
Report: Al-Qaida developed liquid that turns clothes into explosives - Diplomacy & Defense Israel News | Haaretz
Climate and conflict: Cloudy with a chance of war | The Economist
Royal Navy deployed laser weapons during the Falklands War
The Israel Defence Forces: Taking wing | The Economist
The Crises in Syria, Lebanon and Egypt: The Plan to ‘Divide and Conquer’ the Middle East and Why All Roads Lead to Tehran | Economics | News, Opinions & Analysis that Matters
War Games: The Syrian Military Theater Of Operations In Two Charts - BlackListedNews.com
The history of chemical weapons: The shadow of Ypres | The Economist
Wake up to the aboriginal comeback - The Globe and Mail
Slavery By Consent ( Full Version) - YouTube
World Socialist Web Site - Marxist analysis, international working class struggles & the fight for socialism


Underground


Anonymouth Hides Identity
Comment effacer intelligemment ses traces Web sous Google Chrome | UnderNews
Tracking devices hidden in London's recycling bins are stalking your smartphone (Wired UK)
[Tutoriel] Devenir Anonyme sur Internet | Why We Protest | Anonymous Activism Forum
The Government Now Admits There's an 'Area 51' - Philip Bump - The Atlantic Wire
http://earthfirstnews.wordpress.com/2013/08/05/cyber-sabotage-is-easy/
Millions of Kwikset Smartkey Locks Vulnerable to Hacking, Say Researchers | Threat Level | Wired.com
MIT Students Release Program To 3D-Print High Security Keys - Forbes
FBI Taps Hacker Tactics to Spy on Suspects - WSJ.com
The Daily Dot - 5 other countries share NSA's ability to watch your every online move
http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/
XKeyscore : le Google de la NSA, selon la presse… : Reflets
FBI can remotely activate Android and laptop microphones, reports WSJ | The Verge
Canada’s Communications Security Establishment part of a secret state-within-the-state - World Socialist Web Site
Secret NSA Documents Show How the US Spies on Europe and the UN - SPIEGEL ONLINE
Activist Post
Anonymous Newblood Wiki
A Cypherpunk’s Manifesto | cypherpunks
The Syrian Electronic Army Talks About Tuesday’s Hacks | VICE United States