Facebook Twitter web application security lab. Hacker News. Welcome to Brownie! — Brownie v0.2+ documentation. Have you ever started a new project and implemented this little function foo or this datastructure bar you already implemented for another project?

Welcome to Brownie! — Brownie v0.2+ documentation

Ever wondered why a specific feature is not in the standard library already? Wanted to use that new datastructure but you are still stuck with this ancient Python version or are just not willing or able to switch to Python 3.x, yet? And most importantly were too lazy to implement this datastructure which would be more appropriate to use? Anti-Forensics. List of Useful and Must-Have plugins! (100+) - Minecraft Forums. I'm going to update this soon!

List of Useful and Must-Have plugins! (100+) - Minecraft Forums

See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. Join Application. Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code. 1.

Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code

How to use this wiki ... or several advices for beginners. Rubberhose cryptographically deniable transparent disk encryption system. Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. Currently supported ciphers are DES, 3DES, IDEA, RC5, RC6, Blowfish, Twofish and CAST. Written by Julian Assange , Ralf P. Weinmann and Suelette Dreyfus, Rubberhose is currently available for Linux 2.2. Userland daemons and tools are highly portable. Setting up your own SSL VPN. “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin I’ve been wanting to have access to my own secure VPN for quite some time so that when I’m away from home and only have access to insecure networks, I don’t have to use work’s VPN for personal use or worry about someone intercepting my traffic.

Setting up your own SSL VPN

I looked into a couple paid VPN solutions but none of them seem to guarantee your privacy as far as I’m concerned. I figured my best option was to setup and manage my own. I chose to do all my setup on Ubuntu Linux but you can easily port these instructions to an alternative Linux distribution with relative ease. About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing.

PlugBot is a research project and I plan to release the code for free under GPL license.

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing

Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. Online storage re-imagined. Download CrunchBang Linux 10 "statler" r20101205. Welcome to the download page for CrunchBang Linux Waldorf.

Download CrunchBang Linux 10 "statler" r20101205

Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. DEFT Linux - Computer Forensics live cd. GnackTrack - Gnome Based Penetration Distro. Welcome to KXStudio. I2P Anonymous Network. Littleblackbox - Project Hosting on Google Code. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices.

littleblackbox - Project Hosting on Google Code

These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key. The Evil URL Shortener « Spare Clock Cycles. I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. The Evil URL Shortener « Spare Clock Cycles

One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. Bitcoin P2P Virtual Currency. Ubuntu Security. GNOME Shell: Getting prettier by the day. Gnome-Shell’s UI revamp continues apace and the ‘relayout’ version of GNOME-Shell, first shown off at GUADEC earlier this year, is getting ready to land.

GNOME Shell: Getting prettier by the day

With it containing so many visual changes MrMars dropped off screenshots of the ‘relayout’ GIT branch in the OMG! Inbox! 10 things to do after installing Ubuntu 10.04 Lucid Lynx. If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1.

10 things to do after installing Ubuntu 10.04 Lucid Lynx

Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. Wirewatcher. Godzilla Haiku. Shedding Bikes: Programming Culture And Philosophy. By Zed A. Shaw I have this hypothetical question I've been using periodically to talk about the relevance of ad hominem in evaluating software: Tf2 Items & Hats Pricing Guide. Index of /27c3-stream/releases/mkv. Dyko - A Lightweight Web Framework.


Programming. Wikileaks. High Yield Checking Account from ING DIRECT USA. Forums - Powered by vBulletin. Hack This Site! OpenNIC. Open Letter to To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers. I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing. For the last several years, I’ve been spending over $100 a month on new and used books from Amazon.

That’s over. I have contacted Customer Service to ask Amazon to terminate immediately my membership in Amazon Prime and my Amazon credit card and account, to delete my contact and credit information from their files and to send me no more notices. Human Bagel Web Services. 13 Steps To A Better Wordpress Install. Free Books. A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions.

Allen's Weblog: Unicode in Python, and how to prevent it. [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings. For example: Drupal site building tips - Living Off the Grid: Free Yourself. 10 Cool Ways to Use Nmap. - Tales of Team Fortress 2 pwnage and other hilarity.

The Secret Life of Chaos Part (1 - 6) GPG Quick Start. GNUPG Windows Setup - Coresecure, Inc. Before it's News. PhilipBrennan.Net. HiR Information Report: Make your own lock picks - Part 1. Body Scanners (and Groping?) Coming To A Train Station Near You? The TSA and America's Turning Point. I was just detained by the TSA. 4thamendmentwear. The Death Delusion. How The TSA Legally Circumvents The Fourth Amendment. Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’ Anti-earmarker Jon Kyl slips $200 million earmark into bill. Big Sis Caught Lying To American People. Ty's Search for Truth. Jon and Eric's Blog. To promote flying with dignity.

Search Tf2 Stats, Rankings, and Banners. On a long enough timeline, the survival rate for everyone drops to zero. A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution. Overview for afrael. Google Translate. Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips. View topic - Welcome! (What's all this TOSL stuff about...) Lockpicks by Open Locksport by Schuyler Towne. FreeRangeKids. Ugh fields. Making Your Twitter Followers A Little More Uneasy. I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380.

The 2fort2furious Forum / Profile. What quote(s) do you live by? : AskReddit. Karmanaut's map of reddit. What are some good, active subreddits that maybe aren't very well known? : AskReddit. Population - Anno 1404 Wiki. Post Your Farming Builds. Post #1197090. _l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels) 3QRji.jpg (JPEG Image, 500x408 pixels) 10 Things I Learned (Or Unlearned) When I Had Kids. Make a Simple and Slick Accordion Menu in Photoshop. Welcome to - World's Computer Graphics Community. 102 things guys need to know about girls.