Get flash to fully experience Pearltrees
Don't you just hate it when there's someone in the cinema taking photos, or talking on their phone?
Le hacker de fiction Aiden Pierce pourrait bien faire jeu égal avec Mario et Lara Croft : il sera la prochaine icône d'Ubisoft dans Watchdogs , un des jeux vidéo les plus attendus de 2013.
Exploits - PoC
DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these.
Cyber Fast Track (CFT) est un programme de la DARPA dont l'objectif ambitieux est de développer des projets cyber à bas-coût et en un temps record (démonstration des résultats en moins de 12 mois).
Ahahaha mais qu'est-ce qu'on se marre...
For almost a year, an ongoing campaign to infiltrate computer systems throughout the Middle East has targeted individuals across Iran, Israel, Afghanistan and others scattered across the globe. Together with our partner, Seculert, we-ve thoroughly investigated this operation and named it the ?Madi, based on certain strings and handles used by the attackers.
not "stolen", but "reverse engineered". "information wants to be free"
In The UK, You Will Go To Jail Not Just For Encryption, But For Astronomical Noise, Too - Falkvinge on Infopolicy - VimperatorThere was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set. First of all, references – the law is here . You will be sent to jail for refusing to give up encryption keys, regardless of whether you have them or not.
Last month it became apparent that not all VPN providers live up to their marketing after an alleged member of Lulzsec was tracked down after using a supposedly anonymous service from HideMyAss.
After publishing a large number of email databases allegedly obtained from Trend Micro and partner company Sykes, the hacker known as C0mrade returns with another massive data leak. Two files, totaling around 6 gigabytes of information have been posted online, presumably obtained from a number of high-profile companies. “Today, 6.38 GB of Mail Data for companies all over the world will be published.
"Anonymity" - A True Way To Be Disguised - A Full Practial Guide To Mask Ureself Over The Internet - Vimperator"Anonymity" - A True Way To Be Disguised - A Full Practial Guide To Mask Ureself Over The Internet Description: From very beginning of human era there was a need of being Anonymous. Today in this era of 0's and 1's it rather more useful than ever.
Protégez votre ordinateur
AS0 -Reserved AS- AS1 LVLT-1 - Level 3 Communications, Inc. AS2 DCN-AS - University of Delaware AS3 MIT-GATEWAYS - Massachusetts Institute of Technology AS4 ISI-AS - University of Southern California AS5 SYMBOLICS - Symbolics, Inc.