background preloader

Hacking

Facebook Twitter

Leaks

Free System Administration software downloads at SourceForge.net - Vimperator. Apple patent could remotely disable protesters' phone cameras. Don't you just hate it when there's someone in the cinema taking photos, or talking on their phone?

Apple patent could remotely disable protesters' phone cameras

How unfair is it that 'they' cheated on their test because they could access the Web, and yet you only got half their marks? Isn't it a shame you can't take a photo of the police officer beating a man in the street because your oppressive government remotely disabled your smartphone camera? A new patent granted to Apple could do all of the above.

What that means in real-terms is "preventing wireless devices from communicating with other wireless devices (such as in academic settings)," and for, "forcing certain electronic devices to enter "sleep mode" when entering a sensitive area. " But the patented technology may also be used to restrict protesters' right to free expression in oppressive regimes around the world -- if you haven't checked recently, there's plenty of them -- by preventing camera images and video being taken at political rallies and events. Passwords - SkullSecurity - Vimperator. Password dictionaries These are dictionaries that come with tools/worms/etc, designed for cracking passwords.

Passwords - SkullSecurity - Vimperator

As far as I know, I'm not breaking any licensing agreements by mirroring them with credit; if you don't want me to host one of these files, let me know and I'll remove it. Leaked passwords Passwords that were leaked or stolen from sites. Hacker 007 » OWNI, News, Augmented - Vimperator. Le hacker de fiction Aiden Pierce pourrait bien faire jeu égal avec Mario et Lara Croft : il sera la prochaine icône d'Ubisoft dans Watchdogs, un des jeux vidéo les plus attendus de 2013.

Hacker 007 » OWNI, News, Augmented - Vimperator

Tools

RE. Vulnerabilities. Exploits - PoC. w3af - Web Application Attack and Audit Framework - Vimperator. CutyCapt - A Qt WebKit Web Page Rendering Capture Utility - Vimperator. OWASP DirBuster Project - OWASP - Vimperator. This historical page is now part of the OWASP archive.This page contains content that is outdated and is no longer being maintained.

OWASP DirBuster Project - OWASP - Vimperator

It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were once valid but may now link to sites or pages that no longer exist.Please use the newer Edition(s) like OWASP Zed Attack Proxy Project DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within.

DirBuster attempts to find these. However tools of this nature are often as only good as the directory and file list they come with. TUF: The Update Framework - Vimperator. Power Pwn : la Hack machine infernale ! - Vimperator. Cyber Fast Track (CFT) est un programme de la DARPA dont l'objectif ambitieux est de développer des projets cyber à bas-coût et en un temps record (démonstration des résultats en moins de 12 mois).

Power Pwn : la Hack machine infernale ! - Vimperator

L'un de ces projets, Power Pwn, arrive en phase d'industrialisation puisqu'il est possible de commander cette sorte de "module étrange" et d'être livré aux alentours du 30 septembre 2012. D'aspect anodin car ressemblant à une sorte de multiprise parafoudre, il est quasiment invisible dans un bureau mais surtout une salle informatique et/ou de serveurs.

OpenSource

Google > (The Pirate Bay + Megaupload) Ahahaha mais qu'est-ce qu'on se marre... Je vais vous expliquer un truc pas nouveau, mais un truc très drôle quand même pour ceux qui ne seraient pas encore au courant. The Madi Campaign - Part I - Securelist - Vimperator. For almost a year, an ongoing campaign to infiltrate computer systems throughout the Middle East has targeted individuals across Iran, Israel, Afghanistan and others scattered across the globe. Together with our partner, Seculert, we-ve thoroughly investigated this operation and named it the ? Madi, based on certain strings and handles used by the attackers. You can read the Seculert analysis post here. The campaign relied on a couple of well known, simpler attack techniques to deliver the payloads, which reveals a bit about the victims online awareness.

Large amounts of data collection reveal the focus of the campaign on Middle Eastern critical infrastructure engineering firms, government agencies, financial houses, and academia. This post is an examination of the techniques used to spread the Madi malware to victim systems, the spyware tools used, and quirks about both. <b>SKYPE GOES OPEN SOURCE......FLAWLESS VICTORY:</b><br> AFTER MICROSOFT ACQUIRING SKYPE FOR 8.5 BILLION DOLLARS <b>AND PROCEEDING TO ADD BACK DOORS FOR GOVERNMENT</b> TO THE PROGRAM, THE SOFTWARE HAS BEEN HACKED AND IT'S SOURCE CODE RELEASED additional d.

Not "stolen", but "reverse engineered". "information wants to be free" Reverse engineering is nothing but that. The "proprietary" nature of the information was a farce to begin with. MS still holds their precious license. But in the meantime the information is in fact now "open" to the public, Thus it is "Open Source". In any regard, beyond such matters, is the fact that any major corporation would pair with a government, supposedly ran "by the people", and basically give the body public of that government virus infected software....... at it's core, this is nothing but a trojan, plain and simple.

An odd situation, when the employee (government) demands open information (root access) of it's ceo (the people) but the ceo (the people) is expected to lead his/her company (the government) while never having root access (open information) upon which to base and form informed decisions. In The UK, You Will Go To Jail Not Just For Encryption, But For Astronomical Noise, Too - Falkvinge on Infopolicy - Vimperator. There was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set.

In The UK, You Will Go To Jail Not Just For Encryption, But For Astronomical Noise, Too - Falkvinge on Infopolicy - Vimperator

First of all, references – the law is here. You will be sent to jail for refusing to give up encryption keys, regardless of whether you have them or not. Five years of jail if it’s a terrorism investigation (or child porn, apparently), two years otherwise. It’s fascinating – there are four excuses that keep coming back for every single dismantling of democracy. It’s terrorism, child porn, file sharing, and organized crime. Which VPN Providers Really Take Anonymity Seriously?

As detailed in yesterday’s article, if a VPN provider carries logs of their users’ activities the chances of them being able to live up to their claim of offering an anonymous service begins to decrease rapidly.

Which VPN Providers Really Take Anonymity Seriously?

There are dozens of VPN providers, many of which carry marketing on their web pages which suggests that the anonymity of their subscribers is a top priority. But is it really? Do their privacy policies stand up to scrutiny? We decided to find out. List of Pirate Bay proxies - Vimperator. Hacker C0mrade Leaks 6 GB of Data from Various Companies Worldwide - Softpedia - Vimperator. After publishing a large number of email databases allegedly obtained from Trend Micro and partner company Sykes, the hacker known as C0mrade returns with another massive data leak.

Hacker C0mrade Leaks 6 GB of Data from Various Companies Worldwide - Softpedia - Vimperator

Two files, totaling around 6 gigabytes of information have been posted online, presumably obtained from a number of high-profile companies. “Today, 6.38 GB of Mail Data for companies all over the world will be published. Amongst those affected include CitiBank (Banking, Credit Cards, Lending & Investing – Employee) – NHComputerLearning (IT, Desktop Application and Business Skills Training),” the hacker said in a statement that has since been removed from Pastebin. Reflets - Vimperator. "Anonymity" - A True Way To Be Disguised - A Full Practial Guide To Mask Ureself Over The Internet - Vimperator. "Anonymity" - A True Way To Be Disguised - A Full Practial Guide To Mask Ureself Over The Internet Description: From very beginning of human era there was a need of being Anonymous.

"Anonymity" - A True Way To Be Disguised - A Full Practial Guide To Mask Ureself Over The Internet - Vimperator

Today in this era of 0's and 1's it rather more useful than ever.This is a practical guide of being anonymous over the networks.There are some per-requirements :SOFT TOOLS : :PuttyDownload Link: Download Link: Mumble - Vimperator. CJB.NET - Vimperator. Haiku Project - Vimperator.

Bash

Bulletin de sécurité Microsoft MS12-037 - Critique : Mise à jour de sécurité cumulative pour Internet Explorer (2699988) - Vimperator. Protégez votre ordinateur Gérez les mises à jour logicielles et de sécurité que vous avez besoin de déployer vers vos serveurs, ordinateurs de bureau et ordinateurs portables dans votre organisation.

Bulletin de sécurité Microsoft MS12-037 - Critique : Mise à jour de sécurité cumulative pour Internet Explorer (2699988) - Vimperator

Pour plus d'informations, consultez le site TechNet Update Management Center. Le site Web Espace Sécurité TechNet fournit des informations supplémentaires sur la sécurité dans les produits Microsoft. Les mises à jour de sécurité sont disponibles sur Microsoft Update et Windows Update. Les mises à jour de sécurité sont également disponibles sur le Centre de téléchargement Microsoft. Enfin, les mises à jour de sécurité peuvent être téléchargées à partir du Catalogue Microsoft Update. Conseils sur la détection et le déploiement. Ganerate password for BIOS - Vimperator. Mapping MAC addresses - samy kamkar - Vimperator. Android map exposes the data that Google has been collecting from virtually all Android devices and street view cars, using them essentially as global wardriving machines. You can use this tool to accurately locate virtually any router in the world, as well as position iPhones and Android phones.

When the phone detects any wireless network, encrypted or otherwise, it sends the BSSID (MAC address) of the router along with signal strength, and most importantly, GPS coordinates up to the mothership. This page allows you to ping that database and find exactly where any wi-fi router in the world is located. Note that iPhones also send this BSSID and Cell Tower Information up to Apple, as well.

You can enter any router BSSID/MAC address to locate the exact physical location below, or try the demonstration router by hitting "Probe" below. Telecomix Censorship-proof DNS - Vimperator. AS Names - Vimperator. May the command line live forever - Vimperator. Telehack Telehack is a simulation of a stylized arpanet/usenet, circa 1985-1990. It is a full multi-user simulation, including 25,000 hosts and BBS's from the early net, thousands of files from the era, a collection of adventure and IF games, a working BASIC interpreter with a library of programs to run, simulated historical users, and more.

Connecting ---------- On the web: or open a shell and type telnet telehack.com Telehack.com supports an open web telnet interface. You can also telnet directly to telehack on the regular telnet port of 23. The following ports are also open for those, who have issues connecting: 443, 1337, 8080, 31173 (e.g. MeshLab - Vimperator. Selenium - Web Browser Automation - Vimperator. Project SIKULI - Vimperator. Un ancien du RAID s’interroge sur la stratégie choisie à Toulouse. Mercredi 21 mars, vers 3 heures du matin, les policiers du RAID ont lancé l'assaut contre le domicile du suspect des meurtres de Toulouse et Montauban.

Bilan: deux policiers blessés, et un homme armé retranché dans son appartement. Les voisins ont été évacués, à 11h30. Une machine à soudure par point et découpeuse plasma avec un gros condensateur. Radu Motisan a fabriqué une machine qui lui permet de réaliser de la soudure par point sur le métal, mais aussi une découpeuse plasma. Pour cela, il a réalisé un montage électronique qui contrôle la décharge d’un gros condensateur au travers de deux électrodes.

Toute la complexité de ce montage consiste à gérer le avec précision la décharge du condensateur. Connecteurs - Vimperator. Vimperator. SourceSquare - Vimperator. Antepedia - Vimperator. A Special Kind Of Proxy - Vimperator. The basic GoogleSharing install is fairly straightforward: Download the GoogleSharing Firefox Addon. Restart Firefox. You are now browsing with GoogleSharing! All of the appropriate Google traffic will be redirected through a GoogleSharing proxy. By default, GoogleSharing is enabled. Should you feel the urge, Customizing Your Settings Each GoogleSharing proxy you have configured can be customized with your language preferences, services to exclude, and transport requirements. Right-click on the "GoogleSharing Enabled/Disabled" text in the bottom right hand corner of your browser window, and select "Options". Select the GoogleSharing proxy you would like to configure (by default there is only one, the proxy we run at proxy.googlesharing.net), and click "Edit Proxy".

If there are services that you would not like to anonymize with GoogleSharing, you can select the ones you would like to exclude under "Do not proxy the following services. " Changing The Default Proxy. TEDxPlaceDuCapitole – Conférence TEDx à Toulouse - Vimperator. Stories - Vimperator. Hypothermia I made a series of mistakes that culminated in the worst sailing accident of my life, and almost took me to the bottom of the ocean. Challenge-A-Day There is a Pittsburgh punk tradition called "Fun-A-Day.

" For the entire month of January, participants of the "Fun-A-Day project" pick something and do it every day. Someone might do "postcard a day," where they write a postcard to someone every day. Keys To The Kingdom Many years ago, I became strangely enamored with sneaking into movies. Belgique et Pays-Bas : cibles idéales des cyberattaques » OWNI, News, Augmented - Vimperator. Piraté depuis l'Iran, le site de certification du gouvernement néerlandais suscite de grandes craintes au Benelux. Diewald_CV_kit - Vimperator. Diewald_CV_kit A library by Thomas Diewald for the Processing programming environment. Last update, 13/12/2012. -------------------------------------------------------------------------------- this library contains tools that are used in the field of computer vision. its not a wrapper of openCV or some other libraries , so maybe you are missing some features ( ... which may be implemented in the future). its designed to be very fast to use it for realtime applications (webcam-tracking, kinect-tracking, ...). also, it works very well in combination with the kinect-library (dlibs.freenect - )... which i basically built it for ... to track blobs, generate contours from 3d-data, and else. it should work in combination with other libraries too, since the blobdetection is very flexible and works with any given data-arrays. the examples, that come with the library, demonstrates: kinect 3D/2D tracking a simple marker tracking image-blob tracking.

Commotion Wireless - Overview - Chambana.net Tech Projects - Vimperator. Rebind - DNS Rebinding Tool - Google Project Hosting - Vimperator. Mixminion: a Type III anonymous remailer - Vimperator. Free Haven's Selected Papers in Anonymity - Vimperator. 3D Printing with Kinect « MakerBot Industries - Vimperator. EmailShare 44EmailShare. IP to ASN Mapping - Team Cymru - Vimperator. The whois daemon acts like a standard whois server would, but with some added functionality. It accepts arguments on the command-line for single whois queries, and it also supports BULK IP submissions when combined with GNU's netcat for those who wish to optimize their queries. Générer un nom aléatoire - Fake Name Generator - Vimperator. - Vimperator.

Embedded

Linux. 20 sites pour écouter de la musique gratuite en ligne. Elasticsearch - - Open Source, Distributed, RESTful, Search Engine - Vimperator. Vimperator. Graffiti Analysis - Vimperator. Final Projects ECE 4760 - Vimperator. France Culture - Place de la Toile - Vimperator. Eternal-todo.com - Vimperator. Ack tunneling - Vimperator. RéZoCitoyen - Vimperator. Image Processing Operator Worksheets - Vimperator. View topic - Re: ARM Cortex-M3 based Arduino Boards and IDE - Vimperator. Zdenek Kalal - Vimperator. OpenTL - Vimperator. Games. Routeur Hadopi - Vimperator.