background preloader

Hacktivismo

Hacktivismo
cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place. LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. "It's no big secret that the Web is the platform," said cDc spokesmodel Oxblood Ruffin. Goolag Scanner will be released open source under the GNU Affero General Public license. Goolag Scanner is a standalone windows GUI based application. Press Contact Oxblood Ruffin oxblood at hacktivismo.com About Goolag Scanner About Johnny I Hack Stuff and here See J.

An Overview of Cryptography As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation. Similar — but different — is the Japanese Government Cryptography Research and Evaluation Committees (CRYPTREC) efforts to evaluate algorithms submitted for government and industry applications. CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. 3.3.

Personalice Firefox Firefox's toolbar provides easy access to common features. Do you miss something you use a lot? The toolbar is easy to customize. Is there something you don't use all the time? You can change the items that appear in the overflow menu or your toolbar. Click the menu button , click and choose . Tip: Here's another way to open the Customize Firefox tab: Right-clickHold down the control key while you click on a blank spot in the tab bar or toolbar and choose from the context menu. Click the menu button , click and choose . Click the menu button , click and choose . Note: You can also turn the Bookmarks toolbar on or off from the menu bar at the top of the screen: Click , go down to and select . Click the menu button , click and choose . Try restoring the default set of buttons and toolbars by clicking the Restore Defaults button when you are in the customize mode.

Global kOS: About Them HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports Fibonacci Flim-Flam. The Fibonacci Series Leonardo of Pisa (~1170-1250), also known as Fibonacci, wrote books of problems in mathematics, but is best known by laypersons for the sequence of numbers that carries his name: This sequence is constructed by choosing the first two numbers (the "seeds" of the sequence) then assigning the rest by the rule that each number be the sum of the two preceding numbers. This simple rule generates a sequence of numbers having many surprising properties, of which we list but a few: Take any three adjacent numbers in the sequence, square the middle number, multiply the first and third numbers. The Fibonacci sequence is but one example of many sequences with simple recursion relations. The Fibonacci sequence obeys the recursion relation P(n) = P(n-1) + P(n-2). A striking feature of this sequence is that the reciprocal of f is 0.6180339887... which is f - 1. The ratio f = 1.6180339887... is called the "golden ratio" or "golden mean". Fibonacci Foolishness. Golden Spiral Hype.

REDHACK Voice of the oppressed! “Before we begin, I’d like to ask you when your penguin documentary will be on. Hello friends, comrades, the ones who defend the indivisible unity of the trees, how are you? When we hear “Gezi Park,” it represents to us how the media is censored, how auto censoring has been developed, very clearly. The fact that we are speaking out to our friends at Halk TV (channel), who have witnessed the events the entire time, is also a reaction, a response to the media who thinks, “don’t touch me and I won’t touch you”. They have fancy slogans (the news channels), which we know are not enough for news reporting, because they all say, “Be the first to know, with us” or “Always be informed with us”. But, life is a master of creating its own alternatives, so we are honestly not so worried. For instance, the Minister of National Education said, “We did what the opposition party could not do for years: we united all the unrelated groups, all the groups who never interact. Are these things legal?

Computer Security Resource Center YUV Ejemplo de plano de color U-V , valor Y' = 0.5, representado dentro de la gama de color RGB. Una imagen junto con sus componentes Y', U, y V. YUV es un espacio de color típicamente usado como parte de un conducto de imagen en color. Codifica una imagen o video en color teniendo en cuenta la percepción humana, permite utilizar ancho de banda reducido para los componentes de crominancia, de esta forma, hace que los errores de transmisión o las imperfecciones de compresión se oculten más eficientemente a la percepción humana que usando una representación RGB "directa". Otros espacios de color tienen propiedades similares; entre las razones para implementar o investigar propiedades de Y'UV se encuentran tanto las de interactuar con televisión analógica o digital o equipamiento fotográfico que se ajusta a ciertos estándares Y'UV, como las de exploración artistica. El modelo YUV define un espacio de color en términos de una componente de luminancia y dos componentes de crominancia.

Telecomix Introduction to Algorithms - Download free content from MIT

Related: