Since I'm launching this new design, let's begin with a few updates on various projects. Raspberry Pi - Status: Hiatus I'd still like to see Chrome on Raspberry Pi fly, but I don't have time for it at present, and I'm kinda at a dead end in terms of where to go with it. It's not dead, so I might have something to share with you in the future for this one. Chromium OS Vanilla - Status: Active Vanilla builds are continuing as normal, but please note that Flash/MP3/PDF aren't supported as these require plugins or codecs which I don't have a license to distribute.
Top 10 Web hacking techniques of 2010 revealedNetwork World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting. Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. FROM THE SECURITY WORLD: Quirky moments at Black Hat DC 2011HowTo: Make Ubuntu A Perfect Mac File Server And Time Machine Volume [Update6] ¦ kremaliciousFor quite some time I use my Ubuntu machine as a file and backup server for all Macs in my network which is perfectly accessible from the Finder in Mac OS X. There are some instructions available in the web for this task but all failed in my case so I wrote my own tutorial with all the steps needed for it to work properly. So here’s my little Tutorial for connecting Mac OS X Leopard with Ubuntu and using your Ubuntu machine as a backup volume for Time Machine but all steps can be reproduced on every Linux box and they work with Mac OS X 10.4 Tiger too.
Malicious Linux Commands -From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.)Exploiting Unexploitable XSSXSS that are protected by CSRF protection or where other mitigating factors are present are usually considered to be unexploitable or of limited exploitability. This post details real world examples of exploiting “unexploitable” XSS in Google and Twitter. While the XSS detailed in this post are site specific the methods that were used to exploit them could be applied to other websites with similar implementations.
OS X Lion Time Machine backup to DebianWhen OS X Lion was released I was eager to try out the updated FileVault and Time Machine features. Moving from an encrypted home directory to true full-disk encryption was a dream. I was also quite excited to find out if the new implementation of FileVault would work well with Time Machine. I’d previously set up a Time Machine volume on my Debian file-server by installing netatalk and avahi. Unfortunately, it seems OS 10.7 (Lion) requires netatalk 2.2, which is currently in beta.
Google Dorkscache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted.SDKBefore installing Android Studio or the standalone SDK tools, you must agree to the following terms and conditions. This is the Android Software Development Kit License Agreement 1. IntroductionMD5 considered harmful todayThe bytes 0 - 473 in the real certificate (the fields up to the modulus, and the first 5 bytes of the modulus field which are a predictable header) are pretty much fixed by CA requirements. Those 474 bytes form the "chosen prefix" on the real certificate's side. For this certificate we chose to have a 2048 bit RSA key.RPi DistributionsBack to the Hub. Software & Distributions: Software - an overview. Distributions - operating systems and development environments for the Raspberry Pi. Kernel Compilation - advice on compiling a kernel.