Hyper-V Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualization, is a native hypervisor; it can create virtual machines on x86-64 systems. Starting with Windows 8, Hyper-V supersedes Windows Virtual PC as the hardware virtualization component of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual machines to one or more networks. Hyper-V was first released along Windows Server 2008 and became a staple of the Windows Server family ever since. History A beta version of Hyper-V was shipped with certain x86-64 editions of Windows Server 2008. The finalized version was released on June 26, 2008 and was delivered through Windows Update. Hyper-V has since been released with every version of Windows Server. Microsoft provides Hyper-V through two channels: Part of Windows: Hyper-V is an optional component of Windows Server 2008 and later. Hyper-V Server Architecture Linux support
The UK Hackspace Foundation Apprendre le hacking - Techniques de base hacking / sécurité informatique Définition Le nom parle de lui-même : cette faille apparaît quand il est possible d'injecter du code SQL dans les requêtes SQL qui sont faites dans une page web. C'est actuellement la "meilleure" vulnérabilité Web en rapport fréquence/surface d'exploitation. Les conséquences d'une faille SQL peuvent être multiples, du contournement de formulaires d'authentification au dump complet de la base de données en passant par l'exécution arbitraire de code. On peut agrémenter ces requêtes comme bon nous semble en utilisant d'autres fonctionnalités du langage SQL : UNION SELECT pseudo,password FROM admins UNION SELECT pseudo,password FROM admins WHERE pseudo='OR 1=1# AND password='OR ''=" UNION SELECT pseudo,password FROM admins WHERE pseudo='OR "=' AND password='OR "=' Nous l'avons dit, ce type d'injections reste basique. Un petit exemple Comme d'habitude, nous allons prouver nos dires par un petit exemple. // auth.php - Authentification des admins Bases Hacking if ($login ! mysql_close(); if (!
« Hackez la ville ! » – Les conseils d’un pirate en colère Le projet "Dead Drops" propose de partager des fichiers de pair à pair via des clés USB disséminées dans les murs de la ville. L’artiste berlinois Aram Bathollen critique ainsi les opposants à la culture du partage en pleine expansion grâce au numérique. Ne parlez plus de Génération Y, mais de “Génération G” comme Généreuse. C’est ce que nous explique trendwatching.com, relayé par l’excellente newsletter de Curiouser qui y voit “l’émergence d’une culture digitale du partage, où les individus échangent, donnent, s’engagent, créent, collaborent. Selon une récente étude “The new sharing economy“, les médias sociaux seraient le catalyseur d’une économie de partage offline“, annonçant le passage “d’une économie de la propriété vers une économie de l’accès“. Tous ? “Dead Drops” is an anonymous, offline, peer to peer file-sharing network in public space. Traduction approximative : La première clé USB a été installée à New York en octobre dernier. Et maintenant, à nous/vous de jouer !
Networking Academy Anonymous vs. ISIS: Worldwide Hackers Declare Online War To Disrupt ISIS Propaganda “#OpParis” is the name of the cyberwar campaign which was declared by the online Hacktivist group Anonymous in order to help with hunting out and shutting down social media accounts and websites affiliated with the Islamic State militant group (ISIS). ISIS had claimed responsibility for the terrifying terrorist attacks that rocked Paris last week, killing 129 people and injuring hundreds more. Hours later, Anonymous posted a video on YouTube saying they will launch their “biggest operation ever” with the warning that “Anonymous from all over the world will hunt you down.” The Following Video via Anonymous Official: In response to the Anonymous declaration, ISIS terrorists called Anonymous “idiots.” The message read: “The #Anonymous hackers threatened in a new video release that they will carry out a major hack operation on the Islamic state (idiots).” ISIS idiots instructions to avoid #OpISIS #OpParis fighters. pic.twitter.com/EjNMAnSDNJ— GhostSecPI (@GhostSecPI) November 16, 2015
"Password" unseated by "123456" on SplashData’s annual "Worst Passwords" list The 2013 list of worst passwords, influenced by postings from the Adobe breach, demonstrates the importance of not basing passwords on the application or website being accessed LOS GATOS, CA – SplashData has announced its annual list of the 25 most common passwords found on the Internet. For the first time since SplashData began compiling its annual list, "password" has lost its title as the most common and therefore Worst Password, and two-time runner-up "123456" took the dubious honor. "Password" fell to #2. According to SplashData, this year's list was influenced by the large number of passwords from Adobe users posted online by security consulting firm Stricture Consulting Group following Adobe's well publicized security breach. "Seeing passwords like 'adobe123' and 'photoshop' on this list offers a good reminder not to base your password on the name of the website or application you are accessing," says Morgan Slain, CEO of SplashData. About SplashData, Inc. Press Contact:
Bluejacking This Siemens M75 is Bluejacking the Sony Ericsson K600i pictured below This Sony Ericsson K600i is getting Bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Origins Bluejacking was reportedly first carried out by a Malaysian IT consultant who used his phone to advertise Sony Ericsson. Usage Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning.
Step by Step Guide to installing Plex on a NowTV Box Follow this easy step by step guide to get your NowTV box setup and install Plex without having to sign up for any NowTV service. Background: The NowTV box is just a rebranded Roku LT (which usually retails for around £40) however sadly Sky choose to block third party apps which compete with it’s service, with this guide I’ll show you how to enable the developer mode and get around Sky’s restriction and get Plex up and running in no time. This can be achieved in about 10 minutes. Before you begin this guide, I will assume you have already purchased your NowTV box, but if not, for only £9.99 delivered you might as well order one (or a few, hehe!) Step 1: Registering a free NowTV account. To even get the NowTV box setup, you need to setup an account with Sky. Click this link to go to the Sign up Page: Join NOW TV today and watch the latest movies and live Sky Sports | NOW TV Scroll down and Select the 30 day free Movies Trial (ignore the Sports Day Pass): Next you’re asked for some details.
Portail officiel de la sécurité informatique - ANSSI - République française Bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant.). This allows access to a calendar, contact list, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device. Current mobile software generally must allow a connection using a temporary state initiated by the user in order to be 'paired' with another device to copy content. There seem to have been, in the past, available reports of phones being Bluesnarfed without pairing being explicitly allowed. Attacks on wireless systems have increased along with the popularity of wireless networks. See also References
Hacking Amazon's Fire tablet Amazon’s Fire tablet is probably one of the best tablets you can buy for $50… and on Thanksgiving weekend Amazon is selling it for just $35, which makes it an even better bargain. Update: Amazon is selling the tablet for just $33.33 on Amazon Prime Day, 2016. While this article was written in late 2015, many of the tips still work: but you can also check out the Fire Tablet section at the xda-developers forum for more details about the latest custom ROMs, root methods, and other hacks. The 7 inch tablet may not have an HD display or stereo speakers, but it supports WiFi and Bluetooth, has front and rear cameras, features a quad-core processor, and has an IPS display with wide viewing angles. It’s one of Amazon’s first tablets to have a microSD card slot for removable storage. And unlike most other tablets in its price range, the Fire tablet comes from a company with a reputation for offering software updates and customer service. Install the Google Play Store Rooting the Fire tablet
What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Each segment has the destination address attached, the source address, and other information such as the number of packets and reassembly order. Once they arrive at the destination, the packet's headers and footers are stripped away, and the packets are reconstituted. In the example of the simplest network where computers share an Ethernet wire, all packets that travel between the computers are "seen" by every computer on the network. A slightly safer environment is a switched Ethernet network. There are ways to hack the switch protocol, however. A packet sniffer is not just a hacker's tool.
How to Install the Google Play Store on Your Amazon Fire Tablet Amazon’s Fire Tablet normally restricts you to the Amazon Appstore. But the Fire Tablet runs Fire OS, which is based on Android. You can install Google’s Play Store and gain access to every Android app, including Gmail, Chrome, Google Maps, Hangouts, and the over one million apps in Google Play. This doesn’t even require rooting your Fire Tablet. There are two methods for doing this: one that involves installing a few APK files on your tablet, and one that involves running a script from a Windows PC. Option One: Install the Play Store From Your Fire Tablet We tested this first method on a Fire HD 8 running Fire OS 18.104.22.168, but readers have reported it working on the latest 5.3.2 too, as well as on the 7″ Fire Tablet. Step One: Download the Google Play Store APK Files Before you begin, go into Settings > Security and enable “Apps from Unknown Sources”. Next, there are four .APK files you’ll need to download, using the built-in Silk browser on your tablet. Google Account Manager APK