background preloader

Base64 Online - base64 decode and encode - Iceweasel

Base64 Online - base64 decode and encode - Iceweasel
This online sample demonstrates functionality of a base64 property, ByteArray class and Huge asp file upload. You can convert texts using several code pages (using CharSet property) from Unicode string to byte array and then convert the binary data to a Base64 string. The sample uses a special Base64 algorithm written for the ByteArray class. The Base64 conversion algorithm is written in C++ and works with binary (VT_ARRAY | VT_UI1) and String (BSTR) OLE data. It contains hi-speed and low-memory consumption BSTR->BSTR, BSTR->BINARY, BINARY->BSTR and BSTR->BSTR algorithms. Source code of the coding algorithm is available within distribution license of a ScriptUtilities library. Another online samples (utilities, converting, upload) On-line base64 decoder and encoder - let's you convert text data and files from/to a Base64 string.

http://www.motobit.com/util/base64-decoder-encoder.asp

Testing SMTP AUTH connections - Iceweasel When setting up a mail server, one of the things you should do before you "go live" is to test it- not only to make sure things which should work, do work, but to make sure things which shouldn't work, don't. One of the things to test is whether or not your server correctly supports the AUTH command. This command is used when a remote client wishes to identify themself as an "authenticated" user, normally so that they can use your server as an outbound mail relay. This is very handy for companies with employees who travel, or for ISPs with clients who travel.

nvert between Latitude/Longitude & OS National Grid Reference points Some people have asked me about converting between latitude/longitude & Ordnance Survey grid references. The maths is extraordinarily complex, but the Ordnance Survey explain the resulting formulae very clearly in Annex C of their Guide to coordinate systems in Great Britain. OS Grid References are based on 100km grid squares identified by letter-pairs, followed by digits which identify a sub-square within the grid square, as explained on the OS Interactive Guide to the National Grid. 6-digit references identify 100m grid squares; 8 digits identify 10m grid squares, and 10 digits identify 1m squares. TG51401317 represents a 10m box with its (south-west) origin 51.40km across, 13.17km up within the TG square. Before going further, I have to mention that, at a fine level of accuracy, there are different ways of measuring latitude & longitude. The Ordnance Survey uses ‘OSGB-36’, based on an elliptical model of the earth’s surface which is a good fit to the UK.

My Wireless Cracking Tool I’ve become a semi-expert on wireless networking and their security features.. and how to get around them. Before I continue I want to emphasize: The act of cracking encryption is not illegal just like picking a lock is not illegal. It is the unauthorized access of that network which is illegal, just like breaking and entering is illegal. XSS, Cookies, and Session ID Authentication – Three Ingredients for a Successful Hack > The XSS Vulnerability Cross site scripting (XSS) errors are generally considered nothing more than a nuisance — most people do not realize the inherent danger these types of bugs create. In this article Seth Fogie looks at a real life XSS attack and how it was used to bypass the authentication scheme of an online web application, leading to "shell" access to the web server. Cross site scripting (XSS) attacks are often seen as a powerless hack.

SQL Injection Welcome to another edition of Security Corner. This month's topic is SQL injection, an attack vector that frequents the minds of PHP developers, but for which there is a shortage of good documentation. Most web applications interact with a database, and the data stored therein frequently originates from remote sources. Thus, when creating an SQL statement, you often use input in its construction. Access SMTP server with authentication : smtp, gmail, telnet, se (Trying again because not making much progress) Okay, I've got an older microsoft VC++ 6.0 program that works great, it's a home automation program that sends me an email at work at certain times. However, I'd like to switch smtp servers to my gmail account, but smtp.gmail.com requires some sort of encryption (I think it's TLS, because when I telnet in to send an email I get a "must issue a STARTTLS command first z52ss97610").

Education Education Article II of the GeocacheAlaska! Inc. by-laws states the reasons for founding our organization are to: To meet the heavy commitment to train and educate, GeocacheAlaska! is in the process of creating training materials for use by all geocachers. The information will be first presented at GeoEducation Events hosted at several Alaskan locations and then posted here in portable document format (pdf) for all geocachers' use and reference. Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

XSS (Cross Site Scripting) Cheat Sheet Last revision (mm/dd/yy): 06/1/2016 This cheat sheet is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion. Please note that most of these cross site scripting vectors have been tested in the browsers listed at the bottom of the scripts. sqlninja - a SQL Server injection & takeover tool While sqlninja can be extremely effective in your penetration tests, is not a trivial tool to setup and use. While this is a good thing to keep script kiddies at bay, it can be also a problem for security professionals that have to deal with short deadlines. Therefore, here are a couple of flash movies that should make things a little clearer for people that have never used this tool before. Sqlninja basic demo A demo of all basic features: How to configure the tool How to fingerprint the remote server How to bruteforce the 'sa' password How to upload executables and obtain a shell

Related:  Online ToolsСМЭВ