z8po

Facebook Twitter
Re-xe.Com | Reverse Engineering For Fun And Profit
unnamed pearl
Il y a de cela 6 mois je me suis dit "tiens, il se dit que les attaques de type shatter attack ne sont plus d'actualité sur windows 7... Comme d'habitude la confiance n'exclue pas le contrôle, alors c'est parti on sort devcpp et on se code un fuzzer, le but est d'attaquer les fenêtres SYSTEM, bien entendu. Toka7a propose de porter mon code C en python et d'y implémenter quelques paterns, on se met d'accord sur les grandes lignes et hop, il se met à coder comme un chinois. Franchement bon boulot son fuzzer, plus complet et plus propre que le mien (ca m'apprendra à coder comme un porc). Il le lance sur son PC (win7) et bOOm un beau BSOD. Il faut savoir que son labtop était à jour. Ghosts In The Stack Ghosts In The Stack
From Xen Xen 4.0.0 is the first version to support VGA graphics adapter passthrough to Xen HVM (fully virtualized) guests. This means you can give HVM guest full and direct control of the graphics adapter, making it possible to have high performance full 3D and video acceleration in a virtual machine. Xen VGA passthrough requires IOMMU (Intel VT-d) support from the motherboard chipset, from the motherboard BIOS and from Xen. VGA Passthrough - Xen VGA Passthrough - Xen
Advertisement Pinterest is becoming popular among community. It allows us to pin our favourite photo and share it in our pinboard. You can share your things pretty fast. This Web Design layout has been popular and many websites are adapted this layout structure. The main idea behind grid-based designs is a solid visual and structural balance of web-sites you can create with them. 25 Masonry Pinterest Web Design Layouts 25 Masonry Pinterest Web Design Layouts
All that would change now is the HTTP action parameter. This would basically equate to the database transaction or (CRUD Action - Create, Read, Update or Delete) that is wanted to be performed: RESTful web services have open been mentioned as alternatives to 'Traditional SOA' (SOAP / XML-RPC), however, I believe they need to work hand-in-hand to provide a mix of sources for Mashups (and Mashup editors) . With web services that are generally SOAP-based, the request and response are hidden. SOAP requests must be interpreted as they are received at the server to determine the operation to perform and the arguments required to perform that operation. They are generally passed through as a parameter, which is essentially a function/method call. Why Mashups = (REST + ‘Traditional SOA’) * Web 2.0 : Blog the web Why Mashups = (REST + ‘Traditional SOA’) * Web 2.0 : Blog the web
Alphabet Soup in the Cloud: Understanding "aaS" Alphabet Soup in the Cloud: Understanding "aaS" There's a new one born every minute. I don't mean the P.T. Barnum quote, I mean acronym. Today it seems to be Infrastructure-as-a-Platform (IaaP), to join all the other "as a" acronyms that are difficult to keep straight.
sysadmin Archives - z8po
Réseaux maillés Réseaux maillés Protocoles de routage en mode adhoc AODV : Ad hoc On-Demand Distance Vector Routing, un protocole plus tout jeune mais que l’on voit encore en production (il était utilisé par le réseau citoyen un moment).BABEL : a loop-free distance-vector routing protocol (Université de Jussieu)… un des projets les plus prometteurs. Le draft IETF du 21 mai 2010.B.A.T.M.A.N (Better Approach To Mobile Ad-hoc Networking) relativement léger et stable une référence à mon sens, mais je ne suis pas objectif, c’est aussi celui que j’ai le plus utilisé avec OLSR et AODV.DSDV : Destination-Sequenced Distance Vector routing )DYMO : Dynamic MANET On-demand Routing Protocol. Mobile Mesh utilisé par Locust World
RetroShare Team | RetroShare development blog
Map showing the location and industry of victims in 69 countries hit by the spy operation. Courtesy of Kaspersky Lab An advanced and well-orchestrated computer spy operation that targeted diplomats, governments and research institutions for at least five years has been uncovered by security researchers in Russia. The highly targeted campaign, which focuses primarily on victims in Eastern Europe and Central Asia based on existing data, is still live, harvesting documents and data from computers, smartphones and removable storage devices, such as USB sticks, according to Kaspersky Lab, the Moscow-based antivirus firm that uncovered the campaign. Kaspersky has dubbed the operation “Red October.” Cybersleuths Uncover 5-Year Spy Operation Targeting Governments, Others | Threat Level Cybersleuths Uncover 5-Year Spy Operation Targeting Governments, Others | Threat Level
Start the calibre content server. The calibre content server exposes your calibre library over the internet. The default interface allows you to browse you calibre library by categories. You can also access an interface optimized for mobile browsers at /mobile and an OPDS based interface for use with reading applications at /opds. The OPDS interface is advertised via BonJour automatically. calibre-server calibre-server
Dedicated · OpenRA/OpenRA Wiki Original developer keks-n Ported into OpenRA by ihptru Search for dedicated server related bug reports Linux - works Windows - works Mac OSX - works You can run any Mod as dedicated. Compile or install the game. Dedicated · OpenRA/OpenRA Wiki
MySQL: INSERT IF NOT EXISTS syntax » Autarchy of the Private Cave To start: as of the latest MySQL, syntax presented in the title is not possible. But there are several very easy ways to accomplish what is expected using existing functionality. There are 3 possible solutions: using INSERT IGNORE, REPLACE, or INSERT ... MySQL: INSERT IF NOT EXISTS syntax » Autarchy of the Private Cave
gnome - Why doesn't Gnome3 work even after trying all these workarounds
Problem loading page
How to calculate the MySQL database size As i know, there are two ways to calculate MySQL database size. 1. SQL script Sum up the data_length + index_length is equal to the total table size. data_length – store the real data.index_length – store the table index. Here’s the SQL script to list out the entire databases size
Carte Mère - Socket 1366 - GA-X58A-UD3R (rev. 2.0)
PowerShell Scripting Communicator Automation API Using Native Type Library Summary: Learn how to automate Microsoft Lync 2010 and Microsoft Office Communicator 2007 R2 using native Microsoft Office Communicator 2007 Automation API type library in Microsoft Windows PowerShell. Microsoft Office Communicator 2007 Automation API, supported by Microsoft Lync 2010 for backward compatibility, supports limited scripting. This support is useful in traditional web applications where a scripting language, such VBScript or JavaScript, is used throughout a web page or Microsoft Windows Script Host to enable unified communications functionality. Active scripting is mapped against native COM library, which is embedded in an active Lync instance. Microsoft Windows PowerShell can be employed to automate Lync this way. In this article, I focus on how to perform basic tasks that can be used to automate Lync 2010, Microsoft Office Communicator 2007, or Microsoft Communicator 2007 R2 using PowerShell scripts against the native Communicator 2007 Automation API type library.
SIPSAK sipsak − a utility for various tests on sip servers and user agents sipsak [-dFGhiILnNMRSTUVvwz] [-a PASSWORD ] [-b NUMBER ] [-c SIPURI ] [-C SIPURI ] [-D NUMBER ] [-e NUMBER ] [-E STRING ] [-f FILE ] [-g STRING ] [-H HOSTNAME ] [-l PORT ] [-m NUMBER ] [-o NUMBER ] [-p HOSTNAME ] [-P NUMBER ] [-q REGEXP ] [-r PORT ] [-t NUMBER ] [-u STRING ] [-W NUMBER ] [-x NUMBER ] -s SIPURI sipsak is a SIP stress and diagnostics utility. It sends SIP requests to the server within the sip-uri and examines received responses. It runs in one of the following modes: - default mode
Mayan Periodic Chart of the Elements
Box Shadows
Circular Progress Bar - jQuery plugin
Flip! A jQuery plugin v0.9.9
harmony:proposals
io
★ L'architecture orientée ressource pour faire des services web RESTful
Scaling Isomorphic Javascript Codeblog.nodejitsu.com - scaling node.js applications one callback at a time.
twmobius/node-ipc
Node.js vs. Opa: Web Framework Showdown
The Open Information Security Foundation - Suricata Downloads
superafroman/node-torrent
fent/node-torrent
antimatter15/summerTorrent
Full Stack Node.js Part 2 | PeepCode Screencasts
AF83/turbulences_demo
Bienvenue sur le site de la Recherche en CyberGéographie
Search for Timeline
Mozilla jumps into Node.js server project | Deep Tech
How to execute multiple shell commands using node.js
node-bittorrent/lib/bittorrent.js at master · WizKid/node-bittorrent
Comment synchroniser l'agenda d'outlook 2010 avec Lightning (Page 1) / Bureautique et logiciels pour l'internet et le réseau
Utiliser Thunderbird avec un serveur Microsoft Exchange 2007 » DocGreen
GParted partitioning software - Full tutorial
Fix Dual Monitors in GNOME 3 (aka My Workspaces are Broken!) | Greg Cordts' Blog
Desktop Scroller (Original) - GNOME Shell Extensions
gnome-shell
as3crypto - Cryptography library for ActionScript 3, including partial TLS 1.0 support
noVNC - Un client VNC en HTML5
Vertex (graph theory)
Visual editor
VisualEditor
Feature #2024: gantt chart editting
SSH et numericable
« Réseaux sociaux et contraintes dans l’Antiquité Tardive »
JavaScript RSS Box Viewer 3.3
seo sao

Data journalism

infographics

hardware

web

linux

gregory.rozieres

vitaminee

hurz

Javascript

php

db

Xao