background preloader

Ha.ckers.org web application security lab

Ha.ckers.org web application security lab
Here we are, my friends. The 1000th post. Whew! It’s quite a load off to have finally made it. Hopefully this doesn’t come as a surprise to anyone since I’ve been announcing it for months, and if you have questions, hopefully the FAQ can answer them. I wrote and re-wrote this post several times.

http://ha.ckers.org/

MIT/Stanford Venture Lab Moderator Kara Swisher, Co-Executive Editor, All Things Digital, Wall Street Journal Panelists Bret Taylor, Co-founder, FriendFeed Loic Le Meur, Founder, Seesmic Jeff Clavier, Founder, SoftTech VC Leah Culver, Co-Founder, Pownce Event Description: Arbor Networks Security Engineering & Response Team Marc Eisenbarth, Alison Goodrich, Roland Dobbins, Curt Wilson Background A very serious vulnerability present in OpenSSL 1.0.1 for two years has been disclosed (CVE-2014-0160). This “Heartbleed” vulnerability allows an attacker to reveal up to 64kb of memory to a connected client or server. This buffer-over-read vulnerability can be used in rapid succession to exfiltration larger sections of memory, potentially exposing private keys, usernames and passwords, cookies, session tokens, email, or any other data that resides in the affected memory region. This flaw [...] Read More

Eric S. Raymond's Home Page Welcome to my piece of the Web. I maintain quite a lot of open-source software, FAQs, and HTML documents, so this site is rather complex. It's mostly validated HTML and light on the graphics, though. You won't have to wait an eon for any of the pages to load. If the software and FAQs I maintain are valuable to you (and especially if my software makes you money) please leave me a tip at Patreon or SubscribeStar. I'm on SUITE New York: contemporary furniture showcasing top European, American designers This website ("Website") is operated by SUITE New York LLC ("we", "our", or "us"). Please read the following terms and conditions (the 'Terms of Use') carefully before using the Website. By accessing this Website, you agree to be bound by these Terms of Use.

Data Breach Scoreboard 06 November 2012Drew Amorosi Infosecurity compiles history’s top data breaches, while surveying the mandatory reporting landscape in the US and Western Europe Data Breach Reporting Requirements These United States? Female Sexuality Explored Those women who are content with their sexual performance and functioning will not view these disorders as problematic. However, any woman who is unhappy with her sexual activity should seek treatment from a qualified professional. Moreover, a serious health problem is often indicated by a female sexual dysfunction or health problem. NLP and Social Engineering - Hacking the human mind Article at HellBound Hackers Hey everyone this is an extension to my original Social engineering article. This will add on to the specifics behind some techniques that you can use in real social engineering. I hope this really adds on to what I mentioned in the previous article, enjoy.

Blue Blood Magazine Gothic Punk Deathrock Fandom News Photos Forum » Should You Blog on the First Date? The sex blogger panel at SXSW was entertaining and provided food for thought, but I’ve been having trouble writing about it. I finally realized that the problem with writing about sex bloggers is the same problem bloggers have writing about sex: Specifically, sex and sexuality are very core to self, so even the most gentle critiquing of someone’s sexuality can be terribly hurtful. If any sex bloggers are wounded by what I say here, I apologize, but please keep in mind how you feel when you write about sex with a date who doesn’t like your review. I attended the Do You Blog on the First Date?

Related: