<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3351698474708861894</atom:id><lastBuildDate>Tue, 24 Sep 2024 16:07:59 +0000</lastBuildDate><category>security</category><category>hack</category><category>open source</category><category>freeware</category><category>operating system</category><category>web</category><category>linux</category><category>exploit</category><category>microsoft</category><category>windows</category><category>link</category><category>release</category><category>network</category><category>humor</category><category>programming</category><category>government</category><category>hardware</category><category>howto</category><category>Firefox</category><category>business</category><category>google</category><category>picture</category><category>fail</category><category>javascript</category><category>video</category><category>vista</category><category>captcha</category><category>chat</category><category>internet explorer</category><category>ubuntu</category><category>yahoo</category><category>noob</category><category>cracking</category><category>420</category><category>BSD</category><category>Visual basic</category><category>WIFI</category><category>science</category><category>CD/DVD</category><category>IDE</category><category>Photoshop</category><category>adobe</category><category>anon</category><category>apple</category><category>distributed</category><category>edittor</category><category>error</category><category>students</category><category>torrent</category><title>Hackers&#39; Lounge:1</title><description>&lt;br&gt;&#xa;&quot;Where the l33t meet!&quot;</description><link>http://hackerslounge1.blogspot.com/</link><managingEditor>noreply@blogger.com (SoCo)</managingEditor><generator>Blogger</generator><openSearch:totalResults>120</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-6775884494728800391</guid><pubDate>Fri, 21 Sep 2012 20:46:00 +0000</pubDate><atom:updated>2012-09-21T15:46:37.088-05:00</atom:updated><title>[Link] Understanding TTY</title><description>&lt;a href=&quot;http://www.linusakesson.net/&quot;&gt;www.linusakesson.net&lt;/a&gt;&lt;br /&gt;
Linus Åkesson (July 25, 2008)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #555555; border: 2px solid gray; color: white; font-size: 110%; line-height: 220%; padding: 4px;&quot;&gt;&lt;a href=&quot;http://www.linusakesson.net/programming/tty/&quot; style=&quot;color: white;&quot;&gt;&amp;lt;The TTY demystified&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/09/link-understanding-tty.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-8799133317664794984</guid><pubDate>Wed, 25 Apr 2012 04:20:00 +0000</pubDate><atom:updated>2012-04-24T23:44:42.715-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cracking</category><category domain="http://www.blogger.com/atom/ns#">fail</category><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">operating system</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>RuggedCom Unresponsive, Rugged Operating System (ROS&amp;reg;) Backdoor Disclosed</title><description>A factory backdoor account in RuggedCom&#39;s Rugged Operating System (ROS&amp;reg;) has been disclosed. &lt;a href=&quot;http://www.ruggedcom.com/&quot;&gt;&amp;lt;RuggedCom&amp;gt;&lt;/a&gt; is a manufacturer of rugged networking equipment popular in industrial, utility, and defense industries. These sensitive consumers of frequently security sensitive networking devices have recently been informed by RuggedCom, who has acknowledged the backdoor. Due somewhat to RuggedCom&#39;s unresponsiveness after acknowledgement, this information was publicly disclosed. According to the disclosure, an undocumented account, &quot;factory&quot;, which cannot be disabled, is included in all released versions of ROS&amp;reg; with a password generated from the device&#39;s MAC address.&lt;br/&gt;
&lt;br/&gt;

&lt;a href=&quot;http://lists.grok.org.uk/pipermail/full-disclosure/2012-April/086652.html&quot;&gt;&amp;lt;Secunia - Full Disclosure CVE-2012-1803 (April 23, 2012)&amp;gt;&lt;/a&gt;
&lt;br/&gt;
&lt;div style=&quot;background-color: #323232; border: 1px solid white; padding: 5px;&quot;&gt;&lt;pre style=&quot;overflow: wrap;&quot;&gt;#!/usr/bin/perl
if (! defined $ARGV[0]) {
print &quot;+========================================== \n&quot;;
print &quot;+ RuggedCom ROS Backdoor Password Generator \n&quot;;
print &quot;+ JC CREW April 23 2012 \n&quot;;
print &quot;+ Usage:\n$0 macaddress \n&quot;;
print &quot;+========================================== \n&quot;;
exit; }
$a = $ARGV[0];
$a =~  s/[^A-F0-9]+//simg;
@b = reverse split /(\S{2})/,$a;
$c = join &quot;&quot;, @b;
$c .= &quot;0000&quot;;
$d = hex($c) % 999999929;
print &quot;$d\n&quot;;&lt;/pre&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/04/ruggedcom-unresponsive-rugged-operating.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-5809237754741067448</guid><pubDate>Sun, 22 Apr 2012 17:01:00 +0000</pubDate><atom:updated>2012-04-22T12:11:29.386-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>CISPA - US Internet Survalience Bill</title><description>Customers voice their opinion to supporters of the newest dangerous Internet bill, CISPA (H.R. 3523).&lt;br/&gt;
&lt;br/&gt;
&lt;br/&gt;
&lt;div style=&quot;background-color: #323232; border: 1px solid white; padding: 5px;&quot;&gt;
&lt;br/&gt;
Cyber Intelligence Sharing and Protection Act (CISPA), also known as H.R. 3523,
is not just another horribly irresponsible SOPA / PIPA. This bill focuses on a real issue, but does it the most horrible and irresponsible way possible.&lt;br/&gt;
&lt;br/&gt;
CISPA is meant to lay the foundation for private companies and Internet service providers to share information with the US Government about cyber security threats. The main problems are the lack of any real definition to what a threat is, the bypassing of all existing laws to protect collection and sharing of your personal data by private companies, the lack of restriction of what information can be shared and with who, the warrant-less unrestricted sharing of data with the NSA, DHS, and other government agencies, and encouragement of heavy broad surveillance of citizens.&lt;br/&gt;
&lt;br/&gt;
This bill will directly encourage private companies such as your cellular carrier (Verizon / AT&amp;T), your operating system (Microsoft), your anti virus scanner (Symantec), and your Internet service provider (ISP) to collect huge amounts of your personal data to a level that would previously be illegal. This CISPA authority would override privacy protection laws (such as protecting of your medical records), local eavesdropping and wiretapping laws, and allow collection of almost any data based on recklessly vague &quot;cybersecurity&quot; purposes. This private companies would be able to collect this data anonymously without ever having to tell you they collected it or what they collected. They would be free to share the data with any company they want, possibly even selling the data, with complete immunity to legal actions such as lawsuits of criminal charges for privacy violations. They would be allowed to dump all this data on any US Government agency without requiring a warrant.&lt;br/&gt;
&lt;br/&gt;
This is at the wake of the NSA beginning building the country&#39;s biggest spy center in Utah. As well as a recent NSA whistle-blower&#39;s claim that the US Government has illegally been engaged in wide spread Internet surveillance for quite some time having intercepted 20 Trillion communications and has copies of &quot;most of your Emails&quot;. Again, illegally and therefor with no oversight, I might add.&lt;br/&gt;
&lt;br/&gt;
CISPA (H.R. 3523) is another horrible dangerous and irresponsible bill that will erode all existing personal data and privacy protection laws, and give ALL your data to private companies to use and abuse under the table with complete immunity from legal repercussions.&lt;br/&gt;
&lt;br/&gt; 
Verizon disgustingly supports this bill. We call on you, Verizon, to change your stance away from this strong-arm theft and abuse of citizens personal data!&lt;br/&gt;
&lt;br/&gt;
Verizon&#39;s letter of support for CISPA:&lt;br/&gt;
&lt;a href=&quot;http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/Verizon113011.pdf&quot;&gt;http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/Verizon113011.pdf&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;br/&gt;
More Information:&lt;br/&gt;
&lt;br/&gt;
   Electronic Freedom Foundation:&lt;br/&gt;
   &lt;a href=&quot;http://cyberspying.eff.org/&quot;&gt;http://cyberspying.eff.org/&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt; 
   TIME Magazine:&lt;br/&gt;
   &lt;a href=&quot;http://techland.time.com/2012/04/19/5-reasons-the-cispa-cybersecurity-bill-should-be-tossed/&quot;&gt;http://techland.time.com/2012/04/19/5-reasons-the-cispa-cybersecurity-bill-should-be-tossed/&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;a href=&quot;https://community.verizonwireless.com/bookmarks/1221&quot;&gt;Source: Verizon Wireless Community Forum&lt;/a&gt;&lt;br/&gt;April 22, 2012 12:00PM&lt;br/&gt;
(The original text has been modified for formatting, linking, and alignment.)&lt;br/&gt;
&lt;br/&gt;
Some other supporters:&lt;br/&gt;
&lt;ul&gt;
&lt;li&gt;AT&amp;amp;T&lt;/li&gt;
&lt;li&gt;Boeing&lt;/li&gt;
&lt;li&gt;BSA&lt;/li&gt;
&lt;li&gt;Business Roundtable&lt;/li&gt;
&lt;li&gt;CSC&lt;/li&gt;
&lt;li&gt;COMPTEL&lt;/li&gt;
&lt;li&gt;CTIA - The Wireless Association&lt;/li&gt;
&lt;li&gt;Cyber, Space &amp;amp; Intelligence Association&lt;/li&gt;
&lt;li&gt;Edison Electric&lt;/li&gt;
&lt;li&gt;EMC&lt;/li&gt;
&lt;li&gt;Exelon&lt;/li&gt;
&lt;li&gt;Facebook&lt;/li&gt;
&lt;li&gt;The Financial Services Roundtable&lt;/li&gt;
&lt;li&gt;IBM&lt;/li&gt;
&lt;li&gt;Independent Telephone &amp;amp; Telecommunications Alliance&lt;/li&gt;
&lt;li&gt;Information Technology Industry Council&lt;/li&gt;
&lt;li&gt;Intel&lt;/li&gt;
&lt;li&gt;Internet Security Alliance&lt;/li&gt;
&lt;li&gt;Lockheed Martin&lt;/li&gt;
&lt;li&gt;Microsoft&lt;/li&gt;
&lt;li&gt;National Cable &amp;amp; Telecommunications Association&lt;/li&gt;
&lt;li&gt;NDIA&lt;/li&gt;
&lt;li&gt;Oracle&lt;/li&gt;
&lt;li&gt;Symantec&lt;/li&gt;
&lt;li&gt;TechAmerica&lt;/li&gt;
&lt;li&gt;US Chamber of Commerce&lt;/li&gt;
&lt;li&gt;US Telecom - The Broadband Association&lt;/li&gt;
&lt;li&gt;Verizon&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/04/cispa-us-internet-survalience-bill.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-959075297870979457</guid><pubDate>Sun, 12 Feb 2012 22:33:00 +0000</pubDate><atom:updated>2012-04-22T12:12:06.632-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Steam Warns User&#39;s Personal Info and Credit Card Data Swiped in Last Year&#39;s Intrusion</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://upload.wikimedia.org/wikipedia/commons/a/ae/Steam_logo.svg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIkZXSo_0hNI7AcyChEsX3KZWRh32paBejGmT9r_ukf1QWLvCAj_GWSHXHn3f5CWA5GSr5K5rA9Ws-43XdXjHuAqaGy0VH0HuTnYFXdiJ9c_uxzgXAkJbBk-NAiqgwOvvjG96BlV0oRPGy/s1600/SteamLogo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;a href=&quot;http://store.steampowered.com/&quot;&gt;&amp;lt;Steam&amp;gt;&lt;/a&gt;, the popular gaming digital rights management platform by &lt;a href=&quot;http://www.valvesoftware.com/&quot;&gt;&amp;lt;Valve&amp;gt;&lt;/a&gt;, pushed an update today containing an &quot;update news&quot; page, which warned of the discovery that personal data was stolen in last year&#39;s intrusion. Steam warned that a copy of a backup file about transactions between 2004 and 2008 may have been obtained. Steam assured that no Steam account passwords were included, but mentioned the following user data being contained in the taken data:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;height:200px;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;float:left;margin:0 7px 0 0;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2n_BvKjEnL4D5kwxJ5Zc9cnfZ1A8GGly1Sp4qIVdJ5PJvNVsiqBz62a9FXM53ehQmX3WPndOBtXwpNqQ_hDgnGyT8HeYzH3sU8PQ4hzDahMgHbhRGai1vZ709PqgqnA88PtcGzySe6tEl/s1600/SteamNotice.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2n_BvKjEnL4D5kwxJ5Zc9cnfZ1A8GGly1Sp4qIVdJ5PJvNVsiqBz62a9FXM53ehQmX3WPndOBtXwpNqQ_hDgnGyT8HeYzH3sU8PQ4hzDahMgHbhRGai1vZ709PqgqnA88PtcGzySe6tEl/s200/SteamNotice.png&quot; width=&quot;167&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;User Names&lt;/li&gt;
&lt;li&gt;EMail Addresses&lt;/li&gt;
&lt;li&gt;Encrypted Billing Adresses&lt;/li&gt;
&lt;li&gt;Encrypted Credit Card Information&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;Steam Update News Text:&lt;br /&gt;
&lt;div style=&quot;background-color: #323232; border: 1px solid white; padding: 5px;&quot;&gt;&lt;pre style=&quot;overflow: wrap;&quot;&gt;February 10th, 2012
Dear Steam Users and Steam Forum Users:

We continue our investigation of last year’s intrusion
with the help of outside security experts. In my last
note about this, I described how intruders had accessed
our Steam database but we found no evidence that the
intruders took information from that database. That is
still the case.

Recently we learned that it is probable that the
intruders obtained a copy of a backup file with 
information about Steam transactions between 2004 and
2008. This backup file contained user names, email
addresses, encrypted billing addresses and encrypted
credit card information. It did not include Steam
passwords.

We do not have any evidence that the encrypted credit
card numbers or billing addresses have been compromised.
However as I said in November it’s a good idea to watch
your credit card activity and statements. And of course
keeping Steam Guard on is a good idea as well.

We are still investigating and working with law
enforcement authorities. Some state laws require a more
formal notice of this incident so some of you will get
that notice, but we wanted to update everyone with this
new information now.

Gabe
&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/02/steam-warns-users-personal-info-and.html</link><author>noreply@blogger.com (SoCo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIkZXSo_0hNI7AcyChEsX3KZWRh32paBejGmT9r_ukf1QWLvCAj_GWSHXHn3f5CWA5GSr5K5rA9Ws-43XdXjHuAqaGy0VH0HuTnYFXdiJ9c_uxzgXAkJbBk-NAiqgwOvvjG96BlV0oRPGy/s72-c/SteamLogo.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-3271291153887625447</guid><pubDate>Wed, 18 Jan 2012 03:31:00 +0000</pubDate><atom:updated>2012-01-28T21:58:36.033-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>Fight SOPA and PROTECT IP</title><description>This blog would be forced offline if the currently proposed U.S. legislature is passed. &lt;br /&gt;
&lt;br /&gt;
SOPA and PROTECT IP are poorly defined, easily abused, unclear bills proposed to the U.S. House and Senate with unrealistic expectations of Internet technology, which will stifle free speech and innovation while giving the U.S. Government the ability to censor the U.S. Internet and seize U.S. domain names with little reason or limitation. Enforcement of these bills would require the restructuring of many web services which would affect Internet users globally.&lt;br /&gt;
&lt;br /&gt;
These bills threaten a blog like this through vague terminology lacking definitions, such as &quot;committing or facilitating the commission of criminal violations&quot; [of copyright infringement or counterfeit products]. &quot;Facilitation&quot; can often be argued as simply teaching or demonstrating how to do something. As I interpret this, any website with Hacking/Hacker/Hack in the name or topic would technically be automatically out of compliance and be at the mercy of enforcement of these laws to not permanently seize associated domain names and possibly further prosecute owners.&lt;br /&gt;
&lt;br /&gt;
These bills create a largely undefined take down process that will clearly leave many types of web services, such as the free blog host here at blogger.com, unable to meet requirements. No provisions for abuse make these vague bills a prime target for more abuse than the DMCA takedown request system has historically endured.&lt;br /&gt;
&lt;br /&gt;
Some other concerning areas of these bills include provisions against circumvention of such measures, which the U.S. State department funds creating hypocritical tools for doing just that, to offer citizens under [foreign]&quot;repressive regimes&quot; uncensored access to the internet.&lt;br /&gt;
&lt;br /&gt;
Please do all you can to educate the public and urge U.S. citizens to contact their government representatives urging them to vote against these reckless bills.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bill text PROTECT IP (Senate):&lt;br /&gt;
&lt;a href=&quot;http://hdl.loc.gov/loc.uscongress/legislation.112s968&quot;&gt;http://hdl.loc.gov/loc.uscongress/legislation.112s968&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Bill text SOPA - Stop Online Piracy Act (House):&lt;br /&gt;
&lt;a href=&quot;http://hdl.loc.gov/loc.uscongress/legislation.112hr3261&quot;&gt;http://hdl.loc.gov/loc.uscongress/legislation.112hr3261&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
A Layman&#39;s examination:&lt;br /&gt;
&lt;a href=&quot;http://blog.reddit.com/2012/01/technical-examination-of-sopa-and.html&quot;&gt;http://blog.reddit.com/2012/01/technical-examination-of-sopa-and.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
History of DCMA takedown abuse:&lt;br /&gt;
&lt;a href=&quot;https://www.eff.org/takedowns&quot;&gt;https://www.eff.org/takedowns&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
How these bills violate free speech and innovation:&lt;br /&gt;
&lt;a href=&quot;https://www.eff.org/deeplinks/2012/01/how-pipa-and-sopa-violate-white-house-principles-supporting-free-speech
&quot;&gt;https://www.eff.org/deeplinks/2012/01/how-pipa-and-sopa-violate-white-house-principles-supporting-free-speech&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
U.S. State department funds tools to circumvent censoring: &lt;br /&gt;
&lt;a href=&quot;http://www.bloomberg.com/news/2011-04-20/u-s-funds-help-democracy-activists-evade-internet-crackdowns.html&quot;&gt;http://www.bloomberg.com/news/2011-04-20/u-s-funds-help-democracy-activists-evade-internet-crackdowns.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
I apologize for any inconvenience. We will be returning soon.&lt;br /&gt;
&lt;br /&gt;
SoCo&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/01/fight-sopa-and-protect-ip.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-1532153058326801128</guid><pubDate>Fri, 06 Jan 2012 15:04:00 +0000</pubDate><atom:updated>2012-01-06T09:05:05.417-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">link</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Link] Source Code of Older Symantec Antivirus Stolen</title><description>Security Week&lt;br /&gt;
Brian Prince  (January 06, 2012 - Updated)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;line-height:220%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.securityweek.com/symantec-investigating-possible-theft-norton-av-source-code&quot;&gt;&amp;lt;Symantec Investigating Possible Theft of Norton AV Source Code&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Update:&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;line-height:220%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.facebook.com/Symantec/posts/10150465997682876?_fb_noscript=1&quot;&gt;&amp;lt;Facebook - Symantec confirms&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2012/01/source-code-of-older-symantec-antivirus.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-7568588556199883342</guid><pubDate>Tue, 27 Dec 2011 17:25:00 +0000</pubDate><atom:updated>2011-12-27T11:25:27.842-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anon</category><category domain="http://www.blogger.com/atom/ns#">business</category><category domain="http://www.blogger.com/atom/ns#">fail</category><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Antisec Gives Christmas Present to the Public, Massivly Owning Stratfor&#39;s Servers</title><description>Stratfor, &lt;a href=&quot;http://en.wikipedia.org/wiki/Stratfor&quot;&gt;&amp;lt;(Wiki)Strategic Forecasting, Inc.&amp;gt;&lt;/a&gt;, is a global intelligence company founded in Texas in 1996. They are known for publishing security newsletters to the public. They also provide custom intelligence reports for clients such as major corporations, the U.S. military, and international government agencies.&lt;br /&gt;
&lt;br /&gt;
The Antisec wing of Anonymous, revealed Saturday, on Christmas Eve, that they had compromised several(&quot;four&quot;) Stratfor servers and posted credit card details of a few Stratfor customers on IRC servers. Stratfor&#39;s site is still down with after being &lt;a href=&quot;http://zone-h.org/mirror/id/16416728&quot;&gt;&amp;lt;(mirror)defaced&amp;gt;&lt;/a&gt;. The group claims plans to dump up to 200 gigabytes worth of data leading up to New Year’s Eve. Participants estimated they had already donated between $500,000 and $1,000,000 to charities fraudulently.&lt;br /&gt;
&lt;br /&gt;
A Antisec participant explains motive for the attack, stating, “That there will be repercussions for when you choose to betray the people and side with the rich ruling classes.” &lt;br /&gt;
&lt;br /&gt;
The biggest revelation seems to be how terribly insecure the security intelligence firm&#39;s servers were. Claims were made that Stratfor saved client data in clear text and even stored card security codes, a practice prohibited by credit card companies.&lt;br /&gt;
&lt;br /&gt;
Stratfor, known for their secrecy and big name secret clients, has their proported client list posted (Although, some claim it may only be a subscriber list.)&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pastebin.com/8MtFze0s&quot;&gt;&amp;lt;Proported client list (pastebin)&amp;gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quinn Norton (December 26, 2011)&lt;br /&gt;
&lt;a href=&quot;http://www.wired.com/threatlevel/2011/12/antisec-hits-private-intel-firm-million-of-docs-allegedly-lifted/&quot;&gt;&amp;lt;Wired.com - Antisec Hits Private Intel Firm; Million of Docs Allegedly Lifted&amp;gt;&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/12/antisec-gives-christmas-present-to.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-4713301089776005845</guid><pubDate>Thu, 15 Dec 2011 14:12:00 +0000</pubDate><atom:updated>2011-12-15T09:21:27.902-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>Fight SOPA!</title><description>&lt;h1&gt;Fight SOPA!&lt;/h1&gt;&lt;br /&gt;
The US House Judiciary Committee is meeting Today to mark up a bill that threatens all US websites. User contributed services such as blogger/blogspot that host this blog are particularly threatened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act&quot;&gt;(Wiki)SOPA - Stop Online Piracy Act&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://wfc2.wiredforchange.com/o/9042/p/dia/action/public/?action_KEY=8336&quot;&gt;EFF - Electronic Frontier Foundation&#39;s stop SOPA efforts&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://donate.mozilla.org/page/s/SOPA?source=sopa_page&quot;&gt;Mozilla&#39;s stop SOPA efforts&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://boingboing.net/2011/12/13/your-sit.html&quot;&gt;Boing Boing&#39;s stop SOPA efforts&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://news.cnet.com/8301-13506_3-57327681-17/tumblr-users-fight-sopa-with-87834-calls-to-congress/&quot;&gt;Tumblr&#39;s stop SOPA efforts in the news (cnet.com)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.bloomberg.com/news/2011-12-13/google-joins-facebook-to-back-alternate-u-s-anti-piracy-bill.html&quot;&gt;Founders of Google and EBay attack SOPA in the news(Bloomberg)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.eff.org/deeplinks/2011/12/internet-inventors-warn-against-sopa-and-pipa&quot;&gt;An open letter from 83 prominent Internet inventors and engineers sent to members of the United States Congress (EFF.org)&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/12/fight-sopa.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-5629306924346854927</guid><pubDate>Thu, 08 Dec 2011 16:48:00 +0000</pubDate><atom:updated>2011-12-08T10:48:24.116-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">link</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>Another CA  Compromised</title><description>itworld.com&lt;br /&gt;
Lucian Constantin, IDG News Service (December 08, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%; line-height: 215%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.itworld.com/security/231555/dutch-ssl-certificate-provider-gemnet-investigates-website-compromise&quot;&gt;&amp;lt;Dutch SSL certificate provider Gemnet investigates website compromise&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/12/another-ca-compromised.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-6400388630462385077</guid><pubDate>Sat, 19 Nov 2011 23:45:00 +0000</pubDate><atom:updated>2011-11-19T17:46:56.778-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">javascript</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">video</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>[Video Link]  Facebook Social XSS by Copy-Paste</title><description>Matt Jones (November 19, 2011)&lt;br /&gt;
(Video hosted on Facebook as public in Matt&#39;s gallery)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;https://www.facebook.com/photo.php?v=956977232793&quot;&gt;&amp;lt;Facebook Social XSS by Copy-Paste&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/11/video-link-facebook-social-xss-by-copy.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-4457372342236413224</guid><pubDate>Sat, 19 Nov 2011 22:48:00 +0000</pubDate><atom:updated>2011-11-19T16:48:21.624-06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hardware</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Link] US Water Utility Pump Destroyed After Hack</title><description>PCMag.com&lt;br /&gt;
Chloe Albanesius (November 18, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.pcmag.com/article2/0,2817,2396632,00.asp&quot;&gt;&amp;lt;Illinois Water Utility Pump Destroyed After Hack&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/11/link-us-water-utility-pump-destroyed.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-8557849051423456449</guid><pubDate>Sat, 29 Oct 2011 00:32:00 +0000</pubDate><atom:updated>2011-10-28T19:32:27.662-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>[Link] SQL Injection Start to Finish Example</title><description>(Moderate SQL understanding expected)&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef (October 26, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.mathyvanhoef.com/2011/10/exploiting-insert-into-sql-injections.html&quot;&gt;&amp;lt;Exploiting &#39;INSERT INTO&#39; SQL Injections Ninja Style &amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/link-sql-injection-start-to-finish.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-942958243975881834</guid><pubDate>Wed, 26 Oct 2011 01:09:00 +0000</pubDate><atom:updated>2011-10-25T20:09:27.497-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>[Link] EFF -  How secure is HTTPS today? How often is it attacked?</title><description>&lt;a href=&quot;https://www.eff.org/about/staff/peter-eckersley&quot;&gt;&amp;lt;Peter Eckersley&amp;gt;&lt;/a&gt; - Technology Projects Director, Electronic Frontier Foundation (October 25, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;https://www.eff.org/deeplinks/2011/10/how-secure-https-today&quot;&gt;&amp;lt; EFF - How secure is HTTPS today? How often is it attacked?&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/link-eff-how-secure-is-https-today-how.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-5652345624087509021</guid><pubDate>Wed, 19 Oct 2011 16:40:00 +0000</pubDate><atom:updated>2011-10-19T11:40:26.961-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Links] More Surfaces On German State Sponsored Trojan</title><description>Secure List (Kaspersky Lab) - Tillmann Werner (October 18, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.securelist.com/en/blog/208193167/Federal_Trojan_s_got_a_Big_Brother&quot;&gt;&amp;lt;Secure List - Federal Trojan&#39;s got a &quot;Big Brother&quot;&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
F-Secure - Sean (October 11, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.f-secure.com/weblog/archives/00002250.html&quot;&gt;&amp;lt;F-Secure - More Info on German State Backdoor: Case R2D2&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/links-more-surfaces-on-german-state.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-9118294655439716101</guid><pubDate>Thu, 13 Oct 2011 15:10:00 +0000</pubDate><atom:updated>2011-10-13T10:10:07.796-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">operating system</category><category domain="http://www.blogger.com/atom/ns#">programming</category><title>Dennis Ritchie, creator of the C programming language dead at 70</title><description>Rumors that Dennis Ritchie had passed have been confirmed. Dennis was known for developing the C programming language and being a key developer of the UNIX operating system. He was 70 years old. &lt;a href=&quot;http://en.wikipedia.org/wiki/Dennis_Ritchie&quot;&gt;&amp;lt;Dennis Ritchie (wiki)&amp;gt;&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/dennis-ritchie-creator-of-c-programming.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-7598643241311043378</guid><pubDate>Thu, 13 Oct 2011 01:02:00 +0000</pubDate><atom:updated>2011-10-12T20:02:29.283-05:00</atom:updated><title>[Link] F-Secure: Mac Trojan Flashback.B Checks for VM</title><description>Brod - Threat Solutions (October 12, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.f-secure.com/weblog/archives/00002251.html&quot;&gt;&amp;lt;F-Secure - Mac Trojan Flashback.B Checks for VM&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/link-f-secure-mac-trojan-flashbackb.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-6610320793778128009</guid><pubDate>Sun, 09 Oct 2011 17:34:00 +0000</pubDate><atom:updated>2011-10-09T12:34:29.170-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>European Hacker Group Analyzes Germany&#39;s Federally Sponsored Trojan</title><description>A European hacker group, &lt;a href=&quot;http://www.ccc.de&quot;&gt;&amp;lt;Chaos Computer Club&amp;gt;&lt;/a&gt; (site mostly in German), has published an analysis of Germany&#39;s federally sponsored trojan, used by German police forces, revealing it&#39;s functionality may violate guidelines set by Germany&#39;s constitutional court (&quot;Bundesverfassungsgericht&quot;).&lt;br /&gt;
&lt;br /&gt;
(Oct 8, 2011)&lt;br /&gt;
&lt;a href=&quot;http://www.ccc.de/en/updates/2011/staatstrojaner&quot;&gt;&amp;lt;Chaos Computer Club analyzes government malware (English)&amp;gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
ZDNet later published the following article which summarizes the situation well, adding background and &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002249.html&quot;&gt;&amp;lt;confirmation from F-Secure&#39;s analysis&amp;gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
(Ed Bott  October 8, 2011)&lt;br /&gt;
&lt;a href=&quot;http://www.zdnet.com/blog/bott/german-government-accused-of-spying-on-citizens-with-state-sponsored-trojan/4044&quot;&gt;&amp;lt;(ZDNet)German government accused of spying on citizens with state-sponsored Trojan&amp;gt;&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/european-hacker-group-analyzes-germanys.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-6883130319429580366</guid><pubDate>Sun, 02 Oct 2011 05:28:00 +0000</pubDate><atom:updated>2011-10-09T00:11:10.197-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">business</category><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">fail</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">javascript</category><category domain="http://www.blogger.com/atom/ns#">programming</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>Payload Anatomy of InMotion Hosting Defacements</title><description>&lt;h1&gt;The Attack&lt;/h1&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.inmotionhosting.com/&quot;&gt;&amp;lt;InMotion Hosting&amp;gt;&lt;/a&gt; was hacked leaving more than 70,000 websites compromised on the weekend of September 23, 2011. One of many news articles that covered the attack:&lt;br /&gt;
&lt;br /&gt;
(Article by Jack Phillips Sep 29, 2011)&lt;br /&gt;
&lt;a href=&quot;http://www.theepochtimes.com/n2/technology/hosting-firm-inmotion-hacked-thousands-of-websites-defaced-62209.html&quot;&gt;&amp;lt;The Epoch Times: Hosting Firm InMotion Hacked, Thousands of Websites Defaced&amp;gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;The Defacement&lt;/h1&gt;&lt;br /&gt;
This attack appears to be a host-wide defacement. The defaced websites had hacked-by pages added to their site which credited &quot;TiGER-M@TE&quot;:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;border: white solid 1px; background-color:gray; padding:10px; clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfW8ccR87IQ_ABpDCHZegIPFkSLmjG1HRvaF0K7kKxnkDWgH-N3UNQpIAyEOfczhQ5vn0-_QY1knycG8lVxjP1LKVM4XKahFeM9Oz9Ujnyuk31nmjccepKujP0MJ5l6WZ0eRuw65kJ9AhK/s1600/Banglaseshi+Hacker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfW8ccR87IQ_ABpDCHZegIPFkSLmjG1HRvaF0K7kKxnkDWgH-N3UNQpIAyEOfczhQ5vn0-_QY1knycG8lVxjP1LKVM4XKahFeM9Oz9Ujnyuk31nmjccepKujP0MJ5l6WZ0eRuw65kJ9AhK/s320/Banglaseshi+Hacker.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;(This is a screen shot of the defacement page, &lt;b&gt;index.php&lt;/b&gt; )&lt;br /&gt;
&lt;br /&gt;
From the perspective of the customer, there were no access, web, or ftp log entries. A file named &lt;b&gt;hacked_page&lt;/b&gt; was dropped in to the root www directory and was propagated to all the immediate sub-directories as &lt;b&gt;index.php&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pastebin.com/4XZb6XWT&quot;&gt;&amp;lt;index.php contents&amp;gt;(pastebin.org)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Encoding&lt;/h1&gt;&lt;br /&gt;
This PHP page contains only HTML and JavaScript. A close look at its contents shows that it uses some cleaver encoding in an attempt to avoid security fingerprinting, which could later allow for easy automated detection.&lt;br /&gt;
&lt;br /&gt;
A common technique is to represent malicious JavaScript code in escaped hexadecimal character format, then pass that through JavaScript&#39;s &lt;b&gt;unescape&lt;/b&gt; function at run time. First, this obscures the malicious code. With some small adjustments, the same encoded contents can be generated in many copies all uniquely different. But, with a little time one can decode the page&#39;s contents.&lt;br /&gt;
&lt;br /&gt;
The &lt;b&gt;unescape&lt;/b&gt; function decodes the URL escape character syntax as well as the JavaScript escape character syntax. The defacement page used both, one over top of the other:&lt;br /&gt;
&lt;br /&gt;
found in index.php&lt;br /&gt;
(JavaScript escaped hexadecimal characters)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;\x25\x33\x43\x25\x37\x33\x25\x36\x33\x25\x37\x32\x25\x36\x39\x25\x37\x30\x25\x37\x34&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
unescape&#39;s to...&lt;br /&gt;
(URL escaped hexadecimal characters)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;%3C%73%63%72%69%70%74&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
unescape&#39;s to...&lt;br /&gt;
(The start of an HTML tag that will contain the malicious JavaScript)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;lt;script&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This is not a new technique and is easily decoded after the fact. After coding up a quick tool I was able to decode the page:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;index.php decoded&amp;gt;(pastebin.org)&lt;/a&gt;&lt;br /&gt;
(The decoded contents are noted in JavaScript comments.)&lt;br /&gt;
&lt;br /&gt;
I&#39;ve created an open source tool for decoding escaped hex, &lt;a href=&quot;http://www.socosoftware.com/Unescape.html&quot;&gt;&amp;lt;Unescape&amp;gt;&lt;/a&gt;, so you can follow along.&lt;br /&gt;
&lt;br /&gt;
Analyzing this shows that this page has five parts of interest:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Connection to statistics tracking service&lt;/li&gt;
&lt;li&gt;Window animation and color cycling&lt;/li&gt;
&lt;li&gt;A base64 embedded GIF image (not hex-coded)&lt;/li&gt;
&lt;li&gt;&quot;Hacked&quot; image&lt;/li&gt;
&lt;li&gt;Playing of an embedded Flash file (apparently for auto playing audio)&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;h1&gt;Statistics tracking&lt;/h1&gt;&lt;br /&gt;
Line #33 of the &lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;decoded page&amp;gt;&lt;/a&gt; (line #11 originally) defines the function &lt;b&gt;details&lt;/b&gt;. This function is set as an &lt;b&gt;onclick&lt;/b&gt; event for the &quot;TiGER-M@TE&quot; text. The function open three web pages when triggered, two different statistics tracking service links at &lt;a href=&quot;http://www.zone-h.org&quot;&gt;&amp;lt;zone-h&amp;gt;&lt;/a&gt; and one Google search of &quot;Hacked by TiGER-M@TE&quot; through &lt;a href=&quot;http://lmgtfy.com&quot;&gt;&amp;lt;LMGTFY (Let Me Google That For You)&amp;gt;&lt;/a&gt; The statistics at zone-h can be viewed here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://zone-h.org/archive/notifier=TiGER-M@TE&quot;&gt;&amp;lt;zone-h notifier: TIGER-M@TE&amp;gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://zone-h.org/archive/special=1/notifier=TiGER-M@TE&quot;&gt;&amp;lt;zone-h notifier: TIGER-M@TE special=1&amp;gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Window animation&lt;/h1&gt;&lt;br /&gt;
Line #40 through #133 of the &lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;decoded page&amp;gt;&lt;/a&gt; (also line #11 originally) defines a timed script of moving and resizing the browser window in some sort of animated show while cycling colors.&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Embedded base64 GIF image&lt;/h1&gt;&lt;br /&gt;
Line #148 of the &lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;decoded page&amp;gt;&lt;/a&gt; (the end of line #11 originally) contains a GIF image embedded in the page using &lt;a href=&quot;http://en.wikipedia.org/wiki/Base64&quot;&gt;&amp;ltbase64(wiki)&amp;gt;&lt;/a&gt; encoding. This appears to merely be a faded line. As we&#39;ll seen next, maintaining image hosting seems like a challenge for the defacers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;&quot;Hacked&quot; image&lt;/h1&gt;&lt;br /&gt;
Line #183 of the &lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;decoded page&amp;gt;&lt;/a&gt; (then end of line #15 originally) is some encoded JavaScript to add an image tag to a small image of the word &quot;Hacked&quot;. This &lt;a href=&quot;http://www.fotonons.ru/images/17.03.11/bytigermte.jpg&quot;&gt;&amp;lt;image is hosted on Fotonons.ru&amp;gt;&lt;/a&gt; but the tag is crafted to fall back on &lt;a href=&quot;http://image.bayimg.com/maeadaadi.jpg&quot;&gt;&amp;lt;the same image hosted at BayImg.com&amp;gt;&lt;/a&gt;. This seems to highlight the perceived difficulty of maintaining image hosting during the peak of the defacement activity.&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Embedded flash audio&lt;/h1&gt;&lt;br /&gt;
The code inside the &lt;i&gt;&quot;mp3 code starts from here&quot;&lt;/i&gt; HTML comments turned out to be the most complicated. This part was encoded in multiple layers and revealed a custom character transformation function. First the contents had some key characters escaped with JavaScript hex characters, the entire resulting contents was escaped with URL escaped hexadecimal characters, then the resulting contents was additionally escaped with JavaScript hex characters. Pealing this away reveals a &lt;b&gt;dF&lt;/b&gt; function which provided a custom transformation decoder for decoding the accompanying section of escaped data:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pastebin.com/XVkUki5R&quot;&gt;&amp;lt;index.php decoded dF function&amp;gt;(pastebin.org)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This decoder merely did some basic arithmetic to each character&#39;s value. The final results start at line 200 of the &lt;a href=&quot;http://pastebin.com/mhJj6cy5&quot;&gt;&amp;lt;decoded page&amp;gt;&lt;/a&gt;. This resulting code adds the following flash file to the page for auto-play:&lt;br /&gt;
&lt;br /&gt;
http://77.247.69.68/.../By_TiGER-M@TE.swf&lt;br /&gt;
&lt;br /&gt;
The host 77.247.69.68 &lt;a href=&quot;http://www.ip-adress.com/whois/77.247.69.68&quot;&gt;&amp;lt;resolves&amp;gt;&lt;/a&gt; to &lt;a href=&quot;http://rackhosting.com&quot;&gt;&amp;lt;Rackhosting.com&amp;gt;&lt;/a&gt; in Denmark. The link, with its peculiar &quot;...&quot; directory, seemed dead as as soon as tested.&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Variable Names&lt;/h1&gt;&lt;br /&gt;
The &lt;b&gt;&quot;_0x9355&quot;&lt;/b&gt; style of JavaScript variable names imply that many documents where intended to be generated with unique variable names. This technique would act as an obfustication while attempting to evade fingerprinting by security applications such as anti-virus and intrusion detection services.&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;Summary&lt;/h1&gt;&lt;br /&gt;
The &lt;b&gt;index.php&lt;/b&gt; defacement page propagated nearly one hundred thousand times in recently compromised &lt;a href=&quot;http://www.inmotionhosting.com/&quot;&gt;&amp;lt;InMotion Hosting&amp;gt;&lt;/a&gt; web sites display a decorative brand promotion while loading a flash file that appeared to be for audio, but was unrecovered. A statistics tracking service was used and a couple of mostly common techniques where used to obfusticate the JavaScript code in an apparent attempt to evade filtering and detection by security services.&lt;br /&gt;
&lt;br /&gt;
UPDATES:&lt;br /&gt;
&lt;br /&gt;
10/2/2011 - Added decoded dF function pastebin&lt;br /&gt;
10/8/2011 - Added open source &lt;a href=&quot;http://www.socosoftware.com/Unescape.html&quot;&gt;Unescape&lt;/a&gt; tool.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/10/payload-anatomy-of-inmotion-hosting.html</link><author>noreply@blogger.com (SoCo)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfW8ccR87IQ_ABpDCHZegIPFkSLmjG1HRvaF0K7kKxnkDWgH-N3UNQpIAyEOfczhQ5vn0-_QY1knycG8lVxjP1LKVM4XKahFeM9Oz9Ujnyuk31nmjccepKujP0MJ5l6WZ0eRuw65kJ9AhK/s72-c/Banglaseshi+Hacker.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-734744699410647828</guid><pubDate>Mon, 26 Sep 2011 03:23:00 +0000</pubDate><atom:updated>2011-10-12T20:02:10.579-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">freeware</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">open source</category><category domain="http://www.blogger.com/atom/ns#">operating system</category><category domain="http://www.blogger.com/atom/ns#">release</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Link] Gentoo Pleas For Help</title><description>Donnie Berkholz (September 14, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://lwn.net/Articles/458794/&quot;&gt;&amp;lt;LWN.net : The state of Gentoo&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/09/link-gentoo-pleas-for-help.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-7476909643966655332</guid><pubDate>Thu, 22 Sep 2011 02:39:00 +0000</pubDate><atom:updated>2011-09-21T21:39:50.045-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">open source</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>[Link] Reverse Connection ICMP Shell</title><description>(Friday, 15 April 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://bernardodamele.blogspot.com/2011/04/reverse-connection-icmp-shell.html&quot;&gt;&amp;lt;Reverse connection: ICMP shell&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/09/link-reverse-connection-icmp-shell.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-6933130951080013850</guid><pubDate>Tue, 30 Aug 2011 20:54:00 +0000</pubDate><atom:updated>2011-09-25T22:43:20.053-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Firefox</category><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">internet explorer</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>DigiNotar Issued Fraudulent Google Certificate</title><description>&lt;a href=&quot;https://diginotar.nl&quot;&gt;&amp;lt;DigiNotar&amp;gt;&lt;/a&gt; is a Dutch Certificate Authority who issued a rogue SSL certificate to somebody in Iran on July 10th, 2011 for the domain name &lt;b&gt;.google.com&lt;/b&gt;. This allows the certificate holders the ability to possibly carry out a man in the middle attack on most of Google&#39;s services, including GMail, Google+, and Google Docs.&lt;br /&gt;
&lt;br /&gt;
DigiNotar is a wholly owned subsidiary of VASCO Data Security International. On August 30, 2011 &lt;a href=&quot;http://www.vasco.com/company/press_room/news_archive/2011/news_diginotar_reports_security_incident.aspx
&quot;&gt;&amp;lt;VASCO released a public statement&amp;gt;&lt;/a&gt; acknowledging that their DigiNotar Certificate Authority infrastructure was hacked on July 19, 2011, and was used to issue fraudulent CA&#39;s for a number of domains, including Google.com. &lt;a href=&quot;http://www.f-secure.com/weblog/archives/00002228.html&quot;&gt;&amp;lt;Some digging by F-Secure&amp;gt;&lt;/a&gt; found defacements left over from at least two separate intrusions that could be years old.&lt;br /&gt;
&lt;br /&gt;
The Google Chrome browser &lt;a href=&quot;http://blog.chromium.org/2011/06/new-chromium-security-features-june.html&quot;&gt;&amp;lt;has an extra fine grained set of CA&#39;s with the authority to sign for Google&amp;gt;&lt;/a&gt; which is rumored to have protected Google Chrome users.&lt;br /&gt;
&lt;br /&gt;
Firefox suggested revoking DigiNotar and &lt;a href=&quot;http://support.mozilla.com/en-US/kb/deleting-diginotar-ca-cert&quot;&gt;&amp;lt;provides instructions for revoking the CA&amp;gt;&lt;/a&gt; in your local browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fraudulent Digital Certificates Could Allow Spoofing (Aug 29, 2011)&lt;br /&gt;
&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/2607712.mspx&quot;&gt;&amp;lt;Microsoft Security Advisory (2607712)&amp;gt;&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;UPDATE (Aug 31, 2011):&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.softpedia.com/progChangelog/Mozilla-Firefox-Final-Changelog-5787.html&quot;&gt;&amp;lt;Mozilla pushes Firefox 6.0.1 update explicitly to revoke the DigiNotar CA&amp;gt;&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/08/diginotar-issued-fraudulent-google.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-102902082290994582</guid><pubDate>Thu, 18 Aug 2011 03:18:00 +0000</pubDate><atom:updated>2011-08-17T22:20:47.035-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">link</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Link] Inserting fake certificates to sniff SSL and hijack DNS</title><description>&lt;br /&gt;
seventhoctober.net (Aug 17, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;https://seventhoctober.net/2011/08/ssl-mitm-with-an-inserted-ca-and-a-dns-hijack/&quot;&gt;&amp;lt;SSL MITM with an inserted CA and a DNS hijack&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/08/link-inserting-fake-certificates-to.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-5263800074491635140</guid><pubDate>Thu, 18 Aug 2011 03:07:00 +0000</pubDate><atom:updated>2011-08-17T22:19:47.160-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">howto</category><category domain="http://www.blogger.com/atom/ns#">internet explorer</category><category domain="http://www.blogger.com/atom/ns#">link</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>[Link] How to find 0-day in browsers</title><description>abazhanyuk.com (August 7, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://abazhanyuk.com/?p=220&quot;&gt;&amp;lt;How to find 0-day in browsers&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/08/link-how-to-find-0-day-in-browsers.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-1607591437540437681</guid><pubDate>Wed, 27 Jul 2011 01:53:00 +0000</pubDate><atom:updated>2011-07-26T20:59:43.329-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">operating system</category><category domain="http://www.blogger.com/atom/ns#">release</category><title>Linux Version Number Bumped to 3.0</title><description>Linux 3.0 was committed July 22, 2011. The version numbering was bumped up from 2.6.xx to 3.0 in honor of 20 years of Linux, without the large changes a major version number change would normally imply. &lt;br /&gt;
&lt;br /&gt;
InfoWorld (July 22, 2011)&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;border: 2px solid gray; padding: 4px; color: white; background-color: rgb(85, 85, 85);font-size:110%;&quot; &gt;&lt;a style=&quot;color: white;&quot; href=&quot;http://www.infoworld.com/d/open-source-software/linux-30-steady-step-forward-167828&quot;&gt;&amp;lt;InfoWorld - Linux 3.0 a steady step forward&amp;gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/07/linux-version-number-bumped-to-30.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3351698474708861894.post-4342197617959223196</guid><pubDate>Sun, 22 May 2011 18:47:00 +0000</pubDate><atom:updated>2011-05-22T13:47:09.507-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">edittor</category><category domain="http://www.blogger.com/atom/ns#">freeware</category><category domain="http://www.blogger.com/atom/ns#">IDE</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">open source</category><title>Geany text edittor</title><description>I wanted to take a second to point out a great tool that some might otherwise have overlooked; &lt;a href=&quot;http://www.geany.org&quot;&gt;&amp;lt;Geany&amp;gt;&lt;/a&gt;. Based on &lt;a href=&quot;http://en.wikipedia.org/wiki/Scintilla_%28editing_component%29&quot;&gt;&amp;lt;(Wiki)Scintilla&amp;gt;&lt;/a&gt;, Geany is a light weight, cross-platform, text editor with a familiar layout.  Once the packaged plugins are all enabled, Geany goes from, light weight, simple IDE, to system administration and configuration portal with out missing a beat. &lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.geany.org&quot;&gt;&amp;lt;Geany - Homepage&amp;gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.geany.org/Documentation/Screenshots&quot;&gt;&amp;lt;Geany - Screenshots&amp;gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.geany.org/Download/Releases&quot;&gt;&amp;lt;Geany - Download&amp;gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Geany is a tabbed file editor with a familiar layout. A left column shows a tree based navigation panel. This doubles as a file browser, project file browser, and symbol list for the current file. A panel across the bottom can switch between compiler output, messages, and a terminal.&lt;br /&gt;
&lt;br /&gt;
The IDE capabilities of Geany are pretty simple. It has most the text editing bells and whistles one is accustomed to, including code highlighting, text folding, and auto-completion. Aside from the integrated terminal, Geany can be configured to do simple make, build, and execute operations, although there doesn&#39;t seem to be any debugger integration.&lt;br /&gt;
&lt;br /&gt;
When run with elevated privileges, Geany makes a handy GUI administration tool. Quick file navigation, tabbed file editing, and a terminal combine to make an efficient GUI administration tool. If your already running a GUI, you can be terminal warrior and still have the luxury of a GUI file editor.&lt;br /&gt;
&lt;br /&gt;
Geany is a very light weight text editor released under the GNU General Public Licence. It&#39;s light weight GTK+ base makes it great for most window managers and platforms. Geany is a common project, included in most Linux repositories (like Ubuntu), that even has a Windows binary release available.&lt;br /&gt;
&lt;br /&gt;
Geany is definitely a light weight, handy, and flexible tool that shouldn&#39;t be overlooked.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-6219730416992960&quot;;
/* Feed Ad 180x150, created 4/19/08 */
google_ad_slot = &quot;2142831088&quot;;
google_ad_width = 180;
google_ad_height = 150;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://hackerslounge1.blogspot.com/2011/05/geany-text-edittor.html</link><author>noreply@blogger.com (SoCo)</author><thr:total>0</thr:total></item></channel></rss>