<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8563550780787253789</id><updated>2024-09-04T20:14:07.726-07:00</updated><category term="News"/><category term="Hackers News"/><category term="Download"/><category term="Malware"/><category term="Vulnerable"/><title type='text'>Voice Of Hackers</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default?start-index=26&amp;max-results=25'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>57</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-6920785641296511445</id><published>2011-08-20T22:46:00.000-07:00</published><updated>2011-08-20T22:46:32.277-07:00</updated><title type='text'>_Banti_ Was Here</title><content type='html'>&lt;a href=&quot;http://91.186.25.98/showthread.php?4-_Banti_-Was-Here&amp;amp;p=4&amp;amp;styleid=2#post4&quot;&gt;_Banti_ Was Here&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/6920785641296511445/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/08/banti-was-here.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/6920785641296511445'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/6920785641296511445'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/08/banti-was-here.html' title='_Banti_ Was Here'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-2593375647002329287</id><published>2011-04-14T18:11:00.001-07:00</published><updated>2011-04-14T18:11:50.711-07:00</updated><title type='text'>A climate mangles a rush myth.</title><content type='html'>Once this sentence is on your blog, come back to your PPP account and  press the claim blog button. You can remove the post after you have  successfully claimed the blog.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/2593375647002329287/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/climate-mangles-rush-myth.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2593375647002329287'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2593375647002329287'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/climate-mangles-rush-myth.html' title='A climate mangles a rush myth.'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-9029861386065023398</id><published>2011-04-13T06:54:00.000-07:00</published><updated>2011-04-13T06:54:31.537-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Supreme Court of Canada vulnerable to xss attack !</title><content type='html'>&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW_iVxynQQS9CqqdAXOL9du1UyDs4hNS7HyoqS5-POCgjWqZVec78NGpBuBrnUNwhC1Mq4e0aIOcTGq2qs8RwdvGuuUo3zbYHLAomAih02-wh9R511GAnsNbth4oLQxaBKZb_-ATPWHVVE/s1600/candasupream.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW_iVxynQQS9CqqdAXOL9du1UyDs4hNS7HyoqS5-POCgjWqZVec78NGpBuBrnUNwhC1Mq4e0aIOcTGq2qs8RwdvGuuUo3zbYHLAomAih02-wh9R511GAnsNbth4oLQxaBKZb_-ATPWHVVE/s640/candasupream.png&quot; width=&quot;463&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;strong&gt;Vunl Link : &lt;/strong&gt;&lt;a href=&quot;http://sr.scc-csc.gc.ca/search?client=SCC-CSC&amp;amp;site=Internet&amp;amp;output=xml_no_dtd&amp;amp;proxystylesheet=SCC-CSC&amp;amp;hl=en&amp;amp;oe=latin1&amp;amp;ie=latin1&amp;amp;q=%3E%22%3E%3CMARQUEE%3EHACKED+BY+ZERO+COOL%3C%2FMARQUEE%3E&amp;amp;btnG=Search&quot; target=&quot;_blank&quot;&gt;http://sr.scc-csc.gc.ca/search?client=SCC-CSC&amp;amp;site=Internet&amp;amp;output=xml_no_dtd&amp;amp;proxystylesheet=SCC-CSC&amp;amp;hl=en&amp;amp;oe=latin1&amp;amp;ie=latin1&amp;amp;q=%3E%22%3E%3CMARQUEE%3EHACKED+BY+ZERO+COOL%3C%2FMARQUEE%3E&amp;amp;btnG=Search&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Found n Submitted by :&amp;nbsp;Zero Cool&lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/9029861386065023398/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/supreme-court-of-canada-vulnerable-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/9029861386065023398'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/9029861386065023398'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/supreme-court-of-canada-vulnerable-to.html' title='Supreme Court of Canada vulnerable to xss attack !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW_iVxynQQS9CqqdAXOL9du1UyDs4hNS7HyoqS5-POCgjWqZVec78NGpBuBrnUNwhC1Mq4e0aIOcTGq2qs8RwdvGuuUo3zbYHLAomAih02-wh9R511GAnsNbth4oLQxaBKZb_-ATPWHVVE/s72-c/candasupream.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-412062523298359427</id><published>2011-04-13T06:49:00.000-07:00</published><updated>2011-04-13T06:49:00.125-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Self-wiping hard drives from Toshiba</title><content type='html'>Toshiba announces a family of self-encrypting hard disk drives (HDDs)   engineered to automatically invalidate protected data when connected  to  an unknown host.&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.net-security.org/images/articles/toshiba-drive.jpg&quot; /&gt;&lt;br /&gt;
The new Toshiba Self-Encrypting Drive (SED) models enable OEMs to   configure different data invalidation options that align with various   end-user scenarios.&lt;br /&gt;
Designed to address the increasing need for IT departments to comply   with privacy laws and regulations governing data security, the drives   are ideally suited for PC, copier and multi-function printer, and   point-of-sale systems used in government, financial, medical, or similar   environments with an acute need to protect sensitive information.&lt;br /&gt;
&lt;span id=&quot;more-193&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Building on the industry-standard Trusted Computing Group “Opal”   Specification, the new Toshiba MKxx61GSYG models leverage advanced   access security and on-board encryption alongside second generation data   wipe technology.&lt;br /&gt;
Whether to protect against data loss resulting from lost or stolen   notebooks or to maintain the security of document image data stored   within copier and printer systems, Toshiba SEDs can securely invalidate   protected data.&lt;br /&gt;
Data invalidation attributes can be set for multiple data ranges,   enabling targeted data in the drive to be rendered indecipherable by   command, on power cycle, or on host authentication error—an industry   first.&lt;br /&gt;
With the latest enhancement to Toshiba’s SED technology, the risk of   data theft is reduced in cases where the drive is removed from its   defined host environment and connected to an unknown system. At power   ON, the SED and host perform an authentication process. If the   authentication fails, the drive can be configured to simply deny access   or crypto-erase sensitive user data.&lt;br /&gt;
Scott Wright, product manager, Toshiba Storage Device Division,  notes,  “Digital systems vendors recognize the need to help their  customers  protect sensitive data from leakage or theft. Toshiba’s  security  technologies provide designers of copiers, printers, PCs, and  other  systems with new capabilities to help address these important  security  concerns.”</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/412062523298359427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/self-wiping-hard-drives-from-toshiba.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/412062523298359427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/412062523298359427'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/self-wiping-hard-drives-from-toshiba.html' title='Self-wiping hard drives from Toshiba'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-1273195549803104209</id><published>2011-04-13T06:48:00.000-07:00</published><updated>2011-04-13T06:48:15.230-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>IT data management concerns</title><content type='html'>LogLogic announced the findings to an IT Data Management survey carried out amongst 164 IT managers and directors. &lt;br /&gt;
The research aims to establish how IT data is being managed and utilised within UK organizations.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.net-security.org/images/articles/user.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.net-security.org/images/articles/user.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Key findings:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Only 14 percent of survey respondents could say  that they highly  trusted the quality of their IT data and had no  concerns. Staggering  then that 81 percent said they used their IT data  for compliance  purposes.&lt;/li&gt;
&lt;li&gt;A huge 41 percent admitted that they  couldn’t readily access all of  their IT data and 48 percent added that  it wasn’t in the right,  useable format.&lt;/li&gt;
&lt;li&gt;49 percent said that  they couldn’t easily create reports.  Confirming this, the research found  that only 16.2 percent could create  IT data reports in real time, 25  percent would take longer than five  hours (and 13 percent of those  estimating it taking longer than 24  hours).&lt;/li&gt;
&lt;li&gt;Of those who could create reports and insights from their IT data, only 26 percent said they were actionable.&lt;/li&gt;
&lt;li&gt;43  percent don’t use their IT data to help manage service level  agreements  and 44 percent don’t use it for operational planning either.&lt;/li&gt;
&lt;li&gt;36  percent of respondents estimate that less than 49 percent of the  IT  data that they need to need to report on and analyse is available  to  them and accessible for compliance, security or operational  intelligence  purposes.&lt;span id=&quot;more-191&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;“It’s clear from the findings that organisations are  taking a  tactical rather than strategic approach to IT data  management,” said  Guy Churchward, CEO at LogLogic. “For example,  security and compliance  were listed as the key reasons for viewing/using  IT data (81 and 73  percent respectively) – activities the business has  to carry out to  protect itself. Only 32 percent saw IT data as a  productivity tool and  seven percent even admitted that their IT data was  completely ignored  and unused.  The situation is further compounded by  the fact that a  high percentage of organisations have data quality and  trust concerns.”&lt;br /&gt;
He continued: “Our research found that only 19.8 percent of c’level   directors are currently asked to review IT data. This drops to 13   percent when the same question is asked of their board directors. This   will however change in due course as IT data warehousing and management   becomes the crux of IT decision-making and CIOs and IT managers assess   their ability to implement modern computing models in the enterprise.&lt;br /&gt;
Current IT infrastructures have grown into a chaos of applications,   agents and devices that generate an increasing amount of IT data.  This   data provides a wealth of information on how systems are being used,  how  they are performing, where to drive efficiencies, and how to meet   compliance mandates and increase security.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/1273195549803104209/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/it-data-management-concerns.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1273195549803104209'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1273195549803104209'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/it-data-management-concerns.html' title='IT data management concerns'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-7777718313771371058</id><published>2011-04-13T06:42:00.001-07:00</published><updated>2011-04-13T06:42:40.302-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>HD video security on the iPad</title><content type='html'>To help you keep tabs on your home or office anytime, anywhere, Logitech introduced the &lt;a href=&quot;http://itunes.apple.com/us/app/logitech-alert-for-ipad/id428370276?mt=8&quot; target=&quot;_new&quot;&gt;Logitech Alert app for iPad&lt;/a&gt; which makes it easy to access your Logitech Alert digital video security system. &lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.net-security.org/images/articles/logitech-ipad.jpg&quot; /&gt;&lt;br /&gt;
The Logitech Alert app for iPad is one of the first iPad apps developed   strictly for tablet-based HD digital video surveillance. The app lets   you view 720p HD video coupled with rich sound quality that’s captured   by the user’s Logitech Alert cameras — including the Logitech Alert 750i   Master System, the weatherproof Logitech Alert 750e Outdoor Master   System and any Logitech Alert Add-On Camera — giving you the ability to   see and hear what’s going on at home or the office even when you’re   miles away.&lt;br /&gt;
&lt;span id=&quot;more-189&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
With the Logitech Alert app for iPad, it’s quick and easy to check up on   your home or small business by simply using the Logitech Alert app for   iPad. The app connects to your cameras anytime, so you can watch the   live video and hear the audio coming from your cameras.&lt;br /&gt;
If you have the Logitech Alert Web and Mobile Commander service you  can  also view video recordings captured when motion was detected and  manage  system settings, including turning on motion alerts from your  iPad.&lt;br /&gt;
The Logitech Alert app for iPad providing free, live monitoring is   expected to be available in the U.S., Europe and Asia in the Apple App   Store at no charge beginning in April.&lt;br /&gt;
The Logitech Alert Web and Mobile Commander service enables  additional  functionality on the iPad, Web browsers and mobile apps and  is available  at a suggested retail price of U.S. $79.99 per year.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/7777718313771371058/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/hd-video-security-on-ipad.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7777718313771371058'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7777718313771371058'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/hd-video-security-on-ipad.html' title='HD video security on the iPad'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-8888097953912461271</id><published>2011-04-13T06:41:00.002-07:00</published><updated>2011-04-13T06:41:57.516-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>App employs facial recognition to prevent visual eavesdropping</title><content type='html'>Oculis Labs released &lt;a href=&quot;http://www.privateeyeenterprise.com/&quot; target=&quot;_new&quot;&gt;PrivateEye Enterprise&lt;/a&gt;,   a desktop security application that employs facial recognition and   detection algorithms with a standard webcam to actively protect   information displayed on computer screens.&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.net-security.org/images/articles/oculis-eye.jpg&quot; /&gt;&lt;br /&gt;
PrivateEye Enterprise offers a way to secure information used by CEOs,   CFOs, auditors, consultants, lawyers, doctors, investigators, HR   personnel and other users seeking greater privacy.&lt;br /&gt;
IT Administrators can manage client policies from a standard Group   Policy Management console and can tailor PrivateEye Enterprise policies   for the entire domain, business units, or individual users.  Importantly,  this solution complies with Windows’ Server Group Policy  allowing any  Windows-based organization to add PrivateEye Enterprise  seamlessly to  its existing IT infrastructure.&lt;br /&gt;
&lt;span id=&quot;more-187&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Key features of the solution include:&lt;br /&gt;
&lt;strong&gt;Eavesdropper detection&lt;/strong&gt; – Detects and alerts the user  whenever  eavesdroppers try to read a display. Blurs the screen keeping   information private and automatically resolves when risk clears. Users   can automatically protect their screen and log the eavesdropper’s face   for further action.&lt;br /&gt;
&lt;strong&gt;Screen protection&lt;/strong&gt; – Automatically protects the screen whenever the user looks away from it. Instantly clears it again when the user looks back.&lt;br /&gt;
&lt;strong&gt;Face recognition&lt;/strong&gt; – Authenticates and unlocks the  computer with  just a look at the user as well as locks the computer  whenever the user  leaves. If anyone else tries to get into the  computer, the face  recognition system keeps them out.&lt;br /&gt;
&lt;strong&gt;Central policy management&lt;/strong&gt; – Enables an IT  administrator to deploy  and manage security policies to all PrivateEye  Enterprise clients using  standard software and policy distribution  mechanisms.&lt;br /&gt;
&lt;strong&gt;Compliance audit logs&lt;/strong&gt; – Each client logs security  events and  reports them centrally for IT management using standard  Microsoft tools.  These include when the product was active, when the  system activated to  protect the screen, and if there were unauthorized  access attempts. It  may also collect unique data including who was  using the machine.  Whenever a failed login attempt occurs, it captures a  picture of the  person sitting in front of the machine to the log.  Optionally, IT  administrators can choose to keep pictures of anyone  attempting to  eavesdrop on an authorized user.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/8888097953912461271/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/app-employs-facial-recognition-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8888097953912461271'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8888097953912461271'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/app-employs-facial-recognition-to.html' title='App employs facial recognition to prevent visual eavesdropping'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-7815130410640890693</id><published>2011-04-13T06:41:00.000-07:00</published><updated>2011-04-13T06:41:06.439-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>McAfee enhances its Network Security Platform</title><content type='html'>&lt;img alt=&quot;&quot; class=&quot;alignnone&quot; height=&quot;400&quot; src=&quot;http://techgenie.com/wp-content/uploads/mcafee_logo_11.jpg&quot; width=&quot;599&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
McAfee announced enhancements to its Network Security Platform which includes:&lt;br /&gt;
&lt;strong&gt;Enhanced botnet control:&lt;/strong&gt; File and network connection  reputation  feeds from cloud-based McAfee Global Threat Intelligence  allows Network  Security Platform to perform in-line botnet prevention  based on over 60  million malware samples and the reputation of hundreds  of millions of  network connections based on over two billion IP  reputation queries each  month. This external intelligence provides  vital context for faster,  more accurate detection and prevention.&lt;br /&gt;
&lt;strong&gt;Traffic analysis port:&lt;/strong&gt; Traffic redirect capabilities  allow  arbitrary network traffic to be subjected to additional  inspection by  McAfee and third party products, including data loss  prevention, network  forensics and advanced malware analysis tools.&lt;br /&gt;
&lt;strong&gt;Virtual network inspection:&lt;/strong&gt; Enables the Network  Security Platform  sensors to examine inter-virtual machine traffic on  virtual  environments and provide attack detection for virtual data  center  environments. Network Security Platform can inspect traffic both  within  virtual environments and between virtual and physical  environments,  giving organizations the same level of visibility  regardless of where  the traffic flows.&lt;br /&gt;
As enterprises consolidate data centers, adopt cloud-services, and   virtualize critical infrastructure they need a way to unify security   management across physical and virtual infrastructures. In partnership   with Reflex Systems – a leader in virtualization management solutions –   McAfee brings its threat detection and security management to virtual   environments.&lt;br /&gt;
Together, McAfee and Reflex Systems will offer integrated virtual and   physical security and management that enables customers to  holistically  monitor and understand security issues, easily apply best  practices, and  provide comprehensive reporting for compliance purposes  across the  current and next-generation data center infrastructure.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/7815130410640890693/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/mcafee-enhances-its-network-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7815130410640890693'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7815130410640890693'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/mcafee-enhances-its-network-security.html' title='McAfee enhances its Network Security Platform'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-8144486284842973455</id><published>2011-04-13T06:39:00.001-07:00</published><updated>2011-04-13T06:39:57.685-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Microsoft Office for Mac 2011 SP1 released</title><content type='html'>Microsoft Office for Mac 2011 &lt;a href=&quot;http://www.microsoft.com/mac/downloads&quot; target=&quot;_new&quot;&gt;Service Pack 1&lt;/a&gt; (14.1.0) fixes critical issues and also helps to improve security.&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;http://www.net-security.org/images/articles/office-mac.jpg&quot; /&gt;&lt;br /&gt;
It includes fixes for vulnerabilities that an attacker can use to   overwrite the contents of your computer’s memory with malicious code.   For detailed information about this update, please visit the Microsoft   Web site.&lt;br /&gt;
&lt;span id=&quot;more-183&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Applies to:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Office 2011&lt;/li&gt;
&lt;li&gt;Office 2011 Home and Business Edition&lt;/li&gt;
&lt;li&gt;Word 2011&lt;/li&gt;
&lt;li&gt;Excel 2011&lt;/li&gt;
&lt;li&gt;PowerPoint 2011&lt;/li&gt;
&lt;li&gt;Outlook 2011&lt;/li&gt;
&lt;li&gt;Communicator 2011&lt;/li&gt;
&lt;li&gt;Office for Mac Standard 2011 Edition&lt;/li&gt;
&lt;li&gt;Microsoft Office for Mac Home &amp;amp; Student 2011&lt;/li&gt;
&lt;li&gt;Microsoft Office for Mac Academic 2011.&lt;/li&gt;
&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/8144486284842973455/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/microsoft-office-for-mac-2011-sp1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8144486284842973455'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8144486284842973455'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/microsoft-office-for-mac-2011-sp1.html' title='Microsoft Office for Mac 2011 SP1 released'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-7357391157695143782</id><published>2011-04-13T04:37:00.000-07:00</published><updated>2011-04-13T04:37:00.404-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>ESET NOD32 releases Antivirus for Linux 4 !</title><content type='html'>&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXdXYcxK1Q2WAEyYUAuj_jXMQz4o4lMqN31ENxPLHfJBvuheVXZcyRrE-TGAGW71f9cr6bitgTjg9NzWsg9R2lKy9EGv-9BB72aiZtfKCG4OUV89TvL6bnPLbuqq-bqL-R4a-jQiRPzopr/s1600/NOD32_Antivirus_4.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;408&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXdXYcxK1Q2WAEyYUAuj_jXMQz4o4lMqN31ENxPLHfJBvuheVXZcyRrE-TGAGW71f9cr6bitgTjg9NzWsg9R2lKy9EGv-9BB72aiZtfKCG4OUV89TvL6bnPLbuqq-bqL-R4a-jQiRPzopr/s640/NOD32_Antivirus_4.jpg&quot; width=&quot;566&quot; /&gt;&lt;/a&gt;&lt;/div&gt;ESET  announced the availability of ESET NOD32 Antivirus 4 Business  Edition  for Linux Desktop and ESET NOD32 Antivirus 4 for Linux.&lt;br /&gt;
ESET NOD32 Antivirus 4 for Linux offers protection against   cross-platform and emerging threats, enhancing the security of Linux   platforms. The scanning engine automatically detects and cleans   malicious code, including threats designed for Windows and Mac based   systems.&lt;br /&gt;
&lt;span id=&quot;more-178&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
ESET NOD32 Antivirus 4 Business Edition for Linux Desktop includes ESET   Remote Administrator, which provides IT administrators with a  management  console to control an entire network from a single screen —  supporting  tens or thousands of heterogeneous computers.&lt;br /&gt;
Key benefits and features:&lt;br /&gt;
&lt;strong&gt;Detection and proactive cross-platform protection&lt;/strong&gt; –   Advanced heuristics technology delivers real-time, proactive protection   from malware, hacker attacks and exploits. Product protects against   Linux, Windows and Mac malware&lt;br /&gt;
&lt;strong&gt;Small system footprint&lt;/strong&gt; – The unique build  of ESET  NOD32 Antivirus 4 for Linux has been optimized to perfectly  match the  system environment. ESET engineered a smart solution with one  of the  lowest system footprints on the market ensuring fast startup and  smooth  performance&lt;br /&gt;
&lt;strong&gt;Graphical user interface&lt;/strong&gt; – Optional  graphical user  interface which delivers intuitive access to features  includes full  screen mode, informative graphs, statistics and scheduler&lt;br /&gt;
&lt;strong&gt;Security settings control&lt;/strong&gt; – Defines which user accounts have the capability to change settings, so unauthorized users cannot disable or lessen protection&lt;br /&gt;
&lt;strong&gt;Streamlined management&lt;/strong&gt; – Easy management  and  oversight of network security across all platforms, allowing for  push  tasks, updates and security policies to be applied from a single   console (Business Edition only)&lt;br /&gt;
&lt;strong&gt;Removable media access control&lt;/strong&gt; – Scans or blocks usage of USB, FireWire, CD/DVD devices to minimize risk of infection or data loss.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/7357391157695143782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/eset-nod32-releases-antivirus-for-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7357391157695143782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/7357391157695143782'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/eset-nod32-releases-antivirus-for-linux.html' title='ESET NOD32 releases Antivirus for Linux 4 !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXdXYcxK1Q2WAEyYUAuj_jXMQz4o4lMqN31ENxPLHfJBvuheVXZcyRrE-TGAGW71f9cr6bitgTjg9NzWsg9R2lKy9EGv-9BB72aiZtfKCG4OUV89TvL6bnPLbuqq-bqL-R4a-jQiRPzopr/s72-c/NOD32_Antivirus_4.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-8491090936199911851</id><published>2011-04-13T04:36:00.000-07:00</published><updated>2011-04-13T04:36:10.608-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Malaysiakini – Malaysia’s Most Popular News Website Shutdown’s after cyber attack !</title><content type='html'>&lt;img alt=&quot;&quot; class=&quot;alignnone&quot; height=&quot;476&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoWkBK1XvYNbdAzArWsvxFAx1KRinMp0F0EGrLPOXqnk7b1beyteR1L6t3-1KHQ-bwuVcn3rf9bBUJocE0ZhZXMkh1IvHgc6vfigtL5kmv0SLIjxQ-Xe9nM0R77wSGlsXiEnNxyMNT5Rve/s640/phpThumb_generated_thumbnailjpg.jpg&quot; width=&quot;456&quot; /&gt;&lt;br /&gt;
&lt;div&gt;It has been reported that Malaysia’s&amp;nbsp;most popular news website Malaysiakini (&lt;a href=&quot;http://www.malaysiakini.com/&quot; target=&quot;_blank&quot;&gt;http://www.malaysiakini.com&lt;/a&gt;)&amp;nbsp;has   been hit by cyber attack from 11 AM&amp;nbsp;afternoon&amp;nbsp;shutting&amp;nbsp;the   website&amp;nbsp;down. The attack created a stir when the website stopped working   just before the Sarawak election, making the website inaccessible to   the readers. The attack has been diagnosed as Denial-of-service attack   which is considered to prevent an Internet site or service from   functioning efficiently or at all, temporarily or indefinitely.   Denial-of-service attacks are considered violations of the IAB’s   Internet proper use policy, and also violate the acceptable use policies   of virtually all Internet service providers. They also commonly   constitute violations of the laws of individual nations.&lt;/div&gt;&lt;span id=&quot;more-176&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;According  to the technical team, the cyber attack has resulted in  &amp;nbsp;swarming the  Malaysiakini&amp;nbsp;servers to the point that they are unable to  cope with the  massive traffic. Highlighting the attack both the data  centers TM  Brickfields and Jaring have also been affected.&lt;/div&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;Due to the attack the Malaysiakini has interrupted its operation and has posted all of its reports and updates in its facebook (&lt;a href=&quot;http://www.facebook.com/MalaysiaKini&quot;&gt;http://www.facebook.com/MalaysiaKini&lt;/a&gt;). Malaysiakini.com offers daily news and views in English, Malay,  Chinese  and Tamil, delivering over 37 million page views and 750,000  video  downloads per month to over 1.6 million absolute unique visitors  (Google  Analytics, August 2008). From July 2008, Malaysiakini became  the most  read and popular news website in Malaysia.&lt;/div&gt;&lt;div&gt;It has been reported that Malaysia’s&amp;nbsp;most popular news website Malaysiakini (&lt;a href=&quot;http://www.malaysiakini.com/&quot; target=&quot;_blank&quot;&gt;http://www.malaysiakini.com&lt;/a&gt;)&amp;nbsp;has   been hit by cyber attack from 11 AM&amp;nbsp;afternoon&amp;nbsp;shutting&amp;nbsp;the   website&amp;nbsp;down. The attack created a stir when the website stopped working   just before the Sarawak election, making the website inaccessible to   the readers. The attack has been diagnosed as Denial-of-service attack   which is considered to prevent an Internet site or service from   functioning efficiently or at all, temporarily or indefinitely.   Denial-of-service attacks are considered violations of the IAB’s   Internet proper use policy, and also violate the acceptable use policies   of virtually all Internet service providers. They also commonly   constitute violations of the laws of individual nations.&lt;/div&gt;&lt;br /&gt;
&lt;div&gt;According  to the technical team, the cyber attack has resulted in  &amp;nbsp;swarming the  Malaysiakini&amp;nbsp;servers to the point that they are unable to  cope with the  massive traffic. Highlighting the attack both the data  centers TM  Brickfields and Jaring have also been affected.&lt;/div&gt;&lt;br /&gt;
&lt;div&gt;Due to the attack the Malaysiakini has interrupted its operation and has posted all of its reports and updates in its facebook (&lt;a href=&quot;http://www.facebook.com/MalaysiaKini&quot;&gt;http://www.facebook.com/MalaysiaKini&lt;/a&gt;). Malaysiakini.com offers daily news and views in English, Malay,  Chinese  and Tamil, delivering over 37 million page views and 750,000  video  downloads per month to over 1.6 million absolute unique visitors  (Google  Analytics, August 2008). From July 2008, Malaysiakini became  the most  read and popular news website in Malaysia.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/8491090936199911851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/malaysiakini-malaysias-most-popular.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8491090936199911851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/8491090936199911851'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/malaysiakini-malaysias-most-popular.html' title='Malaysiakini – Malaysia’s Most Popular News Website Shutdown’s after cyber attack !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoWkBK1XvYNbdAzArWsvxFAx1KRinMp0F0EGrLPOXqnk7b1beyteR1L6t3-1KHQ-bwuVcn3rf9bBUJocE0ZhZXMkh1IvHgc6vfigtL5kmv0SLIjxQ-Xe9nM0R77wSGlsXiEnNxyMNT5Rve/s72-c/phpThumb_generated_thumbnailjpg.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-4803124349257594511</id><published>2011-04-13T04:34:00.001-07:00</published><updated>2011-04-13T04:34:59.652-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>French Hacker Arrested After Bragging on TV !</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu_Rd5SrYnif-45p9PruVrEd0XqOD7MwTatkTS_dW-PBKSyf0Lrh_C6Dvnf-8C8YTtH49suJHI-ijLSLe36-5s55t02HhcVdwyoYh34Y2OeOjgZtv_s34TLhq0KRAfVvAZ6RvtQvb6mDg2/s1600/anonymouswikileaks-m.jpg&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu_Rd5SrYnif-45p9PruVrEd0XqOD7MwTatkTS_dW-PBKSyf0Lrh_C6Dvnf-8C8YTtH49suJHI-ijLSLe36-5s55t02HhcVdwyoYh34Y2OeOjgZtv_s34TLhq0KRAfVvAZ6RvtQvb6mDg2/s400/anonymouswikileaks-m.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The  hacker appeared on the France 2 television programme “Complément   d’enquête” (Further investigation) where he claimed to have hacked  into  computers belonging to the French Army and Thales Group, an IT   contractor for the aerospace, defense and security industries.&lt;br /&gt;
After the programme aired, the company filed a complaint, claiming  the  hacker stole confidential information from its internal network.&lt;br /&gt;
The man, identified in only as Carl, was arrested on April 7 in  Paris.  When inspecting his computer, police found the details of  hundreds of  credit cards and bank accounts.&lt;br /&gt;
The hacker admitted selling the information on underground websites,  as  well as using them to make fraudulent purchases for himself and  others.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/4803124349257594511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/french-hacker-arrested-after-bragging.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4803124349257594511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4803124349257594511'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/french-hacker-arrested-after-bragging.html' title='French Hacker Arrested After Bragging on TV !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu_Rd5SrYnif-45p9PruVrEd0XqOD7MwTatkTS_dW-PBKSyf0Lrh_C6Dvnf-8C8YTtH49suJHI-ijLSLe36-5s55t02HhcVdwyoYh34Y2OeOjgZtv_s34TLhq0KRAfVvAZ6RvtQvb6mDg2/s72-c/anonymouswikileaks-m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-4742414380221422846</id><published>2011-04-13T04:33:00.001-07:00</published><updated>2011-04-13T04:33:46.525-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>BackTrack 5 will also be for Motorola Xoom</title><content type='html'>&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWGavotIS34GvQxq0CYpAckahSTyYKhRkD5UgEUajmOEV6mhUX4WP5EsEe1WTiDUwglo1_9FLxDr_5hhkQIlIFr726orJu5e2E9hkBTuHfqZLiKh1x_ffKbHLZ-tRSbCH-03prLpSm93_v/s1600/xoom-bt5-05.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWGavotIS34GvQxq0CYpAckahSTyYKhRkD5UgEUajmOEV6mhUX4WP5EsEe1WTiDUwglo1_9FLxDr_5hhkQIlIFr726orJu5e2E9hkBTuHfqZLiKh1x_ffKbHLZ-tRSbCH-03prLpSm93_v/s640/xoom-bt5-05.png&quot; width=&quot;566&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;As  of now, offensive-security have got a modified version of an  Ubuntu  10.04 ARM image, chrooted on a Motorola Xoom. The tablet is  running a  modified, overclockable kernel (from 1.0 to 1.5 GHz). The  chrooted  BackTrack environment is running a VNC server, from which you  can  connect from the tablet itself. When run locally from the Xoom  tablet,  the VNC session does not lag, and the touch keyboard and  touchscreen are  very workable.&lt;span id=&quot;more-172&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;As  expected from a chrooted environment, offensive-security are  not using  any custom drivers (for now), and injection and other related  wireless  attacks are NOT possible. Here’s a few screenshots we managed  to  scrounge from our dev box:&lt;/div&gt;&lt;div dir=&quot;ltr&quot;&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/bt5-msf-pwn.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 1&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/xoom-bt5-02.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 2&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/xoom-bt5-03.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 3&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/xoom-bt5-04.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 4&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/xoom-bt5-05.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 5&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;li&gt;&lt;a href=&quot;http://www.backtrack-linux.org/xoom/xoom-bt5-06.png&quot; rel=&quot;nofollow&quot;&gt;BackTrack on Motorola Xoom Screen 6&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;
&lt;div&gt;offensive-security  hope to release a dev version of this image in a  couple of weeks for  other Xoom owners to play with. We’ll keep you  posted !&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/4742414380221422846/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/backtrack-5-will-also-be-for-motorola.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4742414380221422846'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4742414380221422846'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/backtrack-5-will-also-be-for-motorola.html' title='BackTrack 5 will also be for Motorola Xoom'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWGavotIS34GvQxq0CYpAckahSTyYKhRkD5UgEUajmOEV6mhUX4WP5EsEe1WTiDUwglo1_9FLxDr_5hhkQIlIFr726orJu5e2E9hkBTuHfqZLiKh1x_ffKbHLZ-tRSbCH-03prLpSm93_v/s72-c/xoom-bt5-05.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-2136741438225793196</id><published>2011-04-12T02:52:00.000-07:00</published><updated>2011-04-12T02:52:11.250-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>Tell us how you did it, Pakistan court to hackers !</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzrkLsRVAFx8O5HH7xRN4FpaSdlLrNSctQaFYMnM-GpV0oCNP1_SzI-MZWcPFDiJb31tyuhVt0HgfhSYaQ3xlVxaY10fllOXS2CmXrhlTTF4Hunih5vBjgjL-M9HvcoEcKPVdO29cHpdV/s1600/pakistan-supreme-court_0.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzrkLsRVAFx8O5HH7xRN4FpaSdlLrNSctQaFYMnM-GpV0oCNP1_SzI-MZWcPFDiJb31tyuhVt0HgfhSYaQ3xlVxaY10fllOXS2CmXrhlTTF4Hunih5vBjgjL-M9HvcoEcKPVdO29cHpdV/s400/pakistan-supreme-court_0.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Tell us how you did it, Pakistan court to hackers !&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
Hackers would be granted bail if they taught judges how to do the job,  Pakistan&#39;s Supreme Court said in a lighter vein as it heard the bail  plea of two teenagers who had broken into the Supreme Court website last  year. The Supreme Court then granted bail to the two teenagers who are  accused of hacking its official website and placing derogatory material  about judiciary and the chief justice on it, Dawn reported Tuesday.&lt;br /&gt;
The bench, comprising Justices Asif Saeed Khan Khosa and Amir Hani Muslim, was headed by Justice Javed Iqbal.&lt;br /&gt;
&lt;br /&gt;
The judges said the hackers had done a &quot;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;brilliant job&lt;/span&gt;&lt;/b&gt;&quot;.&lt;br /&gt;
&lt;br /&gt;
Their counsel Iftikhar Hussain Gilani promptly said they had not hacked the site.&lt;br /&gt;
&lt;br /&gt;
To which, the judges asked Gilani why he was not ready to accept praise for the hackers.&lt;br /&gt;
&lt;br /&gt;
They then said in a lighter vein they would grant bail on the condition that the accused taught them how to do such a job.&lt;br /&gt;
&lt;br /&gt;
The judges, however, observed that it was not just the issue of hacking,  the hackers had also deprived the people and visitors to the website of  general information and information regarding fixation of cases.&lt;br /&gt;
&lt;br /&gt;
They also observed that highly objectionable material had been placed on the website.&lt;br /&gt;
&lt;br /&gt;
Gilani claimed the site had not been hacked by the teenagers but by some Indians.</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/2136741438225793196/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/tell-us-how-you-did-it-pakistan-court.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2136741438225793196'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2136741438225793196'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/tell-us-how-you-did-it-pakistan-court.html' title='Tell us how you did it, Pakistan court to hackers !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijzrkLsRVAFx8O5HH7xRN4FpaSdlLrNSctQaFYMnM-GpV0oCNP1_SzI-MZWcPFDiJb31tyuhVt0HgfhSYaQ3xlVxaY10fllOXS2CmXrhlTTF4Hunih5vBjgjL-M9HvcoEcKPVdO29cHpdV/s72-c/pakistan-supreme-court_0.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-735833977995482241</id><published>2011-04-12T02:50:00.000-07:00</published><updated>2011-04-12T02:50:57.471-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>Wireshark 1.5.1 Development Release !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOJSmlm2jdmM4Dkd-Z7c1sRo91eHcJoZ71hwyctAx-rBm-JFWaeEmer3g8u4XfUYW0pTLo0mJGePCpeT7MyORmOh7oi4Uvq0NAj4HIcJCBtF65P5gHopDakt5XVFqvVvAzI_B8Jj0KPxXG/s1600/WireSharkLogo-1024x819.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOJSmlm2jdmM4Dkd-Z7c1sRo91eHcJoZ71hwyctAx-rBm-JFWaeEmer3g8u4XfUYW0pTLo0mJGePCpeT7MyORmOh7oi4Uvq0NAj4HIcJCBtF65P5gHopDakt5XVFqvVvAzI_B8Jj0KPxXG/s1600/WireSharkLogo-1024x819.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;511&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOJSmlm2jdmM4Dkd-Z7c1sRo91eHcJoZ71hwyctAx-rBm-JFWaeEmer3g8u4XfUYW0pTLo0mJGePCpeT7MyORmOh7oi4Uvq0NAj4HIcJCBtF65P5gHopDakt5XVFqvVvAzI_B8Jj0KPxXG/s640/WireSharkLogo-1024x819.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px 0px 0.8em; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;Wireshark 1.5.1 has been released. Installers for Windows, OS X, and source code are now available.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;section&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot; title=&quot;New and Updated Features&quot;&gt;&lt;div class=&quot;titlepage&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;h3 class=&quot;title&quot; style=&quot;font-weight: bold; height: auto; line-height: 16px; margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 72px;&quot; width=&quot;72&quot;&gt;&lt;/canvas&gt;New &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 66px;&quot; width=&quot;66&quot;&gt;&lt;/canvas&gt;and &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 119px;&quot; width=&quot;119&quot;&gt;&lt;/canvas&gt;Updated &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 107px;&quot; width=&quot;107&quot;&gt;&lt;/canvas&gt;Features&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px 0px 0.8em; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;The following features are new (or have been significantly updated) since version 1.4:&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;itemizedlist&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Wireshark can import text dumps, similar to text2pcap.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;You can now view Wireshark&#39;s dissector tables (for example the TCP port to dissector mappings) from the main window.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;TShark can show a specific occurrence of a field when using &#39;-T fields&#39;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Custom columns can show a specific occurrence of a field.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;You can hide columns in the packet list.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Wireshark can now export SMB objects.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;dftest and randpkt now have manual pages.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;TShark can now display iSCSI service response times.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Dumpcap can now save files with a user-specified group id.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Syntax checking is done for capture filters.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;You can display the compiled BPF code for capture filters in the Capture Options dialog.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;You can now navigate backwards and forwards through TCP and UDP sessions using&amp;nbsp;&lt;span class=&quot;keycap&quot; style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px; padding: 0px;&quot;&gt;&lt;strong style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;Ctrl&lt;/strong&gt;&lt;/span&gt;+&lt;span class=&quot;keycap&quot; style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px; padding: 0px;&quot;&gt;&lt;strong style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;,&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span class=&quot;keycap&quot; style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px; padding: 0px;&quot;&gt;&lt;strong style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;Ctrl&lt;/strong&gt;&lt;/span&gt;+&lt;span class=&quot;keycap&quot; style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px; padding: 0px;&quot;&gt;&lt;strong style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;.&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Packet length is (finally) a default column.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;TCP window size is now avaiable both scaled and unscaled. A TCP window scaling graph is available in the GUI.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;802.1q VLAN tags are now shown by the Ethernet II dissector.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Various dissectors now display some UTF-16 strings as proper Unicode including the DCE/RPC and SMB dissectors.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;The RTP player now has an option to show the time of day in the graph in addition to the seconds since beginning of capture.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;The RTP player now shows why media interruptions occur.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; line-height: 17px;&quot;&gt;Graphs now save as PNG images by default.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 17px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot; title=&quot;New Protocol Support&quot;&gt;&lt;div class=&quot;titlepage&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;h3 class=&quot;title&quot; style=&quot;font-weight: bold; height: auto; line-height: 16px; margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 72px;&quot; width=&quot;72&quot;&gt;&lt;/canvas&gt;New &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 116px;&quot; width=&quot;116&quot;&gt;&lt;/canvas&gt;Protocol &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 105px;&quot; width=&quot;105&quot;&gt;&lt;/canvas&gt;Support&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px 0px 0.8em; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;ADwin,  ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing Protocol,  Constrained Application Protocol (COAP), Digium TDMoE, Erlang  Distribution Protocol, Ether-S-I/O, FastCGI, Fibre Channel over  InfiniBand (FCoIB), Gopher, Gigamon GMHDR, IDMP, Infiniband Socket  Direct Protocol (SDP), JSON, LISP Data, MikroTik MAC-Telnet, Mongo Wire  Protocol, Network Monitor 802.11 radio header, OPC UA ExtensionObjects,  PPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing, RSIP, SAMETIME, SCoP,  SGSAP, Tektronix Teklink, WAI authentication, Wi-Fi P2P (Wi-Fi Direct)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot; title=&quot;Updated Protocol Support&quot;&gt;&lt;div class=&quot;titlepage&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;h3 class=&quot;title&quot; style=&quot;font-weight: bold; height: auto; line-height: 16px; margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 119px;&quot; width=&quot;119&quot;&gt;&lt;/canvas&gt;Updated &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 116px;&quot; width=&quot;116&quot;&gt;&lt;/canvas&gt;Protocol &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 105px;&quot; width=&quot;105&quot;&gt;&lt;/canvas&gt;Support&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;section&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot; title=&quot;New and Updated Capture File Support&quot;&gt;&lt;div class=&quot;titlepage&quot; style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;div style=&quot;height: auto; margin: 0px; padding: 0px;&quot;&gt;&lt;h3 class=&quot;title&quot; style=&quot;font-weight: bold; height: auto; line-height: 16px; margin: 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 72px;&quot; width=&quot;72&quot;&gt;&lt;/canvas&gt;New &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 66px;&quot; width=&quot;66&quot;&gt;&lt;/canvas&gt;and &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 119px;&quot; width=&quot;119&quot;&gt;&lt;/canvas&gt;Updated &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 111px;&quot; width=&quot;111&quot;&gt;&lt;/canvas&gt;Capture &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 63px;&quot; width=&quot;63&quot;&gt;&lt;/canvas&gt;File &lt;canvas height=&quot;24&quot; style=&quot;height: 24px; left: -1px; top: 0px; width: 105px;&quot; width=&quot;105&quot;&gt;&lt;/canvas&gt;Support&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: black; font-weight: normal; height: auto; line-height: 17px; margin: 0px 0px 0.8em; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;Apple  PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP OpenVMS  TCPTrace, IPFIX (the file format, not the protocol), Lucent/Ascend  debug, Microsoft Network Monitor, Network Instruments, TamoSoft CommView&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: black; height: auto; line-height: 17px; margin: 0px 0px 0.8em; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Official releases are available:&amp;nbsp;&lt;a href=&quot;http://www.wireshark.org/download.html&quot; style=&quot;color: blue; height: auto; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;download page&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/735833977995482241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/wireshark-151-development-release.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/735833977995482241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/735833977995482241'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/wireshark-151-development-release.html' title='Wireshark 1.5.1 Development Release !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOJSmlm2jdmM4Dkd-Z7c1sRo91eHcJoZ71hwyctAx-rBm-JFWaeEmer3g8u4XfUYW0pTLo0mJGePCpeT7MyORmOh7oi4Uvq0NAj4HIcJCBtF65P5gHopDakt5XVFqvVvAzI_B8Jj0KPxXG/s72-c/WireSharkLogo-1024x819.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-1803607584144468906</id><published>2011-04-12T02:49:00.000-07:00</published><updated>2011-04-12T02:49:19.604-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>CEH Trainer (Centennial Media Training) Got Hacked !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn7mrGixshPyJi0ADHfNQmQNVxLTu-gm-0BQlBe9uoAyePrBFYL-gnrxewHplT-duldZhvf0lsBG44ElZD66AH_eHwmQ2ecL2k2O7bET9OR8wGbgf9nCiObTHf8_lmIVjqFBZ5koaJaCKa/s1600/Untitled.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;366&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn7mrGixshPyJi0ADHfNQmQNVxLTu-gm-0BQlBe9uoAyePrBFYL-gnrxewHplT-duldZhvf0lsBG44ElZD66AH_eHwmQ2ecL2k2O7bET9OR8wGbgf9nCiObTHf8_lmIVjqFBZ5koaJaCKa/s640/Untitled.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Hacked site :&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cmtraining.com.au/product.php?prod_id=68&quot;&gt;http://www.cmtraining.com.au/product.php?prod_id=68&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/1803607584144468906/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ceh-trainer-centennial-media-training.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1803607584144468906'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1803607584144468906'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ceh-trainer-centennial-media-training.html' title='CEH Trainer (Centennial Media Training) Got Hacked !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn7mrGixshPyJi0ADHfNQmQNVxLTu-gm-0BQlBe9uoAyePrBFYL-gnrxewHplT-duldZhvf0lsBG44ElZD66AH_eHwmQ2ecL2k2O7bET9OR8wGbgf9nCiObTHf8_lmIVjqFBZ5koaJaCKa/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-2096148207121687639</id><published>2011-04-12T02:47:00.001-07:00</published><updated>2011-04-12T02:47:53.356-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>50 government website hacked by Tn-V!Rus and The 077</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLbp0n87QEedAcJzkg0fScjN7nr_2aTNECr3h71MoPfnMizLOfDOL7Uwn6MQREuwJzyEU3s-teBjz9wYm1o1mHMXXYiu6EiIz5RR-96QPLzNEe6QDse-uvpVaVRJ0j4OSjuGWZoTvcvFhG/s1600/Untitled.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;376&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLbp0n87QEedAcJzkg0fScjN7nr_2aTNECr3h71MoPfnMizLOfDOL7Uwn6MQREuwJzyEU3s-teBjz9wYm1o1mHMXXYiu6EiIz5RR-96QPLzNEe6QDse-uvpVaVRJ0j4OSjuGWZoTvcvFhG/s640/Untitled.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-size: medium;&quot;&gt;&lt;b&gt;Hacked sites :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;a href=&quot;http://pastebin.com/wmmRF78j&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;http://pastebin.com/wmmRF78j&lt;/span&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/2096148207121687639/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/50-government-website-hacked-by-tn-vrus.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2096148207121687639'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2096148207121687639'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/50-government-website-hacked-by-tn-vrus.html' title='50 government website hacked by Tn-V!Rus and The 077'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLbp0n87QEedAcJzkg0fScjN7nr_2aTNECr3h71MoPfnMizLOfDOL7Uwn6MQREuwJzyEU3s-teBjz9wYm1o1mHMXXYiu6EiIz5RR-96QPLzNEe6QDse-uvpVaVRJ0j4OSjuGWZoTvcvFhG/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-5469159909232391241</id><published>2011-04-12T02:46:00.001-07:00</published><updated>2011-04-12T02:46:47.410-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>71 websites hacked by T0$h!R0 AM!N</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUZoQlpSx3Dw6ExIKq8zKnJv-QVKPtYhTxr-COOMNtRP4FgWSnr37p3urXPtmGO5sZzHf2KEA6pjXNljMA9AKfpgy1P-Xlt7J8tX58G71ak8rjIjs8OsnLzZ38YW04DiLUu7nYv1D9CTc4/s1600/Untitled.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;384&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUZoQlpSx3Dw6ExIKq8zKnJv-QVKPtYhTxr-COOMNtRP4FgWSnr37p3urXPtmGO5sZzHf2KEA6pjXNljMA9AKfpgy1P-Xlt7J8tX58G71ak8rjIjs8OsnLzZ38YW04DiLUu7nYv1D9CTc4/s640/Untitled.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-size: medium;&quot;&gt;&lt;b&gt;Hacked Sites :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;a href=&quot;http://pastebin.com/b1FnnMHp&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;http://pastebin.com/b1FnnMHp&lt;/span&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/5469159909232391241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/71-websites-hacked-by-t0hr0-amn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/5469159909232391241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/5469159909232391241'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/71-websites-hacked-by-t0hr0-amn.html' title='71 websites hacked by T0$h!R0 AM!N'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUZoQlpSx3Dw6ExIKq8zKnJv-QVKPtYhTxr-COOMNtRP4FgWSnr37p3urXPtmGO5sZzHf2KEA6pjXNljMA9AKfpgy1P-Xlt7J8tX58G71ak8rjIjs8OsnLzZ38YW04DiLUu7nYv1D9CTc4/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-1808031574110236489</id><published>2011-04-12T02:45:00.000-07:00</published><updated>2011-04-12T02:45:47.246-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>1000 website hacked by bad boy !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJawyjqNfWdQfiEtPgOsKB1cG3yPG97Delw5H3wFM2U_B6IIjKNQBjmstbKMENqz9qC3Ok0D5woZHAUq6mpPX6VLA_ICKnJl4lf7LjyY0OrY1U-DJcuEvHLXO5WX_cllhH071xK17uZxZP/s1600/Untitled.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJawyjqNfWdQfiEtPgOsKB1cG3yPG97Delw5H3wFM2U_B6IIjKNQBjmstbKMENqz9qC3Ok0D5woZHAUq6mpPX6VLA_ICKnJl4lf7LjyY0OrY1U-DJcuEvHLXO5WX_cllhH071xK17uZxZP/s640/Untitled.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Hacked Site List :&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://pastebin.com/JTDgcyMV&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;http://pastebin.com/JTDgcyMV&lt;/span&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/1808031574110236489/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/1000-website-hacked-by-bad-boy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1808031574110236489'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1808031574110236489'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/1000-website-hacked-by-bad-boy.html' title='1000 website hacked by bad boy !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJawyjqNfWdQfiEtPgOsKB1cG3yPG97Delw5H3wFM2U_B6IIjKNQBjmstbKMENqz9qC3Ok0D5woZHAUq6mpPX6VLA_ICKnJl4lf7LjyY0OrY1U-DJcuEvHLXO5WX_cllhH071xK17uZxZP/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-3042013129033626790</id><published>2011-04-11T09:15:00.001-07:00</published><updated>2011-04-11T09:15:33.122-07:00</updated><title type='text'>Barracuda Networks Hacking via SQL Injection !</title><content type='html'>&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-size: 13px; line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpqqjeIwqX025kGYoPLLvPRkO8XV1sAJjd_-dgAlgv-G74-63ghIpcUp58HRDsZQiqIpuy7nIfEu0KEYH4IFyDVHOIcTjpzJHFfLi5fgUSxI-q4ekTj6YqOjgd_ieeMN-b9FfqvOy0Q7LW/s1600/barr.gif&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpqqjeIwqX025kGYoPLLvPRkO8XV1sAJjd_-dgAlgv-G74-63ghIpcUp58HRDsZQiqIpuy7nIfEu0KEYH4IFyDVHOIcTjpzJHFfLi5fgUSxI-q4ekTj6YqOjgd_ieeMN-b9FfqvOy0Q7LW/s1600/barr.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Helvetica Neue&#39;,Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;Barracuda  Networks Inc. combines premises-based gateways and software, virtual  appliances, cloud services, and sophisticated remote support to deliver  comprehensive content security, data protection and application delivery  solutions. The company’s expansive product portfolio includes offerings  for protection against email, Web and IM threats as well as products  that improve application delivery and network access, message archiving,  backup and data protection.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;Barracuda  Networks’ product portfolio includes: Barracuda Spam &amp;amp; Virus  Firewall, Barracuda Web Filter, Barracuda IM Firewall, Barracuda Web  Application Firewall, Barracuda SSL VPN, Barracuda Load Balancer,  Barracuda Link Balancer, Barracuda Message&amp;nbsp;&lt;span class=&quot;SpellE&quot;&gt;Archiver&lt;/span&gt;, Barracuda Backup Service, and the&amp;nbsp;&lt;span class=&quot;SpellE&quot;&gt;BarracudaWare&lt;/span&gt;software  portfolio. Combining its own award-winning technology with powerful  open source software, Barracuda Networks solutions deliver easy to use,  comprehensive security, networking, and data protection products.  Barracuda Central, an advanced 24x7 operations center manages data  centers for all service-based offerings and works to continuously  monitor and block the latest Internet threats.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhfae30Lg1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;LIST OF DATABASES:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;new_barracuda&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;information_schema&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;Marketing&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;barracuda&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;black_ips&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;buniversity&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;bware&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;co-op&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;collections&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;cuda_car&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;cuda_stats&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;dev_new_barracuda&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;igivetest&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;igivetest_bk1_aug10&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;igivetestsucks&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;kb_solutions&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;leads&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;mysql&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;new_barracuda&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;new_barracuda_archive&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;php_live_chat&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;GramE&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;phpmyadmin&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DB NAME: NEW_BARRACUDA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;TABLE NAME: DEAL_REG&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA COUNT:&amp;nbsp;&lt;span class=&quot;GramE&quot;&gt;Count(&lt;/span&gt;*) of&amp;nbsp;&lt;span class=&quot;SpellE&quot;&gt;new_barracuda.deal_reg&lt;/span&gt;&amp;nbsp;is 17549&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;SAMPLE DATA:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;SpellE&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhfwwmpjY1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;DB NAME: NEW_BARRACUDA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;TABLE NAME: CMS_LOGINS&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA COUNT:&amp;nbsp;Count(*) of new_barracuda.cms_logins is 251&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&amp;nbsp;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhfzlbfLQ1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DB NAME: NEW_BARRACUDA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;TABLE NAME: BUNIVERSITY_USERS&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA COUNT:&amp;nbsp;Count(*) of new_barracuda.buniversity_users is 35&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhg2nBAiW1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DB NAME: MYSQL&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;TABLE NAME: USER&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA COUNT:&amp;nbsp;&lt;span class=&quot;GramE&quot;&gt;Count(&lt;/span&gt;*) of&amp;nbsp;&lt;span class=&quot;SpellE&quot;&gt;mysql.user&lt;/span&gt;&amp;nbsp;is 23&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhg45cy9M1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DB NAME: PHP_LIVE_CHAT&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;TABLE NAME:&amp;nbsp;&amp;nbsp;CHAT_ADMIN&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA COUNT:&amp;nbsp;&lt;span class=&quot;GramE&quot;&gt;Count(&lt;/span&gt;*) of&amp;nbsp;&lt;span class=&quot;SpellE&quot;&gt;php_live_chat.chat_admin&lt;/span&gt;&amp;nbsp;is 30&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;DATA:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;img src=&quot;http://media.tumblr.com/tumblr_ljhg5zljpl1qhd7ko.png&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;line-height: 15px; margin: 10px 0px 0px; padding: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif;&quot;&gt;&lt;b&gt;Source :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;a href=&quot;http://hmsec.tumblr.com/&quot;&gt;&lt;b&gt;http://hmsec.tumblr.com&lt;/b&gt;/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/3042013129033626790/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/barracuda-networks-hacking-via-sql.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/3042013129033626790'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/3042013129033626790'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/barracuda-networks-hacking-via-sql.html' title='Barracuda Networks Hacking via SQL Injection !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpqqjeIwqX025kGYoPLLvPRkO8XV1sAJjd_-dgAlgv-G74-63ghIpcUp58HRDsZQiqIpuy7nIfEu0KEYH4IFyDVHOIcTjpzJHFfLi5fgUSxI-q4ekTj6YqOjgd_ieeMN-b9FfqvOy0Q7LW/s72-c/barr.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-2280147353531380734</id><published>2011-04-11T09:14:00.001-07:00</published><updated>2011-04-11T09:14:39.388-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers News"/><title type='text'>DUCAT Punjab Best Ethical Hacker Competition</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZFK8wM0M9S5G4pyNv0xgUd9msynjN5IC2TwW_SRdolfkpDnILNg_hnWxhrzQjST1g6qTJ-DDajqA7pdEEbY-8pHEvHKhq2yGTnd7ojVIMG9fXpgpAP9gkZPiY4qRdPhFBBunry69rfMH/s1600/hacker.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZFK8wM0M9S5G4pyNv0xgUd9msynjN5IC2TwW_SRdolfkpDnILNg_hnWxhrzQjST1g6qTJ-DDajqA7pdEEbY-8pHEvHKhq2yGTnd7ojVIMG9fXpgpAP9gkZPiY4qRdPhFBBunry69rfMH/s640/hacker.jpg&quot; width=&quot;394&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Registration :&amp;nbsp;&lt;a href=&quot;http://www.dreamtechlabs.com/registration.php&quot;&gt;http://www.dreamtechlabs.com/registration.php&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Participants are requested to carry their personal laptops with Battery backup.&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;A Test fees of Rs 100 has to be submitted on the spot.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;News By &lt;/b&gt;:&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: collapse; font-family: arial,sans-serif; font-size: 13px;&quot;&gt;Vishal Sharma&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/2280147353531380734/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ducat-punjab-best-ethical-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2280147353531380734'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/2280147353531380734'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ducat-punjab-best-ethical-hacker.html' title='DUCAT Punjab Best Ethical Hacker Competition'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZFK8wM0M9S5G4pyNv0xgUd9msynjN5IC2TwW_SRdolfkpDnILNg_hnWxhrzQjST1g6qTJ-DDajqA7pdEEbY-8pHEvHKhq2yGTnd7ojVIMG9fXpgpAP9gkZPiY4qRdPhFBBunry69rfMH/s72-c/hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-4891307414931329957</id><published>2011-04-11T09:13:00.001-07:00</published><updated>2011-04-11T09:13:53.887-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><title type='text'>OllyDbg 2.01 alpha 3 Released !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4u0HnDfHuhFaMLNwSVshPGWsm6ZcpLsicfZ8rutLwbXQYS7O8jfUroXKr8CSOOrzZXgWOM1oO2cz6CGoe8qPm5894dwTH-hWxZsTf_PAyjkejbWd0ZoFmXUUr3TtuRATAwLT3TxIU3y-1/s1600/ollydbg.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;474&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4u0HnDfHuhFaMLNwSVshPGWsm6ZcpLsicfZ8rutLwbXQYS7O8jfUroXKr8CSOOrzZXgWOM1oO2cz6CGoe8qPm5894dwTH-hWxZsTf_PAyjkejbWd0ZoFmXUUr3TtuRATAwLT3TxIU3y-1/s640/ollydbg.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;A major update with many&amp;nbsp;new features. Here are the most importan&lt;/span&gt;&lt;/b&gt;t:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;- Support for multi-monitor configurations&lt;/li&gt;
&lt;li&gt;- Hardware breakpoints and fast command emulation now co-operate.  That is, run trace rund at full speed (up to and exceeding 500000  commands per second) even if there are hardware breakpoints set&lt;/li&gt;
&lt;li&gt;- Purely conditional breakpoints during run trace are strongly accelerated&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;-&amp;nbsp;Stepping,&amp;nbsp;tracing and execution till selection with hardware breakpoints instead of INT3. Controlled by&amp;nbsp;option&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Debugging | Use HW breakpoints for stepping&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;-&amp;nbsp;INT3 and hardware breakpoints allow to declare their location as an entry point and specify call parameters for protocolling&lt;/li&gt;
&lt;li&gt;- Scan for hidden modules. .NET environment frequently loads modules but does not report them to Debugger&lt;/li&gt;
&lt;li&gt;- Search window keeps up to 8 last searches in a separate tabs&lt;/li&gt;
&lt;li&gt;- Option to&amp;nbsp;load&amp;nbsp;.udd information&amp;nbsp;even when path, file name or file checksum is different&lt;/li&gt;
&lt;li&gt;- Option to save .udd file on request&lt;/li&gt;
&lt;li&gt;- Expressions allow for&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;DWORD==&quot;text&quot;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;. Doubleword is interpreted as a pointer to string, comparison is done both in ASCII and UNICODE modes&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;- Updated decoding of several rare commands&lt;/li&gt;
&lt;li&gt;- List of windows. I get address of window function directly from the Window tables. This is tricky but works perfectly&lt;/li&gt;
&lt;li&gt;- ASCII dumps and&amp;nbsp;ASCII strings in Binary edit are displayed according to the seleced code page&amp;nbsp;(option&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Appearance | ASCII code page&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;- Memory allocated at address 0 will be correctly recognized and  displayed. (Yes, it&#39;s possible - I was also astonished by this fact! In  this way one can address data using NULL pointer!)&lt;/li&gt;
&lt;li&gt;- Improved post-mortem dump. I was unable to find the reason for  several reported crashes because they occured in the system DLLs. Now  when creating the dump I attempt to backtrace the stack&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;- Several not-so-inportand changes, like accelerated analysis of  tricky code sequences, option to decode&amp;nbsp;registers for&amp;nbsp;selected command,  new origin on non-command (safeguard: no shortcut), correct truncation  of very long file names in the main menu, restarting of the last loaded  executable even when several OllyDbg instances are running in parallel,  etc, etc&lt;/li&gt;
&lt;li&gt;- And, of course, multiple bugfixes.&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;a href=&quot;http://ollydbg.de/odbg201c.zip&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/4891307414931329957/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ollydbg-201-alpha-3-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4891307414931329957'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/4891307414931329957'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/ollydbg-201-alpha-3-released.html' title='OllyDbg 2.01 alpha 3 Released !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4u0HnDfHuhFaMLNwSVshPGWsm6ZcpLsicfZ8rutLwbXQYS7O8jfUroXKr8CSOOrzZXgWOM1oO2cz6CGoe8qPm5894dwTH-hWxZsTf_PAyjkejbWd0ZoFmXUUr3TtuRATAwLT3TxIU3y-1/s72-c/ollydbg.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-828522909500344834</id><published>2011-04-11T09:12:00.001-07:00</published><updated>2011-04-11T09:12:48.703-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><title type='text'>Sqlmap v.0.9 - automatic SQL injection and database takeover tool !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilX3ruv06RAnN-G_tylOPFBApOPKLWsIgs76KeKlMwnZ0O2zsMh5116XL53Us5mNQPRQRfUvXundKIfozkFCuhm402aSitE7N379b74reL_NtVaj7CKrkHutJYwSh_4Bin7nFaWnPdUkhI/s1600/sqlmap_plus_soap.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilX3ruv06RAnN-G_tylOPFBApOPKLWsIgs76KeKlMwnZ0O2zsMh5116XL53Us5mNQPRQRfUvXundKIfozkFCuhm402aSitE7N379b74reL_NtVaj7CKrkHutJYwSh_4Bin7nFaWnPdUkhI/s320/sqlmap_plus_soap.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
sqlmap is an open source penetration testing tool that automates the  process of detecting and exploiting SQL injection flaws and taking over  of database servers. It comes with a kick-ass detection engine, many  niche features for the ultimate penetration tester and a broad range of  switches lasting from database fingerprinting, over data fetching from  the database, to accessing the underlying file system and executing  commands on the operating system via out-of-band connections.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;Change Log :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;* Rewritten SQL injection detection engine (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Support to directly connect to the database without passing via a&lt;/li&gt;
&lt;li&gt;SQL injection, -d switch (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Added full support for both time-based blind SQL injection and&lt;/li&gt;
&lt;li&gt;error-based SQL injection techniques (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented support for Firebird (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented support for Microsoft Access, Sybase and SAP MaxDB&lt;/li&gt;
&lt;li&gt;(Miroslav).&lt;/li&gt;
&lt;li&gt;* Extended old &#39;--dump -C&#39; functionality to be able to search for&lt;/li&gt;
&lt;li&gt;specific database(s), table(s) and column(s), --search switch&lt;/li&gt;
&lt;li&gt;(Bernardo).&lt;/li&gt;
&lt;li&gt;* Added support to tamper injection data with --tamper switch (Bernardo&lt;/li&gt;
&lt;li&gt;and Miroslav).&lt;/li&gt;
&lt;li&gt;* Added automatic recognition of password hashes format and support to&lt;/li&gt;
&lt;li&gt;crack them with a dictionary-based attack (Miroslav).&lt;/li&gt;
&lt;li&gt;* Added support to enumerate roles on Oracle, --roles switch (Bernardo).&lt;/li&gt;
&lt;li&gt;* Added support for SOAP based web services requests (Bernardo).&lt;/li&gt;
&lt;li&gt;* Added support to fetch unicode data (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Added support to use persistent HTTP(s) connection for speed&lt;/li&gt;
&lt;li&gt;improvement, --keep-alive switch (Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented several optimization switches to speed up the exploitation&lt;/li&gt;
&lt;li&gt;of SQL injections (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Support to test and inject against HTTP Referer header (Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented HTTP(s) proxy authentication support, --proxy-cred switch&lt;/li&gt;
&lt;li&gt;(Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented feature to speedup the enumeration of table names&lt;/li&gt;
&lt;li&gt;(Miroslav).&lt;/li&gt;
&lt;li&gt;* Support for customizable HTTP(s) redirections (Bernardo).&lt;/li&gt;
&lt;li&gt;* Support to replicate the back-end DBMS tables structure and entries&lt;/li&gt;
&lt;li&gt;in a local SQLite 3 database, --replicate switch (Miroslav).&lt;/li&gt;
&lt;li&gt;* Support to parse and test forms on target url, --forms switch&lt;/li&gt;
&lt;li&gt;(Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Added switches to brute-force tables names and columns names with a&lt;/li&gt;
&lt;li&gt;dictionary attack, --common-tables and --common-columns. Useful for&lt;/li&gt;
&lt;li&gt;instance when system table &#39;information_schema&#39; is not available on&lt;/li&gt;
&lt;li&gt;MySQL (Miroslav).&lt;/li&gt;
&lt;li&gt;* Basic support for REST-style URL parameters by using the asterisk (*)&lt;/li&gt;
&lt;li&gt;to mark where to test for and exploit SQL injection (Miroslav).&lt;/li&gt;
&lt;li&gt;* Added safe URL feature, --safe-url and --safe-freq (Miroslav).&lt;/li&gt;
&lt;li&gt;* Added --text-only switch to strip from the HTTP response body the&lt;/li&gt;
&lt;li&gt;HTML/JS code and compare pages based only on their textual content&lt;/li&gt;
&lt;li&gt;(Miroslav).&lt;/li&gt;
&lt;li&gt;* Implemented few other features and switches (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Over 100 bugs fixed (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* Major code refactoring (Bernardo and Miroslav).&lt;/li&gt;
&lt;li&gt;* User&#39;s manual updated (Bernardo).&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Download :&amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/sqlmap/files/&quot;&gt;http://sourceforge.net/projects/sqlmap/files/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Video demo :&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/inquisb#g/u&quot;&gt;http://www.youtube.com/inquisb#g/u&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/828522909500344834/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/sqlmap-v09-automatic-sql-injection-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/828522909500344834'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/828522909500344834'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/sqlmap-v09-automatic-sql-injection-and.html' title='Sqlmap v.0.9 - automatic SQL injection and database takeover tool !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilX3ruv06RAnN-G_tylOPFBApOPKLWsIgs76KeKlMwnZ0O2zsMh5116XL53Us5mNQPRQRfUvXundKIfozkFCuhm402aSitE7N379b74reL_NtVaj7CKrkHutJYwSh_4Bin7nFaWnPdUkhI/s72-c/sqlmap_plus_soap.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-3778009317786872721</id><published>2011-04-11T01:17:00.001-07:00</published><updated>2011-04-11T01:17:32.707-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><title type='text'>RawCap sniffer for Windows released</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC9G8SxkWnWFf2k_n_in2_4tLoK_sepINqNupvjsnPEFF3koGNIndKRAATm9kaoKp7ujOvWgcUaCRF8U8FnAn3KI44XV6O5P-u32NxUgxh2qlITPZp5BS1nxrUlhlsdjOw9DdDAEJQi-Lq/s1600/RawCap_logo_PA2_180x180.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC9G8SxkWnWFf2k_n_in2_4tLoK_sepINqNupvjsnPEFF3koGNIndKRAATm9kaoKp7ujOvWgcUaCRF8U8FnAn3KI44XV6O5P-u32NxUgxh2qlITPZp5BS1nxrUlhlsdjOw9DdDAEJQi-Lq/s400/RawCap_logo_PA2_180x180.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
We are today proude to announce the release of RawCap, which is a free  raw sockets sniffer for Windows.&amp;nbsp;Here are some highlights of why RawCap  is a great tool to have in your toolset:&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback)&lt;/li&gt;
&lt;li&gt;RawCap.exe is just 17 kB&lt;/li&gt;
&lt;li&gt;No external libraries or DLL&#39;s needed&lt;/li&gt;
&lt;li&gt;No installation required, just download RawCap.exe and sniff&lt;/li&gt;
&lt;li&gt;Can sniff most interface types, including WiFi and PPP interfaces&lt;/li&gt;
&lt;li&gt;Minimal memory and CPU load&lt;/li&gt;
&lt;li&gt;Reliable and simple to use&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;Usage&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
RawCap takes two arguments; the first argument is the IP address or  interface number to sniff from, the second is the path/file to write the  captured packets to.&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;C:\Tools&amp;gt;RawCap.exe 192.168.0.23 dumpfile.pcap&lt;/span&gt;&lt;br /&gt;
You can also start RawCap without any arguments, which will leave you  with an interactive dialog where you can select NIC and filename:&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;C:\Tools&amp;gt;RawCap.exe&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;Network interfaces:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;0.     192.168.0.23    Local Area Connection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;1.     192.168.0.47    Wireless Network Connection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;2.     90.130.211.54   3G UMTS Internet&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;3.     192.168.111.1   VMware Network Adapter VMnet1&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;4.     192.168.222.1   VMware Network Adapter VMnet2&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;5.     127.0.0.1       Loopback Pseudo-Interface&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;Select network interface to sniff [default &#39;0&#39;]: 1&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;Output path or filename [default &#39;dumpfile.pcap&#39;]:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;Sniffing IP : 192.168.0.47&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;File        : dumpfile.pcap&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;Packets     : 1337&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;For Incident Responders&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
RawCap comes in very handy for incident responders who want to be able  to sniff network traffic locally at the clients of the corporate  network. Here are a few examples of how RawCap can be used for incident  response:&lt;br /&gt;
&lt;br /&gt;
A company laptop somewhere on the corporate network is believed to  exfiltrate sensitive coporate information to a foreign server on the  Internet by using a UMTS 3G connection on a USB dongle. After finding  the internal IP address on the corporate network the Incident Response  Team (IRT) use the Sysinternals tool PsExec to inject RawCap.exe onto  the laptop and sniff the packets being exfiltrated through the 3G  connection. The generated pcap file can be used to determine what the  external 3G connection was used for.&lt;br /&gt;
&lt;br /&gt;
A computer is suspected to be infected with malware that uses an SSL  tunnelling proxy (stunnel) to encrypt all Command-and-Control (C&amp;amp;C)  communication. The data that is to be sent into the tunnel is first sent  unencrypted to localhost (127.0.0.1 aka loopback interface) before it  enters the encrypted tunnel. Incident responders can use RawCap to sniff  the traffic to/from localhost on the Windows OS, which is something  other sniffing tools cannot do.&lt;br /&gt;
&lt;br /&gt;
A corporate laptop connected to the companies WPA2 encrypted WiFi is  found to have suspicious TCP sessions opened to other computers on the  same WiFi network. Incident responders can run RawCap locally on any of  those machines in order to capture the WiFi network traffic to/from that  machine in unencrypted form.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;For Penetration Testers&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
RawCap was not designed for pen-testers, but I realize that there are  some situations where the tool can come in hany when doing a penetration  test. Here are some examples:&lt;br /&gt;
&lt;br /&gt;
After getting remote access and admin privileges on a Windows XP machine  the pen-tester wanna sniff the network traffic of the machine in order  to get hold of additional credentials. Sniffing tools like dumpcap,  WinDump and NMCap can unfortunately not be used since no WinPcap or NDIS  driver is installed. RawCap does, however, not need any special driver  installed since it makes use of the Raw Sockets functionality built into  Windows. Pen-testers can therefore run RawCap.exe to sniff traffic  without installing any drivers.&lt;br /&gt;
&lt;br /&gt;
After getting admin on a box the pen-tester wanna sniff the network  traffic, but box uses a WiFi network so traditional sniffing tools won&#39;t  work. This is when RawCap comes in handy, since it can sniff the WiFi  traffic of the owned machine just as easily as if it had been an  Ethernet NIC.&lt;br /&gt;
Download RawCap&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.netresec.com/?page=RawCap&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;RawCap Downloaded&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/3778009317786872721/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/rawcap-sniffer-for-windows-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/3778009317786872721'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/3778009317786872721'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/rawcap-sniffer-for-windows-released.html' title='RawCap sniffer for Windows released'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC9G8SxkWnWFf2k_n_in2_4tLoK_sepINqNupvjsnPEFF3koGNIndKRAATm9kaoKp7ujOvWgcUaCRF8U8FnAn3KI44XV6O5P-u32NxUgxh2qlITPZp5BS1nxrUlhlsdjOw9DdDAEJQi-Lq/s72-c/RawCap_logo_PA2_180x180.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8563550780787253789.post-1346482948149713383</id><published>2011-04-10T12:38:00.001-07:00</published><updated>2011-04-10T12:38:25.498-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download"/><title type='text'>WiFite The WEP/WPA Cracker version r68 released !</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0xTVIX7DqZ0tiWU3QV67gNLND_XU6_7oV-rPodM8Yd1BNkCsBmCSBpDZ0bGKNf67rdcOiNEagLD8-4BjeMl1sYetCKdJhluHQ37vrKcw9MoEVw_GOR7CMqxo4wANvfUIWuJcvBhR0XT2/s1600/wifiteimg.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0xTVIX7DqZ0tiWU3QV67gNLND_XU6_7oV-rPodM8Yd1BNkCsBmCSBpDZ0bGKNf67rdcOiNEagLD8-4BjeMl1sYetCKdJhluHQ37vrKcw9MoEVw_GOR7CMqxo4wANvfUIWuJcvBhR0XT2/s640/wifiteimg.jpg&quot; width=&quot;532&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
Designed for Backtrack4 RC1 distribution of Ubuntu. Linux only; no windows or osx support.&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;Purpose :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
to attack multiple WEP and WPA encrypted networks at the same time. this  tool is customizable to be automated with only a few arguments. wifite  can be trusted to run without supervision.&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;Feature :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;this project is available in French: all thanks goto Matt² for his excellent translation!&lt;/li&gt;
&lt;li&gt;sorts targets by power (in dB); cracks closest access points first&lt;/li&gt;
&lt;li&gt;automatically deauths clients of hidden networks to decloak SSIDs&lt;/li&gt;
&lt;li&gt;numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)&lt;/li&gt;
&lt;li&gt;customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc)&lt;/li&gt;
&lt;li&gt;“anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete&lt;/li&gt;
&lt;li&gt;all WPA handshakes are backed up to wifite.py’s current directory&lt;/li&gt;
&lt;li&gt;smart WPA deauthentication — cycles between all clients and broadcast deauths&lt;/li&gt;
&lt;li&gt;stop any attack with Ctrl+C — options: continue, move onto next target, skip to cracking, or exit&lt;/li&gt;
&lt;li&gt;switching WEP attack methods does not reset IVs&lt;/li&gt;
&lt;li&gt;intel 4965 chipset fake-authentication support; uses wpa_supplicant workaround&lt;/li&gt;
&lt;li&gt;SKA support (untested)&lt;/li&gt;
&lt;li&gt;displays session summary at exit; shows any cracked keys&lt;/li&gt;
&lt;li&gt;all passwords saved to log.txt&lt;/li&gt;
&lt;li&gt;built-in updater: ./wifite.py -upgrade&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000; font-size: medium;&quot;&gt;&lt;b&gt;Requirement&amp;nbsp;:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;linux operating system (confirmed working on Ubuntu 8.10 (BT4R1), Ubuntu 10.04.1)&lt;/li&gt;
&lt;li&gt;tested working with python 2.4.5 and python 2.5.2; might be compatible with other versions,&lt;/li&gt;
&lt;li&gt;wireless drivers patched for monitor mode and injection: backtrack4 has many pre-patched drivers,&lt;/li&gt;
&lt;li&gt;aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or by clicking here,&lt;/li&gt;
&lt;li&gt;xterm, python-tk module: required for GUI, available via apt: apt-get install python-tk&lt;/li&gt;
&lt;li&gt;macchanger: also available via apt: apt-get install macchanger&lt;/li&gt;
&lt;li&gt;pyrit: not required, optionally strips wpa handshake from .cap files&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/wifite/downloads/list&quot;&gt;Download&lt;/a&gt;&amp;nbsp;Here...&lt;/span&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://pakishacker.blogspot.com/feeds/1346482948149713383/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pakishacker.blogspot.com/2011/04/wifite-wepwpa-cracker-version-r68.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1346482948149713383'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8563550780787253789/posts/default/1346482948149713383'/><link rel='alternate' type='text/html' href='http://pakishacker.blogspot.com/2011/04/wifite-wepwpa-cracker-version-r68.html' title='WiFite The WEP/WPA Cracker version r68 released !'/><author><name>Hackers Life</name><uri>http://www.blogger.com/profile/08998472656280412318</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrok6m6zUzXLUQzSV1n9lvohhAdZU8n8MPf27oyejI5Cd__s71BrdXwurQwiQxHZAc4JNssjReOJHYiAyyR9laG1aXynkG7GDl49mCpQs0Pu8o9j9zuxar4lKlvh0ujL4/s220/12.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0xTVIX7DqZ0tiWU3QV67gNLND_XU6_7oV-rPodM8Yd1BNkCsBmCSBpDZ0bGKNf67rdcOiNEagLD8-4BjeMl1sYetCKdJhluHQ37vrKcw9MoEVw_GOR7CMqxo4wANvfUIWuJcvBhR0XT2/s72-c/wifiteimg.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>