DEF CON – the world’s largest hacker conference, undertaken each year in Las Vegas, Nevada. The first DEF CON took place in June 1993 having as public those interested in information security, cyberpunk, and simply ANYONE. DEF CON lay out all the information available from the first conference. Quick links: media.defcon.org review of all the materials grouped by directories; […]
So far, the infrastructure Feedly works with about 50 RSS-applications, but now the company removes all restrictions and open API for all developers . Any RSS-reader or mobile application can use the backend Feedly for access to millions of feeds and sync via Cloud API . Company officials says that for six months they worked closely with developers to design a […]
Steps to reproduce: Use any fake mailer, or use any open relay SMTP server that trigger the phishing alert. Send an email to the victim GMail address with the From field: <img src=# onerror=alert(document.cookie)>. Choose UTF-8 as encoding. Open your Gmail in the basic HTML layout. Open the received email. BOOM! Vulnerability status: FIXED !
The second annual Pwn2Own competition in the mobile part of Zero Day Initiative will be held on PacSec Applied Security Conference in Tokyo on 13 and 14 November. The prize fund – more than $ 300,000. Mobile Pwn2Own contest is to find vulnerabilities and hacking opportunities in mobile devices. This year, it sponsors the Android Security Team and […]
$ curl -u user:pass -d status=’Softpill tweets from Bash!’ http://twitter.com/statuses/update.xml Using Curl, this one-liner tweets your message from the terminal viaTwitter’s API.
Watch full recording Mark Zuckerberg one-on-one interview at the Newseum in Washington, D.C, talking about the knowledge economy — including the need for immigration reform — with James Bennet, the editor-in-chief of The Atlantic. FWD.us is an organization started by key leaders in the tech community to promote policies to keep the United States and […]
As they said in a blog post, Starting at the end of August, they started to see a sudden spike in the number of Tor clients:millions of new Tor clients and the numbers continue to rise. The right question / answer “Where do these new users come from? My current best answer is a botnet.” […]
I know this blog not covers that area but i want to protest as well for clean waters, strong mountains, life and freedom. We cannot be here for long without nature’s support. The Romanian government has approved the century’s most controversial mining project – cyanide gold digging in Romania’s beautiful mountains that can consequently affect the […]
Kratos Anti Spam is a Joomla plugin, built to stop bots from sending spam through all website forms (i.e.: contact forms, VirtueMart ask a question, comments, etc.) Kratos Anti Spam Features: STOP SPAM STOP HACKING Don’t require users to input captcha codes, or to answer questions Invisible to the user Block post resending/duplication One click […]
# Define a procedure, abba, that takes two strings as its inputs, and returns a string that is the first input, followed by two repetitions of the second input, followed by the first input. #Example #print abba(‘a’,’b’) #>>> ‘abba’ #print abba(‘soft’,’pill’) #>>> ‘softpillpillsoft’