Bookmarks

Bookmarks Bar

Bienvenue sur Facebook. Connectez-vous, inscrivez-vous ou découvrez!
Gmail : la messagerie de Google
Google
twitter.com

2012

Septembre

Art and Design

Video: The Sound of Stenciling - A How-To Guide on Stenciling • Highsnobiety

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

Java

Hacking for Fun: Programming a Wearable Android Device | Dr Dobb's

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Why Non-Coders Shouldn't Write Code - Slashdot

Cryptography

Database

Hacking

Cracking

Curious About Password Cracking?
t.co/uON63Cm0

DoS

Remote wipe attack not limited to Samsung phones, Android dialer may be to blame | The Verge
Samsung Smartphone Vulnerable to Remote Wipe Hack - IBTimes UK
Adobe Flash Player And AIR CVE-2012-4171 Remote Denial of Service Vulnerability

Exploit

Researcher uncovers yet another Java hole - The H Security: News and Features
Full Disclosure: [SE-2012-01] Critical security issue affecting Java SE 5/6/7
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3957 Heap Buffer Overflow Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-0468 Memory Corruption Vulnerability
[Python] samba 0day - Pastebin.com
Security researchers identify transit system exploit in San Fran and New Jersey, create app to prove it -- Engadget
Internet Explorer hit by zero-day exploit, temporary fix issued - TechSpot News
0Day pour Internet Explorer Internet | Data Security Breach
Microsoft Urges Internet Explorer Users to Protect Against Targeted Attacks
Adobe Photoshop CVE-2012-0275 Remote Buffer Overflow Vulnerability

Maping

Virus

Malware programmers start using Go - The H Security: News and Features
Complex ZeroAccess Rootkit Installed More Than 9 Million Times, Says Sophos | SecurityWeek.Com
Microsoft : Des PC infectés par un virus à la sortie de l’usine
Hackers turn remote maintenance tool into trojan - The H Security: News and Features
Hackers turn remote maintenance tool into trojan | HITBSecNews

Warez

Web

Malicious PhpMyAdmin Served From SourceForge Mirror - Slashdot
phpMyAdmin distributed with backdoor - The H Security: News and Features
phpMyAdmin 'server_sync.php' Backdoor Vulnerability
Mozilla Firefox/SeaMonkey CVE-2012-3976 Address Bar Spoofing Vulnerability
New Attack Uses SSL/TLS Information Leak to Hijack HTTPS Sessions | threatpost
BEAST creators develop new SSL attack - The H Security: News and Features

Wifi

Spoofing

Socks4 proxy list: buy socks list, free and anonymous socks proxy servers, socks4 socks5 proxy for free, US socks

Microsoft corrige une faille dans Hotmail
Adobe hacked and exploited - The H Security: News and Features
TED: All your devices can be hacked (Avi Rubin) | Hackfest.ca
Galaxy S3 : Hacké très facilement à cause du NFC
'How I CRASHED my bank, stole PINs with a touch-tone phone' | HITBSecNews
$30 hacking kit allows you to steal BMWs | HITBSecNews
Taking Control Over The Tor Network
Widely used fingerprint reader exposes Windows passwords in seconds | Ars Technica

Networking

Apache Patch To Override IE 10's Do Not Track Setting - Slashdot

Operating System

Android

Autres

The Invisible Things Lab's blog: Introducing Qubes 1.0!

Bootloader

BSD

Linux

Graphical Desktop (X) Questions - NST Wiki
NST basée sur FC8 (Network Security Toolkit) sur une clé USB (Page 1) / [Anciennes versions] Support général / Fedora-Fr - Communauté francophone Fedora - Linux
NST USB FAQ - NST Wiki
HowTo Put Multiple Live Images On One USB Memory Stick - NST Wiki

Mac

Windows

Security

Jim Manico presenting at OWASP Long Island - YouTube
phpMyAdmin - Security - PMASA-2012-5
Quels sont les pires codes de verrouillage ?
Mise à jour d’Internet Explorer | Data Security Breach
Google Chrome Prior to 19.0.1084.52 Multiple Security Vulnerabilities
Microsoft issues workaround for IE 0-day exploited in current attacks
'Over half' of Android devices have unpatched holes • The Register
Google Chrome Prior to 21.0.1180.89 Multiple Security Vulnerabilities
Google Chrome Prior to 20.0.1132.43 Multiple Security Vulnerabilities
Apache HTTP Server 'LD_LIBRARY_PATH' Insecure Library Loading Arbitrary Code Execution Vulnerability
Apache HTTP Server HTML-Injection And Information Disclosure Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1975 Use-After-Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3963 Use-After-Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3964 Use-After-Free Memory Corruption Vulnerability
cr0 blog: Introducing Chrome's next-generation Linux sandbox

Software

Mozilla lance la bêta de Persona, son système d'authentification centralisée pour le Web qui met fin aux identifiants et mots de passe
Se désabonner des spammeurs : Unroll.me - Le blog du Modérateur
VirusTotal - Free Online Virus, Malware and URL Scanner

Iran Blocks Google As It Prepares To Launch Its Own Internet
The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords - Slashdot

Economy

Stock Market

Le blog de Gerry le boursicoteur
Karate Principles In Trading And Portfolio Management - Seeking Alpha
3 Reasons To Buy Ford Now For A Long-Term Investment - Seeking Alpha
Why Research In Motion Is Still Cheap - Seeking Alpha
2 $4 Tech Stocks That Look Good Here - Seeking Alpha
Time To Load Up On Duke Energy - Seeking Alpha
Medtronic: Alzheimer's Pump Technology Could Drive Shares Higher Into 2014 - Seeking Alpha
Is Google Losing Its Edge? 3 Reasons Why Google Is Starting To Resemble Microsoft - Seeking Alpha
Commodity Chart Of The Day: Canadian Dollar - Seeking Alpha
Why China Mobile Wins In The End - Seeking Alpha
Big Data - Why Warren Buffett Invested $10 Billion In This High-Tech Trend - Seeking Alpha
Jumping the Queue - WSJ.com
Why Avoid Facebook Until After October 25? - Seeking Alpha
Why Do We Own Stocks? - Seeking Alpha
How Buffett Is Different From Most Investors, Part II - Seeking Alpha

Facebook
BitCoin Gets a Futures Market - Slashdot
14 Signs That The World Economy Is Getting Weaker - Seeking Alpha
Chart Of The Day: The Long Decline Of Labor - Seeking Alpha
Le changement climatique ralentit l'économie mondiale, selon un rapport | Économie | Radio-Canada.ca
Free exchange: The reform club | The Economist
Petit cours de fiscalité... | Claude Picher | Chroniques
Canada’s last mining frontier about to be opened - Bill Mann's Canada - MarketWatch
Free exchange: Hayek on the standing committee | The Economist
Are we facing a new currency war? - The Globe and Mail
More billionaire families join Buffett and Gates philanthropy effort - The Tell - MarketWatch
Daily chart: For whom the taxman cometh | The Economist
Russia reveals shiny state secret: It's awash in diamonds - CSMonitor.com
The High-End Green Home - WSJ.com
Insight: In Africa's warm heart, a cold welcome for Chinese | Reuters
The Economics of Solar Power for Your Home - WSJ.com
Daily chart: Ploughing ahead | The Economist
Antagoniste.net- Site d'opinions libertariennes : âmes sensibles s'abstenir ! » Les dinosaures de l’info
Crise grecque : l'ombre de Goldman Sachs
Twitter / chevymo : a picture is worth a thousand ...
La zone euro pèse sur l'économie mondiale | Économie | Radio-Canada.ca
Les ravages sociaux de l'euro, une stratégie délibérée - La lettre volée, politique, lectures, Europe et humeurs diverses
Notre niveau de vie baisse (sauf celui des plus riches) | Rue89 Eco
The Balkans and the EU: Integrated circuit | The Economist
The ECB and the euro: Too central a banker? | The Economist
www.bankofcanada.ca/wp-content/uploads/2012/09/discours-070912.pdf#graphique2
Le mal hollandais - Banque du Canada
The Netherlands votes: Cycling against windmills | The Economist

Entertainement

Anime

Audio Book

Brain Fart

Cinema

[ciné] Les premières images de Robocop 2013 - Geekbecois
Review: In Revolution, Post-Apocalypse Looks Like a Swashbuckle in the Park | Underwire | Wired.com
Anonymous • The Dictator - Final Speech on Dictatorship /...

Comic Strip

E-book

Gaming

Old School

Atari Arcade

Play online. Risk your game. Conquer Club.
Le Scout de Team Fortress 2 contre la Witch de Left 4 Dead! - Geekbecois

Geeked

8bits Retro Experiment

Vidéo: Une fanfare qui joue à Mario Bross et à Tétris | Le Buzz l'Actu et PeopleLe Buzz l'Actu et People
Star Trek Enterprise Bridge Restoration | Indiegogo

Music

Netcast

News

Pub

20 Extremely Funny Vintage Ads
Old Spice | Bed - YouTube
Les 25 plus mauvaises traductions publicitaires
Nokia admits to faking Lumia 920 ad | ZDNet

Sport

30 yd Behind the back TD pass - YouTube
Télé-Québec : Vidéo | Tout le monde dehors : La fièvre de l’adrénaline
NFL Game Center: Oakland Raiders at Miami Dolphins - 2012 Week 2
Daily chart: Value for athletes | The Economist
Week 1: RedZone Recap - NFL Videos
Management Secrets of the NFL - WSJ.com
NFL.com Photos - Chargers Raiders Football
NFL.com Photos - Chargers Raiders Football
NFL.com Photos - Chargers Raiders Football

Travel

XXX

PEOPLE ARE AWESOME 2011 - YouTube

Hardware

DIY

Espace : Un étudiant envoie son satellite artisanal
Gamers May Get a Charge Out of the Gauss Rifle - Slashdot

Hardline

Personal Computer

Wanna Build a Supercomputer? You'll Need Legos and Raspberry Pis... | Wired Enterprise | Wired.com
Le casque qui permet de contrôler sa tablette par la pensée

Radio

Smartphone

TV

Does Anyone Make an Amphibious Car? - WSJ.com
This Portable Desk Is Packed With Power to Keep You Working Anywhere
Controlling Your Home With The Touch Of An iPad - Forbes
Des nouvelles de la montre Pebble « TECHNOSTÉRONE Le blogue de Pascal Forget
Lada introduces new all-electric vehicle in Russia » ev-olution.org

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Military

cyberwar

U.S. cyber warrior accuses China of targeting Pentagon | Reuters
Officials see Iran, not outrage over film, behind cyber attacks on US banks - Open Channel
Exclusive: Iranian hackers target Bank of America, JPMorgan, Citi | Reuters
White House Hack Attack | Washington Free Beacon
L'armée va constituer un corps de réservistes spécialisés en cyberdéfense

Cheap smart weapons: Rockets galore | The Economist
La guerre à la première personne » DominicArpin.ca - Le Patrouilleur du Net
The Pokemon Plot: How One Cartoon Inspired the Army to Dream Up a Seizure Gun | Danger Room | Wired.com
DARPA combines human brains and 120-megapixel cameras to create the ultimate military threat detection system | ExtremeTech
Questions Abound as China Unveils Another Stealth Jet | Danger Room | Wired.com

Misc

The Story of Electronics (2010) - YouTube
'Zombie Bees' Reported in California | NBC Connecticut
How to Get Out of Your Mobile Phone Contract | PCMag.com
Data Centers Waste Vast Amounts of Energy, Belying Industry Image - NYTimes.com
For sale: In Greece, everything must go - The Tell - MarketWatch
Les pays qui téléchargent le plus de Torrents illégaux
Ceci est une Révolution : ce que l'Open Source a changé
La cybercriminalité au crible | L'Union
Anonymous • Imagination: Some animals can see more than...
Despite warnings, most states slow to confront corporate ID theft | ITworld

Science

Astronomy

Black Hole Behemoth Shreds Baby Star System : Discovery News

Biology

Your Body's Best Time for Everything - WSJ.com
Quand le profil génétique dictera notre alimentation | Claudette Samson | Agro-alimentaire

Chemical

Computer Science

Researchers Create Silicon-Based Quantum Bit - Slashdot

Earth

Why All Hurricanes Look the Same From Space | Wired Science | Wired.com

Future

Physic

Search for element 113 concluded at last | Science Codex
Quantum teleportation, Montrealer tipped for Nobel Prize
New Wood Pulp Concoction Stronger Than Kevlar, Carbon Fiber | Autopia | Wired.com

Robotic

Mola, un poisson robot qui fonctionne à l’énergie solaire
Un robot japonais prépare un examen d’entrée à l’université

Space Exploration

Curiosity Rover Takes Detailed Photos of Martian Rock Formation | Wired Science | Wired.com
Curiosity Rover Captures Martian Eclipse | Wired Science | Wired.com
Collision entre Jupiter et un corps céleste filmée en direct
Voyager to Solar System: 'Bye-Bye' | GeekMom | Wired.com

Scientists Invent Electronics That Dissolve In the Body - Slashdot
‘Pre-bionic’ eye implanted in blind patient • The Register
Télé-Québec : Code Chastenay
The Mathematics of Parking Cars | Wired Science | Wired.com

Social

Common Sense

Conspiracy Theory

Rothschilds-The Worlds most Wicked and Wealthiest family - YouTube

Engineering

Experiment

Professor's 'Science Safari' Sometimes Seems Like Candid Camera - WSJ.com

Network

wher-shoulf-you-550x410.jpg (550×410)
Twitter: comment ajouter une image d’en-tête à votre profil
Social Networks and Mythology | Wired Science | Wired.com

Philosophy

Politic

Ce nous qui nous assassine – Cyber-boom! – Simon Jodoin – Voir.ca
Jean-François Lisée: Ministre, 48 heures chrono!
Loi de Godwin - Wikipédia
La CAQ au pouvoir... dans une simulation | Judith Lachapelle | Politique québécoise
US election 2012: States of play | The Economist
Canada's last Iran ambassador: Cutting off Tehran looks like a mistake - The Globe and Mail

Election quebec 2012

lgwb.in/log.asp?tiny=L9900

Un Québec cassé | Chroniqueurs | Opinion | Le Journal de Montréal

Psychology

Twitter / SamSebastian_ : Imagen en directo de las ...
Anti-cuts protests erupt on streets of Athens and Madrid | Reuters
European Markets Jolted Amid Protests in Greece and Spain - NYTimes.com
Demanifestacion - La manifestación del 25S en directo
Twitter / YourAnonNews : What does a revolution look ...
Anonymous • Map of Muslim protests all around the world
Protesters Blockade Monsanto Seed Facility in California « Earth First! Newswire
Daily chart: The situation in Syria | The Economist
Photos: Anti-American protests across the Middle East
‫اقتحام السفارة الامريكية في اليمن واصابات وشهداء بين الشباب‬
Twitter / Ammar_Mojalli : مجموعة صور ...
Uprising by Anonymous - YouTube
Anonymous • If you REALLY REALLY REALLY want to get to the bottom of Zionist / Islamist conflict, you HAVE TO watch these documentaries
Anonymous • Israel is a terrorist state, The evidence is quite...
Anonymous • Anarchist March (Marcha Anarquista) - September 9,...
L'Iran menace d'attaquer les Côtes américaines: des cellules terroristes se préparent à frapper l'Amérique et l'Europe ! - WikiStrike.com
Plus de quarante policiers blessés dans des violences à Belfast
Social Robots May Gain Legal Rights, Says MIT Researcher - Slashdot

Underground

Lockpicking

Stalking

Urban Exploration

We Are Legion: The Story of the Hacktivists 2012 DVDRip x264 (download torrent) - TPB
#OpBigBrother - Pastebin.com
Guerre numérique entre le Bangladesh et le Pakistan
Screenings | We Are Legion
Report Examines Eastern European Hackers Vs. East Asian Hackers | SecurityWeek.Com
Résultats de votre recherche sur ZATAZ - ZATAZ.COM Journal, Actualité informatique et multimédia

Anonymousity

When all the iPhones strike thirteen – flyingpenguin
Internet Privacy and Safety Blog: Which Would You Choose: Privacy or Security?

Group Behind 'Aurora' Attack on Google Still Active - Slashdot

Entrepreneurship

E-commerce

ecommerce, e-commerce, site marchand | ConseilsMarketing.fr
Comment gagner de l'argent avec son blogue ? - Dans la tête d'une entrepreneure
39 Factors: Website Credibility Checklist | ConversionXL
5 Tips and Tools to Create a Company Culture When You Run a Virtual Business | Entrepreneur.com

Finance

Management

Why a 22-year-old shouldn’t be handling your social media - The Globe and Mail

Marketing

SEO

Outsourcing

Sensibiliser les jeunes à l'entrepreneuriat
Build Your Self Confidence Like a Leader - Marshall Goldsmith - Harvard Business Review
6 Signs That It's Time to Fire a Client | Inc. 5000
How I Fast-tracked My Blog to 10k Subscribers and $15k Revenue in a Month : @ProBlogger
5 ways to raise money to support your online business | earningdiary.com
Se lancer en affaires sans financement extérieur - Dans la tête d'une entrepreneure
Running A Software Business On 5 Hours A Week | Kalzumeus Software
Lessons In New Business Require A Foundation | Six Pixels of Separation - Marketing and Communications Blog - By Mitch Joel at Twist Image

Index of /Shared/Video/XXX
Twitter / jonathanmarcil : Anonymous presentation liv
Twitter / jonathanmarcil : Security fails examples li