Bookmarks

Bookmarks Bar

scrible Toolbar
Google
SHODAN - Computer Search Engine
SHODAN - Computer Search Engine
Gmail : la messagerie de Google
Sign In
twitter.com
Bienvenue sur Facebook. Connectez-vous, inscrivez-vous ou découvrez!

Juin

Art and Design

Computer

Coding

ASM

Mois de l’assembleur x86, semaine 1 – Introduction | Hackfest.ca
SecurityTube Linux Assembly Expert « SecurityTube Trainings

ASP

BASH

Basic

C

Code raw sockets in C on Linux

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Cryptography

Database

Hacking

Cracking

Lab of a Penetration Tester: Poshing the hashes: Using PowerShell to play with hashes
Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | Wired Science | Wired.com
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.

DoS

debian Pastezone
Samsung Smartphone Vulnerable to Remote Wipe Hack - IBTimes UK

Exploit

Windows NT - Windows 8 EPATHOBJ Local Ring 0 Exploit
Re: exploitation ideas under memory pressure
phpMyAdmin Authenticated Remote Code Execution via preg_replace()
Regalado (In) Security: Unauthorized Access: Bypassing PHP strcmp()
skype-open-source: Skype User IP-address Disclosure
Netgear WPN824v3 - Unauthorized Config Download
Plesk Apache Zeroday Remote Exploit
Microsoft Internet Explorer textNode Use-After-Free
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Linux kernel perf_swevent_init - Local root Exploit
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Serious Remote Execution Exploit in Zpanel 10.0.0.2!
EXFiLTRATED
Winamp 5.12 (.m3u) - Stack Based Buffer Overflow
FreeBSD 9.0-9.1 mmap/ptrace Privilege Esclation Exploit
Linux/x86 Reverse TCP Bind Shellcode (92 bytes)
ZPanel 10.0.0.2 htpasswd Module Username Command Execution
ZPanel zsudo Local Privilege Escalation Exploit
Unleashing MAYHEM on Binary Code - Automated hybrid binary analysis that results in shell-spawning exploits : netsec
Staged Payloads – What Pen Testers Should Know | Strategic Cyber LLC

Maping

Virus

Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
Computer viruses: A thing of threads and patches | The Economist

Warez

Bombing BitTorrent and File-Sharing Websites Back to the Stone Age | TorrentFreak
Paddle Over

Web

One-click/key attack forces IE and Chrome to execute malicious code | Ars Technica

Wifi

Vulnerability

Wireshark ASN.1 BER Dissector CVE-2013-3557 Denial of Service Vulnerability
Microsoft Internet Explorer 'jsdbgui' Buffer Overflow Remote Code Execution Vulnerability
VMware vCenter Chargeback Manager CVE-2013-3520 Remote Code Execution Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-1693 Information Disclosure Vulnerability
Microsoft Internet Explorer CVE-2013-3123 Memory Corruption Vulnerability
Wireshark DCP ETSI Dissector Integer Overflow Denial of Service Vulnerability
Wireshark DCP ETSI Dissector 'dissect_pft_fec_detailed()' Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0776 URI Spoofing Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird CVE-2012-1942 Local Privilege Escalation Vulnerability
OpenSSL Multiple Remote Denial of Service Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0753 Remote Code Execution Vulnerability
Oracle Java SE CVE-2013-1486 Remote Java Runtime Environment Vulnerability
MySQL and MariaDB Geometry Query Denial Of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4186 Remote Buffer Overflow Vulnerability
SecurityFocus
Wireshark MS-MMC Dissector Denial of Service Vulnerability
Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3660 Local Privilege Escalation Vulnerability
Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-2432 Remote Java Runtime Environment Vulnerability
Adobe Acrobat and Reader CVE-2013-2729 Unspecified Remote Integer Overflow Vulnerability
Apple QuickTime CVE-2013-0986 Buffer Overflow Vulnerability
Apple QuickTime CVE-2013-1021 Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2727 Remote Integer Overflow Vulnerability
t.co/8tgusXp6C5
Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability
KDE Plasma Paste Applet Local Password Generation Vulnerability
Apple QuickTime CVE-2013-0988 Buffer Overflow Vulnerability
Microsoft .NET Framework CVE-2013-1337 Authentication Bypass Vulnerability
Microsoft .NET Framework XML Digital Signature CVE-2013-1336 Security Bypass Vulnerability
Microsoft Internet Explorer XML Object Zone Restriction Bypass Vulnerability
Microsoft Internet Explorer BR549.DLL ActiveX Control Buffer Overflow Vulnerability
Microsoft Internet Explorer Cached Web Credentials Disclosure Vulnerability
Linux Kernel 'b43' Wireless Driver Local Privilege Escalation Vulnerability
t.co/WW2oQVrpfI
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Linux Kernel 'perf' Multiple Denial of Service and Information Disclosure Vulnerabilities
Linux Kernel CVE-2013-3222 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3223 Local Information Disclosure Vulnerability
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
Cisco Linksys E1200 N300 Router 'submit_button' Parameter Cross Site Scripting Vulnerability
Xen 'ELF' Parser Multiple Security Vulnerabilities
Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
Linux Kernel CVE-2013-0310 NULL Pointer Dereference Denial of Service Vulnerability
X.Org libFS 'FSOpenServer()' Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1571 Remote Security Vulnerability
Oracle Java SE CVE-2013-2467 Remote Security Vulnerability
Oracle Java SE CVE-2013-2451 Remote Security Vulnerability
Oracle Java SE CVE-2013-1500 Local Security Vulnerability
SecurityFocus
http://t.co/kpwjnQtcVt is not available
Egor Homakov: Camjacking: Click and say Cheese
Camjacking, как эволюция Clickjacking, или «Гюльчатай! Открой личико!» / Хабрахабр
Oracle Solaris CVE-2012-3199 Local Security Vulnerability
Linux Kernel JFS xattr Namespace Rules Security Bypass Vulnerability
SecurityFocus
Linux Kernel CVE-2012-0810 Local Denial of Service Vulnerability
Linux Kernel 'inotify_init1()' Double Free Local Denial of Service Vulnerability
Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability
Oracle Java SE CVE-2013-2466 Remote Security Vulnerability
Oracle Java SE CVE-2013-2462 Remote Security Vulnerability
Oracle Java SE CVE-2013-2463 Remote Security Vulnerability
Oracle Java SE CVE-2013-2464 Remote Security Vulnerability
Oracle Java SE CVE-2013-2455 Remote Security Vulnerability
Oracle Java SE CVE-2013-2461 Remote Security Vulnerability
Oracle Java SE CVE-2013-2443 Remote Security Vulnerability
SecurityFocus
Xen CVE-2013-2195 Pointer Dereference Privilege Escalation Vulnerability
Xen CVE-2013-2194 Remote Privilege Escalation Vulnerability
Xen CVE-2013-2196 Remote Privilege Escalation Vulnerability
Linux Kernel CVE-2010-2066 Donor File Security Bypass Vulnerability
PHP CVE-2013-2110 Heap Based Buffer Overflow Vulnerability
Mozilla Firefox SeaMonkey Thunderbird Modal Calls Cross Domain Information Disclosure Vulnerability
Mozilla Firefox and Thunderbird CVE-2010-3175 Multiple Memory-Corruption Vulnerabilities
Mozilla Firefox and SeaMonkey Gopher Parser Cross Site Scripting Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird 'document.write' Memory Corruption Vulnerability
Linux Kernel 'tg3.c' Integer Overflow Vulnerability
Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Mozilla Firefox SeaMonkey and Thunderbird 'nsBarProp' Use-After-Free Memory Corruption Vulnerability
Xen CVE-2013-2077 Remote Denial of Service Vulnerability
Xen CVE-2013-2076 Information Disclosure Vulnerability
Xen CVE-2013-2078 Remote Denial of Service Vulnerability
WordPress 'crypt_private()' Method Remote Denial of Service Vulnerability
cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
FreeBSD CVE-2013-2171 Local Privilege Escalation Vulnerabiity
OpenSSH CVE-2010-5107 Denial of Service Vulnerability
Oracle VM VirtualBox 'tracepath' Local Denial of Service Vulnerability
Mozilla Firefox CVE-2013-1696 Clickjacking Vulnerability
Mozilla Firefox CVE-2013-1698 Security Vulnerability
Mozilla Firefox CVE-2013-1699 Homograph Domain Spoofing Vulnerability
SecurityFocus
SecurityFocus
[Kitty Bomber]
Mozilla Firefox and Thunderbird CVE-2013-1692 Cross-Site Request Forgery Vulnerability
Oracle Java SE CVE-2013-2440 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-0446 Remote Java Runtime Environment Vulnerability

# ls -lh total 33896 -r-xr-xr-x 1 root wheel 46.2K May 27 18:39 boot -rwxr - Pastebin.com
Five Disturbingly Simple Ways to Steal Facebook Logins | TechWeekEurope UK
Hacking ( Computer Hacker Basics 4) - YouTube
Hacking ( Computer Hacker Basics 6) - YouTube
Hacking Term (Chipping) - YouTube
Hardware Backdooring is Practical - Jonathan Brossard - YouTube
Biohackers. The politics of open science | Alessandro Delfanti
Twitter / PrometricCyber : The 5 most common #hacking ...

Networking

A simple VPN guide for the beginning Anonymous and online activist

Operating System

Android

Ce que je n’aime pas d’Android « TECHNOSTÉRONE Le blogue de Pascal Forget

Autres

Black Berry

Bootloader

Transform a USB stick into a boot device packing multiple Linux distros using GRUB

BSD

Linux

RŌNIN linux security distribution released. : netsec
NST USB FAQ - NST Wiki
Home » OpenStack Open Source Cloud Computing Software

Mac

Windows

Security

La cybercriminalité. Pourquoi les petites entreprises peuvent perdre beaucoup

Software

Les logiciels qu'il ne fallait pas manquer cette semaine (AVS Media Player, Startup Delayer, CCleaner...)
www.naik-online.com - PHP, cygwin, windows
A small script to detect Linux/Cdorked.A malware on a linux system using the tool from ESET
Opt out of PRISM, the NSA’s global data surveillance program - PRISM BREAK
Ixquick Web Search
Startpage Web Search
Index of /pub/

Korben - Site d'actualité geek et tech

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

googles-200-ranking-factors.jpg.pagespeed.ce.S-B77K3ca5.jpg (800×20112)

Three Myths about What Customers Want - Karen Freeman, Patrick Spenner and Anna Bird - Harvard Business Review

Outsourcing

Canadian Virtual Assistant Connection

Ten tips for using your blog to launch a business - The Globe and Mail

Job

The Quantified Man: How an Obsolete Tech Guy Rebuilt Himself for the Future | Wired Enterprise | Wired.com

Stock Market

How to identify high-probability reversal zones - MarketWatch
Technical Analysis: What Can This Advanced System Do For You? - Seeking Alpha
5 charts to tell if stock buyers are too bullish - Slide Show - MarketWatch
Don't Let Fear Or Greed Influence Your Portfolio Management. - Seeking Alpha
New Doomsday poll: 98% risk of 2014 stock crash - Paul B. Farrell - MarketWatch

Roubini: Why gold, 'that barbarous relic,' will trade below $1,000 by 2014 - The Tell - MarketWatch
18 Signs That Massive Economic Problems Are Erupting All Over The Planet - BlackListedNews.com
15 Signs That The Economy Is Rapidly Getting Worse As We Head Into 2013 - BlackListedNews.com
America's economy: Which way America? | The Economist
AP - Portugal endures worst recession in 37 years
Bitcoin, Blessing or a Trap? - BlackListedNews.com
Comment créer une boutique en ligne - Créer un Site W

bitcoins

So You Think Bitcoin is a Great Way to Remain Anonymous in Your Financial Transactions? - BlackListedNews.com
Bitcoin's Big Bank Problem: Why Did Mt. Gox Halt U.S. Payouts? | Wired Enterprise | Wired.com

The financially forgotten generation: Economically raising the Millennials in a debt strapped financial world. - BlackListedNews.com
CHARTS: You Won't Believe How Much Disasters Cost Last Year | Mother Jones
17 Signs That Most Americans Will Be Wiped Out By The Coming Economic Collapse - BlackListedNews.com
Canada soars in ranking of nations adored by foreign investors - The Globe and Mail
Focus: World GDP | The Economist
Detroit’s Default May Spark U.S. Death Spiral of Debt - BlackListedNews.com
PayPal conçoit une monnaie intergalactique. - La Libre.be

Entertainement

Anime

Audio Book

Brain Fart

John McAfee Fed Up with Users Asking Him How to Uninstall McAfee Antivirus – Video

Cinema

300: Rise of an Empire Official Trailer #1 (2014) - Frank Miller Movie HD - YouTube

Comic Strip

E-book

Gaming

Old School

The Humble Indie Bundle 8 (pay what you want and help charity)

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Who's <i>really</i> in charge? Bill Belichick's savvy clear in AFC East - NFL.com
Bill Belichick, Ted Thompson headline NFL's top power brokers - NFL.com

Travel

XXX

Hardware

Batery

Téléphone: un chargeur de téléphone au coin du feu, grâce à son feu de camp (VIDÉO)

MIT researchers can see through walls using 'Wi-Vi' - Network World

DIY

Instrumentation of the Sapphire Rocket and Ground Support Equipment — For Download | Wired Science | Wired.com

Drone

Les drones sont désormais capables de s’accrocher aux murs pour mieux vous surveiller | Daily Geek Show

Hardline

Military

Personal Computer

HOT Raspberry Pi DIY Mini Desktop PC Build - HotHardware
Tiny Computers That Collect Data from Anywhere | MIT Technology Review
Google Glass Teardown
Une puce AMD franchit la barrière des 5 GHz - Le Monde Informatique
Researcher Dreams Up Machines That Learn Without Humans | Wired Enterprise | Wired.com
How Intel, HP & Compaq Killed The Fastest Processor In The World - Popular Science and Technology Blog by Jos Kirps

Radio

Smartphone

TV

Recycling, solar, and wind power team up to make a terrifying crab robot | Grist
Ancient Roman Concrete Is About To Revolutionize Modern Architecture - Slashdot
Tapping: It's not just for phones anymore - Cabling Install
BBC News - Drayson Racing electric car sets new world speed record
Practice makes perfect B12 69 EV Le Mans ahead of breaking record - YouTube

Howto TOW

Fondation

IIA

Leetsaber

Install Windows XP using USB Flash Disk/ Flash Drive - Step by Step Guide
Install XP from USB without extra tools - MSFN Forum
63 - Install XP and Win7 onto a computer from one USB flash drive containing ISO files! - RMPrepUSB
inportb » Install Windows 7 from USB Pen Drive Using Grub2 and Grub4Dos

MSI

Psychohistoire

Skynet to Launch October, 2013 - BlackListedNews.com

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

TeleGeography Submarine Cable Map 2012

Misc

Science

Astronomy

Spectacular Cosmographic Maps Chart Galaxies and Superclusters in Local Universe | Wired Science | Wired.com
Un trou noir dormant dans la galaxie du Sculpteur | Ciel et Espace
26 New Black Hole Candidates Found In Andromeda - Slashdot
Trois «super-Terres» habitables détectées dans un système voisin du nôtre - 20minutes.fr

Biology

Un superordinateur fait une importante découverte contre le SIDA
Video: Bioengineers invent light-controlled gel - The Globe and Mail
Vous pourriez bientôt régénérer des parties endommagées de votre corps comme le fait la salamandre | Daily Geek Show
Emiliania huxleyi: le secret de l'algue qui s'adapte à tout | Slate.fr
Whole human brain mapped in 3D : Nature News & Comment
Potent Weapon Against Superbugs Is ... Silver - It makes antibiotics far more effective, says study
700,000-Year-Old Horse Genome Shatters Record for Sequencing of Ancient DNA | Wired Science | Wired.com
Des greffes de tête humaine dans 2 ans ! | Gizmodo
Biohacking : quand les fab-labs s'attaquent au vivant

Chemical

Computer Science

Quantum-Tunneling Electrons Could Make Semiconductors Obsolete - Slashdot
Intel demos real-time code compression for die shrinkage, power saving • The Register

Earth

Future

Physic

Temporal cloak erases data from history : Nature News & Comment
The Scale of the Universe 2
Mysterious Subatomic Particle May Represent Exotic New Form of Matter | Wired Science | Wired.com
Teen's biofuel invention turns algae into fuel | Tampa Bay Times
Research Gives New Permanence to Quantum Memory | Wired Enterprise | Wired.com
Des chercheurs créent des flammes froides dans la Station spatiale internationale
Lopsided Map of the Cosmos Offers New Clues to the Universe's Origins | Wired Science | Wired.com

Robotic

Cute Robots Will Be Launched Into Space : Discovery News
Researchers Build A Robot That Will Beat You At Air Hockey - Forbes

Space Exploration

Une météorite de Mars contient les éléments clefs de la vie
Video: NASA launches solar telescope - The Globe and Mail
Wired Space Photo of the Day | Wired Science | Wired.com
Un sous-marin miniature pour rechercher des traces de vie dans l'océan du satellite de Jupiter | Slate.fr
Curiosity : La Nasa dévoile un sublime panorama interactif de Mars
Mars : La planète rouge se dévoile dans une vidéo de trois minutes
NASA : Spirit confirme que Mars a eu une atmosphère riche en oxygène dans le passé

Social

Common Sense

Engineering

Experiment

Des chercheurs créent de faux souvenirs de guerre chez des soldats | Passeur de sciences

History

Noam Chomsky: Les USA accélèrent l’Apocalypse « GLOBAL RELAY NETWORK
Archaeologists Discover Lost City In Cambodian Jungle : The Two-Way : NPR

Manif

Network

Philosophy

Politic

L'avenir du socialisme se joue à l'échelle européenne
Les perles de la commission | Vidéos LaPresse.ca

Psychology

Warfare

Are We On the Brink of World War III? - BlackListedNews.com
Daily chart: Mutually assured ambiguity | The Economist
A country armed to the teeth | Photographers Blog
Daily chart: Syria v Libya v Iraq | The Economist
The UN prepares to go to war for the first time, with a 3,000-strong task force sent to fight rebels in the Congo | Mail Online
Is Central Australia the geostrategic centrepiece in the USA’s new look east policy? — Phantom Report
The grim reality of war with a nuclear Iran - Public Service Europe
The 9 Largest Private Armies In The World. What Are They Fighting For? - BlackListedNews.com
The Age of Gloom? Implications for Key NATO Armies - BlackListedNews.com
Taliban thriving on Afghanistans opium economy - BlackListedNews.com
The Origins of War in the DRC - Armin Rosen - The Atlantic
FreeBSD 9 Address Space Manipulation Privilege Escalation

Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO) - YouTube
7 graphs that prove America is overrated | GlobalPost
Twitter / WSJGraphics : Americans worked less, watched ...

Underground

Anonymousity

This is, hands down, the scariest part of the NSA revelations | FP Passport
NSA as ‘Big Brother’? Not even close | The Great Debate
Se protéger de la cyber surveillance | Data Security Breach
Que sait-on exactement sur PRISM ? | SecurityVibes Magazine – Qualys Security Community
Canada has tracked phone and Internet data for years | Toronto Star
Why the NSA leak may boost Blackberry (and force us to move to Canada) | TG Daily
Overview | Onion Pi | Adafruit Learning System
The intelligence establishment's dream supercomputer will make Raytheon's RIOT program seem like child's play | Privacy SOS
Google tracks you. We don't. An illustrated guide.
RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn't Let Them)
Use of Tor and e-mail crypto could increase chances that NSA keeps your data | Ars Technica
Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard
India’s new surveillance network will make the NSA green with envy - Quartz

Conspiracy Theory

Google-owned Motorola reveals stomach acid-powered tablet that turns your body into a password - BlackListedNews.com
The 25 Rules of Disinformation - BlackListedNews.com
Disclose.tv - Best Conspiracy Theories Site | UFO Sightings Videos
Before It's News | Alternative News | UFO | Beyond Science | True News| Prophecy News | People Powered News
Alex Jones' Infowars: There's a war on for your mind!
Activist Post: Basel III: How The Bank For International Settlements Is Going To Help Bring Down The Global Economy
Washington Post
Forget phones, PRISM plan shows internet firms give NSA everything • The Register
BREAKING!!! UFO ALIEN DISCLOSURE by Canadian Minister of Defense May 2013 - YouTube
Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 - BlackListedNews.com
NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System - BlackListedNews.com
Pentagon bracing for public dissent over climate and energy shocks| Nafeez Ahmed
Anonymous • Pretext for a New War: Obama Lies About Syrian Chemical Weapons
PRISM is just 'the tip of the iceberg' in an Orwellian society - Public Service Europe
Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines - BlackListedNews.com
NOVA | The New Thought Police
Nazi Germany vs. Modern Britain: Some Similarities That Should Disturb You | Scriptonite Daily
InfographieGeantsWebTrack.png (590×1260)

Cyberwar

InfoSec Institute Resources – China vs US, cyber superpowers compared
NSA director says dozens of attacks stopped by surveillance programs - The Washington Post
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com

Lockpicking

Spying

What are those words that trigger Echelon? • The Register
Vie privée : La NSA s'octroie un backdoor dans tous les systèmes Windows | UnderNews
Timeline of NSA Domestic Spying | Electronic Frontier Foundation
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
ELECTRONIC SURVEILLANCE
NSA Architecture of Oppression
Exactly How the NSA Is Getting Away With Spying on US Citizens
#PRISM : let’s have a look at the big picture : Reflets
Meet PRISM’s little brother: Socmint | Ars Technica

Stalking

Urban Exploration

Dans la peau d’un hacker black hat | Korben
Réseau Libre
Wireless mesh network - Wikipedia, the free encyclopedia
The Value of a Hacked Email Account — Krebs on Security
The NSA Bot
The NSA Bot Now Spying?
How Hackers Changed the World - BBC documentary 2013 - YouTube
Root Force