Bookmarks
Bookmarks Bar
- scrible Toolbar
- Google
- SHODAN - Computer Search Engine
- SHODAN - Computer Search Engine
- Gmail : la messagerie de Google
- Sign In
- twitter.com
- Bienvenue sur Facebook. Connectez-vous, inscrivez-vous ou découvrez!
Juin
Art and Design
Computer
Coding
ASM
- Mois de l’assembleur x86, semaine 1 – Introduction | Hackfest.ca
- SecurityTube Linux Assembly Expert « SecurityTube Trainings
ASP
BASH
Basic
C
- Code raw sockets in C on Linux
C#
C++
HTML
Java
Javascript
Mircscript
Perl
PHP
Python
Ruby
TCL
Visual Basic
Cryptography
Database
Hacking
Cracking
- Lab of a Penetration Tester: Poshing the hashes: Using PowerShell to play with hashes
- Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | Wired Science | Wired.com
- CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
DoS
- debian Pastezone
- Samsung Smartphone Vulnerable to Remote Wipe Hack - IBTimes UK
Exploit
- Windows NT - Windows 8 EPATHOBJ Local Ring 0 Exploit
- Re: exploitation ideas under memory pressure
- phpMyAdmin Authenticated Remote Code Execution via preg_replace()
- Regalado (In) Security: Unauthorized Access: Bypassing PHP strcmp()
- skype-open-source: Skype User IP-address Disclosure
- Netgear WPN824v3 - Unauthorized Config Download
- Plesk Apache Zeroday Remote Exploit
- Microsoft Internet Explorer textNode Use-After-Free
- Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
- Linux kernel perf_swevent_init - Local root Exploit
- Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
- Serious Remote Execution Exploit in Zpanel 10.0.0.2!
- EXFiLTRATED
- Winamp 5.12 (.m3u) - Stack Based Buffer Overflow
- FreeBSD 9.0-9.1 mmap/ptrace Privilege Esclation Exploit
- Linux/x86 Reverse TCP Bind Shellcode (92 bytes)
- ZPanel 10.0.0.2 htpasswd Module Username Command Execution
- ZPanel zsudo Local Privilege Escalation Exploit
- Unleashing MAYHEM on Binary Code - Automated hybrid binary analysis that results in shell-spawning exploits : netsec
- Staged Payloads – What Pen Testers Should Know | Strategic Cyber LLC
Maping
Virus
- Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
- Computer viruses: A thing of threads and patches | The Economist
Warez
- Bombing BitTorrent and File-Sharing Websites Back to the Stone Age | TorrentFreak
- Paddle Over
Web
- One-click/key attack forces IE and Chrome to execute malicious code | Ars Technica
Wifi
Vulnerability
- Wireshark ASN.1 BER Dissector CVE-2013-3557 Denial of Service Vulnerability
- Microsoft Internet Explorer 'jsdbgui' Buffer Overflow Remote Code Execution Vulnerability
- VMware vCenter Chargeback Manager CVE-2013-3520 Remote Code Execution Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1693 Information Disclosure Vulnerability
- Microsoft Internet Explorer CVE-2013-3123 Memory Corruption Vulnerability
- Wireshark DCP ETSI Dissector Integer Overflow Denial of Service Vulnerability
- Wireshark DCP ETSI Dissector 'dissect_pft_fec_detailed()' Denial of Service Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0776 URI Spoofing Vulnerability
- Mozilla Firefox SeaMonkey and Thunderbird CVE-2012-1942 Local Privilege Escalation Vulnerability
- OpenSSL Multiple Remote Denial of Service Vulnerabilities
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0753 Remote Code Execution Vulnerability
- Oracle Java SE CVE-2013-1486 Remote Java Runtime Environment Vulnerability
- MySQL and MariaDB Geometry Query Denial Of Service Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4186 Remote Buffer Overflow Vulnerability
- SecurityFocus
- Wireshark MS-MMC Dissector Denial of Service Vulnerability
- Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3660 Local Privilege Escalation Vulnerability
- Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
- Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
- Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability
- Oracle Java SE CVE-2013-2432 Remote Java Runtime Environment Vulnerability
- Adobe Acrobat and Reader CVE-2013-2729 Unspecified Remote Integer Overflow Vulnerability
- Apple QuickTime CVE-2013-0986 Buffer Overflow Vulnerability
- Apple QuickTime CVE-2013-1021 Buffer Overflow Vulnerability
- Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability
- Adobe Acrobat and Reader CVE-2013-2727 Remote Integer Overflow Vulnerability
- t.co/8tgusXp6C5
- Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability
- KDE Plasma Paste Applet Local Password Generation Vulnerability
- Apple QuickTime CVE-2013-0988 Buffer Overflow Vulnerability
- Microsoft .NET Framework CVE-2013-1337 Authentication Bypass Vulnerability
- Microsoft .NET Framework XML Digital Signature CVE-2013-1336 Security Bypass Vulnerability
- Microsoft Internet Explorer XML Object Zone Restriction Bypass Vulnerability
- Microsoft Internet Explorer BR549.DLL ActiveX Control Buffer Overflow Vulnerability
- Microsoft Internet Explorer Cached Web Credentials Disclosure Vulnerability
- Linux Kernel 'b43' Wireless Driver Local Privilege Escalation Vulnerability
- t.co/WW2oQVrpfI
- Linux Kernel Multiple Local Information Disclosure Vulnerabilities
- Linux Kernel 'perf' Multiple Denial of Service and Information Disclosure Vulnerabilities
- Linux Kernel CVE-2013-3222 Local Information Disclosure Vulnerability
- Linux Kernel CVE-2013-3223 Local Information Disclosure Vulnerability
- Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
- Cisco Linksys E1200 N300 Router 'submit_button' Parameter Cross Site Scripting Vulnerability
- Xen 'ELF' Parser Multiple Security Vulnerabilities
- Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
- Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
- Linux Kernel CVE-2013-0310 NULL Pointer Dereference Denial of Service Vulnerability
- X.Org libFS 'FSOpenServer()' Memory Corruption Vulnerability
- Oracle Java SE CVE-2013-1571 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2467 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2451 Remote Security Vulnerability
- Oracle Java SE CVE-2013-1500 Local Security Vulnerability
- SecurityFocus
- http://t.co/kpwjnQtcVt is not available
- Egor Homakov: Camjacking: Click and say Cheese
- Camjacking, как эволюция Clickjacking, или «Гюльчатай! Открой личико!» / Хабрахабр
- Oracle Solaris CVE-2012-3199 Local Security Vulnerability
- Linux Kernel JFS xattr Namespace Rules Security Bypass Vulnerability
- SecurityFocus
- Linux Kernel CVE-2012-0810 Local Denial of Service Vulnerability
- Linux Kernel 'inotify_init1()' Double Free Local Denial of Service Vulnerability
- Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability
- Oracle Java SE CVE-2013-2466 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2462 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2463 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2464 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2455 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2461 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2443 Remote Security Vulnerability
- SecurityFocus
- Xen CVE-2013-2195 Pointer Dereference Privilege Escalation Vulnerability
- Xen CVE-2013-2194 Remote Privilege Escalation Vulnerability
- Xen CVE-2013-2196 Remote Privilege Escalation Vulnerability
- Linux Kernel CVE-2010-2066 Donor File Security Bypass Vulnerability
- PHP CVE-2013-2110 Heap Based Buffer Overflow Vulnerability
- Mozilla Firefox SeaMonkey Thunderbird Modal Calls Cross Domain Information Disclosure Vulnerability
- Mozilla Firefox and Thunderbird CVE-2010-3175 Multiple Memory-Corruption Vulnerabilities
- Mozilla Firefox and SeaMonkey Gopher Parser Cross Site Scripting Vulnerability
- Mozilla Firefox SeaMonkey and Thunderbird 'document.write' Memory Corruption Vulnerability
- Linux Kernel 'tg3.c' Integer Overflow Vulnerability
- Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability
- Linux Kernel Multiple Local Information Disclosure Vulnerabilities
- Mozilla Firefox SeaMonkey and Thunderbird 'nsBarProp' Use-After-Free Memory Corruption Vulnerability
- Xen CVE-2013-2077 Remote Denial of Service Vulnerability
- Xen CVE-2013-2076 Information Disclosure Vulnerability
- Xen CVE-2013-2078 Remote Denial of Service Vulnerability
- WordPress 'crypt_private()' Method Remote Denial of Service Vulnerability
- cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
- FreeBSD CVE-2013-2171 Local Privilege Escalation Vulnerabiity
- OpenSSH CVE-2010-5107 Denial of Service Vulnerability
- Oracle VM VirtualBox 'tracepath' Local Denial of Service Vulnerability
- Mozilla Firefox CVE-2013-1696 Clickjacking Vulnerability
- Mozilla Firefox CVE-2013-1698 Security Vulnerability
- Mozilla Firefox CVE-2013-1699 Homograph Domain Spoofing Vulnerability
- SecurityFocus
- SecurityFocus
- [Kitty Bomber]
- Mozilla Firefox and Thunderbird CVE-2013-1692 Cross-Site Request Forgery Vulnerability
- Oracle Java SE CVE-2013-2440 Remote Java Runtime Environment Vulnerability
- Oracle Java SE CVE-2013-0446 Remote Java Runtime Environment Vulnerability
- # ls -lh total 33896 -r-xr-xr-x 1 root wheel 46.2K May 27 18:39 boot -rwxr - Pastebin.com
- Five Disturbingly Simple Ways to Steal Facebook Logins | TechWeekEurope UK
- Hacking ( Computer Hacker Basics 4) - YouTube
- Hacking ( Computer Hacker Basics 6) - YouTube
- Hacking Term (Chipping) - YouTube
- Hardware Backdooring is Practical - Jonathan Brossard - YouTube
- Biohackers. The politics of open science | Alessandro Delfanti
- Twitter / PrometricCyber : The 5 most common #hacking ...
Networking
- A simple VPN guide for the beginning Anonymous and online activist
Operating System
Android
- Ce que je n’aime pas d’Android « TECHNOSTÉRONE Le blogue de Pascal Forget
Autres
Black Berry
Bootloader
- Transform a USB stick into a boot device packing multiple Linux distros using GRUB
BSD
Linux
- RŌNIN linux security distribution released. : netsec
- NST USB FAQ - NST Wiki
- Home » OpenStack Open Source Cloud Computing Software
Mac
Windows
Security
- La cybercriminalité. Pourquoi les petites entreprises peuvent perdre beaucoup
Software
- Les logiciels qu'il ne fallait pas manquer cette semaine (AVS Media Player, Startup Delayer, CCleaner...)
- www.naik-online.com - PHP, cygwin, windows
- A small script to detect Linux/Cdorked.A malware on a linux system using the tool from ESET
- Opt out of PRISM, the NSA’s global data surveillance program - PRISM BREAK
- Ixquick Web Search
- Startpage Web Search
- Index of /pub/
- Korben - Site d'actualité geek et tech
Economy
Entrepreneurship
E-commerce
Financement
Management
Marketing
SEO
- googles-200-ranking-factors.jpg.pagespeed.ce.S-B77K3ca5.jpg (800×20112)
- Three Myths about What Customers Want - Karen Freeman, Patrick Spenner and Anna Bird - Harvard Business Review
Outsourcing
- Canadian Virtual Assistant Connection
- Ten tips for using your blog to launch a business - The Globe and Mail
Job
- The Quantified Man: How an Obsolete Tech Guy Rebuilt Himself for the Future | Wired Enterprise | Wired.com
Stock Market
- How to identify high-probability reversal zones - MarketWatch
- Technical Analysis: What Can This Advanced System Do For You? - Seeking Alpha
- 5 charts to tell if stock buyers are too bullish - Slide Show - MarketWatch
- Don't Let Fear Or Greed Influence Your Portfolio Management. - Seeking Alpha
- New Doomsday poll: 98% risk of 2014 stock crash - Paul B. Farrell - MarketWatch
- Roubini: Why gold, 'that barbarous relic,' will trade below $1,000 by 2014 - The Tell - MarketWatch
- 18 Signs That Massive Economic Problems Are Erupting All Over The Planet - BlackListedNews.com
- 15 Signs That The Economy Is Rapidly Getting Worse As We Head Into 2013 - BlackListedNews.com
- America's economy: Which way America? | The Economist
- AP - Portugal endures worst recession in 37 years
- Bitcoin, Blessing or a Trap? - BlackListedNews.com
- Comment créer une boutique en ligne - Créer un Site W
bitcoins
- So You Think Bitcoin is a Great Way to Remain Anonymous in Your Financial Transactions? - BlackListedNews.com
- Bitcoin's Big Bank Problem: Why Did Mt. Gox Halt U.S. Payouts? | Wired Enterprise | Wired.com
- The financially forgotten generation: Economically raising the Millennials in a debt strapped financial world. - BlackListedNews.com
- CHARTS: You Won't Believe How Much Disasters Cost Last Year | Mother Jones
- 17 Signs That Most Americans Will Be Wiped Out By The Coming Economic Collapse - BlackListedNews.com
- Canada soars in ranking of nations adored by foreign investors - The Globe and Mail
- Focus: World GDP | The Economist
- Detroit’s Default May Spark U.S. Death Spiral of Debt - BlackListedNews.com
- PayPal conçoit une monnaie intergalactique. - La Libre.be
Entertainement
Anime
Audio Book
Brain Fart
- John McAfee Fed Up with Users Asking Him How to Uninstall McAfee Antivirus – Video
Cinema
- 300: Rise of an Empire Official Trailer #1 (2014) - Frank Miller Movie HD - YouTube
Comic Strip
E-book
Gaming
Old School
- The Humble Indie Bundle 8 (pay what you want and help charity)
Geeked
8bits Retro Experiment
Music
Netcast
News
Pub
Sport
- Who's <i>really</i> in charge? Bill Belichick's savvy clear in AFC East - NFL.com
- Bill Belichick, Ted Thompson headline NFL's top power brokers - NFL.com
Travel
XXX
Hardware
Batery
- Téléphone: un chargeur de téléphone au coin du feu, grâce à son feu de camp (VIDÉO)
- MIT researchers can see through walls using 'Wi-Vi' - Network World
DIY
- Instrumentation of the Sapphire Rocket and Ground Support Equipment — For Download | Wired Science | Wired.com
Drone
- Les drones sont désormais capables de s’accrocher aux murs pour mieux vous surveiller | Daily Geek Show
Hardline
Military
Personal Computer
- HOT Raspberry Pi DIY Mini Desktop PC Build - HotHardware
- Tiny Computers That Collect Data from Anywhere | MIT Technology Review
- Google Glass Teardown
- Une puce AMD franchit la barrière des 5 GHz - Le Monde Informatique
- Researcher Dreams Up Machines That Learn Without Humans | Wired Enterprise | Wired.com
- How Intel, HP & Compaq Killed The Fastest Processor In The World - Popular Science and Technology Blog by Jos Kirps
Radio
Smartphone
TV
- Recycling, solar, and wind power team up to make a terrifying crab robot | Grist
- Ancient Roman Concrete Is About To Revolutionize Modern Architecture - Slashdot
- Tapping: It's not just for phones anymore - Cabling Install
- BBC News - Drayson Racing electric car sets new world speed record
- Practice makes perfect B12 69 EV Le Mans ahead of breaking record - YouTube
Howto TOW
Fondation
IIA
Leetsaber
- Install Windows XP using USB Flash Disk/ Flash Drive - Step by Step Guide
- Install XP from USB without extra tools - MSFN Forum
- 63 - Install XP and Win7 onto a computer from one USB flash drive containing ISO files! - RMPrepUSB
- inportb » Install Windows 7 from USB Pen Drive Using Grub2 and Grub4Dos
MSI
Psychohistoire
- Skynet to Launch October, 2013 - BlackListedNews.com
SATO
TGL
The Borg Project
Ze Bookmark
Knowledge Ressources
- TeleGeography Submarine Cable Map 2012
Misc
Science
Astronomy
- Spectacular Cosmographic Maps Chart Galaxies and Superclusters in Local Universe | Wired Science | Wired.com
- Un trou noir dormant dans la galaxie du Sculpteur | Ciel et Espace
- 26 New Black Hole Candidates Found In Andromeda - Slashdot
- Trois «super-Terres» habitables détectées dans un système voisin du nôtre - 20minutes.fr
Biology
- Un superordinateur fait une importante découverte contre le SIDA
- Video: Bioengineers invent light-controlled gel - The Globe and Mail
- Vous pourriez bientôt régénérer des parties endommagées de votre corps comme le fait la salamandre | Daily Geek Show
- Emiliania huxleyi: le secret de l'algue qui s'adapte à tout | Slate.fr
- Whole human brain mapped in 3D : Nature News & Comment
- Potent Weapon Against Superbugs Is ... Silver - It makes antibiotics far more effective, says study
- 700,000-Year-Old Horse Genome Shatters Record for Sequencing of Ancient DNA | Wired Science | Wired.com
- Des greffes de tête humaine dans 2 ans ! | Gizmodo
- Biohacking : quand les fab-labs s'attaquent au vivant
Chemical
Computer Science
- Quantum-Tunneling Electrons Could Make Semiconductors Obsolete - Slashdot
- Intel demos real-time code compression for die shrinkage, power saving • The Register
Earth
Future
Physic
- Temporal cloak erases data from history : Nature News & Comment
- The Scale of the Universe 2
- Mysterious Subatomic Particle May Represent Exotic New Form of Matter | Wired Science | Wired.com
- Teen's biofuel invention turns algae into fuel | Tampa Bay Times
- Research Gives New Permanence to Quantum Memory | Wired Enterprise | Wired.com
- Des chercheurs créent des flammes froides dans la Station spatiale internationale
- Lopsided Map of the Cosmos Offers New Clues to the Universe's Origins | Wired Science | Wired.com
Robotic
- Cute Robots Will Be Launched Into Space : Discovery News
- Researchers Build A Robot That Will Beat You At Air Hockey - Forbes
Space Exploration
- Une météorite de Mars contient les éléments clefs de la vie
- Video: NASA launches solar telescope - The Globe and Mail
- Wired Space Photo of the Day | Wired Science | Wired.com
- Un sous-marin miniature pour rechercher des traces de vie dans l'océan du satellite de Jupiter | Slate.fr
- Curiosity : La Nasa dévoile un sublime panorama interactif de Mars
- Mars : La planète rouge se dévoile dans une vidéo de trois minutes
- NASA : Spirit confirme que Mars a eu une atmosphère riche en oxygène dans le passé
Social
Common Sense
Engineering
Experiment
- Des chercheurs créent de faux souvenirs de guerre chez des soldats | Passeur de sciences
History
- Noam Chomsky: Les USA accélèrent l’Apocalypse « GLOBAL RELAY NETWORK
- Archaeologists Discover Lost City In Cambodian Jungle : The Two-Way : NPR
Manif
Network
Philosophy
Politic
- L'avenir du socialisme se joue à l'échelle européenne
- Les perles de la commission | Vidéos LaPresse.ca
Psychology
Warfare
- Are We On the Brink of World War III? - BlackListedNews.com
- Daily chart: Mutually assured ambiguity | The Economist
- A country armed to the teeth | Photographers Blog
- Daily chart: Syria v Libya v Iraq | The Economist
- The UN prepares to go to war for the first time, with a 3,000-strong task force sent to fight rebels in the Congo | Mail Online
- Is Central Australia the geostrategic centrepiece in the USA’s new look east policy? — Phantom Report
- The grim reality of war with a nuclear Iran - Public Service Europe
- The 9 Largest Private Armies In The World. What Are They Fighting For? - BlackListedNews.com
- The Age of Gloom? Implications for Key NATO Armies - BlackListedNews.com
- Taliban thriving on Afghanistans opium economy - BlackListedNews.com
- The Origins of War in the DRC - Armin Rosen - The Atlantic
- FreeBSD 9 Address Space Manipulation Privilege Escalation
- Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO) - YouTube
- 7 graphs that prove America is overrated | GlobalPost
- Twitter / WSJGraphics : Americans worked less, watched ...
Underground
Anonymousity
- This is, hands down, the scariest part of the NSA revelations | FP Passport
- NSA as ‘Big Brother’? Not even close | The Great Debate
- Se protéger de la cyber surveillance | Data Security Breach
- Que sait-on exactement sur PRISM ? | SecurityVibes Magazine – Qualys Security Community
- Canada has tracked phone and Internet data for years | Toronto Star
- Why the NSA leak may boost Blackberry (and force us to move to Canada) | TG Daily
- Overview | Onion Pi | Adafruit Learning System
- The intelligence establishment's dream supercomputer will make Raytheon's RIOT program seem like child's play | Privacy SOS
- Google tracks you. We don't. An illustrated guide.
- RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn't Let Them)
- Use of Tor and e-mail crypto could increase chances that NSA keeps your data | Ars Technica
- Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard
- India’s new surveillance network will make the NSA green with envy - Quartz
Conspiracy Theory
- Google-owned Motorola reveals stomach acid-powered tablet that turns your body into a password - BlackListedNews.com
- The 25 Rules of Disinformation - BlackListedNews.com
- Disclose.tv - Best Conspiracy Theories Site | UFO Sightings Videos
- Before It's News | Alternative News | UFO | Beyond Science | True News| Prophecy News | People Powered News
- Alex Jones' Infowars: There's a war on for your mind!
- Activist Post: Basel III: How The Bank For International Settlements Is Going To Help Bring Down The Global Economy
- Washington Post
- Forget phones, PRISM plan shows internet firms give NSA everything • The Register
- BREAKING!!! UFO ALIEN DISCLOSURE by Canadian Minister of Defense May 2013 - YouTube
- Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 - BlackListedNews.com
- NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System - BlackListedNews.com
- Pentagon bracing for public dissent over climate and energy shocks| Nafeez Ahmed
- Anonymous • Pretext for a New War: Obama Lies About Syrian Chemical Weapons
- PRISM is just 'the tip of the iceberg' in an Orwellian society - Public Service Europe
- Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines - BlackListedNews.com
- NOVA | The New Thought Police
- Nazi Germany vs. Modern Britain: Some Similarities That Should Disturb You | Scriptonite Daily
- InfographieGeantsWebTrack.png (590×1260)
Cyberwar
- InfoSec Institute Resources – China vs US, cyber superpowers compared
- NSA director says dozens of attacks stopped by surveillance programs - The Washington Post
- NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com
- NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com
Lockpicking
Spying
- What are those words that trigger Echelon? • The Register
- Vie privée : La NSA s'octroie un backdoor dans tous les systèmes Windows | UnderNews
- Timeline of NSA Domestic Spying | Electronic Frontier Foundation
- U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
- ELECTRONIC SURVEILLANCE
- NSA Architecture of Oppression
- Exactly How the NSA Is Getting Away With Spying on US Citizens
- #PRISM : let’s have a look at the big picture : Reflets
- Meet PRISM’s little brother: Socmint | Ars Technica
Stalking
Urban Exploration
- Dans la peau d’un hacker black hat | Korben
- Réseau Libre
- Wireless mesh network - Wikipedia, the free encyclopedia
- The Value of a Hacked Email Account — Krebs on Security
- The NSA Bot
- The NSA Bot Now Spying?
- How Hackers Changed the World - BBC documentary 2013 - YouTube
- Root Force