Bookmarks Bar

scrible Toolbar
SHODAN - Computer Search Engine
SHODAN - Computer Search Engine
Gmail : la messagerie de Google
Sign In
Bienvenue sur Facebook. Connectez-vous, inscrivez-vous ou découvrez!


Art and Design




Mois de l’assembleur x86, semaine 1 – Introduction |
SecurityTube Linux Assembly Expert « SecurityTube Trainings





Code raw sockets in C on Linux












Visual Basic





Lab of a Penetration Tester: Poshing the hashes: Using PowerShell to play with hashes
Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | Wired Science |
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.


debian Pastezone
Samsung Smartphone Vulnerable to Remote Wipe Hack - IBTimes UK


Windows NT - Windows 8 EPATHOBJ Local Ring 0 Exploit
Re: exploitation ideas under memory pressure
phpMyAdmin Authenticated Remote Code Execution via preg_replace()
Regalado (In) Security: Unauthorized Access: Bypassing PHP strcmp()
skype-open-source: Skype User IP-address Disclosure
Netgear WPN824v3 - Unauthorized Config Download
Plesk Apache Zeroday Remote Exploit
Microsoft Internet Explorer textNode Use-After-Free
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Linux kernel perf_swevent_init - Local root Exploit
Wordpress WP-SendSMS Plugin 1.0 - Multiple Vulnerabilities
Serious Remote Execution Exploit in Zpanel!
Winamp 5.12 (.m3u) - Stack Based Buffer Overflow
FreeBSD 9.0-9.1 mmap/ptrace Privilege Esclation Exploit
Linux/x86 Reverse TCP Bind Shellcode (92 bytes)
ZPanel htpasswd Module Username Command Execution
ZPanel zsudo Local Privilege Escalation Exploit
Unleashing MAYHEM on Binary Code - Automated hybrid binary analysis that results in shell-spawning exploits : netsec
Staged Payloads – What Pen Testers Should Know | Strategic Cyber LLC



Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes
Computer viruses: A thing of threads and patches | The Economist


Bombing BitTorrent and File-Sharing Websites Back to the Stone Age | TorrentFreak
Paddle Over


One-click/key attack forces IE and Chrome to execute malicious code | Ars Technica



Wireshark ASN.1 BER Dissector CVE-2013-3557 Denial of Service Vulnerability
Microsoft Internet Explorer 'jsdbgui' Buffer Overflow Remote Code Execution Vulnerability
VMware vCenter Chargeback Manager CVE-2013-3520 Remote Code Execution Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-1693 Information Disclosure Vulnerability
Microsoft Internet Explorer CVE-2013-3123 Memory Corruption Vulnerability
Wireshark DCP ETSI Dissector Integer Overflow Denial of Service Vulnerability
Wireshark DCP ETSI Dissector 'dissect_pft_fec_detailed()' Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0776 URI Spoofing Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird CVE-2012-1942 Local Privilege Escalation Vulnerability
OpenSSL Multiple Remote Denial of Service Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0753 Remote Code Execution Vulnerability
Oracle Java SE CVE-2013-1486 Remote Java Runtime Environment Vulnerability
MySQL and MariaDB Geometry Query Denial Of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4186 Remote Buffer Overflow Vulnerability
Wireshark MS-MMC Dissector Denial of Service Vulnerability
Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3660 Local Privilege Escalation Vulnerability
Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-2432 Remote Java Runtime Environment Vulnerability
Adobe Acrobat and Reader CVE-2013-2729 Unspecified Remote Integer Overflow Vulnerability
Apple QuickTime CVE-2013-0986 Buffer Overflow Vulnerability
Apple QuickTime CVE-2013-1021 Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2013-2727 Remote Integer Overflow Vulnerability
Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability
KDE Plasma Paste Applet Local Password Generation Vulnerability
Apple QuickTime CVE-2013-0988 Buffer Overflow Vulnerability
Microsoft .NET Framework CVE-2013-1337 Authentication Bypass Vulnerability
Microsoft .NET Framework XML Digital Signature CVE-2013-1336 Security Bypass Vulnerability
Microsoft Internet Explorer XML Object Zone Restriction Bypass Vulnerability
Microsoft Internet Explorer BR549.DLL ActiveX Control Buffer Overflow Vulnerability
Microsoft Internet Explorer Cached Web Credentials Disclosure Vulnerability
Linux Kernel 'b43' Wireless Driver Local Privilege Escalation Vulnerability
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Linux Kernel 'perf' Multiple Denial of Service and Information Disclosure Vulnerabilities
Linux Kernel CVE-2013-3222 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3223 Local Information Disclosure Vulnerability
Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
Cisco Linksys E1200 N300 Router 'submit_button' Parameter Cross Site Scripting Vulnerability
Xen 'ELF' Parser Multiple Security Vulnerabilities
Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
Linux Kernel CVE-2013-0310 NULL Pointer Dereference Denial of Service Vulnerability
X.Org libFS 'FSOpenServer()' Memory Corruption Vulnerability
Oracle Java SE CVE-2013-1571 Remote Security Vulnerability
Oracle Java SE CVE-2013-2467 Remote Security Vulnerability
Oracle Java SE CVE-2013-2451 Remote Security Vulnerability
Oracle Java SE CVE-2013-1500 Local Security Vulnerability
SecurityFocus is not available
Egor Homakov: Camjacking: Click and say Cheese
Camjacking, как эволюция Clickjacking, или «Гюльчатай! Открой личико!» / Хабрахабр
Oracle Solaris CVE-2012-3199 Local Security Vulnerability
Linux Kernel JFS xattr Namespace Rules Security Bypass Vulnerability
Linux Kernel CVE-2012-0810 Local Denial of Service Vulnerability
Linux Kernel 'inotify_init1()' Double Free Local Denial of Service Vulnerability
Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability
Oracle Java SE CVE-2013-2466 Remote Security Vulnerability
Oracle Java SE CVE-2013-2462 Remote Security Vulnerability
Oracle Java SE CVE-2013-2463 Remote Security Vulnerability
Oracle Java SE CVE-2013-2464 Remote Security Vulnerability
Oracle Java SE CVE-2013-2455 Remote Security Vulnerability
Oracle Java SE CVE-2013-2461 Remote Security Vulnerability
Oracle Java SE CVE-2013-2443 Remote Security Vulnerability
Xen CVE-2013-2195 Pointer Dereference Privilege Escalation Vulnerability
Xen CVE-2013-2194 Remote Privilege Escalation Vulnerability
Xen CVE-2013-2196 Remote Privilege Escalation Vulnerability
Linux Kernel CVE-2010-2066 Donor File Security Bypass Vulnerability
PHP CVE-2013-2110 Heap Based Buffer Overflow Vulnerability
Mozilla Firefox SeaMonkey Thunderbird Modal Calls Cross Domain Information Disclosure Vulnerability
Mozilla Firefox and Thunderbird CVE-2010-3175 Multiple Memory-Corruption Vulnerabilities
Mozilla Firefox and SeaMonkey Gopher Parser Cross Site Scripting Vulnerability
Mozilla Firefox SeaMonkey and Thunderbird 'document.write' Memory Corruption Vulnerability
Linux Kernel 'tg3.c' Integer Overflow Vulnerability
Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability
Linux Kernel Multiple Local Information Disclosure Vulnerabilities
Mozilla Firefox SeaMonkey and Thunderbird 'nsBarProp' Use-After-Free Memory Corruption Vulnerability
Xen CVE-2013-2077 Remote Denial of Service Vulnerability
Xen CVE-2013-2076 Information Disclosure Vulnerability
Xen CVE-2013-2078 Remote Denial of Service Vulnerability
WordPress 'crypt_private()' Method Remote Denial of Service Vulnerability
cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
FreeBSD CVE-2013-2171 Local Privilege Escalation Vulnerabiity
OpenSSH CVE-2010-5107 Denial of Service Vulnerability
Oracle VM VirtualBox 'tracepath' Local Denial of Service Vulnerability
Mozilla Firefox CVE-2013-1696 Clickjacking Vulnerability
Mozilla Firefox CVE-2013-1698 Security Vulnerability
Mozilla Firefox CVE-2013-1699 Homograph Domain Spoofing Vulnerability
[Kitty Bomber]
Mozilla Firefox and Thunderbird CVE-2013-1692 Cross-Site Request Forgery Vulnerability
Oracle Java SE CVE-2013-2440 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-0446 Remote Java Runtime Environment Vulnerability

# ls -lh total 33896 -r-xr-xr-x 1 root wheel 46.2K May 27 18:39 boot -rwxr -
Five Disturbingly Simple Ways to Steal Facebook Logins | TechWeekEurope UK
Hacking ( Computer Hacker Basics 4) - YouTube
Hacking ( Computer Hacker Basics 6) - YouTube
Hacking Term (Chipping) - YouTube
Hardware Backdooring is Practical - Jonathan Brossard - YouTube
Biohackers. The politics of open science | Alessandro Delfanti
Twitter / PrometricCyber : The 5 most common #hacking ...


A simple VPN guide for the beginning Anonymous and online activist

Operating System


Ce que je n’aime pas d’Android « TECHNOSTÉRONE Le blogue de Pascal Forget


Black Berry


Transform a USB stick into a boot device packing multiple Linux distros using GRUB



RŌNIN linux security distribution released. : netsec
Home » OpenStack Open Source Cloud Computing Software




La cybercriminalité. Pourquoi les petites entreprises peuvent perdre beaucoup


Les logiciels qu'il ne fallait pas manquer cette semaine (AVS Media Player, Startup Delayer, CCleaner...) - PHP, cygwin, windows
A small script to detect Linux/Cdorked.A malware on a linux system using the tool from ESET
Opt out of PRISM, the NSA’s global data surveillance program - PRISM BREAK
Ixquick Web Search
Startpage Web Search
Index of /pub/

Korben - Site d'actualité geek et tech








googles-200-ranking-factors.jpg.pagespeed.ce.S-B77K3ca5.jpg (800×20112)

Three Myths about What Customers Want - Karen Freeman, Patrick Spenner and Anna Bird - Harvard Business Review


Canadian Virtual Assistant Connection

Ten tips for using your blog to launch a business - The Globe and Mail


The Quantified Man: How an Obsolete Tech Guy Rebuilt Himself for the Future | Wired Enterprise |

Stock Market

How to identify high-probability reversal zones - MarketWatch
Technical Analysis: What Can This Advanced System Do For You? - Seeking Alpha
5 charts to tell if stock buyers are too bullish - Slide Show - MarketWatch
Don't Let Fear Or Greed Influence Your Portfolio Management. - Seeking Alpha
New Doomsday poll: 98% risk of 2014 stock crash - Paul B. Farrell - MarketWatch

Roubini: Why gold, 'that barbarous relic,' will trade below $1,000 by 2014 - The Tell - MarketWatch
18 Signs That Massive Economic Problems Are Erupting All Over The Planet -
15 Signs That The Economy Is Rapidly Getting Worse As We Head Into 2013 -
America's economy: Which way America? | The Economist
AP - Portugal endures worst recession in 37 years
Bitcoin, Blessing or a Trap? -
Comment créer une boutique en ligne - Créer un Site W


So You Think Bitcoin is a Great Way to Remain Anonymous in Your Financial Transactions? -
Bitcoin's Big Bank Problem: Why Did Mt. Gox Halt U.S. Payouts? | Wired Enterprise |

The financially forgotten generation: Economically raising the Millennials in a debt strapped financial world. -
CHARTS: You Won't Believe How Much Disasters Cost Last Year | Mother Jones
17 Signs That Most Americans Will Be Wiped Out By The Coming Economic Collapse -
Canada soars in ranking of nations adored by foreign investors - The Globe and Mail
Focus: World GDP | The Economist
Detroit’s Default May Spark U.S. Death Spiral of Debt -
PayPal conçoit une monnaie intergalactique. - La



Audio Book

Brain Fart

John McAfee Fed Up with Users Asking Him How to Uninstall McAfee Antivirus – Video


300: Rise of an Empire Official Trailer #1 (2014) - Frank Miller Movie HD - YouTube

Comic Strip



Old School

The Humble Indie Bundle 8 (pay what you want and help charity)


8bits Retro Experiment






Who's <i>really</i> in charge? Bill Belichick's savvy clear in AFC East -
Bill Belichick, Ted Thompson headline NFL's top power brokers -





Téléphone: un chargeur de téléphone au coin du feu, grâce à son feu de camp (VIDÉO)

MIT researchers can see through walls using 'Wi-Vi' - Network World


Instrumentation of the Sapphire Rocket and Ground Support Equipment — For Download | Wired Science |


Les drones sont désormais capables de s’accrocher aux murs pour mieux vous surveiller | Daily Geek Show



Personal Computer

HOT Raspberry Pi DIY Mini Desktop PC Build - HotHardware
Tiny Computers That Collect Data from Anywhere | MIT Technology Review
Google Glass Teardown
Une puce AMD franchit la barrière des 5 GHz - Le Monde Informatique
Researcher Dreams Up Machines That Learn Without Humans | Wired Enterprise |
How Intel, HP & Compaq Killed The Fastest Processor In The World - Popular Science and Technology Blog by Jos Kirps




Recycling, solar, and wind power team up to make a terrifying crab robot | Grist
Ancient Roman Concrete Is About To Revolutionize Modern Architecture - Slashdot
Tapping: It's not just for phones anymore - Cabling Install
BBC News - Drayson Racing electric car sets new world speed record
Practice makes perfect B12 69 EV Le Mans ahead of breaking record - YouTube

Howto TOW




Install Windows XP using USB Flash Disk/ Flash Drive - Step by Step Guide
Install XP from USB without extra tools - MSFN Forum
63 - Install XP and Win7 onto a computer from one USB flash drive containing ISO files! - RMPrepUSB
inportb » Install Windows 7 from USB Pen Drive Using Grub2 and Grub4Dos



Skynet to Launch October, 2013 -



The Borg Project

Ze Bookmark

Knowledge Ressources

TeleGeography Submarine Cable Map 2012




Spectacular Cosmographic Maps Chart Galaxies and Superclusters in Local Universe | Wired Science |
Un trou noir dormant dans la galaxie du Sculpteur | Ciel et Espace
26 New Black Hole Candidates Found In Andromeda - Slashdot
Trois «super-Terres» habitables détectées dans un système voisin du nôtre -


Un superordinateur fait une importante découverte contre le SIDA
Video: Bioengineers invent light-controlled gel - The Globe and Mail
Vous pourriez bientôt régénérer des parties endommagées de votre corps comme le fait la salamandre | Daily Geek Show
Emiliania huxleyi: le secret de l'algue qui s'adapte à tout |
Whole human brain mapped in 3D : Nature News & Comment
Potent Weapon Against Superbugs Is ... Silver - It makes antibiotics far more effective, says study
700,000-Year-Old Horse Genome Shatters Record for Sequencing of Ancient DNA | Wired Science |
Des greffes de tête humaine dans 2 ans ! | Gizmodo
Biohacking : quand les fab-labs s'attaquent au vivant


Computer Science

Quantum-Tunneling Electrons Could Make Semiconductors Obsolete - Slashdot
Intel demos real-time code compression for die shrinkage, power saving • The Register




Temporal cloak erases data from history : Nature News & Comment
The Scale of the Universe 2
Mysterious Subatomic Particle May Represent Exotic New Form of Matter | Wired Science |
Teen's biofuel invention turns algae into fuel | Tampa Bay Times
Research Gives New Permanence to Quantum Memory | Wired Enterprise |
Des chercheurs créent des flammes froides dans la Station spatiale internationale
Lopsided Map of the Cosmos Offers New Clues to the Universe's Origins | Wired Science |


Cute Robots Will Be Launched Into Space : Discovery News
Researchers Build A Robot That Will Beat You At Air Hockey - Forbes

Space Exploration

Une météorite de Mars contient les éléments clefs de la vie
Video: NASA launches solar telescope - The Globe and Mail
Wired Space Photo of the Day | Wired Science |
Un sous-marin miniature pour rechercher des traces de vie dans l'océan du satellite de Jupiter |
Curiosity : La Nasa dévoile un sublime panorama interactif de Mars
Mars : La planète rouge se dévoile dans une vidéo de trois minutes
NASA : Spirit confirme que Mars a eu une atmosphère riche en oxygène dans le passé


Common Sense



Des chercheurs créent de faux souvenirs de guerre chez des soldats | Passeur de sciences


Noam Chomsky: Les USA accélèrent l’Apocalypse « GLOBAL RELAY NETWORK
Archaeologists Discover Lost City In Cambodian Jungle : The Two-Way : NPR





L'avenir du socialisme se joue à l'échelle européenne
Les perles de la commission | Vidéos



Are We On the Brink of World War III? -
Daily chart: Mutually assured ambiguity | The Economist
A country armed to the teeth | Photographers Blog
Daily chart: Syria v Libya v Iraq | The Economist
The UN prepares to go to war for the first time, with a 3,000-strong task force sent to fight rebels in the Congo | Mail Online
Is Central Australia the geostrategic centrepiece in the USA’s new look east policy? — Phantom Report
The grim reality of war with a nuclear Iran - Public Service Europe
The 9 Largest Private Armies In The World. What Are They Fighting For? -
The Age of Gloom? Implications for Key NATO Armies -
Taliban thriving on Afghanistans opium economy -
The Origins of War in the DRC - Armin Rosen - The Atlantic
FreeBSD 9 Address Space Manipulation Privilege Escalation

Putin talks NSA, Syria, Iran, drones in exclusive RT interview (FULL VIDEO) - YouTube
7 graphs that prove America is overrated | GlobalPost
Twitter / WSJGraphics : Americans worked less, watched ...



This is, hands down, the scariest part of the NSA revelations | FP Passport
NSA as ‘Big Brother’? Not even close | The Great Debate
Se protéger de la cyber surveillance | Data Security Breach
Que sait-on exactement sur PRISM ? | SecurityVibes Magazine – Qualys Security Community
Canada has tracked phone and Internet data for years | Toronto Star
Why the NSA leak may boost Blackberry (and force us to move to Canada) | TG Daily
Overview | Onion Pi | Adafruit Learning System
The intelligence establishment's dream supercomputer will make Raytheon's RIOT program seem like child's play | Privacy SOS
Google tracks you. We don't. An illustrated guide.
RaiderSec: How Browsers Store Your Passwords (and Why You Shouldn't Let Them)
Use of Tor and e-mail crypto could increase chances that NSA keeps your data | Ars Technica
Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard
India’s new surveillance network will make the NSA green with envy - Quartz

Conspiracy Theory

Google-owned Motorola reveals stomach acid-powered tablet that turns your body into a password -
The 25 Rules of Disinformation - - Best Conspiracy Theories Site | UFO Sightings Videos
Before It's News | Alternative News | UFO | Beyond Science | True News| Prophecy News | People Powered News
Alex Jones' Infowars: There's a war on for your mind!
Activist Post: Basel III: How The Bank For International Settlements Is Going To Help Bring Down The Global Economy
Washington Post
Forget phones, PRISM plan shows internet firms give NSA everything • The Register
BREAKING!!! UFO ALIEN DISCLOSURE by Canadian Minister of Defense May 2013 - YouTube
Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 -
NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System -
Pentagon bracing for public dissent over climate and energy shocks| Nafeez Ahmed
Anonymous • Pretext for a New War: Obama Lies About Syrian Chemical Weapons
PRISM is just 'the tip of the iceberg' in an Orwellian society - Public Service Europe
Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines -
NOVA | The New Thought Police
Nazi Germany vs. Modern Britain: Some Similarities That Should Disturb You | Scriptonite Daily
InfographieGeantsWebTrack.png (590×1260)


InfoSec Institute Resources – China vs US, cyber superpowers compared
NSA director says dozens of attacks stopped by surveillance programs - The Washington Post
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level |
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level |



What are those words that trigger Echelon? • The Register
Vie privée : La NSA s'octroie un backdoor dans tous les systèmes Windows | UnderNews
Timeline of NSA Domestic Spying | Electronic Frontier Foundation
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
NSA Architecture of Oppression
Exactly How the NSA Is Getting Away With Spying on US Citizens
#PRISM : let’s have a look at the big picture : Reflets
Meet PRISM’s little brother: Socmint | Ars Technica


Urban Exploration

Dans la peau d’un hacker black hat | Korben
Réseau Libre
Wireless mesh network - Wikipedia, the free encyclopedia
The Value of a Hacked Email Account — Krebs on Security
The NSA Bot
The NSA Bot Now Spying?
How Hackers Changed the World - BBC documentary 2013 - YouTube
Root Force