Bookmarks

Bookmarks Bar

2013

Juillet

Art and Design

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Cryptography

Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA | Threat Level | Wired.com

Database

Hacking

Cracking

DecryptoCat - TobTu
FBI Intel Community Public Keys and Others
US Secret Service Public Keys
DHS Public Keys
NATO Public Keys
The Art Of Defuzzing | Didier Stevens
Twitter / _cypherpunks_ : How to break encryption - real ...

DoS

Exploit

SecurityFocus
WinAmp 5.63 - Stack-based Buffer Overflow
WinAmp 5.63 - Invalid Pointer Dereference
Quick & dirty PoC for Android bug 8219321 discovered by BlueboxSec
Wordpress Spicy Blogroll Plugin - File Inclusion Vulnerability
Apple Quicktime 7 Invalid Atom Length Buffer Overflow
Exploit (& Fix) Android "Master Key" - Jay Freeman (saurik)
Windows RT ARM Bind Shell (Port 4444)
o0o: CVE-2011-3923: Yet another Struts2 Remote Code Execution

Maping

Virus

RaiderSec: Building an SSH Botnet C&C Using Python and Fabric

Warez

Web

OWASP Montréal - 3 juillet - Linux/CDorked - YouTube
Subgraph Vega - Authenticated Scanning - YouTube
Troy Hunt: Everything you wanted to know about SQL injection (but were afraid to ask)
Josip Franjković - security blog: SQL injections in Nokia sites.

Wifi

Vulnerability

Mozilla Firefox CVE-2013-1688 Remote Code Execution Vulnerability
Mozilla Firefox CVE-2013-1695 Security Bypass Vulnerability
Mozilla Firefox CVE-2013-1700 Local Privilege Escalation Vulnerability
Adobe Acrobat and Reader CVE-2013-0622 Remote Security Bypass Vulnerability
Oracle Java SE CVE-2013-2418 Remote Java Runtime Environment Vulnerability
Oracle Java SE CVE-2013-2471 Buffer Overflow Vulnerability
Oracle Java SE CVE-2013-2465 Memory Corruption Vulnerability
Oracle Java SE and Java for Business CVE-2010-4450 Remote Java Runtime Environment Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0783 Memory Corruption Vulnerability
Apache Subversion CVE-2013-2088 Command Injection Vulnerability
Oracle Java SE CVE-2013-2448 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird CVE-2013-1690 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird CVE-2013-1694 Remote Code Execution Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-1687 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird CVE-2013-1697 Security Bypass Vulnerability
Xen Page Reference Counting CVE-2013-1432 Denial of Service Vulnerability
WordPress Category Grid View Gallery Plugin 'ID' Parameter Cross Site Scripting Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-0799 Local Privilege Escalation Vulnerability
Mozilla Firefox and Thunderbird CVE-2013-1686 Use-After-Free Memory Corruption Vulnerability
Linux Kernel CVE-2013-2206 NULL Pointer Dereference Denial of Service Vulnerability
Apache CXF CVE-2013-2160 Multiple Remote Denial of Service Vulnerabilities
Linux Kernel CVE-2013-3235 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3224 Local Information Disclosure Vulnerability
Linux Kernel CVE-2013-3231 Local Information Disclosure Vulnerability
Adobe Flash Player CVE-2013-3344 Unspecified Heap Buffer Overflow Vulnerability
Adobe Flash Player CVE-2013-3345 Unspecified Memory Corruption Vulnerability
Adobe Flash Player CVE-2013-3347 Integer Overflow Vulnerability
VLC Media Player CVE-2013-3245 Remote Integer Overflow Vulnerability
Linux Kernel CVE-2013-1848 Local Privilege Escalation Vulnerability
Microsoft Internet Explorer CVE-2013-3163 Memory Corruption Vulnerability
Linux Kernel CVE-2013-0914 Local Information Disclosure Vulnerability
Google Chrome CVE-2013-2877 Out of Bounds Denial of Service Vulnerability
SecurityFocus
SecurityFocus
PHP CVE-2013-4113 Heap Memory Corruption Vulnerability
Apache mod_imagemap and mod_imap Cross-Site Scripting Vulnerability
Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
Oracle MySQL Server CVE-2013-3802 Remote Security Vulnerability
Oracle MySQL Server CVE-2013-3793 Remote Security Vulnerability
Linux Kernel 'tcp_collapse()' Local Denial of Service Vulnerability
Linux Kernel CVE-2013-4125 Remote Denial of Service Vulnerability
Oracle Java SE CVE-2013-3744 Remote Security Vulnerability
Oracle Java SE CVE-2013-2400 Remote Security Vulnerability
Multiple OpenStack Products CVE-2013-1665 XML External Entity Information Disclosure Vulnerability
Apache Struts CVE-2013-2251 Multiple Remote Command Execution Vulnerabilities
Oracle Java SE CVE-2013-2460 Remote Java Runtime Environment Vulnerability
Linux Kernel CVE-2013-3225 Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-2468 Remote Security Vulnerability
Oracle Java SE CVE-2013-3743 Remote Security Vulnerability
Oracle Java SE CVE-2013-2447 Remote Security Vulnerability
Oracle Java SE CVE-2013-2394 Remote Code Execution Vulnerability
Some phones can be pwned by sending two SMS messages to them - Boing Boing
Oracle Java SE CVE-2013-2459 Remote Security Vulnerability
Oracle Java SE CVE-2013-2457 Remote Security Vulnerability
Oracle Java SE CVE-2013-2453 Remote Security Vulnerability
Oracle Java SE CVE-2013-2456 Remote Security Vulnerability
Oracle Java SE CVE-2013-2473 Buffer Overflow Vulnerability
Oracle Java SE CVE-2013-2446 Remote Security Vulnerability
Oracle Java SE CVE-2013-2412 Remote Security Vulnerability
Oracle Java SE CVE-2013-2450 Remote Security Vulnerability
Oracle Java SE CVE-2013-2407 Remote Security Vulnerability
Oracle Java SE CVE-2013-2458 Remote Security Vulnerability
Cisco Video Surveillance Manager CVE-2013-3431 Remote Authentication Bypass Vulnerability
Cisco Video Surveillance Manager CVE-2013-3430 Remote Authentication Bypass Vulnerability
Oracle Java SE CVE-2013-2416 Remote Java Runtime Environment Vulnerability
Oracle MySQL Server CVE-2013-3783 Remote Security Vulnerability
Cisco Adaptive Security Appliance (ASA) Software CVE-2013-3414 Cross Site Scripting Vulnerability
Microsoft Internet Explorer CVE-2013-3152 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3145 Memory Corruption Vulnerability
Oracle Java SE CVE-2013-2442 Remote Security Vulnerability
Oracle Java SE CVE-2013-1488 Remote Code Execution Vulnerability
IBM Java CVE-2013-3007 Unspecified Arbitrary Code Execution Vulnerability
IBM Java CVE-2013-3010 Unspecified Arbitrary Code Execution Vulnerability
Oracle Java SE CVE-2013-1557 Remote Java Runtime Environment Vulnerability
Linux Kernel CVE-2013-2851 Memory Corruption Vulnerability
Linux Kernel 'key_notify_policy_flush()' Function Local Information Disclosure Vulnerability
ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
phpMyAdmin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
Wireshark Multiple Denial of Service Vulnerabilities
Apache Struts 'includeParams' CVE-2013-2115 Incomplete Fix Security Bypass Vulnerability
Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability

Researchers hack Verizon device, turn it into mobile spy station | Reuters
How to Use Google as a Proxy Server
Google Glass hacked with malicious QR code to yield its pictures and video | Technology | guardian.co.uk
Rooting SIM Cards - Slashdot
Rooting SIM cards | Security Research Labs
Tampering with a car’s brakes and speed by hacking its computers: A new how-to | Ars Technica
DARPA Hackers Show How Cars Can Be Remotely Controlled - BlackListedNews.com
Spoofing on the High Seas - YouTube
Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box | Ars Technica
Activist Post: "Smart" Houses Added to List of Hacker Threats
shellnoob/shellnoob.py at 1006d4a4bd20a3111d79fd377a1544b0cd4e7658 · reyammer/shellnoob · GitHub

Networking

DHS Front Page
Chapter 3. ez-ipupdate configuration
Howto: DynDNS for Gentoo Linux
www.dd-wrt.com | Unleash Your Router
Here's What Wi-Fi Would Look Like If We Could See It | Motherboard
Don't Worry Government, I Got This Porn Filter Sorted - SickSad

Operating System

Android

Autres

Ubuntu Edge | Indiegogo

Black Berry

Research in Motion/Blackberry Device Exploitation Guidelines for Law Enforcement | Public Intelligence

Bootloader

BSD

Linux

Mac

Windows

Security

Software

HOWTO: Restore Lost Partitions to a Deleted or Corrupt Partition Table
Modifier un PDF : 3 outils gratuits pour éditer un document - Le blog du Modérateur
Capptivate: a site capturing apps before they disappear forever | Ars Technica
CAPPTIVATE.co | beta

who-runs-the-internet_51e5cb1c47844.png (2500×1664)
The Internet map

Economy

Entrepreneurship

E-commerce

Financement

Management

Nine traits of the intelligent leader - The Globe and Mail
The Most Important Leadership Skill You'll Ever Learn | Inc.com

Marketing

SEO

SEO strategy VS Social Media strategy, breakdown and analysis
Référencement Google : cartonner avec 0 partenariat en 5 points et + | Alexandra Martin
Le Top des ressources SEO gratuites proposées par Google | TooClic.com
6 indicateurs de qualité d'un site web (pour le SEO)
30 best new SEO tools | Feature | .net magazine

12 Formulas: How to Use Twitter to Drive Traffic to Your Blog - The Wishpond Blog

Outsourcing

Job

fake diploma, fake degrees, buy a diplomas, buy a degree, diploma order,degree certificates|Canada diploma samples

Stock Market

The easiest way to buy physical gold - The Cody Word - MarketWatch
Earnings Calendar - 2013 Economic Events Calendar - TheStreet

Bitcoin

How a total n00b mined $700 in bitcoins | Ars Technica
Bitcoin ETF Is A Way To Corner The Bitcoin Market And Create A Bubble - Seeking Alpha
Zerocoin/libzerocoin · GitHub

Gold: Is the bad news over? - Mark Hulbert - MarketWatch
Wealth Creation And The State - Seeking Alpha
Interactive currency-comparison tool: The Big Mac index | The Economist
106164.jpg (492×542)
The Biggest Oil Discovery In 50 Years? - BlackListedNews.com
Video - Scientists Foresee Fracking in Arctic, on Ocean Floor - WSJ.com
4 reasons capitalism is morally bankrupt, dying - Paul B. Farrell - MarketWatch

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

Sid Meier: The Father of Civilization

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Top 10 touchdown celebrations of all time - NFL Videos

Travel

XXX

Hardware

Batery

DIY

Teslonian Man Show! - YouTube
Travis Goodspeed's Blog: Hillbilly Tracking of Low Earth Orbit Satellites
Travis Goodspeed's Blog: Hillbilly Tracking of Low Earth Orbit Satellites
Hacker builds Google Glass clone | Internet & Media - CNET News

Drone

Hardline

Military

Science Goes Ballistic: 8 Guns for Hunting Knowledge | Wired Science | Wired.com
cryptogon.com » U.S. Navy Makes History by Landing Unmanned Drone on Aircraft Carrier
Israel's Killer Robots | VICE United States
The Grizzly: First Fully 3D Printed Rifle Gets a Shot Off - BlackListedNews.com

Personal Computer

Oculus Rift: Step Into the Game by Oculus — Kickstarter
X1 : La Smart Watch ultime selon Orsto- Geekbecois
AIREAL: Interactive Tactile Experiences in Free Air - YouTube

Radio

Smartphone

TV

Des lentilles de contact bioniques pour zoomer sur le monde
La peau électronique qui devient lumineuse quand on la touche | Slate.fr

CAR

Water Powered Car Unveiled: Yes It’s Real - BlackListedNews.com

Wild High-Tech Goggles Give You Superhero Senses | Wired Design | Wired.com

Howto TOW

Fondation

IIA

Leetsaber

Tutorial For Using Hiren boot CD 15.1 ISO on USB or HDD - Hiren's Boot CD - reboot.pro

MSI

Psychohistoire

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Planètes habitables : 60 milliards accueilleraient la vie selon une étude
Scientists Determine Blue Is Color of Distant Planet - WSJ.com
Vidéo : La NASA dévoile la queue de notre système solaire - Planet.fr
When space weather attacks!
NASA Hubble Finds New Neptune Moon | NASA
VIDEO. A 11 000 années-lumières, une étoile est en train de naître
Une exoplanète observée aux rayons X livre ses secrets

Biology

Laser Blood Scan Could Help Identify Malaria and Other Diseases - Slashdot
Human stem cells used to grow a mini-liver in mice | Ars Technica
BBC News - Mouse cloned from drop of blood
Exclusive: Mice with human chromosomes - the genetic breakthrough that could revolutionise medicine - Science - News - The Independent
Stretchy Gold Electronics Could Someday Live Inside Your Brain - Wired Science
Bizarre Horn-Faced Dinosaur Discovered in Utah - Wired Science
Largest viral genome yet carries 2,300 genes that are new to biology | Ars Technica
Gut Microbes Can Split a Species - ScienceNOW
Imitation In Dogs Matches Humans and Apes - Slashdot
Researchers Find More Evidence That Dolphins Use Names - Wired Science
These Bacteria Are Wired to Hunt Like a Tiny Wolf Pack - Wired Science
Scientists discover what’s killing the bees and it’s worse than you thought - Quartz
Where 'Nightmare Bacteria' Came From, And How Our Inattention Helped Them Emerge - Wired Science
Faux souvenirs: "Inception" devient réalité au pays des souris - RTBF Etcetera
N-Fix tech could drastically reduce agricultural fertilizer use
Spiders May Have Personalities, and Some Are Bolder Than Others - Wired Science

Chemical

Computer Science

Earth

Big Map of Tiny Creatures: Dip Into a Global Atlas of Plankton - Wired Science
Scientists call for protection of Canada's boreal forest - The Globe and Mail
Global Warming 5 Million Years Ago In Antarctic Drastically Raised Sea Levels - Slashdot
Méthane: la bombe invisible | Le Devoir
VIDÉO. Le Pôle Nord est devenu un lac avec la fonte des glaces

Future

Physic

Precise atomic clock may redefine time : Nature News & Comment
Muon Neutrino To Electron Neutrino Oscillation Conclusively Shown - Slashdot
Probes confirm Earth acts like a giant particle accelerator | Ars Technica
Scientists stop light completely for a record-breaking MINUTE by trapping it inside a crystal | Mail Online

Robotic

Meet ATLAS! - YouTube
Activist Post: The Evolution of the Humanoid Robot
Robots to Revolutionize Farming and Ease Labor Woes | TIME.com

Space Exploration

NASA : les moteurs ioniques battent un nouveau record après cinq années et demie d'activité
NASA : un prototype de robot martien en test dans le désert d'Acatama
The Golden Spike Company | Your Chance to Enable and Take Part in True Space Exploration
Sabre rocket engine could open up access to space as never before | Stuart Clark | Science | guardian.co.uk
La Terre vue de Saturne à 1,45 milliard de km
NASA starts building faster-than-light warp engine — RT USA
NASA : le développement du taxi spatial entre dans sa phase finale

Social

Common Sense

Engineering

Experiment

History

World map of Countries by Age by Country - TargetMap
BBC News - 'World's oldest calendar' discovered in Scottish field

Manif

The Revolt of the Global Middle Class - David Rohde - The Atlantic

Network

Ebook « Community Management : 11 outils indispensables »
Twitter : générer des flux RSS avec la nouvelle API » Stratégies digitales
Utilisez un Google script pour générer des flux RSS depuis Twitter | Michtoblog

Philosophy

Politic

Rushing into a burning house, Croatia joins the EU - Outside the Box - MarketWatch
Red Alert: In Japan, Communists Include Some Colorful Characters - WSJ.com

Psychology

Warfare

Canada played key role in U.S., U.K. biological weapons programs: Walkom | Toronto Star
Russian military stages biggest war games since Soviet times - BlackListedNews.com
The origins of war: Old soldiers? | The Economist
U.S. Arctic Ambitions and the Militarization of the High North - BlackListedNews.com

SO MUCH FOR MIDEAST DEMOCRACY « Eric Margolis

Underground

Anonymousity

French agency spies on phone calls, email, web use, paper says | Reuters
German Spies ECHELON Exists
Realeyes Emotion Detection Software Knows How You’re Feeling About Their Clients’ Ads | Singularity Hub
Here’s how much data Google & Facebook have stored about you | VentureBeat
So, You Want to Hide from the NSA? Your Guide to the Nearly Impossible - Philip Bump - The Atlantic Wire
RedPhone :: Secure Calls - Android Apps on Google Play
See how easily freaks can take over your life - YouTube
The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones - BlackListedNews.com
Ether Rag: Duck Duck Go: Illusion of Privacy
How The CIA Can Send A Drone After Any Mobile Phone | Fast Company | Business + Innovation
Google's Latest Machine Vision Breakthrough - Slashdot
The Internet Knows More About You Than You Think (INFOGRAPHIC)
5 ways to be invisible online - Slide Show - MarketWatch

Conspiracy Theory

Anonymous • The Egyptian Revolution: What You’re Not Being...
HAARP
HAARP ionospheric research program set to continue
Who is Brook Zimmatore and why is he cleaning up Wikipedia? | Why We Protest | Anonymous Activism Forum

Cyberwar

Cyber Command Suffers Second Defeat, Dump It
Singapore creates operations hub to beef up cyberdefense | ZDNet
In his own words: Confessions of a cyber warrior | Security - InfoWorld
La cyberguerre, nouvel enjeu des armées
How CIA Black Ops Teams Are Hacking Into Computers Worldwide

Lockpicking

Spying

BNAbWK7CIAA4ANo.png:large (1024×768)
Pourquoi la NSA espionne aussi votre papa (#oupas) | BUG BROTHER
#PRISM and Guests : Au moins 7 pays européens auraient des accords avec la NSA : Reflets
NSA Surveillance Link Collection | anonymousirc
Low-power Wi-Fi signal tracks movement—even behind walls
Révélations sur le Big Brother français
AT&T Invents Programming Language for Mass Surveillance | Threat Level | Wired.com
Stasi vs. The NSA Back To Back: Who's Worse - A Visual Guide - Falkvinge on Infopolicy
The Canadian Government Is Not Bothered by PRISM and the NSA | VICE Canada
Jealous of PRISM? Use "Amazon 1 Button" Chrome extension to sniff all HTTPS websites!
ECHELON Today: The Evolution of an NSA Black Program - BlackListedNews.com
Twitter / Kallista0_0 : How the NSA collects you data; ...
XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World news | theguardian.com

Stalking

Urban Exploration

(English Subs) Redhack on Halk TV - Occupy Gezi & The Current State Of Turkey (1/3) - YouTube
Anonymous Security - Guide to law enforcement encounters