 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "chriseng" (403 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter chriseng[2012-10-03] - 11:25:55 - RT @csima: Ugh webinspect sucks. Where's the innovation?![2012-10-02] - 01:28:07 - @arnimarhardar Earlier @dlitchfield suggested to me that it may have been a gross misinterpretation of arcane French cryptography laws.[2012-09-27] - 11:51:16 - RT @shyamarose: If you call me and try to sell AppSec is important. SQLi is a problem. Anon is out there. you're gonna have a bad time.[2012-09-27] - 11:51:16 - RT @PacSecjp: PacSec2012???????????????????: Chris Eng???????, Veracode Data Mining a Mountain of Zero Days Excited![2012-09-27] - 11:51:16 - @thegrugq @0xabad1dea @_wirepair Perhaps you didn't notice @WeldPond on the HITB agenda in a couple of weeks? :)[2012-09-27] - 11:51:16 - Ubuntu Snafu: Privacy Is Hard, Let?s Go Shopping http://t.co/LA6JOL8G (#veracode @0xabad1dea)[2012-09-27] - 11:51:16 - RT @marshray: http://t.co/Mw1Ek9Id Ubuntu bug 1055766: grep -R doesn't automatically search Amazon Ubuntu devs have no sense of humor[2012-09-27] - 11:51:16 - Ubuntu bug 1055766 may be one of the most awesome bug reports I've ever seen. http://t.co/Mw1Ek9Id[2012-09-13] - 22:48:10 - RT @ekoparty: What to see a demo of CRIME SSL attack? Check this out: http://t.co/ab4yW6or Well this looks pretty darn interesting.[2012-09-13] - 09:58:36 - Could Your Domain Survive a DNS Outage? Use this simple tool to find out: http://t.co/aAD2NYaT[2012-09-13] - 09:58:36 - (since I previously tweeted this right as the AAPL keynote started) Could Your Domain Survive a DNS Attack? Find out: http://t.co/aAD2NYaT[2012-09-11] - 08:24:53 - Wonder how many orgs will be reconfiguring their DNS tomorrow to include *actual* redundancy. Breakage is best catalyst for change![2012-09-06] - 04:29:50 - So I update to Java 7u7 and now it won't even run anymore (some file libi386jvm.cfg doesn't exist). Nice QA there.[2012-09-06] - 04:29:50 - Well, whatever is broken with the Java 7u7 Win7 x64 installer is not broken with the x86 installer.[2012-09-06] - 04:29:50 - @MoonFairy4 Yeah, we filled just about all of our engineering/research positions in Q1 and Q2. Not a lot of entry-level work here either.[2012-09-06] - 04:29:50 - Re @Wh1t3Rabbit Java blog post, jre1.5.0_10 .... how did that get on there?! Based on the screenshot, you installed it Aug 3, 2012. :)[2012-08-18] - 11:57:48 - MT @dragosr: EUSecWest AMS Sept 19/20 - @Paucis__Verbis @quine - Mapping and Evolution of Android Perms @veracode research represent![2012-08-18] - 11:57:48 - RT @shit_hn_says: By and large Clojure basically obsoletes Ruby and Python[2012-08-18] - 11:57:48 - @0xcharlie @dinodaizovi @nickdepetrillo I used to have a sweet gpg integration with pine. :)[2012-08-14] - 22:22:12 - How would you diagnose a buffer overflow problem? http://t.co/ac62DZnf[2012-08-09] - 18:05:07 - @webhak Yep -- they should be on the OWASP AppSec EU site, if not let me know.[2012-07-30] - 11:32:45 - RT @Montejam: Can you imagine the level of security professional that Defcon kids is going to someday produce? Prepping my CV now for fo ...[2012-07-26] - 08:37:55 - Listening to @esizkur describe how GPS works prior to dropping some baseband 0day. #Blackhat[2012-07-26] - 08:37:55 - SUPL clients often don't use SSL, and when they do, ignoring certificate checks is common. @esizkur #blackhat Just like mobile apps[2012-07-18] - 15:20:27 - HP On That Cloud Thing That Everyone Else Is Talking About http://t.co/wdikFCDO LOL. (h/t @dakami)[2012-07-11] - 17:01:55 - @jeremiahg Woo, more firewalls.[2012-07-11] - 17:01:55 - These ATT Wireless phishing emails are the best I've seen. It even exploits an unvalidated redirect vuln in a legitimate ATT website.[2012-06-30] - 10:35:02 - @s7ephen @alexmImmunity I did a talk like that before (BH 06, OWASP 08).[2012-06-27] - 20:23:53 - RT @jesserobbins: 'the recruiter honeypot' is the most useful explanation of startup recruiting I have ever read. It is also depressing. ...[2012-06-21] - 19:39:38 - MT @MrToph: There's a free tool you can download to automate a web attack. It's called SQL Injection. Urgh.[2012-06-21] - 19:39:38 - I'm just going to assume @parmy knows that SQL Injection is not a tool. Probably just got flustered in the presence of Jon Stewart. :)[2012-06-16] - 04:22:19 - @tqbf I also found out that the SQL Injection shot we served at BlackHat last year was in fact called a Washington Apple.[2012-06-16] - 04:22:19 - RT @nordicsecconf: @chriseng will you bring some 0-day drink recipes to Iceland for us?:-) Haha I am all over it.[2012-06-16] - 04:22:19 - @ErrataRob Anything interesting in chrome://sync-internals/ ?[2012-06-14] - 04:02:51 - RT @r_netsec: In the blink of an eye - A real world AES key extraction performed on a military grade FPGA [PDF] - http://t.co/Fjyv6XqH[2012-06-12] - 17:35:13 - @NGalbreath I was referring to the serial # chosen by the MS TermServ License Server (see http://t.co/n1tMbAEe), wrt Flame MD5 collision.[2012-06-12] - 00:52:24 - RT @trailofbits: We have published our initial analysis of Flame's MD5 collision capabilities http://t.co/6dxb7wun Great deck.[2012-06-12] - 00:52:24 - Most compelling bit of Flame MD5 discussion: Did the attackers have a much faster collision generation algorithm or a larger cluster?[2012-06-08] - 13:27:53 - OH: next generation cryptography[2012-06-01] - 10:04:54 - FYI our latest data (trailing 120 days) shows 2.1% of Java apps reference OWASP ESAPI lib at least once. % unchanged from 2H2011 data pull.[2012-05-31] - 01:44:52 - We released a whitepaper from @_wirepair today on ways people fail at evaluating DAST technologies. http://t.co/TkC74NsT[2012-05-29] - 21:03:48 - @wickett They don't. Last time I checked our stats (a few months back), only 2% of Java apps we scanned were using it.[2012-05-29] - 21:03:48 - @jeremiahg Actually @danielcornell's study showed an avg of 97.5 mins to fix a SQL injection. (NB: small sample set) http://t.co/lAHqU6jK[2012-05-27] - 13:29:51 - @RobBrydon FYI, audio/video Kindle edition of your book won't download to my iPad. Amazon says the content is to blame, had to refund. :([2012-05-25] - 22:54:06 - RT @daveaitel: I recommended Chrome, but next week, I'll recommend IE or Safari. ; http://t.co/8quqVueh Nice interview![2012-05-24] - 19:06:51 - RT @nikcub: Yahoo included their cert private key inside the Axis Chrome extension.. (means anybody can sign extension as yahoo).. http: ...[2012-05-24] - 19:06:51 - RT @nikcub: If anybody is interested I just created a fake Yahoo Axis chrome extension, signed it and pushed to github: https://t.co/LVw ...[2012-05-24] - 19:06:51 - @0xcharlie @diretraversal I mean, I'm glad nobody wasted 0day on this. But argh, reporting.[2012-05-24] - 04:42:05 - Details of Pinkie Pie's $60k Chrome exploit. http://t.co/DizJkBUK (OMG, this guy is only a teenager?!)[2012-05-18] - 11:57:17 - RT @maggit: lolcommits takes a webcam picture of you whenever you git commit https://t.co/zfYyoQGd[2012-05-11] - 05:30:13 - @bobmcmillan If MiFi signal is good I'll use that first. If I do use the hotel network I am tunneling just about everything over SSH or VPN.[2012-05-02] - 12:24:55 - @manicode So is using parameterized SQL queries, but we still have SQLi. Easy != Totally effortless.
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|