 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour halvarflake |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "halvarflake" (150 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter halvarflake[2012-10-04] - 21:44:22 - RT @ochsff: Heap of Hanoi. Fuck yeah! http://t.co/4Y0NO9Pd[2012-10-02] - 09:42:23 - And man, I wish I could go to HITB2012KUL. Sigh. Damn you, knee ;)[2012-09-29] - 12:34:15 - Sad: Won't make HitbKL, even though I would've loved to go :-( Kneehab first, travel later.[2012-09-14] - 20:55:49 - I am drawing rectangles of equal size using OpenGL. At some zoom levels, some of them are twice as tall as others. Linux/Nvidia. Known ?[2012-09-14] - 20:55:49 - @andreasdotorg Hmmm...sounds plausible - I am drawing using int coordinates, but they probably get converted. Crap. Heaps are large.[2012-09-14] - 20:55:49 - @andreasdotorg Ah. Yeah. Heap resolution needs to support zooming between 1 byte res and 4bn byte res, so we need to go sliding scale.[2012-09-12] - 06:22:42 - Sometimes the heap is just insanely messy, and then you realize the simplest allocation primitive involves 30+ allocations. Nuts.[2012-09-12] - 06:22:42 - Today is officially the first day when I stared at an application heap and felt like I had spotted Attila's horde coming over a hill.[2012-09-12] - 06:22:42 - Bushido means to struggle desperately in the jaws of death, commented Lord Naoshige. -- Hagakure, applicable to heaps.[2012-09-12] - 06:22:42 - @adamshostack win8 heap: good work, so pat on back. This here: no connection to anyone with a brain, makes it harder.[2012-09-12] - 06:22:42 - The application seems to have been written by idiots. Sometimes, dealing with their heap is almost as bad as arguing with them.[2012-09-06] - 06:30:51 - People complain about SOAP's RPC over HTTP being cumbersome, but tunneling RPC over PDF over SMTP was hugely successful in recent years.[2012-08-07] - 23:35:54 - Are people really complaining about exploit sales w/o complaining about CA's assisting in MitM attacks ?[2012-07-31] - 14:32:32 - @miaubiz ah you mean a heapviz-in-good. That's more engineering than research...[2012-07-31] - 14:32:32 - @nicowaisman @miaubiz also: easy customization for appspecific heaps[2012-07-19] - 12:38:19 - @xabean PDF dissector isn't sold any more, sorry :-/[2012-07-07] - 00:00:25 - @smoothimpact Dude, that's what the SQLi is for ;)[2012-07-01] - 10:40:07 - @haroonmeer Non-military (hence unencrypted) GPS spoofing.[2012-06-22] - 13:44:23 - sandbox my browser and move all my important data to the cloud, make rop harder but make backdoor detection impossible. Hmmm....[2012-06-14] - 05:26:24 - RT @0xcharlie: I learned today that Linux ARM memcpy doesn't crash on a copy of negative length...[2012-06-05] - 19:45:11 - @msftsecresponse : Does the cert in Flame imply that attackers could've signed MS updates pwned people through MitM on windowsupdate ?[2012-06-05] - 19:45:11 - So the attacker generated license data an evil executable with matching md5 then had Ms sign it ?[2012-04-30] - 18:28:42 - Win8 heap nondeterminism -- or how each combinatorics book that I've ever read suddenly becomes useful.[2012-04-16] - 16:55:04 - The natural competitor of the 0day seller is the service/software provider. This means that 0day value is upper-bounded by PR cost ? Discuss[2012-04-10] - 11:01:12 - I find it impressive how blackhats do not disclose was twisted to non-disclosure is sufficient to call yourself blackhat.[2012-04-10] - 11:01:12 - @ochsff sorry. Will answer the email when I am back near the GPG keys, around 1st of may. Call beforehand ?[2012-03-30] - 07:11:41 - RT @_snagg: Btw that EU proposal is what happens when people say shit like 'an exploit is like a weapon'. Now nmap is a weapon too and t ...[2012-03-19] - 13:45:51 - Like @haroonmeer's slides. The idea of 'playing 0day cards' in a pentest hasn't properly been popularized yet, so this is a good move :)[2012-03-09] - 16:10:46 - Hm. How many teams are participating in pwn2own this year ? If there's only 3 teams, can one earn 15k for drinking beer for 2 days ?[2012-03-08] - 21:26:56 - Thought experiment to clarify price elasticity in vuln markets: If an Acrord 0day is worth X$, what's the value of 20 such 0days bundled ?[2012-03-06] - 15:03:39 - RT @esizkur: OH: PETB advises: Killing 0day is like clubbing baby seals. - not everyone wants to live a bug-vegan live though.[2012-03-06] - 15:03:39 - RT @dragosr: AMD cpu bug corrupts stack pointers. http://t.co/sL4vkl7r /.[2012-02-28] - 18:11:13 - I like the #pwnium rules. Kudos to the Chrome team :-) http://t.co/7NaYhaGT[2012-02-18] - 00:03:59 - RT @pusscat: Today I've seen ppl with no uterus talk about birthcontrol and ppl with no 0day talk about limiting 0day. #lifeimitatespoli ...[2012-02-05] - 13:53:15 - So it turns out that firewalls are surprisingly effective. Flat mostly intact. Smells a bit smoky.[2012-02-03] - 05:13:16 - Could someone please whip up a nice presentation software using the visionobjects stack ?[2012-01-25] - 17:16:55 - RT @onceuponanop: @halvarflake switching is a PITA, I prefer to use Chrome's incognito-mode[2012-01-24] - 00:57:43 - @esizkur In a nutshell: They are selling the equivalent of taxation 0day.[2012-01-22] - 19:04:59 - About to say goodbye to Ubuntu on my personal box where I draw etc. - anyone has experience with Wacom Cintiq's and Debian ?[2012-01-04] - 13:29:33 - Dear Twitterverse, is there any recent research on market shares of different enterprise firewalls ?[2011-12-11] - 03:46:05 - RT @jonoberheide: rm -rf ~/.cache; ln -s /etc/shadow ~/.cache; ssh localhost (trigger pam_motd by re-logging in and you'll own /etc/shad ...[2011-12-01] - 02:23:26 - RT @_dvorak_: Wondering why GSSAPI gets re-enabled and OpenSSH upgraded from 4.3? Maybe http://t.co/ubEaUiLU will help.[2011-11-21] - 15:30:14 - RT @0xFFFFFFFE: Today we will release BinNavi 4.0.5 all 4.x customers can get the update. Mainly performance and bugfix release. http:// ...[2011-11-21] - 15:30:14 - Also, it was great to see Fyodor again. And Taipei is actually a really nice city; the heaps of coffee/tea shops around NTU are awesome.[2011-11-19] - 05:39:50 - @jvanegue 2) It's a very instructive example: It can be cut down to a single function, 60 lines, no heap, and is easily remembered.[2011-11-13] - 20:57:01 - Vista converted me to Ubuntu. 11.10, unity, and general trouble with wacom tablet set-up is now close to converting me to a different distro[2011-11-13] - 20:57:01 - Also, am I correct that there is *still* no patch for the true-type-font privilege escalation abused by Duqu ?[2011-11-04] - 18:22:54 - Won a significant bet about Duqu 0day. Successfully predicted it uses kernel font parsing bug. Happy for some reason.[2011-10-14] - 11:36:51 - RT @esizkur: No stack canaries in the iPhone 4S baseband, but heap protection? Unsure how effective that is...[2011-10-11] - 18:19:05 - So according to http://t.co/zum2Jdoj DigiTask charges 6k/month/victim for SSL decoding and Skype interception.[2011-10-11] - 18:19:05 - Is the variance of the linux kernel the reason that my laptop had to be taken into extra security checking 3 times in the last 5 months ?[2011-09-23] - 15:13:45 - RT @AdmVonSchneider: BinDiff and BinNavi now for sale in the EU. EULA += You understand and agree that you will not use the software f ...
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|