 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour stevewerby |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "stevewerby" (828 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter stevewerby[2012-10-09] - 00:50:17 - Because of RFID tag tracking of students in San Antonio (http://t.co/7baBcWoZ), I'm seeing these. http://t.co/6S7M0oeI http://t.co/fu9rWnEo[2012-10-09] - 00:50:17 - @biosshadow It would have been nice if the journalists sought out opinions from those at schools which have used RFID for years.[2012-10-07] - 11:53:25 - I just realized I never notified a web service with an interesting XSS vuln. It's been a year. It has to have been fixed by now (or not).[2012-10-06] - 15:07:08 - @rmogull @attritionorg Is PenTest theirs?[2012-10-05] - 20:57:35 - @Ben0xA @cj1171 @HackerHuntress @Secureholio I *averaged* 4.3 hours of sleep at Defcon, Derby and SecTor. No conflu. Power of + thinking![2012-10-05] - 20:57:35 - RT @Hakin9 Hakin9 has made a statement concerning the Nmap article - http://t.co/qtqAkpm6 = Can't wait for details on how it was published.[2012-10-05] - 20:57:35 - @danielkennedy74 Great question. Editors need not be SMEs to detect gibberish like what was throughout the Nmap guide.[2012-10-03] - 14:23:16 - @Chimerically Haha! I can't wait to see INT OVERFLOW people viewed your profile in the past week[2012-10-02] - 19:30:52 - My presentation Wednesday at 1:25, Building Dictionaries and Destroying Hashes Using Amazon EC2 is still on. #sectorca[2012-10-02] - 19:30:52 - Full house and then some for @sussurro's Getting Shells When Metasploit Fails. #sectorca http://t.co/TedzsZy7[2012-10-02] - 19:30:52 - @0xcharlie described an NFC protocol attack vector of replacing tags. Even harder to detect than rogue QR codes I've been testing. #sectorca[2012-10-02] - 04:50:55 - I'm pretty sure there's a problem with Figure 1.2 of the Hakin9 Nmap Guide. Shouldn't work factor be measured in pistons, not cylinders?[2012-10-02] - 04:50:55 - @mubix @sempf You can also use hashcat-lite if you have an adequate GPU. On an EC2 GPU VM it can enumerate 4 billion attempts/second.[2012-09-21] - 11:51:08 - Ran 3 miles in 22:44 (7:34 pace). 135 pulse. Big difference running in 80 degree San Antonio sun vs. 57 degree clouds in Seattle.[2012-09-21] - 11:51:08 - I'm looking for specs, cost, and password cracking performance of single and multi GPU boxes for my Derby presentation. Have input?[2012-09-20] - 10:48:50 - Props to Microsoft for releasing Fix It Tool as stop-gap mitigation for IE 0-day. http://t.co/LCtFcEeC[2012-09-19] - 11:47:32 - RT @RSnake Finally got around to donating the XSS cheat sheet to @OWASP http://t.co/romddpWI Now everyone can edit/modify at will.[2012-09-18] - 12:44:29 - RT @chrissullo Happy to announce, at long last, Nikto 2.1.5! http://t.co/2BkWDeQk[2012-09-14] - 01:47:59 - Great point by @oshezaf that pentesters rarely fuzz headers, but with their use in RESTful services they should. #srcsea[2012-09-10] - 00:26:17 - I'm juggling local VMs and cloud VMs and trying to keep the architectures and OS distros straight as I power-multitask.[2012-09-10] - 00:26:17 - I want to process a million line file. Faster way? for LINE in $(cat in.txt); do echo -n $LINE | md5sum | awk '{print $1}'; done out.txt[2012-09-07] - 11:18:20 - New attack vector? Chocolate QR code + a little social engineering = pwn3d smartphone. http://t.co/H5d34ahQ[2012-09-06] - 11:40:29 - NOVA - Network Obfuscation and Virtualized Anti-Reconnaissance system. http://t.co/dJnXpXnr (via @strandjs)[2012-09-06] - 11:40:29 - Ah, the birth control keypad. This phone rocked when I got in 2003. Video capture, Bluetooth tethering, Symbian OS. http://t.co/jvxvvYzO[2012-09-06] - 11:40:29 - @jadedsecurity @attritionorg @chriseng @textfiles little HD space I ran Stacker, removed parts of DOS, and loaded files for DL on a floppy.[2012-08-14] - 07:05:08 - RT @0xjudd BackTrack 5 R3 Released! http://t.co/sjBZ3ec1 ~ w00t w00t[2012-08-13] - 05:34:22 - @threatagent @0xjudd That's my take too - it's of value when mandated or as a proxy for knowledge/experience.[2012-08-13] - 05:34:22 - I even use my industrial engineering background at the beach. http://t.co/X9cExBoP[2012-08-10] - 02:20:13 - RT @LayeredTech: Layered Tech acquires New World Apps for FISMA-compliant cloud solutions. Welcome aboard our new colleagues! http://t.c ...[2012-08-02] - 00:46:57 - Prop tips from social engineering hackers. http://t.co/phRe9f1S[2012-08-02] - 00:46:57 - Congratulations to @Tactical_Intel for earning his 2nd Defcon black badge for crushing the checklist and winning the SECTF.[2012-07-31] - 21:12:12 - One of my favorite parts of Defcon is trying to piece together where I got all of the business cards I collected.[2012-07-30] - 20:02:05 - RT @ZeroDayLab Is Ubisoft's DRM browser plugin a rootkit?: An offhand remark made by Google engineer Tavis Ormandy... http://t.co/Q4Deviwd[2012-07-21] - 23:39:25 - @syntaxerr66 No one came up close to take a pic of the board until my SQLi tweet. Then 2 people did and employees stared at it quizzically.[2012-07-17] - 07:13:39 - Watch @carsteneiram's thought-provoking RVAsec presentation Code Maturity: Is SDL a Waste of Time? http://t.co/d7jrWEdy[2012-07-16] - 14:54:25 - RT @attritionorg Attrition, DEFCON 20, and a Bit of Advice - http://t.co/GsL7G20X[2012-07-15] - 18:10:41 - I support @KdotCdot's stance on sexism against women at Defcon but I'm concerned the warning cards will be ineffective. http://t.co/nZLH8DPz[2012-07-15] - 18:10:41 - And lest you think I'm just being pessimistic, I think @KdotCdot's Defcon card idea is great and can be tweaked to get a better outcome.[2012-07-15] - 18:10:41 - I need @Wh1t3Rabbit's WPA2 key so I can get on the interwebs. Any help? http://t.co/d5r0pfJK[2012-07-01] - 15:13:26 - @cbyrd01 Will do. I already planned to go to BSidesLV and DefCon. Multitasking is second nature.[2012-06-30] - 20:24:19 - New release of John the Ripper. Integrated GPU support added; supports more hash types. http://t.co/qDoq1YRi[2012-06-29] - 18:31:32 - Sipping a Lips Of Faith La Folie on the balcony while developing a plan to encrypt thousands of laptops by August 31.[2012-06-28] - 23:33:11 - Ethical Cyberstalking and Ethical Botnet Management courses appear to be untapped niches.[2012-06-26] - 12:10:43 - Failed login account locking is a DDoS enabler. 2FA seems to be a way to loosen or eliminate that control, yet reduce risk.[2012-06-25] - 02:29:58 - Equilibrium: 52 laps in the pool and a few sips of Maui La Perouse White every 4 laps. http://t.co/OPPwfivn[2012-06-17] - 02:46:54 - Always ask the cloud provider about scope of security assessments and remediation. No one ever does. -@adamely #rvasec[2012-06-07] - 08:42:56 - RT @securityerrata: Dear @Vupen, we have received reports that your site was compromised and ~ 130 0-day stolen this year. Any comment? ...[2012-06-04] - 12:48:38 - RT @jnreich: The new Collusion for Chrome by @disconnectme shows the sites that secretly track you, and now, blocks 850 of them: https:/ ...[2012-06-01] - 16:01:28 - Apple's whitepaper on iOS security covers architecture, data protection, NW sec and device access. http://t.co/Zkrf2e0r (via @dinodaizovi)[2012-05-28] - 08:05:36 - @RafalLos I'm aching just thinking about it. If we both bump our distance up (I haven't done 7 miles in a year) we can do the DEFCON20 20k.[2012-05-25] - 13:13:47 - Yahoo leaks its own private key via new Axis Chrome extension. http://t.co/lc1H2xWF (by @theJoshMeister)[2012-05-25] - 13:13:47 - @georgevhulme @joshcorman I'm working with a colleague on one now that involves researching effectiveness of a class of social engineering..
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|