log Sensex logs 5th straight loss amid earnings, trade woes By www.financialexpress.com Published On :: 2019-05-08T02:22:00+05:30 The investors sentiment was also dented by the weak results reported by some of the heavyweights; the Street chose to stay cautious ahead of results from other blue chips given the trend so far has been somewhat mixed. Full Article Markets
log Encounter® RTL Compiler Hierarchical ILM (Interface Logic Model) Flow By feedproxy.google.com Published On :: Mon, 06 Jan 2014 12:38:00 GMT How to use Encounter® RTL Compiler support Interface Logic Models during synthesis.(read more) Full Article hierarchical VLSI implementation flows EDI synthesis tips for RTL compilers synthesis eda tools Interface Logic Model ILM RAK rtl compiler synthesis flow top-level synthesis rc routing resources at SoC level Placement Rapid Adoption Kits hierarchical synthesis
log Learn Logic built-in self-test (LBIST) macro generation and insertion at your desk By feedproxy.google.com Published On :: Wed, 16 Apr 2014 11:52:00 GMT Cadence offers a new Rapid Adoption Kit for logic built in self test tasks.(read more) Full Article Encounter Test Encounter DFT Architect RAK OPCG JTAG rtl compiler Encounter Diagnostic rc LBIST ATPG
log Skype Blog And Twitter Account Hacked By packetstormsecurity.com Published On :: Thu, 02 Jan 2014 14:44:43 GMT Full Article headline hacker microsoft skype syria
log Pirate Bay Co-Founder Named In Probe Into Logica, Tax Office Hacks By packetstormsecurity.com Published On :: Wed, 12 Sep 2012 04:08:08 GMT Full Article headline hacker riaa mpaa pirate sweden
log Oracle Distances Itself From CSO's Anti-Security Blog Rant By packetstormsecurity.com Published On :: Wed, 12 Aug 2015 14:00:50 GMT Full Article headline hacker database flaw oracle java
log Scientologist Overlord Declares Victory Over Anonymous By packetstormsecurity.com Published On :: Fri, 17 Dec 2010 16:26:25 GMT Full Article headline hacker religion
log Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:26:43 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY. Full Article
log Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
log elog_unix_win.c By packetstormsecurity.com Published On :: Wed, 23 Feb 2005 05:39:59 GMT ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat. Full Article
log Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
log LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
log Researcher Raids Browser History For Webmail Login Tokens By packetstormsecurity.com Published On :: Mon, 20 Jul 2009 18:12:43 GMT Full Article csrf
log Tenshi Log Monitoring Program 0.12 By packetstormsecurity.com Published On :: Sat, 18 Sep 2010 19:43:42 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.10 By packetstormsecurity.com Published On :: Sat, 29 Jan 2011 20:07:48 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.11 By packetstormsecurity.com Published On :: Sun, 26 Jun 2011 07:41:52 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
log Tenshi Log Monitoring Program 0.13 By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 00:33:12 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.20 By packetstormsecurity.com Published On :: Wed, 17 Aug 2011 14:31:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log iXKeyLog 0.1 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 23:40:52 GMT iXKeylog is an X11 keylogger for Unix that basically uses xlib to interact with the users keyboard. It will listen for certain X11 events and then trigger specific routines to handle these events. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.21 By packetstormsecurity.com Published On :: Tue, 27 Dec 2011 17:28:33 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.22 By packetstormsecurity.com Published On :: Fri, 10 Feb 2012 22:31:56 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log Tenshi Log Monitoring Program 0.14 By packetstormsecurity.com Published On :: Sun, 03 Jun 2012 17:11:51 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.3.0 By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 00:48:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log ZedLog 0.1 Beta By packetstormsecurity.com Published On :: Fri, 03 May 2013 19:22:22 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
log Xenotix Python Keylogger For Windows By packetstormsecurity.com Published On :: Tue, 07 May 2013 13:33:33 GMT Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely. Full Article
log ZedLog 0.2 Beta By packetstormsecurity.com Published On :: Tue, 14 May 2013 03:46:57 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
log ZedLog 0.2 Beta 2 By packetstormsecurity.com Published On :: Fri, 12 Jul 2013 18:23:22 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
log ZedLog 0.2 Beta 3 By packetstormsecurity.com Published On :: Mon, 15 Jul 2013 10:33:33 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.4.0 By packetstormsecurity.com Published On :: Wed, 07 Aug 2013 02:02:28 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log ZedLog 0.2 Beta 4 By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 17:55:55 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.5.0 By packetstormsecurity.com Published On :: Wed, 26 Feb 2014 05:12:18 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.5.1 By packetstormsecurity.com Published On :: Wed, 07 May 2014 15:19:10 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
log Tenshi Log Monitoring Program 0.15 By packetstormsecurity.com Published On :: Mon, 04 Aug 2014 21:59:56 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.6.0 By packetstormsecurity.com Published On :: Wed, 10 Dec 2014 00:03:38 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
log NIELD (Network Interface Events Logging Daemon) 0.6.1 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 23:23:23 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
log Tenshi Log Monitoring Program 0.16 By packetstormsecurity.com Published On :: Thu, 17 Aug 2017 13:47:24 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log Tenshi Log Monitoring Program 0.17 By packetstormsecurity.com Published On :: Fri, 20 Oct 2017 12:12:12 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
log Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt By packetstormsecurity.com Published On :: Mon, 27 Sep 2010 12:44:02 GMT Full Article iraq
log Disk Pulse Enterprise 9.0.34 Login Buffer Overflow By packetstormsecurity.com Published On :: Mon, 14 Nov 2016 17:18:22 GMT This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique. Full Article
log Buffett Testing Smart Grid Technology for Home Energy Management By feedproxy.google.com Published On :: 2014-12-17T19:36:00Z Warren Buffett wants to tell you the best time to wash your clothes. Or at least his energy company in the U.K does. Buffett’s Northern Powergrid Holdings Co. is working with Siemens AG to test a so-called smart grid that has the ability to control when consumer appliances will be used in the home. Full Article Storage Energy Efficiency Wind Power Solar
log RenewableEnergyWorld.com's Top 10 Blogs of 2014 By feedproxy.google.com Published On :: 2014-12-26T06:37:00Z We here at RenewableEnergyWorld.com would like to send a big "thank you" to our blogging community. Year after year, bloggers contribute content that is filled with valuable insights, up-to-date news, innovative project highlights and cool new technology updates. RenewableEnergyWorld.com bloggers are truly a crucial part of our website. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Off-Grid Wind Power Solar Geothermal
log Dynamic Tidal Power Technology Advances By feedproxy.google.com Published On :: 2015-01-13T13:27:00Z As an industrial powerhouse and the world’s largest energy consumer, China is fortunate to have abundant coal and hydropower resources. However, to meet demand in the east and south of the country, planners continue to seek new ways to generate local energy. In addition, plans call for development that reduces the use of fossil fuels as a way to also reduce air pollution. Full Article Hydropower Baseload O&M Wind Power Offshore
log Can Certain Geothermal Technologies Better Withstand Climate Change than Others? By feedproxy.google.com Published On :: 2013-12-11T13:00:00Z Nearly one month after Typhoon Haiyan ravaged the Philippines, affecting more than 12 million people and killing almost 6,000, many residents are still sitting in the dark. The Superstorm not only decimated the islands’ transmission systems, it knocked out one of its main power sources — geothermal. Full Article Baseload
log RenewableEnergyWorld.com's Top 10 Blogs of 2013 By feedproxy.google.com Published On :: 2013-12-31T06:02:00Z We here at RenewableEnergyWorld.com value each and every one of our excellent contributors that share their important and thought-provoking insights with our readers. But we have a special affinity for our outstanding blogging community. Full Article Baseload Storage Wind Power Solar
log Hydro technology information and research reports By feedproxy.google.com Published On :: 2014-11-20T20:12:00Z Collection of articles related to hydropower technology Full Article Hydropower
log Buffett Testing Smart Grid Technology for Home Energy Management By feedproxy.google.com Published On :: 2014-12-17T19:36:00Z Warren Buffett wants to tell you the best time to wash your clothes. Or at least his energy company in the U.K does. Buffett’s Northern Powergrid Holdings Co. is working with Siemens AG to test a so-called smart grid that has the ability to control when consumer appliances will be used in the home. Full Article Storage Energy Efficiency Wind Power Solar
log Past is Prologue: The Future of US and UK Arbitration By www.eversheds.com Published On :: 2017-05-02 Much has been said and written about the UK public’s decision in June 2016 to leave the European Union and the November 2016 election of President Donald Trump. It seems obvious that these momentous events will have profound socio-economic con... Full Article
log Mobile technology can improve access to healthcare in Nigeria – if it’s regulated By www.premiumtimesng.com Published On :: Sat, 09 May 2020 20:31:53 +0000 Evidence from low- and middle-income countries suggests that digital and mobile communication technology can improve management of diseases. The post Mobile technology can improve access to healthcare in Nigeria – if it’s regulated appeared first on Premium Times Nigeria. Full Article Features More News healhcare health health service delivery mConsulting services Mobile Health Mobile Technology Nigeria PREMIUM TIMES
log iRhythm Technologies, Inc. (IRTC) CEO Kevin King on Q1 2020 Results - Earnings Call Transcript By seekingalpha.com Published On :: Sun, 10 May 2020 02:45:07 -0400 Full Article IRTC SA Transcripts