log

Sensex logs 5th straight loss amid earnings, trade woes

The investors sentiment was also dented by the weak results reported by some of the heavyweights; the Street chose to stay cautious ahead of results from other blue chips given the trend so far has been somewhat mixed.




log

Encounter® RTL Compiler Hierarchical ILM (Interface Logic Model) Flow

How to use Encounter® RTL Compiler support Interface Logic Models during synthesis.(read more)








log

Scientologist Overlord Declares Victory Over Anonymous




log

Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service

win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY.




log

Oracle Weblogic Apache Connector POST Request Buffer Overflow

This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header.




log

elog_unix_win.c

ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.





log

LPRng use_syslog Remote Format String Vulnerability

This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin".




log

Researcher Raids Browser History For Webmail Login Tokens




log

Tenshi Log Monitoring Program 0.12

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

NIELD (Network Interface Events Logging Daemon) 0.10

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.




log

NIELD (Network Interface Events Logging Daemon) 0.11

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.




log

Tenshi Log Monitoring Program 0.13

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

NIELD (Network Interface Events Logging Daemon) 0.20

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

iXKeyLog 0.1

iXKeylog is an X11 keylogger for Unix that basically uses xlib to interact with the users keyboard. It will listen for certain X11 events and then trigger specific routines to handle these events.




log

NIELD (Network Interface Events Logging Daemon) 0.21

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

NIELD (Network Interface Events Logging Daemon) 0.22

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

NIELD (Network Interface Events Logging Daemon) 0.23

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

Tenshi Log Monitoring Program 0.14

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

NIELD (Network Interface Events Logging Daemon) 0.3.0

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

ZedLog 0.1 Beta

ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.




log

Xenotix Python Keylogger For Windows

Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely.




log

ZedLog 0.2 Beta

ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.




log

ZedLog 0.2 Beta 2

ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.




log

ZedLog 0.2 Beta 3

ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.




log

NIELD (Network Interface Events Logging Daemon) 0.4.0

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

ZedLog 0.2 Beta 4

ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.




log

NIELD (Network Interface Events Logging Daemon) 0.5.0

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.




log

NIELD (Network Interface Events Logging Daemon) 0.5.1

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control.




log

Tenshi Log Monitoring Program 0.15

tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

NIELD (Network Interface Events Logging Daemon) 0.6.0

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control.




log

NIELD (Network Interface Events Logging Daemon) 0.6.1

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control.




log

Tenshi Log Monitoring Program 0.16

tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

Tenshi Log Monitoring Program 0.17

tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.




log

Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt




log

Disk Pulse Enterprise 9.0.34 Login Buffer Overflow

This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique.




log

Buffett Testing Smart Grid Technology for Home Energy Management

Warren Buffett wants to tell you the best time to wash your clothes. Or at least his energy company in the U.K does. Buffett’s Northern Powergrid Holdings Co. is working with Siemens AG to test a so-called smart grid that has the ability to control when consumer appliances will be used in the home.




log

RenewableEnergyWorld.com's Top 10 Blogs of 2014

We here at RenewableEnergyWorld.com would like to send a big "thank you" to our blogging community. Year after year, bloggers contribute content that is filled with valuable insights, up-to-date news, innovative project highlights and cool new technology updates. RenewableEnergyWorld.com bloggers are truly a crucial part of our website.




log

Dynamic Tidal Power Technology Advances

As an industrial powerhouse and the world’s largest energy consumer, China is fortunate to have abundant coal and hydropower resources. However, to meet demand in the east and south of the country, planners continue to seek new ways to generate local energy. In addition, plans call for development that reduces the use of fossil fuels as a way to also reduce air pollution.




log

Can Certain Geothermal Technologies Better Withstand Climate Change than Others?

Nearly one month after Typhoon Haiyan ravaged the Philippines, affecting more than 12 million people and killing almost 6,000, many residents are still sitting in the dark. The Superstorm not only decimated the islands’ transmission systems, it knocked out one of its main power sources — geothermal.




log

RenewableEnergyWorld.com's Top 10 Blogs of 2013

We here at RenewableEnergyWorld.com value each and every one of our excellent contributors that share their important and thought-provoking insights with our readers. But we have a special affinity for our outstanding blogging community.




log

Hydro technology information and research reports

Collection of articles related to hydropower technology




log

Buffett Testing Smart Grid Technology for Home Energy Management

Warren Buffett wants to tell you the best time to wash your clothes. Or at least his energy company in the U.K does. Buffett’s Northern Powergrid Holdings Co. is working with Siemens AG to test a so-called smart grid that has the ability to control when consumer appliances will be used in the home.




log

Past is Prologue: The Future of US and UK Arbitration

Much has been said and written about the UK public’s decision in June 2016 to leave the European Union and the November 2016 election of President Donald Trump. It seems obvious that these momentous events will have profound socio-economic con...




log

Mobile technology can improve access to healthcare in Nigeria – if it’s regulated

Evidence from low- and middle-income countries suggests that digital and mobile communication technology can improve management of diseases.

The post Mobile technology can improve access to healthcare in Nigeria – if it’s regulated appeared first on Premium Times Nigeria.




log

iRhythm Technologies, Inc. (IRTC) CEO Kevin King on Q1 2020 Results - Earnings Call Transcript