en NIELD (Network Interface Events Logging Daemon) 0.4.0 By packetstormsecurity.com Published On :: Wed, 07 Aug 2013 02:02:28 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
en NIELD (Network Interface Events Logging Daemon) 0.5.0 By packetstormsecurity.com Published On :: Wed, 26 Feb 2014 05:12:18 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
en NIELD (Network Interface Events Logging Daemon) 0.5.1 By packetstormsecurity.com Published On :: Wed, 07 May 2014 15:19:10 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
en Tenshi Log Monitoring Program 0.15 By packetstormsecurity.com Published On :: Mon, 04 Aug 2014 21:59:56 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
en NIELD (Network Interface Events Logging Daemon) 0.6.0 By packetstormsecurity.com Published On :: Wed, 10 Dec 2014 00:03:38 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
en NIELD (Network Interface Events Logging Daemon) 0.6.1 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 23:23:23 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
en Tenshi Log Monitoring Program 0.16 By packetstormsecurity.com Published On :: Thu, 17 Aug 2017 13:47:24 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
en Tenshi Log Monitoring Program 0.17 By packetstormsecurity.com Published On :: Fri, 20 Oct 2017 12:12:12 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
en Notorious eBay Hacker Gets 3-Year Suspended Sentence By packetstormsecurity.com Published On :: Thu, 03 Nov 2011 06:37:18 GMT Full Article headline hacker ebay
en Teen Drops $33K On Wikileaks Server Using Dad's Ebay Account By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 02:17:27 GMT Full Article headline data loss ebay sweden
en eBay Redirect Attack Puts Buyers' Credentials At Risk By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 23:27:59 GMT Full Article headline hacker flaw ebay
en Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
en Blackhats Using Mystery Magento Card Stealers By packetstormsecurity.com Published On :: Mon, 29 Jun 2015 14:01:12 GMT Full Article headline bank cybercrime fraud flaw ebay
en The Three Amigos Offer Sanctuary To Cornered NSA Leaker Snowden By packetstormsecurity.com Published On :: Mon, 08 Jul 2013 15:10:18 GMT Full Article headline government privacy usa data loss spyware venezuela nsa
en It's Time To Encrypt The Entire Internet By packetstormsecurity.com Published On :: Thu, 17 Apr 2014 22:32:08 GMT Full Article headline privacy data loss ssl cryptography
en Chrome Has A Different Take On Certificate Revocation By packetstormsecurity.com Published On :: Tue, 22 Apr 2014 15:09:19 GMT Full Article headline privacy flaw google ssl chrome cryptography
en Tech Giants Spend Millions To Stop Another Heartbleed By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:37 GMT Full Article headline microsoft flaw google ssl facebook cryptography
en Siemens Patching Heartbleed Affected Products By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 23:43:09 GMT Full Article headline privacy data loss flaw ssl scada cryptography
en OpenSSL Man In The Middle Flaw Found After 16 Years By packetstormsecurity.com Published On :: Fri, 06 Jun 2014 12:47:38 GMT Full Article headline privacy flaw ssl cryptography
en Android 4.4.4 Kitkat Unexpectedly Arrives With OpenSSL Fix By packetstormsecurity.com Published On :: Fri, 20 Jun 2014 15:38:31 GMT Full Article headline phone flaw google patch ssl
en Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
en IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
en Elcomsoft Verdict Weakens the DMCA By packetstormsecurity.com Published On :: Wed, 18 Dec 2002 21:26:29 GMT Full Article dmca
en DMCA Strikes Again - First Amendment Does Not Apply By packetstormsecurity.com Published On :: Thu, 10 Apr 2003 04:35:11 GMT Full Article dmca
en E-Voting Vendor Sued For DMCA Takedown By packetstormsecurity.com Published On :: Tue, 04 Nov 2003 01:16:59 GMT Full Article dmca
en DMCA Fails to Stop Garage Door Opener By packetstormsecurity.com Published On :: Fri, 14 Nov 2003 05:50:10 GMT Full Article dmca
en Kazaa Threatens Google with DMCA Letter By packetstormsecurity.com Published On :: Mon, 08 Dec 2003 12:51:49 GMT Full Article google dmca
en US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
en Intelligence Official Offers New Timeline For Benghazi Attack By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:10:00 GMT Full Article headline government usa terror libya
en Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
en Iraq Base Plans Left On Open Servers By packetstormsecurity.com Published On :: Mon, 16 Jul 2007 15:58:34 GMT Full Article iraq
en Iraq Government Launches Its Own Channel On YouTube By packetstormsecurity.com Published On :: Wed, 25 Nov 2009 01:58:19 GMT Full Article government iraq
en Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen? By packetstormsecurity.com Published On :: Fri, 15 Oct 2010 15:05:16 GMT Full Article iraq
en Social-Media Battle Augments Iraq Bloodshed By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 01:32:47 GMT Full Article headline iraq facebook social twitter terror
en Variety Jones, Alleged Silk Road Mentor, Arrested In Thailand By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:02:54 GMT Full Article headline thailand
en Microsoft Is Helping Thai Military Government Spy On Web Users By packetstormsecurity.com Published On :: Thu, 26 Jan 2017 15:08:13 GMT Full Article headline government privacy microsoft spyware thailand
en Hackers Disrupt 51 Malaysian Government Websites By packetstormsecurity.com Published On :: Thu, 16 Jun 2011 10:52:16 GMT Full Article headline hacker government malaysia
en Cert Stolen From Malaysian Government Used To Sign Malware By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 06:02:04 GMT Full Article headline government malware ssl malaysia
en Malaysian Election Sparks Denial Of Service By packetstormsecurity.com Published On :: Thu, 09 May 2013 15:07:38 GMT Full Article headline government denial of service malaysia
en Malaysia-Based Credit Card Fraud Ring Broken, 105 Arrested By packetstormsecurity.com Published On :: Sat, 09 Jul 2016 02:56:15 GMT Full Article headline bank cybercrime fraud malaysia
en It Sounds Like Everyone In Malaysia Has Been Pwned By packetstormsecurity.com Published On :: Thu, 02 Nov 2017 15:22:39 GMT Full Article headline hacker government privacy data loss malaysia
en NTharden.pdf By packetstormsecurity.com Published On :: Sun, 27 Aug 2006 23:00:39 GMT Whitepaper discussing the hardening of Windows NT. Full Article
en NBTEnum33.zip By packetstormsecurity.com Published On :: Wed, 29 Nov 2006 02:41:50 GMT NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included. Full Article
en Terminal Server License Bypass By packetstormsecurity.com Published On :: Mon, 11 Jan 2010 22:21:23 GMT This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server. Full Article
en Disk Pulse Enterprise 9.0.34 Login Buffer Overflow By packetstormsecurity.com Published On :: Mon, 14 Nov 2016 17:18:22 GMT This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique. Full Article
en Disk Pulse Enterprise 9.9.16 GET Buffer Overflow By packetstormsecurity.com Published On :: Thu, 21 Sep 2017 00:43:18 GMT This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Full Article
en South Africa Seeks to Improve Process for Renewable Energy Deals By feedproxy.google.com Published On :: 2014-08-27T15:53:00Z South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects. Full Article Hydropower Baseload Bioenergy Wind Power Solar Geothermal
en Expect $1.6 Trillion in Clean Energy Investments Through 2020, Says IEA By feedproxy.google.com Published On :: 2014-08-28T14:32:00Z Investments in new clean-energy capacity will total $1.61 trillion through 2020 even as the expansion of renewables is expected to slow, the International Energy Agency said. Full Article Wind Power Solar
en Eco Wave to Raise $5 Million to Accelerate Ocean Energy Plans By feedproxy.google.com Published On :: 2014-09-03T10:59:00Z Eco Wave Power, based in Israel, plans to raise $5 million by the end of the year to further develop its technology and projects that harness the power of the ocean to generate electricity. Full Article
en Ten Clean Energy Stocks for 2014: September Update and Thoughts on the Finavera Deal By feedproxy.google.com Published On :: 2014-09-08T15:00:00Z Clean energy stocks and the market in general rebounded strongly in August. My broad market benchmark of small cap stocks, IWM, rose 4.5 percent, returning to positive territory up 1.7 percent for the year. My clean energy benchmark PBW also jumped back into the black with an 11.1 percent gain for the month and 10.8 percent for the year to date. Full Article Hydropower Baseload Storage Bioenergy Wind Power Opinion & Commentary Solar Geothermal