the Brown is the New Black By indiauncut.com Published On :: 2007-11-11T20:01:00+00:00 I’m coming to the party late—last weekend, for the first but not the last time, I watched Manish Acharya’s comedy, Loins of Punjab Presents. Behan____, what a film! I will not rehearse the synopsis or plot, partly because of the lateness of the hour, but also because it is available here. Instead, let me note quickly that the comedy keeps ticking, and the attention to detail in all matters, from the plot to the casting, makes this film a pleasure to watch. Let me use one scene to make a point about where the film is coming from. Ishitta Sharma, playing a demure, Gujju girl called Preeti Patel, is one of the competitors in the Desi Idol competition in New Jersey. We have watched her sing beautifully, and we have watched her stay silent, eyes downcast, as her family-members make fools of themselves. But there’s a moment later in the film, when an older, wily competitor, played with classy ease by Shabana Azmi, tries to manipulate her. And suddenly, in the blink of an eye, Preeti Patel turns upon the Shabana character. It’s as if she always had a dagger hiding in her hand. When I saw that, I thought that there was a similar strength in the movie I was watching. It’s all laughs but it has a quicksilver intelligence within. It is a declaration of independence by the desi diaspora—and what is great is that it celebrates this freedom by mocking, and loving, almost everything in sight. Rave Out © 2007 IndiaUncut.com. All rights reserved. India Uncut * The IU Blog * Rave Out * Extrowords * Workoutable * Linkastic Full Article
the The Desperate Passion of Ben Foster By indiauncut.com Published On :: 2008-08-11T10:53:01+00:00 I could barely recognize Ben Foster in 3:10 to Yuma, but I was blown away just the same by him as in his star making turn from Hostage. What makes Foster so special in Yuma? Yuma contains two of Hollywood’s finest: Russell Crowe and Christian Bale. Bale is excellent, Crowe a little too relaxed to be cock-sure-dangerous. Both are unable to provide the powder-keg relationship that the movie demands. Into this void steps Ben Foster. He plays Charlie Prince, sidekick to Crowe’s dangerous and celebrated outlaw Ben Wade. When Wade is captured, Prince is infuriated. He initiates an effort suffused with desperate passion to rescue his boss. Playing Prince with a mildly effeminate gait, Foster quickly becomes the movie’s beating heart. What struck me in particular was that Foster was able to balance method acting with just plain good acting. He plays his character organically but isn’t above drawing attention with controlled staginess. Gradually, Foster’s willingness to control a scene blend in with that of Prince’s. Is the character manipulating his circumstances in the movie or is it the actor playing a fine hand? Foster is so entertaining, the answer is immaterial. Rave Out © 2007 IndiaUncut.com. All rights reserved. India Uncut * The IU Blog * Rave Out * Extrowords * Workoutable * Linkastic Full Article
the The Hard Edges of Modern Lives By indiauncut.com Published On :: 2009-03-20T08:26:00+00:00 This new film is the latest remake of Devdas, but what is equally interesting is the fact that it is in conversation with films made in the West. Unlike Bhansali’s more spectacular version of the older story, Anurag Kashyap’s Dev.D is a genuine rewriting of Sarat Chandra’s novel. Kashyap doesn’t flinch from depicting the individual’s downward spiral, but he also gives women their own strength. He has set out to right a wrong—or, at least, tell a more realistic, even redemptive, story. If these characters have lost some of the affective depth of the original creations, they have also gained the hard edges of modern lives. We don’t always feel the pain of Kashyap’s characters, but we are able to more readily recognize them. Take Chandramukhi, or Chanda, who is a school-girl humiliated by the MMS sex-scandal. Her father, protective and patriarchal, says that he has seen the tape and thinks she knew what she was doing. “How could you watch it?” the girl asks angrily. And then, “Did you get off on it?” When was the last time a father was asked such a question on the Hindi screen? With its frankness toward sex and masturbation, Dev.D takes a huge step toward honesty. In fact, more than the obvious tributes to Danny Boyle’s Trainspotting, or the over-extended psychedelic adventure on screen, in fact, as much as the moody style of film-making, the candour of such questions make Dev.D a film that is truly a part of world cinema. Rave Out © 2007 IndiaUncut.com. All rights reserved. India Uncut * The IU Blog * Rave Out * Extrowords * Workoutable * Linkastic Full Article
the This Video Hurts the Sentiments of Hindu’s [sic] Across the World By indiauncut.com Published On :: 2009-10-27T07:22:01+00:00 I loved Nina Paley’s brilliant animated film Sita Sings the Blues. If you’re reading this, stop right now—and watch the film here. Paley has set the story of the Ramayana to the 1920s jazz vocals of Annette Hanshaw. The epic tale is interwoven with Paley’s account of her husband’s move to India from where he dumps her by e-mail. The Ramayana is presented with the tagline: “The Greatest Break-Up Story Ever Told.” All of this should make us curious. But there are other reasons for admiring this film: The film returns us to the message that is made clear by every village-performance of the Ramlila: the epics are for everyone. Also, there is no authoritative narration of an epic. This film is aided by three shadow puppets who, drawing upon memory and unabashedly incomplete knowledge, boldly go where only pundits and philosophers have gone before. The result is a rendition of the epic that is gloriously a part of the everyday. This idea is taken even further. Paley says that the work came from a shared culture, and it is to a shared culture that it must return: she has put the film on Creative Commons—viewers are invited to distribute, copy, remix the film. Of course, such art drives the purists and fundamentalists crazy. On the Channel 13 website, “Durgadevi” and “Shridhar” rant about the evil done to Hinduism. It is as if Paley had lit her tail (tale!) and set our houses on fire! Rave Out © 2007 IndiaUncut.com. All rights reserved. India Uncut * The IU Blog * Rave Out * Extrowords * Workoutable * Linkastic Full Article
the Boost Productivity With Synthesis, Test and Verification Flow Rapid Adoption Kits (RAKs) By feedproxy.google.com Published On :: Tue, 24 Jul 2012 12:36:00 GMT A focus on customer enablement across all Cadence sub-organizations has led to a cross-functional effort to identify opportunities to bring our customers to proficiency with our products and flows. Hence, Rapid Adoption Kits -- RAKs -- for Synthesis...(read more) Full Article conformal EDI Encounter Test customer enablement LEC Incisive Enterprise Simulator Incisive Incisive Unified Simulation Test Logic Design rtl compiler Logic synthesis ATPG Synthesis Rapid Adoption Kits RAKs verification
the Surveillance A La Skype: EFF, Others Seek Answers By packetstormsecurity.com Published On :: Thu, 24 Jan 2013 16:08:45 GMT Full Article headline government privacy microsoft usa data loss spyware skype
the European Data Watchdog Investigates Skype Leaks To The NSA By packetstormsecurity.com Published On :: Fri, 11 Oct 2013 21:35:15 GMT Full Article headline government privacy microsoft data loss spyware skype nsa
the Skype, Signal, Slack, Other Apps Inherit Electron Vuln By packetstormsecurity.com Published On :: Wed, 24 Jan 2018 16:51:54 GMT Full Article headline phone flaw skype
the Assange's Options: How Could He Escape The UK? By packetstormsecurity.com Published On :: Mon, 20 Aug 2012 15:37:26 GMT Full Article headline government usa britain data loss sweden
the Julian Assange Will Get His Day In Court.. In The Embassy? By packetstormsecurity.com Published On :: Tue, 15 Dec 2015 15:01:17 GMT Full Article headline government britain data loss sweden
the Is Nokia Man-In-The-Middling SSL Traffic On Phones? By packetstormsecurity.com Published On :: Wed, 09 Jan 2013 15:59:52 GMT Full Article headline privacy bank fraud ssl nokia
the Nokia Is Accused Of Leaking Finnish Data To The US By packetstormsecurity.com Published On :: Tue, 25 Feb 2014 16:01:13 GMT Full Article headline government privacy usa phone data loss finland nokia
the Most Consumers Reuse Banking Passwords On Other Sites By packetstormsecurity.com Published On :: Tue, 02 Feb 2010 05:26:33 GMT Full Article bank survey password
the US Dodges The Question Of Whether Its Military Built Stuxnet By packetstormsecurity.com Published On :: Mon, 30 May 2011 07:42:50 GMT Full Article headline government usa worm
the Rare AutoCAD Worm Lifted Blueprints From Peru, Sent Them To China By packetstormsecurity.com Published On :: Fri, 22 Jun 2012 03:47:39 GMT Full Article headline malware china cybercrime flaw worm
the Analysis Of The Skype Worm By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 01:56:17 GMT Full Article headline worm skype
the Is Mexican Cartel The Next 'Anonymous' Target? By packetstormsecurity.com Published On :: Wed, 02 Nov 2011 23:04:55 GMT Full Article headline anonymous mexico
the 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
the Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
the Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
the Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece
the John The Ripper 1.7.3.4 By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 17:26:16 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
the John The Ripper 1.7.4 By packetstormsecurity.com Published On :: Wed, 30 Dec 2009 06:00:36 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
the John The Ripper 1.7.5 By packetstormsecurity.com Published On :: Fri, 26 Feb 2010 19:07:15 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
the John The Ripper 1.7.6 By packetstormsecurity.com Published On :: Wed, 16 Jun 2010 01:48:44 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.6 Jumbo 11 By packetstormsecurity.com Published On :: Tue, 08 Feb 2011 04:49:46 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.6 Jumbo 12 By packetstormsecurity.com Published On :: Wed, 16 Feb 2011 19:22:11 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Thu, 28 Apr 2011 12:12:12 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Fri, 29 Apr 2011 03:51:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.7 Jumbo 5 By packetstormsecurity.com Published On :: Fri, 03 Jun 2011 20:22:22 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.7 Jumbo 6 By packetstormsecurity.com Published On :: Thu, 09 Jun 2011 15:46:26 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
the John The Ripper 1.7.8 By packetstormsecurity.com Published On :: Fri, 24 Jun 2011 09:05:49 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.8 Jumbo 2 By packetstormsecurity.com Published On :: Tue, 05 Jul 2011 00:27:53 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.8 Jumbo 4 By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:32:20 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.8 Jumbo 5 By packetstormsecurity.com Published On :: Thu, 04 Aug 2011 00:04:00 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.8 Jumbo 7 By packetstormsecurity.com Published On :: Thu, 22 Sep 2011 05:56:59 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.8 Jumbo 8 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:42:41 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.9 By packetstormsecurity.com Published On :: Sun, 27 Nov 2011 18:09:38 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.9 Jumbo 5 By packetstormsecurity.com Published On :: Mon, 19 Dec 2011 02:25:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.9 Jumbo 6 By packetstormsecurity.com Published On :: Mon, 02 Jul 2012 23:53:25 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.7.9 Jumbo 7 By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:17:27 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the John The Ripper 1.8.0 By packetstormsecurity.com Published On :: Fri, 31 May 2013 02:49:42 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
the Opera Update Draws The Curtain On Seven Security Vulns By packetstormsecurity.com Published On :: Thu, 21 Aug 2008 11:31:43 GMT Full Article opera
the Hackers Use Opera As Defense Against Other Cybercriminals By packetstormsecurity.com Published On :: Fri, 21 Aug 2009 05:18:26 GMT Full Article hacker privacy cybercrime opera
the Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
the Osama bin Laden, The Face Of Terror, Killed In Pakistan By packetstormsecurity.com Published On :: Mon, 02 May 2011 03:28:24 GMT Full Article headline pakistan terror
the How The U.S. Tracked Down bin Laden By packetstormsecurity.com Published On :: Mon, 02 May 2011 14:35:35 GMT Full Article headline usa pakistan terror
the Deep Inside The CIA's Targeted Killings By packetstormsecurity.com Published On :: Wed, 10 Apr 2013 02:18:37 GMT Full Article headline government usa pakistan terror cia
the eBay Makes Users Change Their Passwords After Hack By packetstormsecurity.com Published On :: Wed, 21 May 2014 15:11:50 GMT Full Article headline hacker data loss password ebay
the Cyber-Theft Hits eBay's Stubhub By packetstormsecurity.com Published On :: Wed, 23 Jul 2014 15:05:06 GMT Full Article headline cybercrime fraud ebay