Jump to content

Fi8sVrs

Active Members
  • Posts

    3206
  • Joined

  • Days Won

    87

Everything posted by Fi8sVrs

  1. Top 10 DLL files with largest number of icons [table=width: 500, class: grid, align: center] [tr] [td]Filenametd[/td] [td]Description[/td] [td]Number of Icons[/td] [/tr] [tr] [td]shell32.dll[/td] [td]Windows Shell Common Dll[/td] [td]306[/td] [/tr] [tr] [td]imageres.dll[/td] [td]Windows Image Resource[/td] [td]218[/td] [/tr] [tr] [td]wmploc.DLL[/td] [td]Windows Media Player Resources[/td] [td]208[/td] [/tr] [tr] [td]netshell.dll[/td] [td]Network Connections Shell[/td] [td]164[/td] [/tr] [tr] [td]mmcndmgr.dll [/td] [td]MMC Node Manager DLL[/td] [td]129[/td] [/tr] [tr] [td]moricons.dll[/td] [td]Windows NT Setup Icon Resources Library[/td] [td]113[/td] [/tr] [tr] [td]ieframe.dll[/td] [td]Internet Browser[/td] [td]105[/td] [/tr] [tr] [td]compstui.dll[/td] [td]Common Property Sheet User Interface DLL[/td] [td]101[/td] [/tr] [tr] [td]DDORes.dll[/td] [td]Device Category information and resources[/td] [td]81[/td] [/tr] [tr] [td]pnidui.dll[/td] [td]Network System Icon[/td] [td]59[/td] [/tr] [/table] Top 10 DLL files with largest number of Bitmap Images [table=width: 500, class: grid, align: center] [tr] [td]Filename[/td] [td]Description[/td] [td]Number of bitmaps[/td] [/tr] [tr] [td]wmploc.DLL[/td] [td]Windows Media Player Resources[/td] [td]400[/td] [/tr] [tr] [td]UIRibbonRes.dll[/td] [td]Windows Ribbon Framework Resources[/td] [td]234[/td] [/tr] [tr] [td]ieframe.dll[/td] [td]Internet Browser[/td] [td]215[/td] [/tr] [tr] [td]authui.dll[/td] [td]Windows Authentication UI[/td] [td]113[/td] [/tr] [tr] [td]wdc.dll[/td] [td]Performance Monitor[/td] [td]55[/td] [/tr] [tr] [td]ExplorerFrame.dll [/td] [td]ExplorerFrame[/td] [td]52[/td] [/tr] [tr] [td]UIRibbon.dll[/td] [td]Windows Ribbon Framework[/td] [td]45[/td] [/tr] [tr] [td]shell32.dll[/td] [td]Windows Shell Common Dll[/td] [td]39[/td] [/tr] [tr] [td]spwizimg.dll[/td] [td]Setup Wizard Framework Resources[/td] [td]36[/td] [/tr] [tr] [td]Display.dll[/td] [td]Display Control Panel[/td] [td]30[/td] [/tr] [/table] Top 10 DLL files with largest number of dialogue boxes [table=width: 500, class: grid, align: center] [tr] [td]Filename[/td] [td]Description[/td] [td]Number of Dialogue Boxes[/td] [/tr] [tr] [td]wmploc.DLL[/td] [td]Windows Media Player Resources[/td] [td]128[/td] [/tr] [tr] [td]ieframe.dll[/td] [td]Internet Browser[/td] [td]113[/td] [/tr] [tr] [td]shell32.dll[/td] [td]Windows Shell Common D[/td] [td]110[/td] [/tr] [tr] [td]comres.dll[/td] [td]COM+ Resources[/td] [td]109[/td] [/tr] [tr] [td]rasdlg.dll[/td] [td]Remote Access Common Dialog API[/td] [td]96[/td] [/tr] [tr] [td]cryptui.dll[/td] [td]Microsoft Trust UI Provider[/td] [td]67[/td] [/tr] [tr] [td]wsecedit.dll[/td] [td]Security Configuration UI Module[/td] [td]65[/td] [/tr] [tr] [td]FXSRESM.dll [/td] [td]Microsoft Fax Resource DLL[/td] [td]60[/td] [/tr] [tr] [td]ieakui.dll[/td] [td]Microsoft IEAK Shared UI DLL[/td] [td]60[/td] [/tr] [tr] [td]cmdial32.dll [/td] [td]Microsoft Connection Manager[/td] [td]56[/td] [/tr] [/table] Top 10 DLL files with largest number of cursors [table=width: 500, class: grid, align: center] [tr] [td]Filename[/td] [td]Description[/td] [td]Number of icons[/td] [/tr] [tr] [td]user32.dll[/td] [td]Multi-User Windows USER API Client DLL [/td] [td]28[/td] [/tr] [tr] [td]mfc70.dll[/td] [td]MFCDLL Shared Library - Retail Version [/td] [td]26[/td] [/tr] [tr] [td]msftedit.dll[/td] [td]Rich Text Edit Control, v4.1 [/td] [td]19[/td] [/tr] [tr] [td]comctl32.dll[/td] [td]Common Controls Library [/td] [td]18[/td] [/tr] [tr] [td]mshtml.dll[/td] [td]Microsoft ® HTML Viewer [/td] [td]18[/td] [/tr] [tr] [td]riched20.dll[/td] [td]Rich Text Edit Control, v3.1 [/td] [td]17[/td] [/tr] [tr] [td]UIHub.dll[/td] [td]Microsoft Tablet PC Flicks and Pen Feedback Component [/td] [td]15[/td] [/tr] [tr] [td]WFSR.dll[/td] [td]Windows Fax and Scan Resources [/td] [td]15[/td] [/tr] [tr] [td]FXSRESM.dll[/td] [td]Microsoft Fax Resource DLL [/td] [td]14[/td] [/tr] [tr] [td]mfc40u.dll[/td] [td]MFCDLL Shared Library - Retail Version [/td] [td]12[/td] [/tr] [/table] Top 10 DLL files with largest type library [table=width: 500, class: grid, align: center] [tr] [td]Filename[/td] [td]Description[/td] [td]Type library size[/td] [/tr] [tr] [td]MSVidCtl.dll[/td] [td]ActiveX control for streaming video [/td] [td]256 KB[/td] [/tr] [tr] [td]wmp.dll[/td] [td]wmp.dll[/td] [td]208 KB[/td] [/tr] [tr] [td]msvbvm60.dll[/td] [td]Visual Basic Virtual Machine [/td] [td]145 KB[/td] [/tr] [tr] [td]CertEnroll.dll[/td] [td]Microsoft Active Directory Certificate Services Enrollment Client [/td] [td]138 KB[/td] [/tr] [tr] [td]tapi3.dll[/td] [td]Microsoft TAPI3 [/td] [td]113 KB[/td] [/tr] [tr] [td]comsvcs.dll[/td] [td]COM+ Services [/td] [td]106 KB[/td] [/tr] [tr] [td]InkEd.dll[/td] [td]Microsoft Tablet PC InkEdit Control [/td] [td]99 KB[/td] [/tr] [tr] [td]msxml3.dll[/td] [td]MSXML 3.0 SP11[/td] [td]98 KB[/td] [/tr] [tr] [td]FXSCOMEX.dll[/td] [td]Microsoft Fax Server Extended COM Client Interface [/td] [td]92 KB[/td] [/tr] [tr] [td]msxml6.dll[/td] [td]MSXML 6.0 SP3 [/td] [td]90 KB[/td] [/tr] [/table] Top 25 popular DLL files in System32 directory In the following table, you can find the DLL files that are commonly used by other DLL files. The 'Number of DLLs' column represents the number of DLL files that use the specified DLL. For example: The first DLL file in this table - kernel32.dll, is loaded by other 1,475 DLL files in the system32 directory. This statistics is based on static link (import tables) between the DLL files. [table=width: 500, class: grid, align: center] [tr] [td]Filename[/td] [td]Description[/td] [td]Number of DLLs[/td] [/tr] [tr] [td]kernel32.dll[/td] [td]Windows NT BASE API Client DLL [/td] [td]1,475[/td] [/tr] [tr] [td]msvcrt.dll[/td] [td]Windows NT CRT DLL [/td] [td]1,431[/td] [/tr] [tr] [td]ntdll.dll[/td] [td]NT Layer DLL [/td] [td]865[/td] [/tr] [tr] [td]advapi32.dll[/td] [td]Advanced Windows 32 Base API [/td] [td]848[/td] [/tr] [tr] [td]user32.dll[/td] [td]Multi-User Windows USER API Client DLL[/td] [td]834[/td] [/tr] [tr] [td]ole32.dll[/td] [td]Microsoft OLE for Windows [/td] [td]700[/td] [/tr] [tr] [td]oleaut32.dll[/td] [td][/td] [td]547[/td] [/tr] [tr] [td]rpcrt4.dll[/td] [td]Remote Procedure Call Runtime [/td] [td]421[/td] [/tr] [tr] [td]gdi32.dll[/td] [td]GDI Client DLL[/td] [td]300[/td] [/tr] [tr] [td]shlwapi.dll[/td] [td]Shell Light-weight Utility Library [/td] [td]294[/td] [/tr] [tr] [td]shell32.dll[/td] [td]Windows Shell Common Dll [/td] [td]265[/td] [/tr] [tr] [td]api-ms-win-core-processthreads-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]187[/td] [/tr] [tr] [td]api-ms-win-core-localregistry-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]178[/td] [/tr] [tr] [td]api-ms-win-core-libraryloader-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]146[/td] [/tr] [tr] [td]api-ms-win-security-base-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]146[/td] [/tr] [tr] [td]ws2_32.dll[/td] [td]Windows Socket 2.0 32-Bit DLL [/td] [td]138[/td] [/tr] [tr] [td]api-ms-win-core-errorhandling-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]134[/td] [/tr] [tr] [td]api-ms-win-core-sysinfo-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]133[/td] [/tr] [tr] [td]api-ms-win-core-misc-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]129[/td] [/tr] [tr] [td]api-ms-win-core-profile-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]128[/td] [/tr] [tr] [td]api-ms-win-core-interlocked-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]128[/td] [/tr] [tr] [td]setupapi.dll[/td] [td]Windows Setup API [/td] [td]127[/td] [/tr] [tr] [td]crypt32.dll[/td] [td]Crypto API32 [/td] [td]114[/td] [/tr] [tr] [td]api-ms-win-core-handle-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]102[/td] [/tr] [tr] [td]api-ms-win-core-synch-l1-1-0.dll[/td] [td]ApiSet Stub DLL[/td] [td]98[/td] [/tr] [/table] more info...
  2. Fi8sVrs

    CSSrefresh

    CSSrefresh is a small, unobstructive javascript file that monitors the CSS-files included in your webpage. As soon as you save a CSS-file, the changes are directly implemented, without having to refresh your browser. Why would I need it? When you're coding a website, nothing can be more frustrating than having to switch from the texteditor to the browser over and over again, just for small changes to occur. With CSSrefresh installed, all the included stylesheets are automatically refreshed directly after you save them. How do I use it? Using CSSrefresh is easy. You can either include the javascript-file in your webpage, or use the bookmarklet. Get the script Download the file: CSSrefresh.js and include it in your webpage: <head> <link rel="stylesheet" type="text/css" href="css/site.css" /> <script type="text/javascript" src="js/cssrefresh.js"></script> </head> Note: Only CSS-files included before the CSSrefresh-file will be refreshed. CSSrefresh uses a XMLHttpRequest to get the modification time of the CSS-files, therefore it only works in a server environment. Source CSSrefresh - automatically refresh CSS files
  3. https://www.easel.io/ - Easel is an in-browser, high-fidelity web design tool that lets you mockup, share and implement your ideas with ease. https://www.fluidui.com/editor/live/ Welcome to Jarallax.com - Jarallax is an open-source javascript library which makes adjusting css based on interaction easy. With Jarallax it's easy to create a parallax scrolling website. tiltShift.js - a jQuery plugin using CSS3 filters to replicate the tilt shift effect - A jQuery plugin that uses the CSS3 image filters to replicate the tilt-shift effect. This is a proof of concept and currently only works in Chrome & Safari 6.
  4. https://rstcenter.com/forum/54324-chrome-autofill-forms.rst sau https://rstcenter.com/forum/59461-zennoproxychecker-despre-si-cum-sa-faci-bani-cu-el.rst
  5. Normalize.css is a customisable CSS file that makes browsers render all elements more consistently and in line with modern standards. We researched the differences between default browser styles in order to precisely target only the styles that need normalizing. Check out the demo What does it do? Preserves useful defaults, unlike many CSS resets. Normalizes styles for a wide range of elements. Corrects bugs and common browser inconsistencies. Improves usability with subtle improvements. Explains what code does using detailed comments. How to use it Normalize.css is intended to be used as an alternative to CSS resets. It's suggested that you read the normalize.css file and consider customising it to meet your needs. Alternatively, include the file in your project and override the defaults later in your CSS. Browser support Google Chrome Mozilla Firefox 4+ Apple Safari 5+ Opera 12+ Internet Explorer 8+ Download Mirror: component.json { "name": "normalize-css", "version": "2.0.1", "author": "Nicolas Gallagher", "homepage": "http://necolas.github.com/normalize.css/", "styles": ["normalize.css"], "repository": { "type": "git", "url": "https://github.com/necolas/normalize.css.git" }, "licenses": [{ "type": "MIT", "url": "http://opensource.org/licenses/MIT" }] } normalize.css /*! normalize.css v2.0.1 | MIT License | git.io/normalize */ /* ========================================================================== HTML5 display definitions ========================================================================== */ /* * Corrects `block` display not defined in IE 8/9. */ article, aside, details, figcaption, figure, footer, header, hgroup, nav, section, summary { display: block; } /* * Corrects `inline-block` display not defined in IE 8/9. */ audio, canvas, video { display: inline-block; } /* * Prevents modern browsers from displaying `audio` without controls. * Remove excess height in iOS 5 devices. */ audio:not([controls]) { display: none; height: 0; } /* * Addresses styling for `hidden` attribute not present in IE 8/9. */ [hidden] { display: none; } /* ========================================================================== Base ========================================================================== */ /* * 1. Sets default font family to sans-serif. * 2. Prevents iOS text size adjust after orientation change, without disabling * user zoom. */ html { font-family: sans-serif; /* 1 */ -webkit-text-size-adjust: 100%; /* 2 */ -ms-text-size-adjust: 100%; /* 2 */ } /* * Removes default margin. */ body { margin: 0; } /* ========================================================================== Links ========================================================================== */ /* * Addresses `outline` inconsistency between Chrome and other browsers. */ a:focus { outline: thin dotted; } /* * Improves readability when focused and also mouse hovered in all browsers. */ a:active, a:hover { outline: 0; } /* ========================================================================== Typography ========================================================================== */ /* * Addresses `h1` font sizes within `section` and `article` in Firefox 4+, * Safari 5, and Chrome. */ h1 { font-size: 2em; } /* * Addresses styling not present in IE 8/9, Safari 5, and Chrome. */ abbr[title] { border-bottom: 1px dotted; } /* * Addresses style set to `bolder` in Firefox 4+, Safari 5, and Chrome. */ b, strong { font-weight: bold; } /* * Addresses styling not present in Safari 5 and Chrome. */ dfn { font-style: italic; } /* * Addresses styling not present in IE 8/9. */ mark { background: #ff0; color: #000; } /* * Corrects font family set oddly in Safari 5 and Chrome. */ code, kbd, pre, samp { font-family: monospace, serif; font-size: 1em; } /* * Improves readability of pre-formatted text in all browsers. */ pre { white-space: pre; white-space: pre-wrap; word-wrap: break-word; } /* * Sets consistent quote types. */ q { quotes: "\201C" "\201D" "\2018" "\2019"; } /* * Addresses inconsistent and variable font size in all browsers. */ small { font-size: 80%; } /* * Prevents `sub` and `sup` affecting `line-height` in all browsers. */ sub, sup { font-size: 75%; line-height: 0; position: relative; vertical-align: baseline; } sup { top: -0.5em; } sub { bottom: -0.25em; } /* ========================================================================== Embedded content ========================================================================== */ /* * Removes border when inside `a` element in IE 8/9. */ img { border: 0; } /* * Corrects overflow displayed oddly in IE 9. */ svg:not(:root) { overflow: hidden; } /* ========================================================================== Figures ========================================================================== */ /* * Addresses margin not present in IE 8/9 and Safari 5. */ figure { margin: 0; } /* ========================================================================== Forms ========================================================================== */ /* * Define consistent border, margin, and padding. */ fieldset { border: 1px solid #c0c0c0; margin: 0 2px; padding: 0.35em 0.625em 0.75em; } /* * 1. Corrects color not being inherited in IE 8/9. * 2. Remove padding so people aren't caught out if they zero out fieldsets. */ legend { border: 0; /* 1 */ padding: 0; /* 2 */ } /* * 1. Corrects font family not being inherited in all browsers. * 2. Corrects font size not being inherited in all browsers. * 3. Addresses margins set differently in Firefox 4+, Safari 5, and Chrome */ button, input, select, textarea { font-family: inherit; /* 1 */ font-size: 100%; /* 2 */ margin: 0; /* 3 */ } /* * Addresses Firefox 4+ setting `line-height` on `input` using `!important` in * the UA stylesheet. */ button, input { line-height: normal; } /* * 1. Avoid the WebKit bug in Android 4.0.* where (2) destroys native `audio` * and `video` controls. * 2. Corrects inability to style clickable `input` types in iOS. * 3. Improves usability and consistency of cursor style between image-type * `input` and others. */ button, html input[type="button"], /* 1 */ input[type="reset"], input[type="submit"] { -webkit-appearance: button; /* 2 */ cursor: pointer; /* 3 */ } /* * Re-set default cursor for disabled elements. */ button[disabled], input[disabled] { cursor: default; } /* * 1. Addresses box sizing set to `content-box` in IE 8/9. * 2. Removes excess padding in IE 8/9. */ input[type="checkbox"], input[type="radio"] { box-sizing: border-box; /* 1 */ padding: 0; /* 2 */ } /* * 1. Addresses `appearance` set to `searchfield` in Safari 5 and Chrome. * 2. Addresses `box-sizing` set to `border-box` in Safari 5 and Chrome * (include `-moz` to future-proof). */ input[type="search"] { -webkit-appearance: textfield; /* 1 */ -moz-box-sizing: content-box; -webkit-box-sizing: content-box; /* 2 */ box-sizing: content-box; } /* * Removes inner padding and search cancel button in Safari 5 and Chrome * on OS X. */ input[type="search"]::-webkit-search-cancel-button, input[type="search"]::-webkit-search-decoration { -webkit-appearance: none; } /* * Removes inner padding and border in Firefox 4+. */ button::-moz-focus-inner, input::-moz-focus-inner { border: 0; padding: 0; } /* * 1. Removes default vertical scrollbar in IE 8/9. * 2. Improves readability and alignment in all browsers. */ textarea { overflow: auto; /* 1 */ vertical-align: top; /* 2 */ } /* ========================================================================== Tables ========================================================================== */ /* * Remove most spacing between table cells. */ table { border-collapse: collapse; border-spacing: 0; } test.html <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width"> <title>Normalize CSS</title> <link rel="stylesheet" href="normalize.css"> <script src="http://html5shim.googlecode.com/svn/trunk/html5.js"></script> <style> #boxsize button, #boxsize input, #boxsize select, #boxsize textarea { width: 200px; padding: 5px; border: 1px solid #333; } </style> </head> <body> <h1>Heading 1</h1> <h2>Heading 2</h2> <h3>Heading 3</h3> <h4>Heading 4</h4> <h5>Heading 5</h5> <h6>Heading 6</h6> <section> <h1>Heading 1 (in section)</h1> <h2>Heading 2 (in section)</h2> <h3>Heading 3 (in section)</h3> <h4>Heading 4 (in section)</h4> <h5>Heading 5 (in section)</h5> <h6>Heading 6 (in section)</h6> </section> <article> <h1>Heading 1 (in article)</h1> <h2>Heading 2 (in article)</h2> <h3>Heading 3 (in article)</h3> <h4>Heading 4 (in article)</h4> <h5>Heading 5 (in article)</h5> <h6>Heading 6 (in article)</h6> </article> <header> <hgroup> <h1>Heading 1 (in hgroup)</h1> <h2>Heading 2 (in hgroup)</h2> </hgroup> <nav> <ul> <li><a href="#">navigation item #1</a></li> <li><a href="#">navigation item #2</a></li> <li><a href="#">navigation item #3</a></li> </ul> </nav> </header> <h1>Text-level semantics</h1> <p hidden>This should be hidden in all browsers, apart from IE6</p> <p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m.</p> <p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m.</p> <address>Address: somewhere, world</address> <p> The <a href="#">a element</a> example<br> The <abbr>abbr element</abbr> and <abbr title="Title text">abbr element with title</abbr> examples<br> The <b>b element</b> example<br> The <cite>cite element</cite> example<br> The <code>code element</code> example<br> The <del>del element</del> example<br> The <dfn>dfn element</dfn> and <dfn title="Title text">dfn element with title</dfn> examples<br> The <em>em element</em> example<br> The <i>i element</i> example<br> The img element <img src="http://lorempixel.com/16/16" alt=""> example<br> The <ins>ins element</ins> example<br> The <kbd>kbd element</kbd> example<br> The <mark>mark element</mark> example<br> The <q>q element <q>inside</q> a q element</q> example<br> The <s>s element</s> example<br> The <samp>samp element</samp> example<br> The <small>small element</small> example<br> The <span>span element</span> example<br> The <strong>strong element</strong> example<br> The <sub>sub element</sub> example<br> The <sup>sup element</sup> example<br> The <u>u element</u> example<br> The <var>var element</var> example </p> <h1>Embedded content</h1> <h3>audio</h3> <audio controls></audio> <audio></audio> <h3>img</h3> <img src="http://lorempixel.com/100/100" alt=""> <a href="#"><img src="http://lorempixel.com/100/100" alt=""></a> <h3>svg</h3> <svg width="100px" height="100px"> <circle cx="100" cy="100" r="100" fill="#ff0000" /> </svg> <h3>video</h3> <video controls></video> <video></video> <h1>Interactive content</h1> <h3>details / summary</h3> <details> <summary>More info</summary> <p>Additional information</p> <ul> <li>Point 1</li> <li>Point 2</li> </ul> </details> <h1>Grouping content</h1> <p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et m.</p> <h3>pre</h3> <pre>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et me.</pre> <pre><code><html> <head> </head> <body> <div class="main"> <div> </body> </html></code></pre> <h3>blockquote</h3> <blockquote> <p>Some sort of famous witty quote marked up with a <blockquote> and a child <p> element.</p> </blockquote> <blockquote>Even better philosophical quote marked up with just a <blockquote> element.</blockquote> <h3>ordered list</h3> <ol> <li>list item 1</li> <li>list item 1 <ol> <li>list item 2</li> <li>list item 2 <ol> <li>list item 3</li> <li>list item 3</li> </ol> </li> <li>list item 2</li> <li>list item 2</li> </ol> </li> <li>list item 1</li> <li>list item 1</li> </ol> <h3>unordered list</h3> <ul> <li>list item 1</li> <li>list item 1 <ul> <li>list item 2</li> <li>list item 2 <ul> <li>list item 3</li> <li>list item 3</li> </ul> </li> <li>list item 2</li> <li>list item 2</li> </ul> </li> <li>list item 1</li> <li>list item 1</li> </ul> <h3>description list</h3> <dl> <dt>Description name</dt> <dd>Description value</dd> <dt>Description name</dt> <dd>Description value</dd> <dd>Description value</dd> <dt>Description name</dt> <dt>Description name</dt> <dd>Description value</dd> </dl> <h3>figure</h3> <figure> <img src="http://lorempixel.com/400/200" alt=""> <figcaption>Figcaption content</figcaption> </figure> <h1>Tabular data</h1> <table> <caption>Jimi Hendrix - albums</caption> <thead> <tr> <th>Album</th> <th>Year</th> <th>Price</th> </tr> </thead> <tfoot> <tr> <th>Album</th> <th>Year</th> <th>Price</th> </tr> </tfoot> <tbody> <tr> <td>Are You Experienced</td> <td>1967</td> <td>$10.00</td> </tr> <tr> <td>Axis: Bold as Love</td> <td>1967</td> <td>$12.00</td> </tr> <tr> <td>Electric Ladyland</td> <td>1968</td> <td>$10.00</td> </tr> <tr> <td>Band of Gypsys</td> <td>1970</td> <td>$12.00</td> </tr> </tbody> </table> <h1>Forms</h1> <form> <fieldset> <legend>Inputs as descendents of labels (form legend). This doubles up as a long legend that can test word wrapping.</legend> <p><label>Text input <input type="text" value="default value that goes on and on without stopping or punctuation"></label></p> <p><label>Email input <input type="email"></label></p> <p><label>Search input <input type="search"></label></p> <p><label>Tel input <input type="tel"></label></p> <p><label>URL input <input type="url" placeholder="http://"></label></p> <p><label>Password input <input type="password" value="password"></label></p> <p><label>File input <input type="file"></label></p> <p><label>Radio input <input type="radio" name="rad"></label></p> <p><label>Checkbox input <input type="checkbox"></label></p> <p><label><input type="radio" name="rad"> Radio input</label></p> <p><label><input type="checkbox"> Checkbox input</label></p> <p><label>Select field <select><option>Option 01</option><option>Option 02</option></select></label></p> <p><label>Textarea <textarea cols="30" rows="5" >Textarea text</textarea></label></p> </fieldset> <fieldset> <legend>Inputs as siblings of labels</legend> <p><label for="ic">Color input</label> <input type="color" id="ic" value="#000000"></p> <p><label for="in">Number input</label> <input type="number" id="in" min="0" max="10" value="5"></p> <p><label for="ir">Range input</label> <input type="range" id="ir" value="10"></p> <p><label for="idd">Date input</label> <input type="date" id="idd" value="1970-01-01"></p> <p><label for="idm">Month input</label> <input type="month" id="idm" value="1970-01"></p> <p><label for="idw">Week input</label> <input type="week" id="idw" value="1970-W01"></p> <p><label for="idt">Datetime input</label> <input type="datetime" id="idt" value="1970-01-01T00:00:00Z"></p> <p><label for="idtl">Datetime-local input</label> <input type="datetime-local" id="idtl" value="1970-01-01T00:00"></p> <p><label for="irb">Radio input</label> <input type="radio" id="irb" name="rad"></p> <p><label for="icb">Checkbox input</label> <input type="checkbox" id="icb"></p> <p><input type="radio" id="irb2" name="rad"> <label for="irb2">Radio input</label></p> <p><input type="checkbox" id="icb2"> <label for="icb2">Checkbox input</label></p> <p><label for="s">Select field</label> <select id="s"><option>Option 01</option><option>Option 02</option></select></p> <p><label for="t">Textarea</label> <textarea id="t" cols="30" rows="5" >Textarea text</textarea></p> </fieldset> <fieldset> <legend>Clickable inputs and buttons</legend> <p><input type="image" src="http://lorempixel.com/90/24" alt="Image (input)"></p> <p><input type="reset" value="Reset (input)"></p> <p><input type="button" value="Button (input)"></p> <p><input type="submit" value="Submit (input)"></p> <p><input type="submit" value="Disabled (input)" disabled></p> <p><button type="reset">Reset (button)</button></p> <p><button type="button">Button (button)</button></p> <p><button type="submit">Submit (button)</button></p> <p><button type="submit" disabled>Disabled (button)</button></p> </fieldset> <fieldset id="boxsize"> <legend>box-sizing tests</legend> <div><input type="text" value="text"></div> <div><input type="email" value="email"></div> <div><input type="search" value="search"></div> <div><input type="url" value="http://example.com"></div> <div><input type="password" value="password"></div> <div><input type="color" value="#000000"></div> <div><input type="number" value="5"></div> <div><input type="range" value="10"></div> <div><input type="date" value="1970-01-01"></div> <div><input type="month" value="1970-01"></div> <div><input type="week" value="1970-W01"></div> <div><input type="datetime" value="1970-01-01T00:00:00Z"></div> <div><input type="datetime-local" value="1970-01-01T00:00"></div> <div><input type="radio"></div> <div><input type="checkbox"></div> <div><select><option>Option 01</option><option>Option 02</option></select></div> <div><textarea cols="30" rows="5">Textarea text</textarea></div> <div><input type="image" src="http://lorempixel.com/90/24" alt="Image (input)"></div> <div><input type="reset" value="Reset (input)"></div> <div><input type="button" value="Button (input)"></div> <div><input type="submit" value="Submit (input)"></div> <div><button type="reset">Reset (button)</button></div> <div><button type="button">Button (button)</button></div> <div><button type="submit">Submit (button)</button></div> </fieldset> </form> </body> </html> Contribute Please read my issue guidelines. Acknowledgements Normalize.css is a project by Nicolas Gallagher and Jonathan Neal. Source: https://github.com/necolas/normalize.css
  6. The White House has confirmed it was the target of a cyber-attack but says the breach hit an unclassified network. An unnamed administration official told US media that there was no indication any data had been removed. The conservative Washington Free Beacon reported on Sunday that hackers linked to the Chinese government had breached the White House Military Office. The White House said attempted phishing attacks against its networks were 'not infrequent' The White House would not say if the attack originated in China, describing it as a "spear-phishing" attempt. "Spear-phishing" typically works by sending fake e-mails that look like legitimate correspondence, but which link to a malicious website or file attachment. "These types of attacks are not infrequent and we have mitigation measures in place," the official, who was not authorised to speak on the record, told the Associated Press and other US media. Cyber-attacks from Chinese-linked hackers have been an increasing concern among US government offices, including the Pentagon, the head of intelligence for US cyber defence told Reuters last week. "Their level of effort against the Department of Defense is constant," Rear Admiral Samuel Cox said. In 2011, Google blamed computer hackers in China for a phishing effort against Gmail accounts of several hundred people, including senior US government officials and military personnel. That November, senior US intelligence officials for the first time publicly accused China of systematically stealing American high-tech data for its own gain. Source: BBC News - White House confirms cyber-attack on 'unclassified' system
  7. Amal Graafstra snaps on a pair of black rubber gloves. “Do you want to talk about pain management techniques?” he asks. The bearded systems administrator across the table, who requested I call him “Andrew,” has paid Grafstra $30 to have a radio-frequency identification (RFID) chip injected into the space between his thumb and pointer finger, and as Graafstra describes Lamaze-type breathing methods, Andrew looks remarkably untroubled, in spite of the intimidatingly high-gauge syringe sitting on the table between them. Graafstra finishes his pain talk, fishes a tiny cylindrical two-millimeter diameter EM4012 RFID chip out of a tin of isopropyl alcohol, and drops it into the syringe’s end, replacing the RFID tag intended for pets that came with the injection kit. He swabs Andrew’s hand with iodine, carefully pinches and pulls up a fold of skin on the top of his hand to create a tent of flesh, and with the other hand slides the syringe into the subcutaneous layer known as the fascia, just below the surface. Then he plunges the plastic handle and withdraws the needle. A small crowd of onlookers applauds. The first subject of the day has been successfully chipped. Here’s a video of the procedure. Over the course of the weekend, Andrew would be one of eight people to undergo the RFID implantation among the 500 or so attendees of Toorcamp, a hacker conference and retreat near the northwest corner of Washington State. Graafstra’s “implantation station” was set up in the open air: Any camper willing to spend $30 and sign a liability waiver could have the implantation performed, and after the excitement of Andrew’s injection, a small line formed to be next. And why volunteer to be injected with a chip that responds to radio signals with a unique identifier, a procedure typically reserved for tracking pets and livestock? “I thought it would be cool,” says Andrew, when we speak at a picnic table a few minutes after his injection. (The pain, he tells me, was only a short pinch, followed by a “weird feeling of a foreign body sliding into my hand.”) Graafstra's glass-encased RFID chips, ready for implantation. The practical appeal of an RFID implant, in theory, is quick authentication that’s faster, cheaper and more reliable than other biometrics like thumbprints or facial scans. When the chip is hit with a radio frequency signal, it emits a unique identifier number that functions like a long, unguessable password. Implantees like Andrew imagine the ability to unclutter their pockets of keys and keycards and instead access their cars, computers, and homes with with a mere wave of the hand. Andrew says he initially hoped to use his RFID implant instead of the HID identity card his office uses for entry, but wasn’t deterred from the injection when Graafstra told him that HID uses a proprietary system whose chips Graafstra couldn’t implant. “I don’t have anything specific in mind, now, but I didn’t know when I’d have another opportunity to do it,” says Andrew. “And it’s a good excuse to start learning more about RFID.” Another young hacker who underwent the procedure at Toorcamp said he hopes to install an RFID access system at the door of his local hackerspace. A young woman with a small collection of rings and studs in her ears compared her new implant to aesthetic body modifications like piercings and tattoos, or even the fringier culture of erotic “needleplay.” “I guess I have an interest in my body’s response to pain and modification,” she says. “There’s a certain thrill of the new.” For Graafstra himself, the chips are more than a novelty or a hacker hobby. Graafstra uses them to access his home near Seattle, to turn on his motorcycle, to open a safe in his house, even to authenticate into his phone, a Samsung Galaxy Nexus that’s capable of near-field communications. He had his first chip installed in 2005 by a doctor client of his IT services firm, and has since become one of a few vocal RFID body implant evangelists, chronicling his experiences with the chip on his website and in a book, RFID Toys. The enthusiasm of hackers like those at Toorcamp for RFID implants may seem a bit surprising–privacy advocates have long warned that the chips could allow individuals to be tracked by governments and corporations, even when they’re merely housed in passports or clothing, not to mention injected subcutaneously. But Graafstra says that the chips he’s implanting are difficult to read from more than a few inches away. And he argues the idea of some trying to read his chip in order to spoof its signal and access his house or other property is far less of a threat than other potential privacy invasions. “If someone manages to read this, it’s just as if they found a piece of paper with a number on the ground,” he says. “For any kind of attack, they would have to also know me and where I live and wants to gain access to the things I’ve enabled. There are easier ways to do that, like breaking into my window.” That hasn’t stopped privacy advocates and religious types from attacking Graafstra as a harbinger of evil–Some link his hand chip with the Bible’s “mark of the beast,” a number stamped by the Devil on hands and heads in the Book of Revelations. Graafstra ignores their emails or responds politely. “Some people view the body as a sacred temple,” he says. “Some view it as a sports utility vehicle they can upgrade. I’m definitely in the second category.” Even so, he says his Toorcamp implantation station was a one-off. Outside of the camp’s community of hacking and experimentation, he worries that the risk of unhappy customers would be too high. “I trust that the people here have put a little thought into it and know what they’re getting into,” he says. “For everyone else, I recommend you contact your local piercing artist.” Implementation Guide: http://amal.net/wp-content/uploads/2012/09/DIY-Implantation-Guide.pdf Sources: Want An RFID Chip Implanted Into Your Hand? Here's What The DIY Surgery Looks Like (Video) - Forbes The first ever MakerFaire - Amal Graafstra - Technologist, Author & Double RFID Implantee
  8. Unauthorised Access – Physical Penetration Testing For IT Security Teams WIL ALLSOPP - FOREWORD BY KEVIN MITNICK http://www.mediafire.com/view/?fyno9ro7dt5fqo1
      • 1
      • Upvote
  9. This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution. Content: dir /s > listing.txt Volume in drive D has no label. Volume Serial Number is 149B-6B1D Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012 01.10.2012 10:22 <DIR> . 01.10.2012 10:22 <DIR> .. 01.10.2012 10:22 0 listing.txt 01.10.2012 10:20 <DIR> web-malware-collection 1 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 01.10.2012 10:20 <DIR> Backdoors 01.10.2012 10:20 <DIR> Bots 01.10.2012 10:20 <DIR> Honey 01.10.2012 10:20 <DIR> Malicious Scripts 13.06.2012 23:36 461 README 1 File(s) 461 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 139 all-wcprops 13.06.2012 23:36 445 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 584 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 461 README.svn-base 1 File(s) 461 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 01.10.2012 10:20 <DIR> ASP 01.10.2012 10:20 <DIR> JSP 01.10.2012 10:20 <DIR> Other 01.10.2012 10:20 <DIR> PHP 01.10.2012 10:20 <DIR> PL 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 73 all-wcprops 13.06.2012 23:36 287 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 360 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 56.301 3fexe.txt 13.06.2012 23:36 27.380 aspSH.v1.txt 13.06.2012 23:36 70.558 aspxSH.txt 13.06.2012 23:36 5.271 aspxshell.aspx.txt 13.06.2012 23:36 34.427 ASpy.txt 13.06.2012 23:36 35.284 aspydrv.asp 13.06.2012 23:36 34.837 aspydrv.txt 13.06.2012 23:36 1.521 cmd.asp 13.06.2012 23:36 1.583 cmd.aspx 13.06.2012 23:36 2.623 cmdexec.aspx 13.06.2012 23:36 151.575 EFSO.txt 13.06.2012 23:36 38.479 ELMALISEKER Backd00r.asp 13.06.2012 23:36 65.962 elmaliseker.asp 13.06.2012 23:36 6.359 filesystembrowser.aspx 13.06.2012 23:36 3.154 fileupload.aspx 13.06.2012 23:36 1.451 list.asp 13.06.2012 23:36 42.801 ntdaddy.asp 13.06.2012 23:36 38.856 NTDaddy.v1.9.txt 13.06.2012 23:36 7.695 RemExp.asp 13.06.2012 23:36 45.569 RHTools.v1.5-BETA.txt 13.06.2012 23:36 856 Server Variables.asp 13.06.2012 23:36 14.079 spexec.aspx 13.06.2012 23:36 2.910 sql.aspx 13.06.2012 23:36 46.359 tool.asp 13.06.2012 23:36 46.003 toolaspshell.txt 13.06.2012 23:36 4.604 up.asp 13.06.2012 23:36 45.960 zehir.asp 13.06.2012 23:36 50.216 zehir.txt 13.06.2012 23:36 51.405 zehir4.asp 13.06.2012 23:36 45.127 zehir4.txt 30 File(s) 979.205 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 3.150 all-wcprops 13.06.2012 23:36 5.200 entries 01.10.2012 10:20 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 8.350 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\prop-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 30 cmd.asp.svn-base 13.06.2012 23:36 30 cmd.aspx.svn-base 13.06.2012 23:36 30 list.asp.svn-base 13.06.2012 23:36 30 ntdaddy.asp.svn-base 13.06.2012 23:36 30 up.asp.svn-base 5 File(s) 150 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 56.301 3fexe.txt.svn-base 13.06.2012 23:36 27.380 aspSH.v1.txt.svn-base 13.06.2012 23:36 70.558 aspxSH.txt.svn-base 13.06.2012 23:36 5.271 aspxshell.aspx.txt.svn-base 13.06.2012 23:36 34.427 ASpy.txt.svn-base 13.06.2012 23:36 35.284 aspydrv.asp.svn-base 13.06.2012 23:36 34.837 aspydrv.txt.svn-base 13.06.2012 23:36 1.521 cmd.asp.svn-base 13.06.2012 23:36 1.583 cmd.aspx.svn-base 13.06.2012 23:36 2.623 cmdexec.aspx.svn-base 13.06.2012 23:36 151.575 EFSO.txt.svn-base 13.06.2012 23:36 38.479 ELMALISEKER Backd00r.asp.svn-base 13.06.2012 23:36 65.962 elmaliseker.asp.svn-base 13.06.2012 23:36 6.359 filesystembrowser.aspx.svn-base 13.06.2012 23:36 3.154 fileupload.aspx.svn-base 13.06.2012 23:36 1.451 list.asp.svn-base 13.06.2012 23:36 42.801 ntdaddy.asp.svn-base 13.06.2012 23:36 38.856 NTDaddy.v1.9.txt.svn-base 13.06.2012 23:36 7.695 RemExp.asp.svn-base 13.06.2012 23:36 45.569 RHTools.v1.5-BETA.txt.svn-base 13.06.2012 23:36 856 Server Variables.asp.svn-base 13.06.2012 23:36 14.079 spexec.aspx.svn-base 13.06.2012 23:36 2.910 sql.aspx.svn-base 13.06.2012 23:36 46.359 tool.asp.svn-base 13.06.2012 23:36 46.003 toolaspshell.txt.svn-base 13.06.2012 23:36 4.604 up.asp.svn-base 13.06.2012 23:36 45.960 zehir.asp.svn-base 13.06.2012 23:36 50.216 zehir.txt.svn-base 13.06.2012 23:36 51.405 zehir4.asp.svn-base 13.06.2012 23:36 45.127 zehir4.txt.svn-base 30 File(s) 979.205 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\ASP\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 69.911 browser.jsp 13.06.2012 23:36 864 cmd.jsp 13.06.2012 23:36 853 cmd_win32.jsp 13.06.2012 23:36 2.359 jspbd.jsp 13.06.2012 23:36 13.250 jspShell.jsp 13.06.2012 23:36 26.862 JspWebshell 1.2.jsp 13.06.2012 23:36 1.870 list.jsp 13.06.2012 23:36 3.735 up.jsp 13.06.2012 23:36 3.735 up_win32.jsp 9 File(s) 123.439 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 974 all-wcprops 13.06.2012 23:36 1.750 entries 01.10.2012 10:20 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 2.724 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\prop-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 30 browser.jsp.svn-base 13.06.2012 23:36 30 cmd.jsp.svn-base 13.06.2012 23:36 30 cmd_win32.jsp.svn-base 13.06.2012 23:36 30 list.jsp.svn-base 13.06.2012 23:36 30 up.jsp.svn-base 13.06.2012 23:36 30 up_win32.jsp.svn-base 6 File(s) 180 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 69.911 browser.jsp.svn-base 13.06.2012 23:36 864 cmd.jsp.svn-base 13.06.2012 23:36 853 cmd_win32.jsp.svn-base 13.06.2012 23:36 2.359 jspbd.jsp.svn-base 13.06.2012 23:36 13.250 jspShell.jsp.svn-base 13.06.2012 23:36 26.862 JspWebshell 1.2.jsp.svn-base 13.06.2012 23:36 1.870 list.jsp.svn-base 13.06.2012 23:36 3.735 up.jsp.svn-base 13.06.2012 23:36 3.735 up_win32.jsp.svn-base 9 File(s) 123.439 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\JSP\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 1.448 cmd.c 13.06.2012 23:36 807 cmd.cfm 2 File(s) 2.255 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 262 all-wcprops 13.06.2012 23:36 572 entries 01.10.2012 10:20 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 834 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\prop-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 30 cmd.c.svn-base 13.06.2012 23:36 30 cmd.cfm.svn-base 2 File(s) 60 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 1.448 cmd.c.svn-base 13.06.2012 23:36 807 cmd.cfm.svn-base 2 File(s) 2.255 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\Other\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 65.652 150.php 13.06.2012 23:36 131.446 27.9.txt 13.06.2012 23:36 63.228 2mv2.txt 13.06.2012 23:36 72.804 404.php 13.06.2012 23:36 72.979 404.txt 13.06.2012 23:36 5.298 a.php 13.06.2012 23:36 76 accept_language.txt 13.06.2012 23:36 188.697 acid.php 13.06.2012 23:36 17.536 Ajax_PHP Command Shell.txt 13.06.2012 23:36 17.536 Ajax_PHP Command Shell.txt.1 13.06.2012 23:36 87.075 Ani-Shell.php 13.06.2012 23:36 8.998 Antichat Shell v1.3.php 13.06.2012 23:36 8.998 Antichat Shell v1.3.txt 13.06.2012 23:36 32.664 antichat.php 13.06.2012 23:36 190.502 AntiSecShell.v0.5.txt 13.06.2012 23:36 45.379 arabicspy.php 13.06.2012 23:36 10.144 Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt 13.06.2012 23:36 10.421 aZRaiLPhp v1.0.php 13.06.2012 23:36 10.421 aZRaiLPhp v1.0.txt 13.06.2012 23:36 31.362 b37.php 13.06.2012 23:36 20.980 b374k.v1.txt 13.06.2012 23:36 105.790 Backdoor.PHP.Agent.php 13.06.2012 23:36 6.331 backupsql.txt 13.06.2012 23:36 3.188 bdotw44shell.txt 13.06.2012 23:36 34 bug (1).php 13.06.2012 23:36 34 bug.php 13.06.2012 23:36 110.373 bypass.txt 13.06.2012 23:36 165.084 c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php 13.06.2012 23:36 164.487 c100.txt 13.06.2012 23:36 177.014 c37.php 13.06.2012 23:36 131.592 c66.php 13.06.2012 23:36 171.177 c99-bd.txt 13.06.2012 23:36 163.252 c99-shadows-mod.php 13.06.2012 23:36 150.555 c99.php 13.06.2012 23:36 165.493 c99.txt 13.06.2012 23:36 150.692 c993.txt 13.06.2012 23:36 44.348 c99madshell.php 13.06.2012 23:36 162.242 c99shell.php 13.06.2012 23:36 146.412 c99ud.txt 13.06.2012 23:36 227.649 c99unlimited.txt 13.06.2012 23:36 150.555 c99v2.php 13.06.2012 23:36 160.677 c99_2.txt 13.06.2012 23:36 229.103 c99_locus7s.txt 13.06.2012 23:36 44.351 c99_madnet.txt 13.06.2012 23:36 164.114 c99_PSych0.php 13.06.2012 23:36 143.062 c99_w4cking.txt 13.06.2012 23:36 97.921 cbfphpsh.txt 13.06.2012 23:36 47.118 cihshell_fix.php 13.06.2012 23:36 345 cmd.php 13.06.2012 23:36 70 cmd.txt 13.06.2012 23:36 63.065 co.php 13.06.2012 23:36 1.460 connect-back.php.txt 13.06.2012 23:36 9.622 cpanel.txt 13.06.2012 23:36 17.659 cpg_143_incl_xpl.php 13.06.2012 23:36 56.135 Crystal.txt 13.06.2012 23:36 41.610 CrystalShell v.1.txt 13.06.2012 23:36 130.394 ctt_sh.txt 13.06.2012 23:36 34.705 Cyber Shell (v 1.0).php 13.06.2012 23:36 35.152 cybershell.txt 13.06.2012 23:36 43.394 dC3 Security Crew Shell PRiV.txt 13.06.2012 23:36 43.394 dC3.Security.Crew.Shell.priv8.txt 13.06.2012 23:36 5.512 Dive Shell 1.0 - Emperor Hacking Team.php 13.06.2012 23:36 5.512 Dive Shell 1.0 - Emperor Hacking Team.txt 13.06.2012 23:36 14.444 DTool Pro.txt 13.06.2012 23:36 111.606 Dx.txt 13.06.2012 23:36 113.557 DxShell.1.0.txt 13.06.2012 23:36 312.076 egy.txt 13.06.2012 23:36 43.560 erne.txt 13.06.2012 23:36 41.885 ex0shell.txt 13.06.2012 23:36 163.992 FaTaLisTiCz_Fx.txt 13.06.2012 23:36 168.653 fx.txt 13.06.2012 23:36 158.613 Fx29Sh.3.2.12.08.txt 13.06.2012 23:36 29.030 g00nshell-v1.3.txt 13.06.2012 23:36 32.530 g00nv13.php 13.06.2012 23:36 87.220 G5.php 13.06.2012 23:36 25.446 GFS web-shell ver 3.1.7 - PRiV8.txt 13.06.2012 23:36 64.548 gfs_sh.txt 13.06.2012 23:36 584.174 GNY.Shell.v1.1.txt 13.06.2012 23:36 2.475 h4ntu shell [powered by tsoi].php 13.06.2012 23:36 2.475 h4ntu shell [powered by tsoi].txt 13.06.2012 23:36 44.915 hkrkoz.php 13.06.2012 23:36 53.740 iMHaPFtp.txt 13.06.2012 23:36 18.370 ironshell.txt 13.06.2012 23:36 112.002 isko.txt 13.06.2012 23:36 112.002 iskorpitx.txt 13.06.2012 23:36 65.120 itsecteam.v2.1.txt 13.06.2012 23:36 66.403 itsecteam_shell.php 13.06.2012 23:36 64.928 jHn.php 13.06.2012 23:36 4.884 KAdot Universal Shell v0.1.6.php 13.06.2012 23:36 4.656 KAdot Universal Shell v0.1.6.txt 13.06.2012 23:36 21.574 knullsh.txt 13.06.2012 23:36 19.611 kolang-bypass.txt 13.06.2012 23:36 10.010 kral.txt 13.06.2012 23:36 2.480 lamashell.txt 13.06.2012 23:36 589 list.php 13.06.2012 23:36 1.340 Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php 13.06.2012 23:36 1.340 Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt 13.06.2012 23:36 13.831 load_shell.txt 13.06.2012 23:36 233.891 locus.txt 13.06.2012 23:36 66.160 log.txt 13.06.2012 23:36 13.776 lolipop.txt 13.06.2012 23:36 19.828 lostDC.txt 13.06.2012 23:36 70.620 ly0kha.txt 13.06.2012 23:36 38.230 Macker's Private PHPShell.php 13.06.2012 23:36 3.801 matamu.txt 13.06.2012 23:36 42.880 megabor.txt 13.06.2012 23:36 81.063 metaslsoft.php 13.06.2012 23:36 131.446 mini.j0s_ali.j0e.v27.9.txt 13.06.2012 23:36 7.180 Moroccan Spamers Ma-EditioN By GhOsT.txt 13.06.2012 23:36 16.114 myshell.txt 13.06.2012 23:36 34.961 Mysql interface v1.0.txt 13.06.2012 23:36 35.803 MySQL Web Interface Version 0.8.php 13.06.2012 23:36 34.501 MySQL Web Interface Version 0.8.txt 13.06.2012 23:36 52.388 mysql.txt 13.06.2012 23:36 17.782 mysqlwebsh.php 13.06.2012 23:36 33.081 mysql_tool.txt 13.06.2012 23:36 2.592 NCC-Shell.txt 13.06.2012 23:36 122.250 NetworkFileManagerPHP.txt 13.06.2012 23:36 57.294 newsh.php 13.06.2012 23:36 53.629 NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php 13.06.2012 23:36 53.629 NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt 13.06.2012 23:36 12.817 nshell.txt 13.06.2012 23:36 81.594 nst.txt 13.06.2012 23:36 81.159 nstview.txt 13.06.2012 23:36 185.789 p0isoN.sh3ll.txt 13.06.2012 23:36 24.678 PH Vayv.txt 13.06.2012 23:36 25.944 PHANTASMA.txt 13.06.2012 23:36 37.240 PHP Shell.txt 13.06.2012 23:36 2.800 php-backdoor.txt 13.06.2012 23:36 46.934 php-include-w-shell.txt 13.06.2012 23:36 1.124 pHpINJ.txt 13.06.2012 23:36 99.242 PHPJackal.txt 13.06.2012 23:36 95.358 phpjackal1.3.txt 13.06.2012 23:36 34.754 PHPRemoteView.txt 13.06.2012 23:36 8.945 phpshell.php 13.06.2012 23:36 28.023 PHPSPY.php 13.06.2012 23:36 9.042 Php_Backdoor.txt 13.06.2012 23:36 137.439 priv8-2012-bypass-shell.txt 13.06.2012 23:36 62.716 Private-i3lue.php 13.06.2012 23:36 62.716 Private-i3lue.txt 13.06.2012 23:36 869 pws.txt 13.06.2012 23:36 196.129 r57-bd.txt 13.06.2012 23:36 53.064 r57.1.4.0.php 13.06.2012 23:36 86.594 r57.mod-bizzz.shell.txt 13.06.2012 23:36 100.846 r57.php 13.06.2012 23:36 105.476 r57.txt 13.06.2012 23:36 57.396 r57142.php 13.06.2012 23:36 159.573 r57shell1.40.txt 13.06.2012 23:36 99.940 r57shell2.0.txt 13.06.2012 23:36 87.741 r57_iFX.txt 13.06.2012 23:36 98.533 r57_kartal.txt 13.06.2012 23:36 114.318 r57_Mohajer22.txt 13.06.2012 23:36 72.343 redcod.php 13.06.2012 23:36 131.456 RedhatC99 [login=redhat-pass=root] 13.06.2012 23:36 88.455 remview_fix.php 13.06.2012 23:36 13.466 rootshell.txt 13.06.2012 23:36 9.757 Rootshell.v.1.0.txt 13.06.2012 23:36 520 ru24_post_sh.txt 13.06.2012 23:36 5.121 s72 Shell v1.1 Coding.php 13.06.2012 23:36 5.121 s72 Shell v1.1 Coding.txt 13.06.2012 23:36 2.337 Safe mode breaker.php 13.06.2012 23:36 37.723 Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt 13.06.2012 23:36 38.744 safe0ver.txt 13.06.2012 23:36 5.306 Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php 13.06.2012 23:36 5.306 Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt 13.06.2012 23:36 5.733 Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.txt 13.06.2012 23:36 70.500 shellzx.txt 13.06.2012 23:36 11.627 SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php 13.06.2012 23:36 11.627 SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt 13.06.2012 23:36 12.415 simattacker.txt 13.06.2012 23:36 328 simple-backdoor.txt 13.06.2012 23:36 335 simple_cmd.txt 13.06.2012 23:36 5.164 SimShell 1.0 - Simorgh Security MGZ.php 13.06.2012 23:36 5.164 SimShell 1.0 - Simorgh Security MGZ.txt 13.06.2012 23:36 15.834 small.txt 13.06.2012 23:36 217.408 sniper.txt 13.06.2012 23:36 103.794 SnIpEr_SA Shell.txt 13.06.2012 23:36 35.670 soldierofallah.txt 13.06.2012 23:36 8.101 sosyete.txt 13.06.2012 23:36 8.659 spygrup.txt 13.06.2012 23:36 82.531 sql.php 13.06.2012 23:36 22.304 Sst-Sheller.php 13.06.2012 23:36 40.999 stres.txt 13.06.2012 23:36 114.054 SyRiAn.Sh3ll.v7.txt 13.06.2012 23:36 31.670 ugdevil.v2.0.txt 13.06.2012 23:36 696 up.php 13.06.2012 23:36 279 uploader.txt 13.06.2012 23:36 5.057 WinX Shell.php 13.06.2012 23:36 5.057 WinX Shell.txt 13.06.2012 23:36 2.524 Worse Linux Shell.php 13.06.2012 23:36 2.455 Worse Linux Shell.txt 13.06.2012 23:36 66.032 wso.v2.5.txt 13.06.2012 23:36 65.950 wso2.5.php 13.06.2012 23:36 50.779 wso2.php 13.06.2012 23:36 301.363 x0rg.byp4ss.txt 13.06.2012 23:36 16.304 zacosmall.txt 196 File(s) 12.594.712 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 22.841 all-wcprops 13.06.2012 23:36 33.856 entries 01.10.2012 10:20 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 56.697 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\prop-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 30 cmd.php.svn-base 13.06.2012 23:36 30 list.php.svn-base 13.06.2012 23:36 30 phpshell.php.svn-base 13.06.2012 23:36 30 up.php.svn-base 4 File(s) 120 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 65.652 150.php.svn-base 13.06.2012 23:36 131.446 27.9.txt.svn-base 13.06.2012 23:36 63.228 2mv2.txt.svn-base 13.06.2012 23:36 72.804 404.php.svn-base 13.06.2012 23:36 72.979 404.txt.svn-base 13.06.2012 23:36 5.298 a.php.svn-base 13.06.2012 23:36 76 accept_language.txt.svn-base 13.06.2012 23:36 188.697 acid.php.svn-base 13.06.2012 23:36 17.536 Ajax_PHP Command Shell.txt.1.svn-base 13.06.2012 23:36 17.536 Ajax_PHP Command Shell.txt.svn-base 13.06.2012 23:36 87.075 Ani-Shell.php.svn-base 13.06.2012 23:36 8.998 Antichat Shell v1.3.php.svn-base 13.06.2012 23:36 8.998 Antichat Shell v1.3.txt.svn-base 13.06.2012 23:36 32.664 antichat.php.svn-base 13.06.2012 23:36 190.502 AntiSecShell.v0.5.txt.svn-base 13.06.2012 23:36 45.379 arabicspy.php.svn-base 13.06.2012 23:36 10.144 Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt.svn-base 13.06.2012 23:36 10.421 aZRaiLPhp v1.0.php.svn-base 13.06.2012 23:36 10.421 aZRaiLPhp v1.0.txt.svn-base 13.06.2012 23:36 31.362 b37.php.svn-base 13.06.2012 23:36 20.980 b374k.v1.txt.svn-base 13.06.2012 23:36 105.790 Backdoor.PHP.Agent.php.svn-base 13.06.2012 23:36 6.331 backupsql.txt.svn-base 13.06.2012 23:36 3.188 bdotw44shell.txt.svn-base 13.06.2012 23:36 34 bug (1).php.svn-base 13.06.2012 23:36 34 bug.php.svn-base 13.06.2012 23:36 110.373 bypass.txt.svn-base 13.06.2012 23:36 165.084 c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php.svn-base 13.06.2012 23:36 164.487 c100.txt.svn-base 13.06.2012 23:36 177.014 c37.php.svn-base 13.06.2012 23:36 131.592 c66.php.svn-base 13.06.2012 23:36 171.177 c99-bd.txt.svn-base 13.06.2012 23:36 163.252 c99-shadows-mod.php.svn-base 13.06.2012 23:36 150.555 c99.php.svn-base 13.06.2012 23:36 165.493 c99.txt.svn-base 13.06.2012 23:36 150.692 c993.txt.svn-base 13.06.2012 23:36 44.348 c99madshell.php.svn-base 13.06.2012 23:36 162.242 c99shell.php.svn-base 13.06.2012 23:36 146.412 c99ud.txt.svn-base 13.06.2012 23:36 227.649 c99unlimited.txt.svn-base 13.06.2012 23:36 150.555 c99v2.php.svn-base 13.06.2012 23:36 160.677 c99_2.txt.svn-base 13.06.2012 23:36 229.103 c99_locus7s.txt.svn-base 13.06.2012 23:36 44.351 c99_madnet.txt.svn-base 13.06.2012 23:36 164.114 c99_PSych0.php.svn-base 13.06.2012 23:36 143.062 c99_w4cking.txt.svn-base 13.06.2012 23:36 97.921 cbfphpsh.txt.svn-base 13.06.2012 23:36 47.118 cihshell_fix.php.svn-base 13.06.2012 23:36 345 cmd.php.svn-base 13.06.2012 23:36 70 cmd.txt.svn-base 13.06.2012 23:36 63.065 co.php.svn-base 13.06.2012 23:36 1.460 connect-back.php.txt.svn-base 13.06.2012 23:36 9.622 cpanel.txt.svn-base 13.06.2012 23:36 17.659 cpg_143_incl_xpl.php.svn-base 13.06.2012 23:36 56.135 Crystal.txt.svn-base 13.06.2012 23:36 41.610 CrystalShell v.1.txt.svn-base 13.06.2012 23:36 130.394 ctt_sh.txt.svn-base 13.06.2012 23:36 34.705 Cyber Shell (v 1.0).php.svn-base 13.06.2012 23:36 35.152 cybershell.txt.svn-base 13.06.2012 23:36 43.394 dC3 Security Crew Shell PRiV.txt.svn-base 13.06.2012 23:36 43.394 dC3.Security.Crew.Shell.priv8.txt.svn-base 13.06.2012 23:36 5.512 Dive Shell 1.0 - Emperor Hacking Team.php.svn-base 13.06.2012 23:36 5.512 Dive Shell 1.0 - Emperor Hacking Team.txt.svn-base 13.06.2012 23:36 14.444 DTool Pro.txt.svn-base 13.06.2012 23:36 111.606 Dx.txt.svn-base 13.06.2012 23:36 113.557 DxShell.1.0.txt.svn-base 13.06.2012 23:36 312.076 egy.txt.svn-base 13.06.2012 23:36 43.560 erne.txt.svn-base 13.06.2012 23:36 41.885 ex0shell.txt.svn-base 13.06.2012 23:36 163.992 FaTaLisTiCz_Fx.txt.svn-base 13.06.2012 23:36 168.653 fx.txt.svn-base 13.06.2012 23:36 158.613 Fx29Sh.3.2.12.08.txt.svn-base 13.06.2012 23:36 29.030 g00nshell-v1.3.txt.svn-base 13.06.2012 23:36 32.530 g00nv13.php.svn-base 13.06.2012 23:36 87.220 G5.php.svn-base 13.06.2012 23:36 25.446 GFS web-shell ver 3.1.7 - PRiV8.txt.svn-base 13.06.2012 23:36 64.548 gfs_sh.txt.svn-base 13.06.2012 23:36 584.174 GNY.Shell.v1.1.txt.svn-base 13.06.2012 23:36 2.475 h4ntu shell [powered by tsoi].php.svn-base 13.06.2012 23:36 2.475 h4ntu shell [powered by tsoi].txt.svn-base 13.06.2012 23:36 44.915 hkrkoz.php.svn-base 13.06.2012 23:36 53.740 iMHaPFtp.txt.svn-base 13.06.2012 23:36 18.370 ironshell.txt.svn-base 13.06.2012 23:36 112.002 isko.txt.svn-base 13.06.2012 23:36 112.002 iskorpitx.txt.svn-base 13.06.2012 23:36 65.120 itsecteam.v2.1.txt.svn-base 13.06.2012 23:36 66.403 itsecteam_shell.php.svn-base 13.06.2012 23:36 64.928 jHn.php.svn-base 13.06.2012 23:36 4.884 KAdot Universal Shell v0.1.6.php.svn-base 13.06.2012 23:36 4.656 KAdot Universal Shell v0.1.6.txt.svn-base 13.06.2012 23:36 21.574 knullsh.txt.svn-base 13.06.2012 23:36 19.611 kolang-bypass.txt.svn-base 13.06.2012 23:36 10.010 kral.txt.svn-base 13.06.2012 23:36 2.480 lamashell.txt.svn-base 13.06.2012 23:36 589 list.php.svn-base 13.06.2012 23:36 1.340 Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php.svn-base 13.06.2012 23:36 1.340 Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt.svn-base 13.06.2012 23:36 13.831 load_shell.txt.svn-base 13.06.2012 23:36 233.891 locus.txt.svn-base 13.06.2012 23:36 66.160 log.txt.svn-base 13.06.2012 23:36 13.776 lolipop.txt.svn-base 13.06.2012 23:36 19.828 lostDC.txt.svn-base 13.06.2012 23:36 70.620 ly0kha.txt.svn-base 13.06.2012 23:36 38.230 Macker's Private PHPShell.php.svn-base 13.06.2012 23:36 3.801 matamu.txt.svn-base 13.06.2012 23:36 42.880 megabor.txt.svn-base 13.06.2012 23:36 81.063 metaslsoft.php.svn-base 13.06.2012 23:36 131.446 mini.j0s_ali.j0e.v27.9.txt.svn-base 13.06.2012 23:36 7.180 Moroccan Spamers Ma-EditioN By GhOsT.txt.svn-base 13.06.2012 23:36 16.114 myshell.txt.svn-base 13.06.2012 23:36 34.961 Mysql interface v1.0.txt.svn-base 13.06.2012 23:36 35.803 MySQL Web Interface Version 0.8.php.svn-base 13.06.2012 23:36 34.501 MySQL Web Interface Version 0.8.txt.svn-base 13.06.2012 23:36 52.388 mysql.txt.svn-base 13.06.2012 23:36 17.782 mysqlwebsh.php.svn-base 13.06.2012 23:36 33.081 mysql_tool.txt.svn-base 13.06.2012 23:36 2.592 NCC-Shell.txt.svn-base 13.06.2012 23:36 122.250 NetworkFileManagerPHP.txt.svn-base 13.06.2012 23:36 57.294 newsh.php.svn-base 13.06.2012 23:36 53.629 NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php.svn-base 13.06.2012 23:36 53.629 NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt.svn-base 13.06.2012 23:36 12.817 nshell.txt.svn-base 13.06.2012 23:36 81.594 nst.txt.svn-base 13.06.2012 23:36 81.159 nstview.txt.svn-base 13.06.2012 23:36 185.789 p0isoN.sh3ll.txt.svn-base 13.06.2012 23:36 24.678 PH Vayv.txt.svn-base 13.06.2012 23:36 25.944 PHANTASMA.txt.svn-base 13.06.2012 23:36 37.240 PHP Shell.txt.svn-base 13.06.2012 23:36 2.800 php-backdoor.txt.svn-base 13.06.2012 23:36 46.934 php-include-w-shell.txt.svn-base 13.06.2012 23:36 1.124 pHpINJ.txt.svn-base 13.06.2012 23:36 99.242 PHPJackal.txt.svn-base 13.06.2012 23:36 95.358 phpjackal1.3.txt.svn-base 13.06.2012 23:36 34.754 PHPRemoteView.txt.svn-base 13.06.2012 23:36 8.945 phpshell.php.svn-base 13.06.2012 23:36 28.023 PHPSPY.php.svn-base 13.06.2012 23:36 9.042 Php_Backdoor.txt.svn-base 13.06.2012 23:36 137.439 priv8-2012-bypass-shell.txt.svn-base 13.06.2012 23:36 62.716 Private-i3lue.php.svn-base 13.06.2012 23:36 62.716 Private-i3lue.txt.svn-base 13.06.2012 23:36 869 pws.txt.svn-base 13.06.2012 23:36 196.129 r57-bd.txt.svn-base 13.06.2012 23:36 53.064 r57.1.4.0.php.svn-base 13.06.2012 23:36 86.594 r57.mod-bizzz.shell.txt.svn-base 13.06.2012 23:36 100.846 r57.php.svn-base 13.06.2012 23:36 105.476 r57.txt.svn-base 13.06.2012 23:36 57.396 r57142.php.svn-base 13.06.2012 23:36 159.573 r57shell1.40.txt.svn-base 13.06.2012 23:36 99.940 r57shell2.0.txt.svn-base 13.06.2012 23:36 87.741 r57_iFX.txt.svn-base 13.06.2012 23:36 98.533 r57_kartal.txt.svn-base 13.06.2012 23:36 114.318 r57_Mohajer22.txt.svn-base 13.06.2012 23:36 72.343 redcod.php.svn-base 13.06.2012 23:36 131.456 RedhatC99 [login=redhat-pass=root].svn-base 13.06.2012 23:36 88.455 remview_fix.php.svn-base 13.06.2012 23:36 13.466 rootshell.txt.svn-base 13.06.2012 23:36 9.757 Rootshell.v.1.0.txt.svn-base 13.06.2012 23:36 520 ru24_post_sh.txt.svn-base 13.06.2012 23:36 5.121 s72 Shell v1.1 Coding.php.svn-base 13.06.2012 23:36 5.121 s72 Shell v1.1 Coding.txt.svn-base 13.06.2012 23:36 2.337 Safe mode breaker.php.svn-base 13.06.2012 23:36 37.723 Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt.svn-base 13.06.2012 23:36 38.744 safe0ver.txt.svn-base 13.06.2012 23:36 5.306 Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php.svn-base 13.06.2012 23:36 5.306 Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt.svn-base 13.06.2012 23:36 5.733 Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.txt.svn-base 13.06.2012 23:36 70.500 shellzx.txt.svn-base 13.06.2012 23:36 11.627 SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php.svn-base 13.06.2012 23:36 11.627 SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt.svn-base 13.06.2012 23:36 12.415 simattacker.txt.svn-base 13.06.2012 23:36 328 simple-backdoor.txt.svn-base 13.06.2012 23:36 335 simple_cmd.txt.svn-base 13.06.2012 23:36 5.164 SimShell 1.0 - Simorgh Security MGZ.php.svn-base 13.06.2012 23:36 5.164 SimShell 1.0 - Simorgh Security MGZ.txt.svn-base 13.06.2012 23:36 15.834 small.txt.svn-base 13.06.2012 23:36 217.408 sniper.txt.svn-base 13.06.2012 23:36 103.794 SnIpEr_SA Shell.txt.svn-base 13.06.2012 23:36 35.670 soldierofallah.txt.svn-base 13.06.2012 23:36 8.101 sosyete.txt.svn-base 13.06.2012 23:36 8.659 spygrup.txt.svn-base 13.06.2012 23:36 82.531 sql.php.svn-base 13.06.2012 23:36 22.304 Sst-Sheller.php.svn-base 13.06.2012 23:36 40.999 stres.txt.svn-base 13.06.2012 23:36 114.054 SyRiAn.Sh3ll.v7.txt.svn-base 13.06.2012 23:36 31.670 ugdevil.v2.0.txt.svn-base 13.06.2012 23:36 696 up.php.svn-base 13.06.2012 23:36 280 Uploader.txt.svn-base 13.06.2012 23:36 5.057 WinX Shell.php.svn-base 13.06.2012 23:36 5.057 WinX Shell.txt.svn-base 13.06.2012 23:36 2.524 Worse Linux Shell.php.svn-base 13.06.2012 23:36 2.455 Worse Linux Shell.txt.svn-base 13.06.2012 23:36 66.032 wso.v2.5.txt.svn-base 13.06.2012 23:36 65.950 wso2.5.php.svn-base 13.06.2012 23:36 50.779 wso2.php.svn-base 13.06.2012 23:36 301.363 x0rg.byp4ss.txt.svn-base 13.06.2012 23:36 16.304 zacosmall.txt.svn-base 196 File(s) 12.594.713 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PHP\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 23.851 cgitelnet.txt 13.06.2012 23:36 1.032 cmd.pl 13.06.2012 23:36 1.993 dc.pl 13.06.2012 23:36 1.978 list.pl 13.06.2012 23:36 19.631 Perl Web Shell by RST-GHC.pl 13.06.2012 23:36 12.836 up.pl 6 File(s) 61.321 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 676 all-wcprops 13.06.2012 23:36 1.241 entries 01.10.2012 10:20 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 1.917 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\prop-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 30 cmd.pl.svn-base 13.06.2012 23:36 30 list.pl.svn-base 13.06.2012 23:36 30 up.pl.svn-base 3 File(s) 90 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 23.851 cgitelnet.txt.svn-base 13.06.2012 23:36 1.032 cmd.pl.svn-base 13.06.2012 23:36 1.993 dc.pl.svn-base 13.06.2012 23:36 1.978 list.pl.svn-base 13.06.2012 23:36 19.631 Perl Web Shell by RST-GHC.pl.svn-base 13.06.2012 23:36 12.836 up.pl.svn-base 6 File(s) 61.321 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Backdoors\PL\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 01.10.2012 10:20 <DIR> Perl 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 68 all-wcprops 13.06.2012 23:36 242 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 310 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 31.834 AlpHaNiX.IRC.v1.5.txt 13.06.2012 23:36 36.907 AlpHaNiX.SQLi.v2.0.txt 13.06.2012 23:36 21.252 scane.txt 13.06.2012 23:36 29.017 sexi.txt 13.06.2012 23:36 32.482 shellbot.pl 5 File(s) 151.492 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 588 all-wcprops 13.06.2012 23:36 1.070 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 1.658 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 31.834 AlpHaNiX.IRC.v1.5.txt.svn-base 13.06.2012 23:36 36.907 AlpHaNiX.SQLi.v2.0.txt.svn-base 13.06.2012 23:36 21.252 scane.txt.svn-base 13.06.2012 23:36 29.017 sexi.txt.svn-base 13.06.2012 23:36 32.482 shellbot.pl.svn-base 5 File(s) 151.492 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Bots\Perl\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 01.10.2012 10:20 <DIR> Exploits 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 69 all-wcprops 13.06.2012 23:36 247 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 316 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 01.10.2012 10:20 <DIR> pma 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 78 all-wcprops 13.06.2012 23:36 251 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 329 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 35 conf 13.06.2012 23:36 178 go 13.06.2012 23:36 145 mass 13.06.2012 23:36 0 pma 13.06.2012 23:36 83 README 13.06.2012 23:36 206 tmp 13.06.2012 23:36 3.192 xpl 7 File(s) 3.839 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 720 all-wcprops 13.06.2012 23:36 1.324 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 2.044 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 35 conf.svn-base 13.06.2012 23:36 178 go.svn-base 13.06.2012 23:36 145 mass.svn-base 13.06.2012 23:36 0 pma.svn-base 13.06.2012 23:36 83 README.svn-base 13.06.2012 23:36 206 tmp.svn-base 13.06.2012 23:36 3.192 xpl.svn-base 7 File(s) 3.839 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Honey\Exploits\pma\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 01.10.2012 10:20 <DIR> .svn 13.06.2012 23:36 663 httpflood.php 13.06.2012 23:36 3.504 multiflood.php 13.06.2012 23:36 648 slowloris.php 13.06.2012 23:36 2.471 udp-flood.php 4 File(s) 7.286 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 524 all-wcprops 13.06.2012 23:36 900 entries 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 01.10.2012 10:20 <DIR> text-base 01.10.2012 10:20 <DIR> tmp 2 File(s) 1.424 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\text-base 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 663 httpflood.php.svn-base 13.06.2012 23:36 3.504 multiflood.php.svn-base 13.06.2012 23:36 648 slowloris.php.svn-base 13.06.2012 23:36 2.471 udp-flood.php.svn-base 4 File(s) 7.286 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\tmp 01.10.2012 10:20 <DIR> . 01.10.2012 10:20 <DIR> .. 13.06.2012 23:36 <DIR> prop-base 13.06.2012 23:36 <DIR> props 13.06.2012 23:36 <DIR> text-base 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\tmp\prop-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\tmp\props 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Directory of D:\dload\web-malware-collection-13-06-2012.tar\web-malware-collection-13-06-2012\web-malware-collection\Malicious Scripts\.svn\tmp\text-base 13.06.2012 23:36 <DIR> . 13.06.2012 23:36 <DIR> .. 0 File(s) 0 bytes Total Files Listed: 567 File(s) 27.926.168 bytes 353 Dir(s) 44.035.633.152 bytes free Download source
  10. SmartDeblur The SmartDeblur is a tool for restoration of defocused and blurred images. Algorithm based on Wiener deconvolution. Supported defect types: Out of Focus blur (with kernel deep tuning) Motion blur SmartDeblur uses the FFTW library which provides fast fourier tranformation implementation. See FFTW Home Page for details Author: Vladimir Yuzhikov (yuvladimir@gmail.com) Sceenshots Main Window: Features Real-time parameters changes applying (without any preview button) Full resolution processing (without small preview window) Deep tuning of kernel parameters Easy and friendly user interface Download Version 0.48: SmartDeblur-0.48-win.zip License SmartDeblur is provided under the GPL v3 license source
  11. e smart phone nu "military phone" voi vreti ceva http://cdnimg.visualizeus.com/thumbs/02/74/einstein,perfect,man-027436479074fc8f35afb7c1ee2b2d87_h.jpg
  12. sa faca teste la ei in laboratur, nu sa-mi planga inima cand vad bunatate de telefon cum se distruge in cateva milisecunde, cand dai 1k $ pe el nu prea il scapi edit: sunt telefoane si laptop-uri rezistente la soc special construite pentru asta... take a look
  13. ce oameni fac teste pe telefoane... nu s-ar uita si la altii care n-au iPhone, sa faca un gest caritabil.. asta e lumea in care traim edit: chiar nu inteleg scopul acestui drop test, vrei telefon rezistent? = Nokia 5210
  14. Errors in decoding.
  15. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide author: Lee Allen http://www.mediafire.com/view/?w9djsbawnybtr0x
  16. Automatic building mapping could help emergency responders A prototype sensor array that can be worn on the chest automatically maps the wearer’s environment, recognizing movement between floors. MIT researchers have built a wearable sensor system that automatically creates a digital map of the environment through which the wearer is moving. The prototype system, described in a paper slated for the Intelligent Robots and Systems conference in Portugal next month, is envisioned as a tool to help emergency responders coordinate disaster response. The prototype sensor included a stripped-down Microsoft Kinect camera (top) and a laser rangefinder (bottom), which looks something like a camera lens seen side-on. In experiments conducted on the MIT campus, a graduate student wearing the sensor system wandered the halls, and the sensors wirelessly relayed data to a laptop in a distant conference room. Observers in the conference room were able to track the student’s progress on a map that sprang into being as he moved. Connected to the array of sensors is a handheld pushbutton device that the wearer can use to annotate the map. In the prototype system, depressing the button simply designates a particular location as a point of interest. But the researchers envision that emergency responders could use a similar system to add voice or text tags to the map — indicating, say, structural damage or a toxic spill. “The operational scenario that was envisioned for this was a hazmat situation where people are suited up with the full suit, and they go in and explore an environment,” says Maurice Fallon, a research scientist in MIT’s Computer Science and Artificial Intelligence Laboratory, and lead author on the new paper. “The current approach would be to textually summarize what they had seen afterward — ‘I went into this room on the left, I saw this, I went into the next room,’ and so on. We want to try to automate that.” Fallon is joined on the paper by professors John Leonard and Seth Teller, of, respectively, the departments of Mechanical Engineering and of Electrical Engineering and Computer Science (EECS), and EECS grad students Hordur Johannsson and Jonathan Brookshire. Shaky aim The new work builds on previous research on systems that enable robots to map their environments. But adapting the system so that a human could wear it required a number of modifications. One of the sensors that the system uses is a laser rangefinder, which sweeps a laser beam around a 270-degree arc and measures the time that it takes the light pulses to return. If the rangefinder is level, it can provide very accurate information about the distance of the nearest walls, but a walking human jostles it much more than a rolling robot does. Similarly, sensors in a robot’s wheels can provide accurate information about its physical orientation and the distances it covers, but that’s missing with humans. And as emergency workers responding to a disaster might have to move among several floors of a building, the system also has to recognize changes in altitude, so it doesn’t inadvertently overlay the map of one floor with information about a different one. Maurice Fallon, a research scientist in MIT’s Computer Science and Artificial Intelligence Laboratory, demonstrates how the sensor is worn. So in addition to the rangefinder, the researchers also equipped their sensor platform with a cluster of accelerometers and gyroscopes, a camera, and, in one group of experiments, a barometer (changes in air pressure proved to be a surprisingly good indicator of floor transitions). The gyroscopes could infer when the rangefinder was tilted — information the mapping algorithms could use in interpreting its readings — and the accelerometers provided some information about the wearer’s velocity and very good information about changes in altitude. Adjudicating the data from all the other sensors is the camera. Every few meters, the camera takes a snapshot of its surroundings, and software extracts a couple of hundred visual features from the image — particular patterns of color, or contours, or inferred three-dimensional shapes. Each batch of features is associated with a particular location on the map. Seeing is believing If the person wearing the sensors returns to an area that he or she has previously visited, the system’s location estimate could be off: For instance, its compensation for the tilt of the rangefinder might not have been perfect, and a wall now looks several feet farther away than it did, or its inference of position from accelerometer data could be off. In such cases, a fresh snapshot and a comparison of the visual features with those already stored can help correct its location estimate. The prototype of the sensor platform consists of a handful of devices attached to a sheet of hard plastic about the size of an iPad, which is worn on the chest like a backward backpack. The only sensor whose volume can’t be reduced significantly is the rangefinder, so in principle, the whole system could be shrunk to about the size of a coffee mug. Wolfram Burgard, a professor of computer science at the University of Freiburg in Germany, says that the MIT researchers’ work is on the general topic of SLAM, or simultaneous localization and mapping. “Originally, this came out as a problem of robotics,” Burgard says. “This idea of having a SLAM system that is attached to a human’s body, for figuring out where it is, is actually innovative and pretty useful. For first responders, a technology like this one might be highly relevant.” “With a robot, we typically assume that the robot lives in a plane,” Burgard continues. “What they definitely tackled is the problem of height and dealing with staircases, as the human walks up and down. The sensors are not always straight, because the body shakes. These are problems that they tackle in their approach, and where it actually goes beyond the standard 2-D SLAM.” Both the U.S. Air Force and the Office of Naval Research supported the work. source
  17. At a security conference a scary demonstration showed that a single line of HTML code can remotely wipe out a Samsung Galaxy S III handset. Worse: It appears to work on many Samsung smartphones that run TouchWiz, which is most of Samsung’s line of handsets. Be careful what links you click: A single line of HTML code can wipe the data on certain Samsung smartphones running Google’s Android software. The issue is specific to Samsung phones that also use the company’s TouchWiz software, says SlashGear, which actually means most of the current Samsung smartphones. Google’s Galaxy Nexus, also made by Samsung, is not affected by the exploit, which was demonstrated by Ravi Borganokar at the Ekoparty security conference. Borganokar’s session, titled “Dirty use of USSD Codes in Cellular Network” demonstrated the issue when he tapped a link that causes Samsung’s TouchWiz phone dialer to execute the data wipe. Such codes are commonly used to register a phone on a network or perform other phone-level diagnostics, but this becomes an issue because TouchWiz automatically dials the code when the link is tapped. Here’s a video demonstration and explanation of the issue: The short line of HTML code, Borganokar says, can also be executed through an embedded QR code or NFC wireless transfer. Even worse than an unintended factory restore or data wipe, this exploit can render the phone’s SIM card useless. Some will surely condemn Android as a whole for this issue, but since it’s specific to Samsung’s TouchWiz software — likely as a feature to quickly dial phone numbers by way of links, QR codes or NFC data — the problem is limited to Samsung devices. I’d expect that Samsung releases a patch to disable the automatic phone dialing soon. As a long-time Android user, however, these security — or insecurity issues, rather — are getting old in general. I mainly use Android devices because they fit my mantra of “use the best tool for the task at hand.” As someone embedded deeply in Google’s world of apps and data, Android simply works better. Even my limits are getting tested though: An open platform that can be endlessly tweaked is great until the wrong folks are tweaking it. via One line of HTML can wipe or reset Samsung smartphones — Mobile Technology News
  18. Security researchers have discovered security shortcomings in Windows 8 that create a means to infect the upcoming operating system with rootkit-style malware. Italian security consultants ITSEC discovered the security hole following an analysis of the Unified Extensible Firmware Interface (UEFI), a successor to the legacy BIOS firmware interface, that Microsoft began fully supporting with 64-bit versions of Windows 7. ITSEC analysed the UEFI platform now that Microsoft has ported old BIOS and MBR's boot loader to the new UEFI technology in Windows 8. Andrea Allievi, a senior security researcher at ITSEC, was able to use the research to cook up what's billed as the first ever UEFI bootkit designed to hit Windows 8. The proof-of-concept malware is able to defeat Windows 8's Kernel Patch Protection and Driver Signature Enforcement policy. The UEFI boot loader developed by Allievi overwrites the legitimate Windows 8 UEFI bootloader, bypassing security defences in the process. "Our bootloader hooked the UEFI disk I/O routines and it intercepted the loading of the Windows 8 kernel, thus our bootkit tampered the kernel by disabling the security features used by Windows to prevent the loading of unsigned drivers," explains Marco Giuliani, a director of ITSEC. The bootkit developed by ITSEC is comparable to forms of older MBR (Master Boot Record) rootkits that overwrite system files of older version of Windows. Bootkits capable of taking over Windows 8 machines have been around since last November but these earlier proof-of-concept nasties didn't circumvent UEFI, unlike the latest research. Previously boot loaders and rootkits had to be developed in assembly language. But UEFI creates a means to develop system loaders much more straightforwardly using the easier C programming language, making thing easier for both legitimate developers and VXers. "Our research attempts to show the industry that the new UEFI platform is still as insecure as the old BIOS technology, it's still vulnerable to the old attacks if the SecureBoot technology is not turned on by default," Giuliani told El Reg. "Writing a bootkit couldn't be an easier task for virus writers with the UEFI framework available, much easier than before when they needed to code in pure assembly. "The UEFI platform will soon become the new field of war between malware writers and the security industry unless SecureBoot is used to ensure that only digitally signed UEFI bootloaders can be executed at the system bootup." Giuliani also said that - although it's desirable from a security perspective - enabling SecureBoot by default effectively limits user choice. ITSEC's detailed technical analysis of the Windows 8 implementation of UEFI, and its potential security shortcomings, can be found here. The research by ITSEC follows the creation of a UEFI bootkit able to infect Mac's OS X operating systems, which was unveiled at this year's edition of the BlackHat Conference in Las Vegas by Australian security researchers Assurance. ® http://www.youtube.com/watch?v=xKgz4Y_sNjo via New vicious UEFI bootkit vuln found for Windows 8 • The Register
  19. SHA-3 to Be Announced NIST is about to announce the new hash algorithm that will become SHA-3. This is the result of a six-year competition, and my own Skein is one of the five remaining finalists (out of an initial 64). It's probably too late for me to affect the final decision, but I am hoping for "no award." It's not that the new hash functions aren't any good, it's that we don't really need one. When we started this process back in 2006, it looked as if we would be needing a new hash function soon. The SHA family (which is really part of the MD4 and MD5 family), was under increasing pressure from new types of cryptanalysis. We didn't know how long the various SHA-2 variants would remain secure. But it's 2012, and SHA-512 is still looking good. Even worse, none of the SHA-3 candidates is significantly better. Some are faster, but not orders of magnitude faster. Some are smaller in hardware, but not orders of magnitude smaller. When SHA-3 is announced, I'm going to recommend that, unless the improvements are critical to their application, people stick with the tried and true SHA-512. At least for a while. I don't think NIST is going to announce "no award"; I think it's going to pick one. And of the five remaining, I don't really have a favorite. Of course I want Skein to win, but that's out of personal pride, not for some objective reason. And while I like some more than others, I think any would be okay. Well, maybe there's one reason NIST should choose Skein. Skein isn't just a hash function, it's the large-block cipher Threefish and a mechanism to turn it into a hash function. I think the world actually needs a large-block cipher, and if NIST chooses Skein, we'll get one. via https://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html
      • 1
      • Upvote
  20. TOKYO: As Bob Dylan and the Rolling Stones prove, good music lasts a long time; now Japanese hi-tech giant Hitachi says it can last even longer -- a few hundred million years at least. A woman holds up Japanese electronics giant Hitachi's new quartz glass plate which can be used to store data indefinitely. (AFP - Yoshikazu Tsuno) The company on Monday unveiled a method of storing digital information on slivers of quartz glass that can endure extreme temperatures and hostile conditions without degrading, almost forever. And for anyone who updated their LP collection onto CD, only to find they then needed to get it all on MP3, a technology that never needs to change might sound appealing. "The volume of data being created every day is exploding, but in terms of keeping it for later generations, we haven't necessarily improved since the days we inscribed things on stones," Hitachi researcher Kazuyoshi Torii said. "The possibility of losing information may actually have increased," he said, noting the life of digital media currently available -- CDs and hard drives -- is limited to a few decades or a century at most. And the rapid development of technologies has resulted in frequent changes of data-reading hardware. "As you must have experienced, there is the problem that you cannot retrieve information and data you managed to collect," said Torii, apparently referring to now-obsolete record players and cine films. Hitachi's new technology stores data in binary form by creating dots inside a thin sheet of quartz glass, which can be read with an ordinary optical microscope. Provided a computer with the know-how to understand that binary is available -- simple enough to programme, no matter how advanced computers become -- the data will always be readable, Torii said. The prototype storage device is two centimetres square and just two millimetres thick and made from quartz glass, a highly stable and resilient material, used to make beakers and other instruments for laboratory use. The chip, which is resistant to many chemicals and unaffected by radio waves, can be exposed directly to high temperature flames and heated to 1,000 degrees Celsius for at least two hours without being damaged. It is also waterproof, meaning it could survive natural calamities, such as fires and tsunami. "We believe data will survive unless this hard glass is broken," said senior researcher Takao Watanabe. The material currently has four layers of dots, which can hold 40 megabytes per square inch, approximately the density on a music CD, researchers said, adding they believe adding more layers should not be a problem. Hitachi has not decided when to put the chip to practical use but researchers said it could start with storage services for government agencies, museums and religious organisations. - AFP/ir via Hitachi unveils glass slivers that store data forever - Channel NewsAsia
  21. Tracking Hackers through Cyber space Sherri DAVIDOFF Jonathan HAM foreword by DANIEL E. GEER, JR,, SC.D. Read http://www.mediafire.com/view/?kfgtsbi1ib3hvqg
  22. ShareXmod is an open-source program that lets you take screenshots, save them in your clipboard, hard disk or upload them to over 20 different remote locations. ShareXmod can capture screenshots with different shapes: rounded rectangle, ellipse, triangle, diamond, polygon and also free hand. It can also upload images, text files and all other different file types. It is able to capture screenshots with transparency and shadow. The program also supports drag n drop, clipboard upload and Windows Explorer integration. Built on the solid foundation of ZUploader, ShareXmod combines features in both ZScreen and ZUploader. Such features are: Greenshot Image Editor to annotate images after you capture screenshots Folder Monitor to drop files to upload or to use as a target folder to capture webpages from browsers using browser extensions After upload wizard to show all different URL types so you can copy them to a wiki, forum post or as HTML code Automatically indexes the folder content if have a folder path in your clipboard and provides a link to the index e.g. [C#] Folder PATH listing for volume DATA Volume serial number is 00D7-87F9 E:\TV\CR - Pastebin.com Watermark support In addition to above features, ShareXmod is a derivative of ShareX and therefore has: An improved Shape capture compared to ZUploader with magnifier and cross hairs from ZScreen Features unique to ShareXmod: Customizable work flows where you can create work flows and assign keyboard shortcuts for them After capture wizard to dynamically choose whether to copy to clipboard, annotate image or to upload to remote host Documentation author: mcored source
  23. We have been upgrading and adding new servers for capacity increases as we always do. Unfortunately, due to the more updated technology and expanded storage space, some of our older systems are no longer able to keep up with demand. These servers have been used by Wikimedia Foundation on different projects for over 3 years and are no longer covered by their warranty. These are good systems though, and while we may overload them and need replacements, they are more than suitable for many non-profits to use. We’re donating some of our older servers to like-minded US non-profits, who can apply by e-mail to show their interest. Most systems (but possibly not all) have the following specifications: Dual CPU 2.5 GHz Intel® Xeon® some may have AMD processors 2-8GB RAM Most servers have multiple HDD A majority are manufactured by Dell while others by SUN Microsystems We’re donating some of our older servers to like-minded US non-profits, who can apply by e-mail to show their interest. Disclaimers: The Wikimedia Foundation does not guarantee the operation or use of these servers in any shape or form. They are old, some may have dying fans, bad HDD sectors, and the like. Servers have been wiped of information, and they ran through that, but no promises on function! Also, most servers have rails, but occasionally one may not, and we do not sort through them for these things. However, most are standard Dell 1u servers and getting replacement rails is fairly simple. Some servers are well over 3 years old, we do not just turn off servers when they hit the 3 year mark, we turn them off when they are no longer worth using in any role or function on our cluster in a reliable manner. In most cases, it is simply the hardware technology has updated to the point that a new server is much faster, and since we demand high performance of our servers, it is worth upgrading for our needs. We try to only donate servers to other US non-profits whose core values are similar or in support of our own. This means we do not donate them for individual use. Since these servers were purchased with donations to support the Wikimedia Foundation, we feel we need to further donate them to other like-minded organizations, since that is how the money for the servers was meant to be spent. This means that we cannot, in good conscience, donate these servers for profit or personal use to individuals or corporations. If you are a US organization and you would like to receive some of these servers for your NON-PROFIT use, please email servers@wikimedia.org, applications should only be made via email. Applications in this post’s comments will NOT be accepted. TO BE ELIGIBLE, YOUR EMAIL MUST INCLUDE THE FOLLOWING: Subject: Server Decommissioning Donations for <NONPROFIT NAME HERE> Your name, contact information, relationship with non-profit requesting the servers Registered non-profit name and proof of status Organization’s website Information on the non-profit, who they are, what their mission statement and goals are. Shipping address information for a FedEx Ground delivery to where the servers need to go. How the servers will be used. (We like to know and share with folks!) Please keep in mind that deciding where these go is pretty tough, so the more detailed you can be in your email is best. (i.e. ‘Wikimedia uses these for our sites.’ is pretty vague where ‘Wikimedia is the non-profit foundation that runs Wikipedia. Server donations to us would be used to run our websites that allow access to Wikipedia and its sister projects.’ is a lot nicer. Also, by submitting and possibly accepting servers from us, you are giving us permission to post about it here on our technical blog. The submission period will remain open no less than two weeks from this posting. Donating decommissioned servers — Wikimedia blog
  24. e Stuff tools
×
×
  • Create New...