Jump to content

Fi8sVrs

Active Members
  • Posts

    3206
  • Joined

  • Days Won

    87

Everything posted by Fi8sVrs

  1. Agentia Spatiala Americana, NASA, a anuntat recent deschiderea centrului sau de sustenabilitate. Numite Ames Research Center, cladirile sunt de fapt primele avanposturi lunare construite vreodata. Constructiile sunt in Moffett Field, Canada, SUA si au castigat de curand certificarea Platinum LEED - cea mai inalta in materie de constructii prietenoase cu mediul, functionale si locuibile. Directorul Centrului de Cercetare Ames, Pete Worden, a descris acest centru ca "prima cladire de pe Luna, construita pe Pamant". Asadar asa vor arata bazele lunare, daca vor fi construite vreodata pe suprafata satelitului nostru natural. Tehnologia din aceste cladiri este una care apartine maidegraba viitorului, fiind similara cu cea de pe Statia Orbitala Internationala. Inclusiv sistemele de reciclare a apei sunt prezente, asta ducand la economii de 90% in privinta consumului de apa. Peretii cladirii sunt incalziti prin conducte speciale cu apa termala, iar energia consumata provine de la panourile solare in care este "invelit" centrul. Practic, aceasta constructie genereaza mai multa energie decat consuma, iar excesul este stocat. Image: Aerial of Sustainability Base Image credit: NASA/Eric James http://www.nasa.gov/centers/ames/images/content/637289main_ACD10-0037-293.jpg http://www.nasa.gov/centers/ames/images/content/637291main_ACD10-0037-191.jpg In Sustainability Base, computational fluid dynamics (CFD) is used to simulate environmental flows in- and outside the building. Above figure shows a CFD simulation of NASA Ames, where surfaces are colored by Mach number. The new building is in the foreground Image credit: NASA Ames NAS The new facility has embedded repurposed NASA technologies, including NASA’s advanced computational fluid dynamic (CFD) tools. Above image shows CFD flows of NASA Ames, where surfaces are colored by pressure. The new building is in the background. Image credit: NASA Ames NAS scr Asa arata primele baze lunare construite de NASA. "Suntem gata sa ne mutam". FOTO - Yahoo! ?tiri România scr NASA - Digital Press Kit - NASA Ames Sustainability Base
  2. Mul?umesc
  3. Error 404 - page not found
  4. Description This is a very simple way to build yourself a small scale SMTP to SMS gateway, to allow you to send emails to your mobile phone. Requirements Old mobile phone with a pre-paid phone card, so you won't end up with a nasty bill. http://www.e-things.org/smtp2sms/images/mobile_phone.png Data cable http://www.e-things.org/smtp2sms/images/phone_cable.png Phone charger http://www.e-things.org/smtp2sms/images/phone_charger.png Linux PC (Pentium 120Mhz with 32MB RAM) http://www.e-things.org/smtp2sms/images/pc_486.png Gnokii gnokii.org - Home Installation Connect your phone to COM1 (/dev/ttyS0) using your data cable. Download and install Gnokii. su - rpm -ivh ftp://ftp.gnokii.org/pub/gnokii/binaries/RedHat/gnokii-0.4.3-1.i386.rpm rpm -ql gnokii # List files more /usr/share/doc/gnokii-0.4.3/COPYING more /usr/share/doc/gnokii-0.4.3/CREDITS more /usr/share/doc/gnokii-0.4.3/README cp /usr/share/doc/gnokii-0.4.3/gnokiirc ~/.gnokiirc vi ~/.gnokiirc # set "model = " to suite your phone # set "connection = " to suite your cable # in my case I set # "model = 7110" # "connection = dau9p" # and had to comment out "require_dcd = 1" # Now test that gnokii can find your phone gnokii --monitor # send yourself an SMS echo "Test SMS message" | gnokii --sendsms [your mobile number] Example POP3 to SMS Perl script #!/usr/bin/perl use Net::POP3; my $mail_server="mailserver"; my $username="username"; my $password="password"; my $phoneNumber="phonenumber"; my $gnokii = "|/usr/bin/gnokii --sendsms $phoneNumber"; my $pop = Net::POP3->new($mail_server) or die "Can't open connection to $mail_server : $!\n"; defined ($pop->login($username, $password)) or die "Can't authenticate: $!\n"; $messages = $pop->list or die "Can't get list of undeleted messages: $!\n"; foreach my $msgid (keys %$messages) { my $email = $pop->get($msgid); unless (defined $email) { warn "Couldn't fetch $msgid from server: $!\n"; next; } my $header=1; my $message = ""; # $message is a reference to an array of lines foreach (@$email) { if ($_ =~ /^\n/ && $header == 1) { $header = 0; } if ($header == 1 &&; /^From:\s/) { my ($from) = ($_ =~ /([\w\d\.-_]+@[\w\d\.-]+)/); $from =~ s/[\<\>]//g; $message .= "Frm $from\n"; } if ($header == 1 && /^Subject:\s/) { my ($subject) = ($_ =~ s/^Subject:/Sbj/g); $message .= "$_"; } if ($header == 0) { s/are/R/gi; s/you/U/gi; s/before/B4/gi; s/see\syou/CU/gi; # etc, etc. $message .= "$_"; } } # limit to SMS 160 char limit. $message = substr($message, 0, 160); # send this message open(GNOKII, $gnokii) or die "$0: Could not open $gnokii\n"; print GNOKII $message; close GNOKII; # mark message to be deleted at quit below $pop->delete($msgid); } $pop->quit($mail_server); exit 0; scr
  5. Japan's Ogaki Kyoritsu bank is preparing to roll out biometric ATMs that will allow users to access their accounts by scanning their hand, and entering their birthdate and PIN number. They will be the first machines that do not require cards. Customers at select locations of the bank will register their biometric data with their branch where it will be stored in conjunction with their numerical data. These will then authenticate a person's account. There are ATMs that make use of some level of biometrics — whether it is a scanning the unique patterns of a finger, palm or iris. The difference is these scans are used in conjunction with cards — you can't use one without the other. The addition of this combination of scans and cards were originally used to combat card skimming — where all the data is copied off a user's card. The scan was an extra safety measure. The move to the completely card-less system being trialed in Japan has a surprising origin. A large number of customers lost their cards and other forms of ID after the 2011 Tohoku earthquake — this new system would allow clients access to their accounts in emergency situations. It is just one of the many innovations the Japanese have created to ride out a catastrophe. Of course, it goes without saying that not having another card to fiddle around with would also be pretty convenient. Source
  6. ai pm
  7. Forum: Linkuri Postati aici doar linkurile despre securitate!
  8. Passwords - SkullSecurity http://leetupload.com/dbindex2/index.php?dir=Word%20Lists/ http://rapidshare.com/files/305013757/dictionaries-vince213333.part01.rar http://rapidshare.com/files/305013804/dictionaries-vince213333.part02.rar http://rapidshare.com/files/305028222/dictionaries-vince213333.part03.rar http://rapidshare.com/files/90611743/purehates_word_list.part1.rar http://rapidshare.com/files/90620632/purehates_word_list.part2.rar http://rapidshare.com/files/90628318/purehates_word_list.part3.rar http://rapidshare.com/files/90636711/purehates_word_list.part4.rar http://rapidshare.com/files/90639703/purehates_word_list.part5.rar https://rstcenter.com/forum/50984-python-dictionary-file-maker-v0-2-a.rst
  9. exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering. Nebula Nebula covers a variety of simple and intermediate challenges that cover Linux privilege escalation, common scripting language issues, and file system race conditions. Nebula is an ideal place to get started for people new to Linux exploitation. Protostar Protostar introduces basic memory corruption issues such as buffer overflows, format strings and heap exploitation under "old-style" Linux system that does not have any form of modern exploit mitigiation systems enabled. Protostar is the next progression from Nebula. Fusion Fusion continues the memory corruption, format strings and heap exploitation but this time focusing on more advanced scenarios and modern protection systems. Fusion is the place to start if you are familiar with Linux exploitation and wish to learn more about exploitation prevention systems. scr
  10. a mai fost https://rstcenter.com/forum/50575-os.rst
  11. fc.tape — rotate css-sprites like cinema tape! Download v0.1 10 kb fc.tape — jQuery widget for sprite animations. For the widget to work you need: jQuery (1.6+), jQuery UI (1.8+) Core and Widget, and certainly a sprite with animation frames. fc.tape — rotate css-sprites like cinema tape! scr
  12. daca apeleaza 333 va observa ca nu a primit
  13. Comenzi USA sunt de incredere, trimite-le linkul si codul produsului, folosind pagina CONTACT, pentru a afla comisionul.
  14. Today, we introduce a new unit to Code Year: HTML and CSS. You'll learn how to build and customize webpages, and eventually combine this with your JavaScript knowledge to add interactivity and animation to websites. Code Year » Week 13: Build a Webpage Code Year: Week 13: Build a Webpage | Codecademy via mail
  15. “GooDork is for the few people who enjoy being creative about hacking/information gathering!” Some of you may have heard about Google Dorking/Hacking and even fewer have heard about GooDork.py a new designed to super charge you’re google dorking, and can even be used as front end for sqlmap (mass pwnage!) if you’re bash scripting is good enough! GooDork? Very simply put GooDork is a python script that allows you to perform Google Search queries from the comfort of your command line (Bleach fans, you can think of this as a Shikai). The real power of GooDork lies in its ability to let you run regular expressions on the attributes of the results of a Google Search (BANKAI!). Let me rephrase that, you run a query, this query will return a couple of results (URLs), these results will be web pages (or rather URLs to web pages), you then have the ability to run regular expressions on these web pages and be returned a list of results containing links to only those pages that satisfied your regular expression(s). So whats these regular expression stuff? Before you can come to truly appreciate the power of GooDork, you need to master regular expressions! Regular expressions can be thought of as little programs that help you specify how a string should be matched. They are expressions that detail the structure of a string. For instance, we can write a regex that will match all strings with a given range of characters in them, or one that matches strings with only a specific repetition of chars. These little buggers are incredibly powerful! If you wanna read more about them check out the links at the end of the post Vulnerability Scanning: Okay so how do use GooDork to find vulnerabilities? Actually quite easily! It just takes a bit of practice. I’m actually gonna show you what I personally use GooDork for. If we are to do vulnerability scanning with GooDork, we need to make sure we know what to look for, in this example I’ll show you how do find a specific SQL injection vulnerability in a CMS. Basically what ill be showing you is how I fingerprint CMSs (learn to recognize them) and then we will write a regex for GooDork that will make sure to find links to only the vulnerable web applications. So we gonna look for web pages with the MediaSolusi SQLi (MediaSolusi - SQL Injection Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode) i know its quite random, but I need to show you guys how to use GooDork properly, as an information gathering tool! So lets get started, our aim is to find out the few details that “tag” or mark all these vulnerable web pages, over here half the job is done by knowing that if they are running the mentioned CMS then theres a good chance that the web page is vulnerable at least in the way described. The report will have you believe that the best way to find these vulnerable servers is by Dorking: inurl:"/products/category/?id=" nm=" intext:"All rights reserved. - By Media Kreasi" But I never settle for just a google dork, there are details that a Google dork cannot specify, this is why I make use of regex to hunt vulnerabilities in GooDork so lets see what we can find out, I start with this command GooDork starting up ./GooDork.py intext:%22All%20rights%20reserved.%20-%20By%20Media%20Kreasi%22 -a[\\w]* I’ve urlencoded the ” and space chars, to make it appear as a single argument to python. the first argument to the script is the dork I want to run, the one quoted above using the “intext:” directive, I choose not to use the inurl, because Google blows a gasket, if you use it in general Im not interested in the known vulnerabilities, I’m interested in fingerprinting the CMS The second argument is a lil hack I came up with, -a is the argument to specify regex to search for in the anchor tag of the pages, the regex I give it matches any alphanumeric character, which will cause GooDork to print out all the anchors on all the pages / you should spend some time checking out the anchors, you might find some interesting stuff, for instance what i found is in the screen shot: GooDork loot The vulnerability report above details that we find it based on URL value, and that the script in the category sub directory is the vulnerable, I bet the script in the product subdirectory is as well. So what we established here as well is that the anchors of vulnerable CMS contain hrefs like the ones in the screen shot. So our next task will be to find all the pages with anchor tags like the ones above. Oh wait heres something interesting i found when i ran this dork as well authd?IDKEY= lols you’ve gotta be insane to put that in an anchor! Anyway back to the hunt! We wanna find specific URLs in a pages anchor tags , one of the example URLS looks as follows: PT. Duta Plastik Industri - Plastic Forming - Plastik Kemasan - Kemasan Plastik We need to write a regex that matches every part of the string. Basically the string consits of a protocol spec,domain and a query-string. I skipped the “http://” part of the regex purely because I was lazy lols! But the regex I came up with was: “([\w]+)\.([\w]+)\.([\w]+)/([\w_-]|/)*\?([\w_-].*?)(=|%3D)([\d].*?)” I know it looks ascii art that grew up next to a nuclear power plant, but if you start trying to build your won regexes you’ll see how easy they are to use! I’ll break down that regex, this what everything is there for: ([\w]+) — matches the first part of the domain \. — matches a dot ([\w]+) — matches the second part of the domain \. — another dot ([\w]+) — the final part of the domain / — the slash demarcating the path ([\w_-]|/)* — matches the first work after the path \? — the query delimiter ([\w_-].*?) — the keyword (=|%3D) — an = sign or its urlencoding ([\d].*?) — an argument for the keyword, im betting on only decimal data here! Oh I should have used number instead of bullets here, but just do you know (if you don’t), order does matter!! This regex is pretty generic, but i did build it straight from one of the sample URLs to make sure it works, at returns exactly what i want, here’s me building the regex Building a regex There is something you need to remember when running a regex, and thats escaping properly, remeber that you will be supplying your regex via the command line. you will need to escape somethings for bash and somethings for regex, the things you escape for regexes sake! for instance notice in the following screen shot how i escape the parenthesis and | chars so bash doesn’t interpret them but them! You also need to wary of the \w special chars because of the \ in them, bash will assume you are escaping the “w” with the “\” so to make sure it doesn’t escape the w we need to escape the escape character its self like this: “\\w”, the first \ protects the second \ Running the dork And the results? We actually get only sites vulnerable to the SQL injection Proofs in the pudding GooDork: https://github.com/k3170makan/GooDork <— Download Keith (k3170) Makan: GooDork : Super Charging your Google Hacking Regular expressions: 7.2. re — Regular expression operations — Python v2.7.2 documentation Regular expression - Wikipedia, the free encyclopedia 8 Regular Expressions You Should Know | Nettuts+ Scr: GooDork.py as a Vulnerability Scanner | The ProjectX Blog – Information Security Redefined
  16. CaptchaTrader - The most affordable CAPTCHA bypass service you'll find This method is: 95.9% accurate(last time I checked). This program uses the site captchatrader.com and you'll need an account there. import urllib, urllib2, sys if len(sys.argv )<2: sys.exit("the first argument should be the captcha file") url = "http://api.captchatrader.com/submit" api_key = "API_KEY" passwd = "PASSWORD" user = "USERNAME" img = base64.b64encode(open(sys.argv[1]).read()) values = {'api_key' : api_key,'password' : passwd,'username' : user, 'value':img} data = urllib.urlencode(values) req = urllib2.Request(url, data) response = urllib2.urlopen(req) the_page = response.read().split(",") the_page = the_page.replace("\"", "") the_page = the_page.replace("]", "") print the_page[1] Just change the variables the top to your credentials then run it using these arguments: python captcha.py '/image/location/image.jpg' Solve any Captcha
  17. #!/usr/bin/env python #Python Dictionary File Maker v0.2 #Written By: Absolution import os, string, time, hashlib, math,sys from itertools import product, chain bench = 0 def UI(): print "Dictionary Maker v0.2" print "Written By: Absolution" print ''' 1 - Make Dictionary 2 - Benchmark System 3 - Exit ''' ui = raw_input("What would you like to do? => ") if ui == '1': DictInfo() elif ui == '2': Benchmark() elif ui == '3': exit() def DictInfo(): print ''' 1 - Lowercase Letters 2 - Uppercase Letters 3 - Numbers 4 - Uppercase & Lowercase 5 - Uppercase, Lowercase & Numbers 6 - Uppercase, Lowercase & Punctuation 7 - Uppercase, Lowercase, Numbers & Punctuation 8 - Enter your own charset ''' charset = raw_input("Which charset to use? => ") maxfilesize = raw_input("Enter max size of each file (MB) => ") minlength = raw_input("Enter min length => ") maxlength = raw_input("Enter max length => ") maxlength = int(maxlength) + 1 md5 = raw_input("Include MD5 Hash? (Y or N) => ") MakeDict(charset, maxfilesize, minlength, maxlength, md5) def MakeDict(charset, maxfilesize, minlength, maxlength, md5): global bench #Load charset for dictionary maker to use if charset == '1': letters = string.ascii_lowercase elif charset == '2': letters = string.ascii_uppercase elif charset == '3': letters = string.digits elif charset == '4': letters = string.ascii_letters elif charset == '5': letters = string.ascii_letters + string.digits elif charset == '6': letters = string.ascii_letters + string.punctuation elif charset == '7': letters = string.ascii_letters + string.digits + string.punctuation elif charset == '8': letters = raw_input("Enter characters to use => ") else: print 'No valid char set was chosen.' DictInfo() combinations = 0 totalsize = 0 for z in range(int(minlength),int(maxlength)): combs = math.pow(int(len(letters)), z) combinations = int(combinations) + int(combs) size = int(combs) * z totalsize = int(totalsize) + int(size) wspace = int(combinations) * 2 totalsize = int(totalsize) + int(wspace) if md5 == "Y": md5calc = int(combinations) * 34 totalsize = int(totalsize) + int(md5calc) if totalsize < 1000: sizeappend = "bytes" elif totalsize > 1000 and totalsize < 1000000: sizeappend = "kB" totalsize = int(totalsize) / 1000 elif totalsize > 1000000 and totalsize < 1000000000: sizeappend = "MB" totalsize = int(totalsize) / 1000000 elif totalsize > 1000000000 and totalsize < 1000000000000: sizeappend = "GB" totalsize = int(totalsize) / 1000000000 elif totalsize > 1000000000000: sizeappend = "TB" totalsize = int(totalsize) / 1000000000000 #Creates variable for filename y = 1 #Dictionary iteration filename = 'dict' #Change name to whatever you want extension = '.txt' #Change extension to whatever you want dictfile = (filename + str(y) + str(extension)) #File name variable print ("Writing dictionary that contains the charset %s, with a min length of %s characters and a max length of %s characters." % (letters, minlength, str(int(maxlength) -1))) print ("You have selected %i different combinations, the output file size will be about %i %s" % (combinations, totalsize, sizeappend)) if bench > 0: estimatedtime = int(combinations) / int(bench) estimatedtime = int(estimatedtime) / 60 print("It is estimated that the dictionary creation will take %i minutes to complete" %(estimatedtime)) startstop = raw_input("Are you sure you wish to continue? (Y or N) => ") if startstop == "N": exit() starttime = time.time() #Create dictionary words try: f = open(dictfile,'w') #Initially opens file for x in xrange(int(minlength),int(maxlength)): my_chain = product(letters, repeat=x) print ("Writing %i letter words..." % (x)) for char_set in my_chain: word = string.join(char_set) #Join letters together in list word = string.replace(word, ' ', '') #Strip out whitespace f.write(word + '\n') #Writes current word to file if md5 == 'Y': hash = hashlib.md5(word).hexdigest() f.write(hash + '\n') #When each word is written to file, check filesize filesize = os.path.getsize(dictfile) #Get current filesize filesize = int(filesize)/1048576 #Convert to MB if int(filesize) >= int(maxfilesize): print ('%s has reached %i MB. Closing file and making a new one' % (dictfile, filesize)) print ("Last written word was " + str(word)) f.close() #Close current file y = int(y) + 1 #Move to next file number dictfile = (filename + str(y) + str(extension)) #Update filename variable print ('Opening new dictionary file called ' + dictfile) f = open(dictfile,'w') #Open new file for writing except KeyboardInterrupt or StandardError or TypeError as error: f.close() print ('Process interrupted...' + str(error)) #When done: f.close() #Finished so close the file finishtime = time.time() totaltime = int(finishtime) - int(starttime) print ("Finished!\n %i dictionary file(s) were created and your files are located in folder %s" %(y, os.getcwd())) print ('Time Taken: %s seconds' % (str(totaltime))) UI() def Benchmark(): global bench benchfile = "benchmark.txt" print("Creating benchmark test file...") benchstart = time.time() try: f = open(benchfile,'w') for x in xrange(1,5): chain = product('abcdefghijklmnopqrstuvwxyz', repeat=x) print ("Writing %i letter words..." % (x)) for char_set in chain: word = string.join(char_set) #Join letters together in list word = string.replace(word, ' ', '') #Strip out whitespace f.write(word + '\n') f.close() benchstop = time.time() benchtime = int(benchstop) - int(benchstart) bench = 475254 / int(benchtime) except ZeroDivisionError or IOError or ArithmeticError as error: print "There was an error, trying again." Benchmark() print("Your computer has been benched at %i words per second" %(bench)) print("Removing benchmark test file...") os.remove(benchfile) UI() UI() mirror scr
  18. Mandriva Linux Security Advisory 2012-037 - The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message. The updated packages have been patched to correct this issue. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:037 http://www.mandriva.com/security/ _______________________________________________________________________ Package : cyrus-imapd Date : March 23, 2012 Affected: 2010.1, 2011., Enterprise Server 5.0 _______________________________________________________________________ Problem Description: A vulnerability has been found and corrected in cyrus-imapd: The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message (CVE-2011-3481). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3481 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: ff7b707f8503a52f3467c76cdc106ba0 2010.1/i586/cyrus-imapd-2.3.15-10.4mdv2010.2.i586.rpm daefe2c80fc7145df902c43dbf5ad50d 2010.1/i586/cyrus-imapd-devel-2.3.15-10.4mdv2010.2.i586.rpm e41ea7bf9c749026d4cd6516f6feeaf5 2010.1/i586/cyrus-imapd-murder-2.3.15-10.4mdv2010.2.i586.rpm fb6e2825a8824598ee5ae2aadd7fa12a 2010.1/i586/cyrus-imapd-nntp-2.3.15-10.4mdv2010.2.i586.rpm ebd016a661dfa7bdc042fc9140f61dd9 2010.1/i586/cyrus-imapd-utils-2.3.15-10.4mdv2010.2.i586.rpm 7888ab862ca17b0c55ad3fc52da1d858 2010.1/i586/perl-Cyrus-2.3.15-10.4mdv2010.2.i586.rpm 1b4c9cf68d17d2cab8dcab01255a1ac2 2010.1/SRPMS/cyrus-imapd-2.3.15-10.4mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 839604c4fe14a2ed84a32e810592119d 2010.1/x86_64/cyrus-imapd-2.3.15-10.4mdv2010.2.x86_64.rpm b3596d7e78caf7b1005948a462e70785 2010.1/x86_64/cyrus-imapd-devel-2.3.15-10.4mdv2010.2.x86_64.rpm ae18e2b89957dd50dbb6d284df8fa96e 2010.1/x86_64/cyrus-imapd-murder-2.3.15-10.4mdv2010.2.x86_64.rpm 049293e08b36cb86adb51b7f4eabae7f 2010.1/x86_64/cyrus-imapd-nntp-2.3.15-10.4mdv2010.2.x86_64.rpm 6670e23271557683218681c812dc3b52 2010.1/x86_64/cyrus-imapd-utils-2.3.15-10.4mdv2010.2.x86_64.rpm ed418a8cd77a041e1a060f97715fd489 2010.1/x86_64/perl-Cyrus-2.3.15-10.4mdv2010.2.x86_64.rpm 1b4c9cf68d17d2cab8dcab01255a1ac2 2010.1/SRPMS/cyrus-imapd-2.3.15-10.4mdv2010.2.src.rpm Mandriva Linux 2011: 671d5fab777fe892fdb17f746c0911af 2011/i586/cyrus-imapd-2.3.16-7.2-mdv2011.0.i586.rpm 684c26b361c8cfa2ea2f2904a4eb1c9a 2011/i586/cyrus-imapd-devel-2.3.16-7.2-mdv2011.0.i586.rpm fbcce805ef0ff3450191f42a2c03239d 2011/i586/cyrus-imapd-murder-2.3.16-7.2-mdv2011.0.i586.rpm 7bd6dddf40fee59fa1e205a1381cb55c 2011/i586/cyrus-imapd-nntp-2.3.16-7.2-mdv2011.0.i586.rpm 2e30c67b93cd77e0b93375d52c6ba3fd 2011/i586/cyrus-imapd-utils-2.3.16-7.2-mdv2011.0.i586.rpm 3b419c6a279bcd7014785ac08190a7a3 2011/i586/perl-Cyrus-2.3.16-7.2-mdv2011.0.i586.rpm ae4016358f3fb65f8848e7dfacfe51b8 2011/SRPMS/cyrus-imapd-2.3.16-7.2.src.rpm Mandriva Linux 2011/X86_64: c2d51a8608ec4b4e60dbf519efeb27a4 2011/x86_64/cyrus-imapd-2.3.16-7.2-mdv2011.0.x86_64.rpm 987ba5349ff108ecdd9196fc04a129b6 2011/x86_64/cyrus-imapd-devel-2.3.16-7.2-mdv2011.0.x86_64.rpm 7280d308aeacd0c4a42cfb8fa81d98ef 2011/x86_64/cyrus-imapd-murder-2.3.16-7.2-mdv2011.0.x86_64.rpm d87a595ef6b0c8ac1e33b95bc80a4b26 2011/x86_64/cyrus-imapd-nntp-2.3.16-7.2-mdv2011.0.x86_64.rpm 78103c0c3e65bec8b0e74cb0646da2de 2011/x86_64/cyrus-imapd-utils-2.3.16-7.2-mdv2011.0.x86_64.rpm 708d80352c941535db1543235212587f 2011/x86_64/perl-Cyrus-2.3.16-7.2-mdv2011.0.x86_64.rpm ae4016358f3fb65f8848e7dfacfe51b8 2011/SRPMS/cyrus-imapd-2.3.16-7.2.src.rpm Mandriva Enterprise Server 5: c3a25d81605b459b404904d8796d9371 mes5/i586/cyrus-imapd-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm 8041c5f3799dce70901249eb1785d4a3 mes5/i586/cyrus-imapd-devel-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm c6b4f04e130aac5fabc2fa292634bb17 mes5/i586/cyrus-imapd-murder-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm adc9eead0e01c35a3e7d6f8b229ed3e8 mes5/i586/cyrus-imapd-nntp-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm f308073537087528015e1055733681c9 mes5/i586/cyrus-imapd-utils-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm db3487fafeba5b0b2382ccc02634965c mes5/i586/perl-Cyrus-2.3.12-0.p2.4.4mdvmes5.2.i586.rpm ad67978598b453b082cd41fc0ee523dc mes5/SRPMS/cyrus-imapd-2.3.12-0.p2.4.4mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 19410e71050d4c838089ec0a2e903812 mes5/x86_64/cyrus-imapd-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm 4cb70d841875aaf93a190b5fa9880467 mes5/x86_64/cyrus-imapd-devel-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm ddd5ca10ccf664eb339eb82d33c92359 mes5/x86_64/cyrus-imapd-murder-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm 72a0bf64084c54108b9195d296e75908 mes5/x86_64/cyrus-imapd-nntp-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm f2e109e2aafcdf58e5eb8d60ed9e965f mes5/x86_64/cyrus-imapd-utils-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm 137056e0d077cfb799a70d1249d0a45f mes5/x86_64/perl-Cyrus-2.3.12-0.p2.4.4mdvmes5.2.x86_64.rpm ad67978598b453b082cd41fc0ee523dc mes5/SRPMS/cyrus-imapd-2.3.12-0.p2.4.4mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFPbGb1mqjQ0CJFipgRAh1/AKC2qlbRESOUD1PBqzrPi+55cMssxgCbB8Tu pozYe8cYq/oqsWnM8dlDo9M= =Mhy0 -----END PGP SIGNATURE----- scr: packetstormsecurity.org
  19. Globals DB now has APIs to support .NET, Java, and Node.js development. This comes two weeks before we start our 4th Globals Challenge, see Globals for more details . See the release info below: <release-info> Subject: Introducing a New Globals Version – v2012.296 We are very pleased to announce that a new version of Globals (v2012.296) is now available on the Globals Community Website: Globals This new version has a number of enhanced features and bug fixes, which have been incorporated into the Globals software since our last Globals release – v2011.111. This new release introduces the long-awaited .NET API for the Globals Database, along with corrections and enhancements to the existing Java & Node.js APIs. To download this new software, visit the Download page of the Globals website: Globals For a detailed list of all of the new features added to this release, please read the “Globals Release Notes – v2012.296?, also available on the Globals Download page. Globals v2012.296 is available immediately for the following platforms: Apple Mac OS X 10.6 for x86-64 Microsoft Windows XP Pro, Server 2003 SP2, Server 2008, Vista, 7,, 7 SP1 for x86-32 Microsoft Windows Server 2003 SP2, Server 2008, Vista, 7, 7 SP1 for x86-64 Red Hat Enterprise Linux Advanced Platform 5, 6, 6.1 for x86-32 Red Hat Enterprise Linux Advanced Platform 5, 6, 6.1 for x86-64 SUSE Linux Enterprise Server 11 SP1 for x86-32 SUSE Linux Enterprise Server 11 SP1 for x86-64 This platform list is the same as for Globals 2011.111 We look forward to your involvement in the Globals Community. </release-info> scr: globalsdb.wordpress.com
  20. @flux mai e valabil https://rstcenter.com/forum/50626-reselleri-la-produsele-mele-vrei-20-euro.rst ? ti-am trimis pm
  21. AMD has finally released the open-source driver code to support the Radeon HD 7000 "Southern Islands" GPUs and next-generation Fusion "Trinity" APUs under Linux with their open-source driver. Alex Deucher of AMD fired off an email to the DRI development list this afternoon with a set of 48 patches attached to provide the Southern Islands and Trinity DRM support patches, which will now need to land into the mainline Linux kernel. With the set of 48 patches also comes new microcode for Southern Islands and Trinity. The Southern Islands microcode consists of Tahiti, Pitcirn, and Verde. The Trinity microcode is for the Aruba codename. With this Radeon DRM/KMS driver enablement there is initial DCE6 display watermark support, support for CRTC power-gating, support for the Southern Islands internal thermal sensor, support for SI GPU reset, a VM CS (Command Stream) checker, and the other code necessary for this new hardware enablement. The Linux 3.4 kernel merge window opened this week and will remain open through next week. Let's hope these Radeon DRM/KMS patches will be cleared immediately for part of the DRM pull and make it into the Linux 3.4 kernel. It's unfortunate that the Radeon HD 7000 series open-source support is coming months late (I've been talking about the S.I. open-source driver support since last November, with many HD 7000 series Linux updates since), but at least it's here now and that the Trinity Fusion APU support is coming at the same time. As of right now, however, I haven't seen the new Gallium3D driver for Mesa be introduced yet for the Radeon HD 7000 series nor any Trinity patches. The Radeon DRM patches were published just minutes ago, so hopefully the Gallium3D and xf86-video-ati patches are still on the agenda for this afternoon. You can see my Radeon HD 7950 Linux review from earlier this month using the proprietary Catalyst Linux driver. Additional Radeon HD 7950 Linux benchmarks are forthcoming, plus soon as the xf86-video-ati/Gallium3D patches are ready to go with these new Radeon kernel patches, there will be open-source Linux benchmarks. On the AMD Fusion "Trinity" APU side, there's already some early Linux findings. [Phoronix] AMD Publishes Open-Source HD 7000, Trinity Code
  22. Introducing PayPal Here: The Future of Commerce for Small Business PayPal has a long history of helping small businesses. For 14 years we’ve provided the tools and services that have allowed millions of small businesses to grow by solving the complex and critical task of processing payments securely and easily in more than 190 countries. Helping small business owners get paid is in our DNA. That’s why I’m excited to unveil PayPal Here, a new payments solution that will help small businesses get paid – whether they do business online, offline or on mobile. PayPal Here is the world’s first global mobile payment solution that allows small businesses to accept almost any form of payment. It’s designed to help those merchants make more sales and grow their business with confidence. And it gives them choices. They can accept payments by swiping cards with a fully encrypted thumb-sized card reader, or use a phone camera to scan and process cards and checks. It also allows them to invoice directly from the mobile app and, of course, accept PayPal in a brand new way. So, you’re asking, how is this different from other small business mobile payment solutions? The key differentiator is that it comes from PayPal, a trusted brand in the online payments industry with more than 100 million customers around the globe and years of proven payment innovation, driving growth for millions of businesses globally. PayPal Here comes with our world-class fraud management capabilities, and our 24×7 live customer support. In addition to accepting more payment methods, PayPal Here offers a simple flat rate of 2.7% for card swipes and PayPal payments. Merchants are also given a business debit card for quick access to their funds and 1% cash back on eligible purchases – which means if you use the debit card, your fees are actually just 1.7%! PayPal Here is just the latest addition to our comprehensive suite of payment solutions for small businesses – from PCI-compliant checkout options and invoicing, to debit cards and mobile-optimized checkout. With PayPal Here, we are now able to serve as a one-stop shop for online, offline and multi-channel small businesses. http://www.youtube.com/watch?v=x5woIGSOLGk We’re happy to be helping small businesses around the globe take the pain out of payments and let them focus on what they do best – running their business and growing their customer base. PayPal Here is available today exclusively for select merchants in the United States, Canada, Australia and Hong Kong. It will open to all other merchants in those countries next month. And we’ll announce the availability of PayPal Here in more countries soon. Be sure to visit www.paypal.com/here to get the free app and card reader as soon as it’s widely available. Feel free to let us know what you think in the comments below! –David Marcus, Vice President of Mobile, PayPal https://www.thepaypalblog.com/2012/03/paypal-here/
  23. https://rstcenter.com/forum/50245-xtscrack-rdp-audit-tool.rst
  24. check PM ps: http://www.vonfelten.com/blog/2007/06/05/referral-url-from-session-using-php/
×
×
  • Create New...