Hacking may refer to: [http://en.wikipedia.org/wiki/Hacking]
How to create a rogue CA certificate...
We (note Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger) have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.
"A single attempt for constructing a chosen-prefix collision costs about a little more than a day. The first stage consisting of the birthday search is computationally the most expensive. Luckily it is also very suited for the special SPU cores of the Cell Processor that the Sony PlayStation 3 uses. We had about 200 PS3s at our disposal, located at the "PlayStation Lab" of Arjen Lenstra at EPFL, Lausanne, Switzerland (see the picture). The birthdaying takes about 18 hours on the 200 PS3s using 30GB of memory that was equally divided over the PS3s. The second stage computes the 3 collision blocks that eliminate the
Note: only certificate signed with MD5 are forgeable, and it required a lot of knowledge and money at the moment... unfortunately these are things that spammer, thief and zombies network have at disposal. By luck as soon as Verisign switch to a more secure hashing function, the problem will be solved (Verisign will phase MD5 by January out)
Note2: even a geek need 1 week to understand the explanations ;-)
Read more at http://www.win.tue.nl/hashclash/rogue-ca/
I use the hard way, free but a bit more difficult as it require a rooted device, I personally use “Android Terminal Emulator” with granted root permissions (after typing su a prompt will appear)
su (enter) mount -o rw,remount /system (enter) rm -r /system/app/FILE-NAME-HERE.apk (enter)
This application got installed without my knowledge by a Samsung update as a System App that CANNOT BE UN INSTALLED!
First before I forgot: Go to hell Samsung and Intelligent Apps GmbHIf either of you continue in that direction, installing software without my prior permission, the next update to my Samsung Galaxy S3 will be CyanogenMod 10
Back to the removal of MyTaxi, Samsung did hide taxi.android.client_v2.5.1.apk under the name /system/app/samsung_ch.apk
To remove it
su (enter) mount -o rw,remount /system (enter) rm -r /system/app/samsung_ch.apk (enter)
|http://www.snocud.pf/zerofil/neogeo.htm||Convert a NeoGeo pad and use it on your PC.|
|http://www.neogeousa.com/mods/svideo.html||"S-Video can offer a much better video signal for those with newer televisions..." |
+ Some notes about svideo mods
|http://nfg.2y.net/games/neorgb/||Study about the decrease of RGB output quality circuitry.|
|http://www.nickthfury.com/neogeo/cdmods.htm||Neo Geo CD mods, Neo Geo AES mods. Great site|
|http://www.gamesx.com/importmod/neocd5060.htm||NEO GEO CD 50-60Hz Mod|
|http://www.gamesx.com/importmod/neocdzcon.htm||NEO CDZ Import modification|
I already saw this at the french robotic cup in 1999, here is Your chance to buy a mature kit: the Xport 2.0. You can now create amazing robot creations with a Game Boy and some LEGOs....
The new Xport 2.0 turns the Game Boy Advance (GBA) into a powerful embedded development system.
Combine with a game boy advance, you have among other things a system:
|A SECURITY flaw could allow hackers to eavesdrop on cellphone conversations made on Bluetooth-based wireless headsets was revealed in april 2004...But at that time an expensive piece of hardware was needed. Now it is even worse a simple brute force while the device are doing keyring exchange...|
"Whitehouse showed in 2004 that a hacker could arrive at this link key without knowing the PIN using a piece of equipment called a Bluetooth sniffer. This can record the exchanged messages being used to derive the link key and feed the recordings to software that knows the Bluetooth algorithms and can cycle through all 10,000 possibilities of the PIN. Once a hacker knows the link keys, Whitehouse reasoned they could hijack the device."
Now the new attack force the two bluetooth devices to pair, they can work out the link key in just 0.06 seconds on a Pentium IV-enabled computer, and 0.3 seconds on a Pentium-III
Some PDFs on the internet have a copy protection to make sure you cannot copy-paste any content from the PDF into a document you're writing. Defeating this protection is very easy as you will see in this post.
I will use a combination of Open Source tools to extract the content of a protected PDF..
The Raspberry Pi is a credit-card sized computer that plugs into your TV and a keyboard. It’s a capable little PC which can be used for many of the things that your desktop PC does, like spreadsheets, word-processing and games. It also plays high-definition video. We want to see it being used by kids all over the world to learn programming.
We don’t think that the Raspberry Pi is a fix to all of the world’s computing issues; we do believe that we can be a catalyst. We want to see cheap, accessible, programmable computers everywhere; we actively encourage other companies to clone what we’re doing. We want to break the paradigm where without spending hundreds of pounds on a PC, families can’t use the internet. We want owning a truly personal computer to be normal for children. We think that 2012 is going to be a very exciting year. [About Raspberry PI]
Disclaimer: I don’t recommend vShare or any other alternatives to Install .IPA files. The only reason of this post is to help users try out paid apps before they decide to purchase them. This post do not support piracy or piracy-related apps.
I recommend you to use instead Android since you can test any paid application for 24h and get a refund if you are not satisfied!
You will need:
Only 2 steps are required
After you’ve installed AppSync, do the following:
Privacy Statement | Copyright Notice | Licenses
© 1999-2012 Waltercedric.com. Designed by Cédric Walter. Sitemap
Reproduction without explicit permission is prohibited. All Rights Reserved. All photos remain copyright © their rightful owners. No copyright infringement is intended.
Disclaimer: The editor(s) reserve the right to edit any comments that are found to be abusive, offensive, contain profanity, serves as spam, is largely self-promotional, or displaying attempts to harbour irrelevant text links for any purpose.