Hits | SV (NI)
- 2,210,177 hits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Bits of Bytes' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
- BSides – If you missed an event, catch the next one
- But Macs don’t get viruses
- Free Information Technology Books
- Netgear WNR2000v2 – Mods and DD-WRT all for $3
- GUI Maintenance Program for MySQL / MSSQL and Windows
- Defrag multiple drives at the same time
- (In My Opinion) – Best Dedicated Photo Resizer Out There
- A 5 Stars Windows Repair Utility
- Test Your Hard Drive Speed With Windows 7's Device Manager
- Rufus USB boot and Hiren's Boot ISO
- What is core parking and should you adjust it?
- Realtek PCIe GBE Family Controller performance issues
- Commands in Telnet - DD-WRT and Tomato routers
- Release Mouse From VirtualBox
- Defending your network with Snort for Windows
- See What Ports are Open on Your Computer and What is a Port Number?-Updated
- Red X on network icon - Windows 7
- NTop for Windows
- CVE-2011-4403 (zen_cart)Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.php.
- CVE-2012-2930 (tinywebgallery)Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers.php via the user parameter to admin/index.php.
- CVE-2012-2932 (tinywebgallery)Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/index.php.
- CVE-2012-5451 (tvmobili)Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 188.8.131.5274 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.
- CVE-2014-6090 (curam_social_program_management)Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 184.108.40.206 iFix8, 6.0.4 before 220.127.116.11 iFix10, and 6.0.5 before 18.104.22.168 allow remote attackers to hijac […]
- CVE-2011-4403 (zen_cart)
- Annual Craft Advisory meeting - TCAT-S read about accomplishments from the past year.. goo.gl/gHGZvq 1 hour ago
- Will Robinson, Advisory Council Member, coordinated with Nissan to donate a Nissan Pathfinder to the Auto Tech class http://t.co/pS9lefhHot 1 hour ago
- Jack Darden wins Distinguished Alumni Award. goo.gl/UFdEic http://t.co/DvElTmcB3q 1 hour ago
- TNReconnect.gov- Free college? 5/15 deadline. Don't live near Shelbyville? TCATs- goo.gl/7Xtz6F http://t.co/f544elkavk 1 day ago
- Technical College May Now Be Free In Tennessee, But Few Seem To Realize It - Nashville Public Radio goo.gl/Xdl9Sf #TNReconnect 3 days ago
Tag Archives: Hacking
The term MitM’d means man in the middle. Usually refers to a device or program that intercepts traffic between a source and a target.
I encourage my students to go over and visit Rick, Paul and Bill’s blog. In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections. Great Article. With our students going through some … Continue reading
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs? You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading
ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading
While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading