1 Rootkit Hunter 1.3.6 By packetstormsecurity.com Published On :: Mon, 30 Nov 2009 22:01:27 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
1 Another File Integrity Checker 2.15 By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:44:33 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Rootkit Hunter 1.3.8 By packetstormsecurity.com Published On :: Thu, 18 Nov 2010 00:42:04 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
1 Another File Integrity Checker 2.16 By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 11:07:22 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Malmon Detection Tool 0.1b By packetstormsecurity.com Published On :: Fri, 21 Jan 2011 20:11:11 GMT Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory. Full Article
1 Another File Integrity Checker 2.17 By packetstormsecurity.com Published On :: Fri, 10 Jun 2011 21:53:34 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Another File Integrity Checker 2.18 By packetstormsecurity.com Published On :: Tue, 11 Oct 2011 01:59:54 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Another File Integrity Checker 2.19 By packetstormsecurity.com Published On :: Wed, 16 Nov 2011 04:08:37 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Another File Integrity Checker 2.21 By packetstormsecurity.com Published On :: Tue, 17 Jul 2012 00:25:58 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 Another File Integrity Checker 3.1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2012 01:36:53 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
1 1 In 20 Android Apps Hit By Apache Cordova Flaw By packetstormsecurity.com Published On :: Thu, 28 May 2015 13:47:45 GMT Full Article headline phone flaw google apache
1 Adobe Plagued By 16-Month-Old XSS Bug By packetstormsecurity.com Published On :: Thu, 14 May 2009 08:22:15 GMT Full Article adobe xss
1 FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 18:04:28 GMT FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server. Full Article
1 FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 02:19:30 GMT FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root. Full Article
1 FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa By packetstormsecurity.com Published On :: Wed, 15 May 2019 15:30:08 GMT FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations. Full Article
1 FreeBSD Security Advisory - FreeBSD-SA-19:07.mds By packetstormsecurity.com Published On :: Wed, 15 May 2019 15:47:43 GMT FreeBSD Security Advisory - On some Intel processors utilizing speculative execution a local process may be able to infer stale information from microarchitectural buffers to obtain a memory disclosure. An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser). Full Article
1 Hacktivism Activity And Chatter Has Markedly Dropped Since 2016 By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:25:32 GMT Full Article headline hacker government anonymous
1 Ebola Outbreak Reaches City Of 1 Million Residents By packetstormsecurity.com Published On :: Sat, 15 Dec 2018 14:26:52 GMT Full Article headline africa science
1 Hacker 1x0123 Claims He Has More Leaked NSA Files To View - If You Can Solve This Puzzle By packetstormsecurity.com Published On :: Thu, 25 Aug 2016 13:39:18 GMT Full Article headline hacker government data loss flaw cyberwar cisco juniper nsa
1 Slackware Security Advisory - Slackware 14.2 kernel Updates By packetstormsecurity.com Published On :: Fri, 08 Nov 2019 15:37:19 GMT Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues. Full Article
1 Slackware Security Advisory - Slackware 14.2 kernel Updates By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:22:09 GMT Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues. Full Article
1 Slackware Security Advisory - Slackware 14.2 kernel Updates By packetstormsecurity.com Published On :: Thu, 09 Jan 2020 15:06:22 GMT Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues. Full Article
1 Oracle Spoils Your Day With Nearly 150 Patches By packetstormsecurity.com Published On :: Thu, 16 Jan 2014 04:00:14 GMT Full Article headline flaw patch oracle blackberry java
1 Blackberry In $1.4 Billion Deal To Buy Cylance By packetstormsecurity.com Published On :: Sat, 17 Nov 2018 14:33:11 GMT Full Article headline blackberry
1 More Than 1.5 Million WordPress Blogs Defaced By packetstormsecurity.com Published On :: Fri, 10 Feb 2017 16:13:31 GMT Full Article headline hacker flaw wordpress
1 10,000 WordPress Sites Hacked To Launch Epic Malvertising By packetstormsecurity.com Published On :: Mon, 30 Jul 2018 16:26:27 GMT Full Article headline malware flaw wordpress
1 WordPress Accounted For 90 Percent Of All Hacked CMS Sites In 2018 By packetstormsecurity.com Published On :: Tue, 05 Mar 2019 14:36:53 GMT Full Article headline hacker privacy data loss flaw wordpress
1 WordPress Releases 14 Fixes In Latest Security Updates By packetstormsecurity.com Published On :: Sat, 16 Mar 2019 15:33:07 GMT Full Article headline flaw patch wordpress
1 WP-VCD Malware Is No. 1 In WordPress Infections Since August By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:03 GMT Full Article headline malware fraud wordpress
1 AWS S3 Server Leaks Data From Fortune 100 Companies: Ford, Netflix, TD Bank By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:03 GMT Full Article headline privacy amazon data loss
1 Ring Reportedly Shared Video And Map Data With Police In 2018 By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 17:15:21 GMT Full Article headline government privacy usa amazon spyware
1 Alexa Records You Up To 19 Times A day By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:50:35 GMT Full Article headline privacy amazon spyware
1 Check Out These 12 New Hubble Images By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:42:42 GMT Full Article headline space science
1 Falcon 9 Backlog Delays Canada's $1B Surveillance Project By packetstormsecurity.com Published On :: Wed, 14 Nov 2018 15:25:13 GMT Full Article headline canada space spyware science
1 Dassault Systèmes Q3 and YTD Total Revenue and EPS Growth Up Double-digits; On Track for 5-year Doubling of non-IFRS EPS to €3.50 for 2019 By www.3ds.com Published On :: Thu, 24 Oct 2019 08:44:53 +0200 VÉLIZY-VILLACOUBLAY, France — October 24, 2019 — Dassault Systèmes (Euronext Paris: #13065, DSY.PA) announces IFRS unaudited financial results for the third quarter and nine months ended September 30, 2019. These results were reviewed by the Group’s Board of Directors on October 23, 2019. This press release also includes financial information on a non-IFRS basis with reconciliations included in the Appendix to this communication. All IFRS and non-IFRS figures are presented in compliance... Full Article Investors
1 Medidata Accelerates Launch of myMedidata Platform, Responding to COVID-19 By www.3ds.com Published On :: Fri, 24 Apr 2020 14:17:34 +0200 Medidata Accelerates Launch of myMedidata Platform, Responding to COVID-19 Full Article
1 Hacker Owes Nintendo $1.3M By packetstormsecurity.com Published On :: Tue, 09 Feb 2010 11:11:12 GMT Full Article hacker nintendo
1 rec16lx.zip By packetstormsecurity.com Published On :: Sun, 14 Dec 2003 22:46:32 GMT REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files). Full Article
1 typsoft110.txt By packetstormsecurity.com Published On :: Wed, 04 Feb 2004 20:03:00 GMT TYPSoft FTP Server 1.10 for Windows 9X and WinNT is vulnerable to a denial of service attack when a blank username is supplied. Full Article
1 genie_v13.zip By packetstormsecurity.com Published On :: Wed, 22 Feb 2006 20:32:33 GMT Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.3 Archive password is set to p4ssw0rd. Use at your own risk. Full Article
1 genie_v14.zip By packetstormsecurity.com Published On :: Wed, 08 Mar 2006 05:43:51 GMT Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.4 Archive password is set to p4ssw0rd. Use at your own risk. Full Article
1 genie_v151.zip By packetstormsecurity.com Published On :: Wed, 19 Apr 2006 22:00:17 GMT Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.5.1 Archive password is set to p4ssw0rd. Use at your own risk. Full Article
1 genie_v17.zip By packetstormsecurity.com Published On :: Thu, 04 Jan 2007 04:02:20 GMT Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.7. Archive password is set to p4ssw0rd. Use at your own risk. Full Article
1 igmpbomb-v1.4.zip By packetstormsecurity.com Published On :: Mon, 21 May 2007 04:12:33 GMT This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code. Full Article
1 pingflood-v1.0.zip By packetstormsecurity.com Published On :: Mon, 21 May 2007 04:12:41 GMT An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code. Full Article
1 udpflood-v1.0.zip By packetstormsecurity.com Published On :: Mon, 21 May 2007 04:12:58 GMT UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code. Full Article
1 Botan C++ Crypto Algorithms Library 2.11.0 By packetstormsecurity.com Published On :: Mon, 01 Jul 2019 15:32:42 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
1 libpcap 1.9.1 By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 20:00:44 GMT Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump. Full Article
1 Botan C++ Crypto Algorithms Library 2.12.0 By packetstormsecurity.com Published On :: Mon, 07 Oct 2019 15:02:16 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
1 Botan C++ Crypto Algorithms Library 2.12.1 By packetstormsecurity.com Published On :: Mon, 14 Oct 2019 15:16:36 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article