1

Rootkit Hunter 1.3.6

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




1

Another File Integrity Checker 2.15

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Rootkit Hunter 1.3.8

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




1

Another File Integrity Checker 2.16

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Malmon Detection Tool 0.1b

Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory.




1

Another File Integrity Checker 2.17

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Another File Integrity Checker 2.18

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Another File Integrity Checker 2.19

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Another File Integrity Checker 2.21

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




1

Another File Integrity Checker 3.1

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.





1

Adobe Plagued By 16-Month-Old XSS Bug




1

FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs

FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.




1

FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve

FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.




1

FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa

FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations.




1

FreeBSD Security Advisory - FreeBSD-SA-19:07.mds

FreeBSD Security Advisory - On some Intel processors utilizing speculative execution a local process may be able to infer stale information from microarchitectural buffers to obtain a memory disclosure. An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).







1

Slackware Security Advisory - Slackware 14.2 kernel Updates

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.




1

Slackware Security Advisory - Slackware 14.2 kernel Updates

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.




1

Slackware Security Advisory - Slackware 14.2 kernel Updates

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.





1

Blackberry In $1.4 Billion Deal To Buy Cylance














1

Dassault Systèmes Q3 and YTD Total Revenue and EPS Growth Up Double-digits; On Track for 5-year Doubling of non-IFRS EPS to €3.50 for 2019

VÉLIZY-VILLACOUBLAY, France — October 24, 2019 — Dassault Systèmes (Euronext Paris: #13065, DSY.PA) announces IFRS unaudited financial results for the third quarter and nine months ended September 30, 2019. These results were reviewed by the Group’s Board of Directors on October 23, 2019. This press release also includes financial information on a non-IFRS basis with reconciliations included in the Appendix to this communication. All IFRS and non-IFRS figures are presented in compliance...




1

Medidata Accelerates Launch of myMedidata Platform, Responding to COVID-19

Medidata Accelerates Launch of myMedidata Platform, Responding to COVID-19




1

Hacker Owes Nintendo $1.3M




1

rec16lx.zip

REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).




1

typsoft110.txt

TYPSoft FTP Server 1.10 for Windows 9X and WinNT is vulnerable to a denial of service attack when a blank username is supplied.




1

genie_v13.zip

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.3 Archive password is set to p4ssw0rd. Use at your own risk.




1

genie_v14.zip

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.4 Archive password is set to p4ssw0rd. Use at your own risk.




1

genie_v151.zip

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.5.1 Archive password is set to p4ssw0rd. Use at your own risk.




1

genie_v17.zip

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.7. Archive password is set to p4ssw0rd. Use at your own risk.




1

igmpbomb-v1.4.zip

This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code.




1

pingflood-v1.0.zip

An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code.




1

udpflood-v1.0.zip

UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code.




1

Botan C++ Crypto Algorithms Library 2.11.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




1

libpcap 1.9.1

Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.




1

Botan C++ Crypto Algorithms Library 2.12.0

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.




1

Botan C++ Crypto Algorithms Library 2.12.1

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.