b

DMCA Blocks Tech Progress




b

Court Confirms DMCA Good Faith Web Site Shut Down




b

Diebold Uses DMCA to Conceal E-Voting Machine Flaws




b

Diebold Retracts DMCA Threats




b

Apple Files Opposition To DMCA Exemption For Jailbreaking




b

Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown










b

Air Raids Force Gadhafi Retreat, Rebels Seize East




b

The Robot War Over Libya Has Begun




b

Rebel Hackers Seize Libyan Domain Name Registry




b

Libyan Rebels Are Flying Their Own Minidrone







b

Why Iraq is Buying up Playstation 2's





b

Iraq Base Plans Left On Open Servers




b

Hackers Attack Iraq's Vulnerable Computers




b

Iraq Government Launches Its Own Channel On YouTube




b

Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt















b

HP Security Bulletin 2005-10.23

HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux.




b

Debian Linux Security Advisory 830-1

Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.




b

EEYEB-20050523.txt

eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel).




b

lbrute.zip

lbture is a local Windows account password brute forcer. It supports dictionary attacks and resume. Works on Windows NT/2K/XP/2K3.




b

NBTEnum33.zip

NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included.




b

Terminal Server License Bypass

This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.




b

Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0

There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8.




b

Disk Pulse Enterprise 9.0.34 Login Buffer Overflow

This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique.




b

Disk Pulse Enterprise 9.9.16 GET Buffer Overflow

This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account.




b

SyncBreeze 10.1.16 SEH GET Overflow

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.




b

South Africa Seeks to Improve Process for Renewable Energy Deals

South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects.




b

Ten Clean Energy Stocks for 2014: September Update and Thoughts on the Finavera Deal

Clean energy stocks and the market in general rebounded strongly in August. My broad market benchmark of small cap stocks, IWM, rose 4.5 percent, returning to positive territory up 1.7 percent for the year. My clean energy benchmark PBW also jumped back into the black with an 11.1 percent gain for the month and 10.8 percent for the year to date.





b

Exploring Finance Options: Yield-cos Don’t Fit the Bill for Many Renewable Energy Companies

Yield-cos have been grabbing headlines lately. Typically, large utilities spin off their high-yield alternative energy operations into separate smaller companies called yield-cos. These new companies are then taken public to attract individual and institutional investors.