b DMCA Blocks Tech Progress By packetstormsecurity.com Published On :: Thu, 20 Feb 2003 04:22:07 GMT Full Article dmca
b Court Confirms DMCA Good Faith Web Site Shut Down By packetstormsecurity.com Published On :: Fri, 30 May 2003 17:16:09 GMT Full Article government dmca
b Diebold Uses DMCA to Conceal E-Voting Machine Flaws By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 22:45:15 GMT Full Article government flaw dmca
b Diebold Retracts DMCA Threats By packetstormsecurity.com Published On :: Tue, 02 Dec 2003 06:19:58 GMT Full Article dmca
b Apple Files Opposition To DMCA Exemption For Jailbreaking By packetstormsecurity.com Published On :: Fri, 13 Feb 2009 12:00:58 GMT Full Article phone dmca apple
b Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:00 GMT Full Article headline microsoft dmca
b US Rules Jailbreaking Tablets Is Illegal By packetstormsecurity.com Published On :: Fri, 26 Oct 2012 15:10:43 GMT Full Article headline government usa flaw dmca apple samsung
b WTF! It Should Not Be Illegal To Hack Your Own Car's Computer By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:39 GMT Full Article headline hacker government usa dmca
b IOActive Gagged By DMCA On Eve Of Wireless Key Vuln Reveal By packetstormsecurity.com Published On :: Wed, 06 May 2015 13:47:37 GMT Full Article headline wireless flaw dmca
b Libya's Internet Goes Dark As Upheaval Spreads By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:54:34 GMT Full Article headline government libya
b Libyans Will Fight No-Fly Zone By packetstormsecurity.com Published On :: Wed, 09 Mar 2011 15:22:38 GMT Full Article headline government libya
b Secret Libya Psyops, Caught By Online Sleuths By packetstormsecurity.com Published On :: Mon, 21 Mar 2011 15:27:04 GMT Full Article headline government usa libya
b Air Raids Force Gadhafi Retreat, Rebels Seize East By packetstormsecurity.com Published On :: Sat, 26 Mar 2011 19:05:09 GMT Full Article headline libya
b The Robot War Over Libya Has Begun By packetstormsecurity.com Published On :: Fri, 22 Apr 2011 00:37:03 GMT Full Article headline libya
b Rebel Hackers Seize Libyan Domain Name Registry By packetstormsecurity.com Published On :: Mon, 22 Aug 2011 14:05:57 GMT Full Article headline hacker libya
b Libyan Rebels Are Flying Their Own Minidrone By packetstormsecurity.com Published On :: Wed, 24 Aug 2011 02:20:49 GMT Full Article headline libya
b US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
b Libya's New Rulers Fire Up Gaddafi's Surveillance Tech By packetstormsecurity.com Published On :: Fri, 06 Jul 2012 13:55:09 GMT Full Article headline government privacy science libya
b Intelligence Official Offers New Timeline For Benghazi Attack By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:10:00 GMT Full Article headline government usa terror libya
b Why Iraq is Buying up Playstation 2's By packetstormsecurity.com Published On :: Tue, 19 Dec 2000 13:23:22 GMT Full Article iraq sony
b Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
b Iraq Base Plans Left On Open Servers By packetstormsecurity.com Published On :: Mon, 16 Jul 2007 15:58:34 GMT Full Article iraq
b Hackers Attack Iraq's Vulnerable Computers By packetstormsecurity.com Published On :: Fri, 29 Aug 2008 02:42:49 GMT Full Article hacker iraq
b Iraq Government Launches Its Own Channel On YouTube By packetstormsecurity.com Published On :: Wed, 25 Nov 2009 01:58:19 GMT Full Article government iraq
b Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt By packetstormsecurity.com Published On :: Mon, 27 Sep 2010 12:44:02 GMT Full Article iraq
b Anonymous Releases Law Firm's Emails About Haditha Killings By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 01:26:16 GMT Full Article headline data loss iraq anonymous
b ISIS Stole $425 Million Becoming The World's Richest Terrorist Group By packetstormsecurity.com Published On :: Fri, 13 Jun 2014 13:28:56 GMT Full Article headline government iraq terror
b Social-Media Battle Augments Iraq Bloodshed By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 01:32:47 GMT Full Article headline iraq facebook social twitter terror
b Iraq Conflict Breeds Cyberwar Among Rival Factions By packetstormsecurity.com Published On :: Tue, 22 Jul 2014 15:10:51 GMT Full Article headline government cyberwar iraq
b Three-Year Hunt Nabs Hacker Who Popularized Cybercrime By packetstormsecurity.com Published On :: Sat, 04 May 2013 15:46:54 GMT Full Article headline hacker government usa thailand
b Zotob Hacker Diabl0 Arrested In Bangkok After Three Year Hunt By packetstormsecurity.com Published On :: Wed, 19 Mar 2014 15:12:34 GMT Full Article headline hacker malware thailand
b Thailand: Nine Young, Alleged Hackers Detained By Military By packetstormsecurity.com Published On :: Mon, 26 Dec 2016 13:50:51 GMT Full Article headline hacker government data loss thailand
b Microsoft Is Helping Thai Military Government Spy On Web Users By packetstormsecurity.com Published On :: Thu, 26 Jan 2017 15:08:13 GMT Full Article headline government privacy microsoft spyware thailand
b Hackers Disrupt 51 Malaysian Government Websites By packetstormsecurity.com Published On :: Thu, 16 Jun 2011 10:52:16 GMT Full Article headline hacker government malaysia
b Malaysia-Based Credit Card Fraud Ring Broken, 105 Arrested By packetstormsecurity.com Published On :: Sat, 09 Jul 2016 02:56:15 GMT Full Article headline bank cybercrime fraud malaysia
b It Sounds Like Everyone In Malaysia Has Been Pwned By packetstormsecurity.com Published On :: Thu, 02 Nov 2017 15:22:39 GMT Full Article headline hacker government privacy data loss malaysia
b HP Security Bulletin 2005-10.23 By packetstormsecurity.com Published On :: Sun, 28 Aug 2005 19:14:10 GMT HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux. Full Article
b Debian Linux Security Advisory 830-1 By packetstormsecurity.com Published On :: Tue, 04 Oct 2005 03:09:21 GMT Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users. Full Article
b EEYEB-20050523.txt By packetstormsecurity.com Published On :: Wed, 14 Dec 2005 07:57:35 GMT eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel). Full Article
b lbrute.zip By packetstormsecurity.com Published On :: Wed, 12 Apr 2006 04:22:52 GMT lbture is a local Windows account password brute forcer. It supports dictionary attacks and resume. Works on Windows NT/2K/XP/2K3. Full Article
b NBTEnum33.zip By packetstormsecurity.com Published On :: Wed, 29 Nov 2006 02:41:50 GMT NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included. Full Article
b Terminal Server License Bypass By packetstormsecurity.com Published On :: Mon, 11 Jan 2010 22:21:23 GMT This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server. Full Article
b Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0 By packetstormsecurity.com Published On :: Mon, 03 Jun 2013 16:28:24 GMT There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8. Full Article
b Disk Pulse Enterprise 9.0.34 Login Buffer Overflow By packetstormsecurity.com Published On :: Mon, 14 Nov 2016 17:18:22 GMT This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique. Full Article
b Disk Pulse Enterprise 9.9.16 GET Buffer Overflow By packetstormsecurity.com Published On :: Thu, 21 Sep 2017 00:43:18 GMT This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Full Article
b SyncBreeze 10.1.16 SEH GET Overflow By packetstormsecurity.com Published On :: Fri, 13 Oct 2017 13:42:47 GMT There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs. Full Article
b South Africa Seeks to Improve Process for Renewable Energy Deals By feedproxy.google.com Published On :: 2014-08-27T15:53:00Z South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects. Full Article Hydropower Baseload Bioenergy Wind Power Solar Geothermal
b Ten Clean Energy Stocks for 2014: September Update and Thoughts on the Finavera Deal By feedproxy.google.com Published On :: 2014-09-08T15:00:00Z Clean energy stocks and the market in general rebounded strongly in August. My broad market benchmark of small cap stocks, IWM, rose 4.5 percent, returning to positive territory up 1.7 percent for the year. My clean energy benchmark PBW also jumped back into the black with an 11.1 percent gain for the month and 10.8 percent for the year to date. Full Article Hydropower Baseload Storage Bioenergy Wind Power Opinion & Commentary Solar Geothermal
b Obama’s International Climate Strategy: More Grease for Renewables By feedproxy.google.com Published On :: 2014-09-10T13:58:00Z It was good news for renewable energy when President Barack Obama in June proposed carbon dioxide restrictions on existing power plants. It is even better news now that he may use the plan to leverage an international climate accord. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
b Exploring Finance Options: Yield-cos Don’t Fit the Bill for Many Renewable Energy Companies By feedproxy.google.com Published On :: 2014-09-12T18:34:00Z Yield-cos have been grabbing headlines lately. Typically, large utilities spin off their high-yield alternative energy operations into separate smaller companies called yield-cos. These new companies are then taken public to attract individual and institutional investors. Full Article Hydropower Baseload Bioenergy Wind Power Opinion & Commentary Solar Geothermal