vi

Secunia Security Advisory 51947

Secunia Security Advisory - SUSE has issued an update for WebYaST and SUSE Studio Standard Edition. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.




vi

Secunia Security Advisory 52008

Secunia Security Advisory - SUSE has issued an update for java-1_7_0-openjdk. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.




vi

Secunia Security Advisory 52039

Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.




vi

Secunia Security Advisory 52044

Secunia Security Advisory - SUSE has issued an update for virtualbox. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.




vi

Secunia Security Advisory 52124

Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library.




vi

Secunia Security Advisory 52111

Secunia Security Advisory - SUSE has issued an update for apache2. This fixes two weaknesses, a security issue, and a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.




vi

Secunia Security Advisory 52113

Secunia Security Advisory - SUSE has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.




vi

Secunia Security Advisory 52049

Secunia Security Advisory - SUSE has issued an update for v8. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library.




vi

Secunia Security Advisory 52160

Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.




vi

Secunia Security Advisory 52159

Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks.




vi

Secunia Security Advisory 52148

Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library.




vi

Secunia Security Advisory 52150

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.




vi

Secunia Security Advisory 52204

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact.




vi

Secunia Security Advisory 52151

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.




vi

Secunia Security Advisory 52152

Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.




vi

Secunia Security Advisory 52077

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.




vi

Secunia Security Advisory 52135

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks.




vi

Secunia Security Advisory 52153

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.




vi

Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system.




vi

Mandriva Linux Security Advisory 2015-046

Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed.




vi

Mandriva Linux Security Advisory 2015-140

Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues.




vi

Jury Convicts DirecTV Pirate On DMCA Charges




vi

Wikileaks Releases Indiscriminate Slaying Video From Iraq






vi

Debian Linux Security Advisory 830-1

Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.




vi

Cisco Security Advisory 20081022-asa

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak.




vi

Microsoft Server Service NetpwPathCanonicalize Overflow

This Metasploit module exploits a stack overflow in the NetApi32 CanonicalizePathName() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denial of service on on Windows XP SP2 or Windows 2003 SP1. A failed exploit attempt will likely result in a complete reboot on Windows 2000 and the termination of all SMB-related services on Windows XP. The default target for this exploit should succeed on Windows NT 4.0, Windows 2000 SP0-SP4+, Windows XP SP0-SP1 and Windows 2003 SP0.




vi

Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()-

Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




vi

Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0

There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8.




vi

Microgrid Economics: It Takes a Village, a University, and a Ship

As a businessman exploring investments, I need simple answers, however complicated the problem. I wish to know: Are microgrids economical? How much investment is needed and for what? What are the factors that principally affect profitability, within the system and in the environment? If microgrids are not profitable at the present, when will they be? I recognize that understanding microgrids as a system requires complicated mathematics and modeling. I’m sympathetic to and respect those who do that.




vi

Are Environmental Regulations Causing US Utility Bills to Surge?

U.S. electricity markets face years of higher prices as clean-air regulations shut more coal-fired power plants than earlier forecast, cutting supply and forcing producers to rely more on natural gas.





vi

Wind Energy Provides More Than Two-Thirds of New US Generating Capacity in October

According to the latest "Energy Infrastructure Update" report from the Federal Energy Regulatory Commission's (FERC) Office of Energy Projects, wind power provided over two-thirds (68.41 percent) of new U.S. electrical generating capacity in October 2014. Specifically, five wind farms in Colorado, Kansas, Michigan, Nebraska, and Texas came on line last month, accounting for 574 MW of new capacity.




vi

Sage Advice is the Highlight of the Women in Power Luncheon

The advice that Pennwell’s 2014 Woman of the Year, Mary Powell, gave to women in the power industry during Tuesday’s Women in Power Luncheon might come as a surprise to some. It was this: Stop undercutting each other. Powell said the most difficult obstacles she has encountered in her various leadership roles have not come from men, but rather from other women. Small comments like “I don’t know how you do it [being a mom and holding a high-level job]”, serve to bring doubt and uncertainty to high achieving women in any industry, and ultimately can lead to women exiting their careers in order to fit what they perceive is the societal norm.




vi

Renewable Energy Is Driving the Energy Transformation: REWNA Recap Video

Renewable energy stakeholders are well aware that clean energy is slowly but steadily transforming the energy landscape and that message couldn’t have been more clear at the recently concluded Power-Gen International, the largest show for the traditional power generation industry. Since all forms of power generation are represented at the show through the four co-located conferences, PennWell calls the second week in December "Power Generation Week."







vi

Renewable Energy Review: Finance Mechanisms

Developers, manufacturers, investors and other renewable energy industry stakeholders need updates on the latest and greatest finance mechanisms available today. Since 2003, global consultancy Ernst & Young has released its Country Attractiveness Indices, which ranks global renewable energy markets by analyzing investment strategies and resource availability.





vi

Renewable Energy Review: Australia

Developers, manufacturers, investors and other renewable energy industry stakeholders need to know where the next big market is going to be so that they can adjust their business decisions accordingly.







vi

It Turns Out That You Can’t Divide Americans Over Renewable Energy

In our second annual survey on American homeowners’ attitudes toward clean energy, one thing is resoundingly clear. In a nation divided on climate change, immigration policy, and so many other issues, Americans are overwhelmingly united in their support of renewable energy.





vi

Reykjavik Geothermal Agrees to Build 1,000 Megawatts in Ethiopia

Reykjavik Geothermal, the Icelandic company that’s helped build power plants in more than 30 countries, agreed to develop as much as 1,000 megawatts of projects in Ethiopia over the next 10 years.




vi

The Viability of Germany’s Energiewende: Mark Jacobson Answers 3 Questions

To those in the climate change field the name Mark Z. Jacobson needs no introduction. The director of the Atmosphere and Energy Program at Stanford University is credited with having written the book on computer modeling for atmospheric changes, as well as being a recognized expert in the impacts of energy production and a staunch supporter of renewables.




vi

Q3 Portfolio Review: A Bottom For Clean Energy Developers?

In the third quarter, clean energy stocks in general continued their upward trend, turning in a 27 percent gain for the quarter and a 64 percent gain for the year as a whole, as measured by my benchmark and most broadly held clean energy ETF, Powershares Wilderhill Clean Energy (PBW.) This brings PBW back up to levels last seen in September 2011.