0 bbeep010.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
0 10code.tgz By packetstormsecurity.com Published On :: Wed, 01 Sep 1999 15:25:28 GMT 10xxx Phone Code Lookup (no 10-10-xxx yet). From Attrition Full Article
0 tcdial-1.0.tar.gz By packetstormsecurity.com Published On :: Tue, 19 Oct 1999 18:36:40 GMT DTMF dialer for X. Uses sound card. Screenshot. Full Article
0 iwar-0.01.tar.gz By packetstormsecurity.com Published On :: Tue, 15 Nov 2005 06:16:34 GMT Iwar is a war dialer written for Unix type (Linux/OpenBSD/etc) operating systems. It supports a nice curses based front end, ASCII/MySQL logging, system identification, multiple modems support, random/sequential dialing, key stroke logging, and more. Full Article
0 iwar-0.06-DOS.zip By packetstormsecurity.com Published On :: Sat, 03 Dec 2005 07:20:10 GMT Iwar is a war dialer written for Unix type (Linux/OpenBSD/etc) operating systems. It supports a nice curses based front end, ASCII/MySQL logging, system identification, multiple modems support, random/sequential dialing, key stroke logging, and more. Note: this is the Cygwin version. Full Article
0 iwar-0.06.tar.gz By packetstormsecurity.com Published On :: Sat, 03 Dec 2005 07:20:52 GMT Iwar is a war dialer written for Unix type (Linux/OpenBSD/etc) operating systems. It supports a nice curses based front end, ASCII/MySQL logging, system identification, multiple modems support, random/sequential dialing, key stroke logging, and more. Note: this is the source tarball for use under Unix variants. Full Article
0 iwar-0.07.tar.gz By packetstormsecurity.com Published On :: Sun, 15 Jan 2006 17:47:18 GMT IWar is a war dialer used for auditing your PSTN (phone) network. Its features include random/sequential dialing, Voice over IP using the IAX2 (Intra-Asterisk eXchange) protocol, ASCII flat file and MySQL logging, a curses-based front end, key stroke marking, multiple modem support, several methods of tone detection, save/load state, banner detections (to determine remote system types) and blacklist support. Full Article
0 iwar-0.071.tar.gz By packetstormsecurity.com Published On :: Fri, 27 Jan 2006 20:24:45 GMT IWar is a war dialer used for auditing your PSTN (phone) network. Its features include random/sequential dialing, Voice over IP using the IAX2 (Intra-Asterisk eXchange) protocol, ASCII flat file and MySQL logging, a curses-based front end, key stroke marking, multiple modem support, several methods of tone detection, save/load state, banner detections (to determine remote system types) and blacklist support. Full Article
0 Hacker Hits Over 400 Chinese Government Sites By packetstormsecurity.com Published On :: Sat, 08 Dec 2012 04:09:16 GMT Full Article headline hacker government china pakistan
0 Tenshi Log Monitoring Program 0.12 By packetstormsecurity.com Published On :: Sat, 18 Sep 2010 19:43:42 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.10 By packetstormsecurity.com Published On :: Sat, 29 Jan 2011 20:07:48 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.11 By packetstormsecurity.com Published On :: Sun, 26 Jun 2011 07:41:52 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
0 Tenshi Log Monitoring Program 0.13 By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 00:33:12 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.20 By packetstormsecurity.com Published On :: Wed, 17 Aug 2011 14:31:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 iXKeyLog 0.1 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 23:40:52 GMT iXKeylog is an X11 keylogger for Unix that basically uses xlib to interact with the users keyboard. It will listen for certain X11 events and then trigger specific routines to handle these events. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.21 By packetstormsecurity.com Published On :: Tue, 27 Dec 2011 17:28:33 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.22 By packetstormsecurity.com Published On :: Fri, 10 Feb 2012 22:31:56 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 Tenshi Log Monitoring Program 0.14 By packetstormsecurity.com Published On :: Sun, 03 Jun 2012 17:11:51 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.3.0 By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 00:48:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 ZedLog 0.1 Beta By packetstormsecurity.com Published On :: Fri, 03 May 2013 19:22:22 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
0 ZedLog 0.2 Beta By packetstormsecurity.com Published On :: Tue, 14 May 2013 03:46:57 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
0 ZedLog 0.2 Beta 2 By packetstormsecurity.com Published On :: Fri, 12 Jul 2013 18:23:22 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
0 ZedLog 0.2 Beta 3 By packetstormsecurity.com Published On :: Mon, 15 Jul 2013 10:33:33 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.4.0 By packetstormsecurity.com Published On :: Wed, 07 Aug 2013 02:02:28 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 ZedLog 0.2 Beta 4 By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 17:55:55 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.5.0 By packetstormsecurity.com Published On :: Wed, 26 Feb 2014 05:12:18 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.5.1 By packetstormsecurity.com Published On :: Wed, 07 May 2014 15:19:10 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
0 Tenshi Log Monitoring Program 0.15 By packetstormsecurity.com Published On :: Mon, 04 Aug 2014 21:59:56 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.6.0 By packetstormsecurity.com Published On :: Wed, 10 Dec 2014 00:03:38 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
0 NIELD (Network Interface Events Logging Daemon) 0.6.1 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 23:23:23 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control. Full Article
0 Tenshi Log Monitoring Program 0.16 By packetstormsecurity.com Published On :: Thu, 17 Aug 2017 13:47:24 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 Tenshi Log Monitoring Program 0.17 By packetstormsecurity.com Published On :: Fri, 20 Oct 2017 12:12:12 GMT tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
0 Top 10 Data Breach Survival Tips After eBay, Spotify, And Office Breaches By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 02:31:54 GMT Full Article headline hacker privacy data loss ebay
0 eBay Pulls N9500 Chinese Spyware Phone From Auction Website By packetstormsecurity.com Published On :: Thu, 19 Jun 2014 13:30:15 GMT Full Article headline phone china cybercrime fraud spyware ebay backdoor
0 Mozilla Offers $10k To Avoid Heartbleed Style Code Errors By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:31 GMT Full Article headline hacker bank flaw ssl mozilla cryptography
0 Mozilla Certificate Revocation Tanks 107,000 Sites By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:21 GMT Full Article headline flaw ssl mozilla cryptography
0 Secunia Security Advisory 52008 By packetstormsecurity.com Published On :: Mon, 28 Jan 2013 06:24:14 GMT Secunia Security Advisory - SUSE has issued an update for java-1_7_0-openjdk. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Article
0 Secunia Security Advisory 52039 By packetstormsecurity.com Published On :: Mon, 04 Feb 2013 04:57:58 GMT Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. Full Article
0 Secunia Security Advisory 52044 By packetstormsecurity.com Published On :: Mon, 04 Feb 2013 06:43:18 GMT Secunia Security Advisory - SUSE has issued an update for virtualbox. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Article
0 Secunia Security Advisory 52049 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:10:05 GMT Secunia Security Advisory - SUSE has issued an update for v8. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library. Full Article
0 Secunia Security Advisory 52160 By packetstormsecurity.com Published On :: Mon, 11 Feb 2013 06:47:27 GMT Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Article
0 Secunia Security Advisory 52150 By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 06:40:42 GMT Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system. Full Article
0 Secunia Security Advisory 52204 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 04:59:55 GMT Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact. Full Article
0 Secunia Security Advisory 52077 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:18 GMT Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Article
0 Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
0 Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
0 Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen? By packetstormsecurity.com Published On :: Fri, 15 Oct 2010 15:05:16 GMT Full Article iraq
0 Thai Police Shutter 5,000+ Sites Insulting Royals By packetstormsecurity.com Published On :: Thu, 15 Mar 2012 15:25:12 GMT Full Article headline government thailand censorship
0 Zotob Hacker Diabl0 Arrested In Bangkok After Three Year Hunt By packetstormsecurity.com Published On :: Wed, 19 Mar 2014 15:12:34 GMT Full Article headline hacker malware thailand