Loading

On Covert Acoustical Mesh Networks in Air (RE: Bad Bios)

  1. On Covert Acoustical Mesh Networks in Air (RE: Bad Bios)
  2.  
  3. "Abstract-Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communication system that was originally designed for robust underwater communication. We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range.

FX-8.350 4GHz

  1. raxas@daeira ~ $ /sbin/cryptsetup benchmark
  2. # Tests are approximate using memory only (no storage IO).
  3. PBKDF2-sha1       386073 iterations per second
  4. PBKDF2-sha256     239182 iterations per second
  5. PBKDF2-sha512     165078 iterations per second

hello.ll

  1. ; ModuleID = '<stdin>'
  2. target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
  3. target triple = "x86_64-pc-linux-gnu"
  4.  
  5. @str = private unnamed_addr constant [12 x i8] c"hello world\00"

Soylent News Website Launches Tor Hidden Service (.onion) http://soylentnews.org Tor Hidden Servic

  1. Soylent News Website Launches Tor Hidden Service (.onion)
  2.  
  3. http://soylentnews.org
  4.  
  5. Tor Hidden Service URL: http://7rmath4ro2of2a42.onion/

If Microsoft thinks old Tor clients are risky, why not Windows XP?

  1. If Microsoft thinks old Tor clients are risky, why not Windows XP?
  2.  
  3. "Summary: Microsoft has been removing outdated Tor clients, stating that they pose a security threat, but if that's the case, what about other outdated software? Isn't that a threat, too?"
  4.  
  5. - URL: http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/

exopolitika

  1. Starodávná lidská rasa smíchaná se zcela neznámými druhy
  2. NASA OBDRŽELA RÁDIOVÉ SIGNÁLY ZE STŘEDU ZEMĚ
  3. Cizinci na planetě Zemi?
  4. Penzionovaný důstojník USAF hovoří o mimozemšťanech a atomovkách, skupině ,,UFO Cabal” a svých zážitcích z únosů
  5. DRAKONIÁNI A POHŘEŠOVANÉ DĚTI

python...

  1. #!/usr/bin/env python
  2.  
  3. import sys
  4.  
  5. def main ():

Archive.org: MAME 0.151 ROMs (November 2013) 42.8GB zip/torrent

  1. Archive.org: MAME 0.151 ROMs (November 2013) 42.8GB zip/torrent
  2.  
  3. #
  4.  
  5. that's the jingle bell

dosbox.conf pro ultima underworld obe dve

  1.  
  2. [render]
  3. scaler=hq3x
  4.  
  5. [cpu]

"Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends" by Chris Hoffman, 28th May, 20

  1. "Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends"
  2. by Chris Hoffman, 28th May, 2014, MakeUseOf.com
  3.  
  4. ############

clinfo

  1. Number of platforms:                 1
  2.   Platform Profile:              FULL_PROFILE
  3.   Platform Version:              OpenCL 1.2 AMD-APP (1411.4)
  4.   Platform Name:                 AMD Accelerated Parallel Processing
  5.   Platform Vendor:               Advanced Micro Devices, Inc.

Facebook blacked out bubbles

  1. ._5uch {
  2.     background-image: url("http://i.imgur.com/T2LPj.png") !important;
  3.     border-radius: 15px;
  4.     margin-bottom: 7px;
  5.     padding: 0px;

raxasuv grub.cfg

  1. # grub.cfg pro grub 2.00
  2.  
  3. set default=0
  4.  
  5. menuentry "Linux 3.14.0-rc7 Asus ROG Crosshair V Formula Z III" {

ACLU app lets Android users secretly tape the police

  1. ACLU app lets Android users secretly tape the police
  2.  
  3. The free app records video and audio, hides when requested and lets users send backup copies of recordings to the ACLU for safekeeping.
  4.  
  5. http://news.cnet.com/8301-1009_3-57467073-83/aclu-app-lets-android-users-secretly-tape-the-police/

Tor One Hop Honeypots

  1. Is Anonymous Access to TOR Attainable?
  2.      
  3. 7 December 2013
  4.      
  5. http://cryptome.org/2013/12/tor-anon-access.htm