#article

APIS Volume 18, Number 2, February 2000

eZine's profile picture
Published in 
 · 1 year ago
... Association, written by Dr. Marion Ellis <http://ianrwww.unl.edu/ianr/entomol/beekpg/tidings/btid2000/btdjan00.htm#article2>. Dr. Ellis suggests three reasons why this might work: Varroa mites have a sticky pad called the empodium that helps them adhere to their host. The presence of powdered sugar could make it difficult for the mites to adhere to their host. Powdered sugar stimulates the bees’ grooming behavior. The powdered sugar on the mites’ bodies stimulates them to release from feeding to groom themselves. To use the technique as described in Bee Tidings , one needs the following: A wide-mouth canning jar ...

5: Info Leaks

eZine's profile picture
Published in 
 · 1 year ago
... master/hyde3.c última dica do tópico o paper "The Art of Port Scanning" do fyodor http://www.phrack.org/issues.html?issue=51&id=11#article lembrando que o nmap anda sendo muito usado em conjunto com metasploit vide o "fast track" do secmaniac "www.secmaniac.com" *ferramentas que você deve conhecer http://lcamtuf.coredump.cx/soft/p0f.tgz http://lcamtuf.coredump.cx/soft/fl0p-devel.tgz http://lcamtuf.coredump.cx/soft/0trace.tgz Referência: http://insecure.org http://www.openbsd.org -0x02 Ataque man-in-the-middle Interceptação de dados é uma das técnicas que não poderia f ...

10 - Fabrication de savons a Paper Street 2/2

eZine's profile picture
Published in 
 · 2 years ago
... e regarder ruby et de faire un premier prog en ruby, donc j'ai recode Process Dumper (http://phrack.org/issues.html?issue=63&id=12#article). Juste en pure ruby, have fun ! Et oui je code en ruby avec des syntaxes C par moment, on se refait pas :) begin-base64 644 relf.tar cmVsZi8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ... AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA= ==== Utilisation : ./snatch PID output Ces deux tools ne sont pas finis par manque de temps, mais allez voir sur http:/&# ...

Aware eZine 02 - Beta

eZine's profile picture
Published in 
 · 4 years ago
... use. So how do we find out? In this case it is easy. Let's read his Phrack articles! [http://phrack.org/issues.html?issue=51&id=11#article] His first one, in Phrack 51, states: "These ports represent potential communication channels. Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their networked environment, including hackers." Well now, that isn't so bad. However, let's take some quotes from the article: - "Scanning, as a method for discovering exploitable communication channels" # The reason we need scanning for... - "Some people th ...

d2_0x06_Hacking_the_wholism_of_linux_net

eZine's profile picture
Published in 
 · 5 years ago
... Linux Kernel Network Stack bioforge. Phrack Vol 0x0b, Issue 0x3d, Phile #0x0d of 0x0f http://www.phrack.org/issues.html?issue=61&id=13#article [2] GNU/Linux kernel 2.6.33.4 source code [3] Understanding the Kernel Network Layer Breno Leitao& Arnaldo Carvalho http://stoa.usp.br/leitao/files/-1/3689/network.pdf [4] Netfilter/Iptables Firewall http://www.netfilter.org/ [5] Kernel Intrusion Detection System http://sourceforge.net/projects/ids-kids/ [6] Sreekrishnan Venkateswaran "Essential Linux Device Driver", Chapter 15: Network Interface Cards [7] Kernel Documentat ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT