«
Expand/Collapse
33 items tagged "amazon"
Related tags:
security [+],
kindle [+],
hacks [+],
cloud [+],
red hat security [+],
red [+],
python implementation [+],
hat [+],
amazon elastic compute cloud [+],
amazon ec2 [+],
silk [+],
read [+],
password [+],
network hack [+],
network [+],
fire [+],
darknet [+],
amazon web [+],
amazon kindle [+],
wordpress [+],
wikileaks [+],
webapps [+],
web [+],
vulnerability [+],
vulnerabilities [+],
usb wireless [+],
usb network [+],
traffic [+],
thing [+],
targets [+],
sysadmin [+],
street view [+],
store [+],
stole [+],
ssl certificates [+],
sr 1 [+],
splurge [+],
sleep [+],
sha [+],
service outage [+],
security flaw [+],
security compromise [+],
security advisory [+],
secunia [+],
sdk [+],
root [+],
receipt [+],
rc helicopter [+],
purges [+],
point [+],
pleasure [+],
playstation [+],
pay [+],
passwords [+],
password hashes [+],
nabs [+],
merchants [+],
led [+],
kicked [+],
internet [+],
horse bolts [+],
hole [+],
high availability [+],
hidden bugs [+],
hidden [+],
helicopter blades [+],
helicopter [+],
heavy lifting [+],
hash tables [+],
hash [+],
handhelds [+],
hacking [+],
hacker [+],
hack [+],
government [+],
google [+],
gets [+],
from [+],
fresh out of the box [+],
fraud risk [+],
file upload [+],
file [+],
fake [+],
excelangue [+],
easy on the eyes [+],
dont lose [+],
diy [+],
dim environment [+],
day [+],
cybercriminals [+],
crypto [+],
cracking [+],
com [+],
co worker [+],
cnc [+],
close [+],
chaos communication congress [+],
card [+],
browser [+],
bittorrent [+],
big win [+],
begins [+],
barclaycard [+],
backlight [+],
associate [+],
arbitrary [+],
apple [+],
app [+],
answers [+],
android [+],
amp [+],
amazon river [+],
amazon associate [+],
alpha [+],
alleged [+],
advisory [+],
account [+],
Support [+],
Hardware [+],
General [+],
Bugs [+],
BackTrack [+],
8 bits [+]
-
-
18:33
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1556-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. The openstack-keystone packages have been upgraded to upstream version 2012.1.3, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following security issues: It was found that Keystone did not correctly handle users being removed from tenants when Amazon Elastic Compute Cloud style credentials were in use. When a user was removed from a tenant, they retained the privileges provided by that tenant, allowing them to access resources they should no longer have access to.
-
18:33
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1556-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. The openstack-keystone packages have been upgraded to upstream version 2012.1.3, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following security issues: It was found that Keystone did not correctly handle users being removed from tenants when Amazon Elastic Compute Cloud style credentials were in use. When a user was removed from a tenant, they retained the privileges provided by that tenant, allowing them to access resources they should no longer have access to.
-
18:33
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1556-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. The openstack-keystone packages have been upgraded to upstream version 2012.1.3, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following security issues: It was found that Keystone did not correctly handle users being removed from tenants when Amazon Elastic Compute Cloud style credentials were in use. When a user was removed from a tenant, they retained the privileges provided by that tenant, allowing them to access resources they should no longer have access to.
-
-
16:00
»
SecuriTeam
Amazon Web Services SDK is prone to a security-bypass vulnerability because the application fails to properly validate SSL certificates from a server.
-
-
21:40
»
SecDocs
Tags:
BitTorrent Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Distributed Hash Tables implement Routing and Addressability in large P2P networks. In the Kademlia adaption for Bittorrent a peer's address (NodeID) is to be generated randomly, or more appropriate: arbitrarily. Because randomness isn't verifiable, an implementation can advertise itself with popular NodeIDs or even change them on a per-packet basis. Two issues arise due this design problem: Amplification of UDP traffic Amplification of TCP traffic Anyone with a moderate bandwidth connection can induce DDoS attacks with the BitTorrent cloud. Starting with the prerequisites of BitTorrent, I will outline the importance of tracker-less operation and how Magnet links work. Distributed Hash Tables are explained pertaining to the Kademlia algorithm. It is most interesting how implementations maintain and refresh routing information, allowing a malicious node to become a popular neighbour quickly, and how traffic can be amplified in two ways. I will present packet rate analysis measured during tests on Amazon EC2. In conclusion it is explained how the problem of arbitrary NodeIDs can be avoided if the protocol was to be redesigned. A few words are to be given what client authors can do to alleviate the damage potential of the BitTorrent DHT.
-
-
11:01
»
Hack a Day
[Excelangue] just posted a guide to using the free 3G connection in your Amazon Kindle to browse the Internet on your computer. The hack requires a Kindle Keyboard 3G and the free worldwide Internet access that comes along with the purchase price. After jailbreaking the Kindle and applying a USB network hack, [Excelangue] managed to connect his laptop [...]
-
-
5:01
»
Hack a Day
If you’re like us, you’ve been infatuated with the small RC helicopter you picked up on Amazon up until the point where it careened off a wall and broke its blades. Now that you’re wondering about what to do with that small pile of plastic, metal, and electronics, why not print some helicopter blades on [...]
-
-
9:01
»
Hack a Day
Amazon’s new tablet reader, the Kindle Fire has been rooted. Early this morning [Death2All110] posted the steps he took to gain root access to his device (which is so fresh out of the box it still smells new). The heavy lifting is done by a package called SuperOneClick which aims to root all manner of phones [...]
-
-
14:01
»
Hack a Day
[Rossum's] still coming up with great ways to use his microtouch hardware. This time, he’s taken his inspiration from Amazon’s announcement that a full-color eBook reader (and movie player) is on the way. Judging from the video after the break, his fully functional reader is a big win for the device. You’re probably familiar with [...]
-
-
19:40
»
Packet Storm Security Advisories
Secunia Security Advisory - Some vulnerabilities have been reported in the WordPress-Amazon-Associate plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
-
-
4:00
»
Hack a Day
ePaper displays are easy on the eyes because there’s no flickering backlight to put strain on them. This is great until you’re trying to read in a dim environment. Of course Amazon will sell you a backlight that’s powered from the reader itself if you’re willing to pay. [Txoof] thought the price was a bit [...]
-
-
8:44
»
remote-exploit & backtrack
I am deciding on which wifi card I should get. Either the 500mw or the 1000mw alpa networking booster card. Anyone here tried either cards. I search the forum and saw that some people were using the 500mw but want I to know if anyone has experienced better performance with the 1000mw or even the 2000mw adapter card?
Thanks
1. 500mw amazon.com/Adapter-Wardriving-Extension-Strongest-Market/dp/B000QYGNKQ/ref=dp_cp_ob_e_title_3?ie=UTF8&qid=1264171727&sr=8-1]Amazon.com:[/url] USB 500mW WiFI Adapter for Wardriving & Range Extension *Strongest on the Market*: Electronics
2. 1000mv amazon.com/Wireless-Original-Alfa-9dBi-Strongest/dp/B001O9X9EU/ref=sr_1_1?ie=UTF8&s=electronics&qid=1264434130&sr =1-1-spell]Amazon.com:[/url] 1000mW 1W 802.11b/g USB Wireless WiFi Network Adapter With Original Alfa Screw-On Swivel 9dBi Rubber Antenna *Strongest on the Market*: Electronics