diff --git a/cache/browser/35504159817dfba1706512be7e023fba2055af83 b/cache/browser/35504159817dfba1706512be7e023fba2055af83 deleted file mode 100644 index bcbd9ef8..00000000 --- a/cache/browser/35504159817dfba1706512be7e023fba2055af83 +++ /dev/null @@ -1,82 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.5e-05 -body: "html,body,div,span,object,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,address,code,img,small,strong,dl,dt,dd,ol,ul,li,fieldset,form,label{margin:0;padding:0;border:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;}body{font-size:14px;font-family:helvetica,arial,sans-serif;letter-spacing:0.2px;}ol,ul{list-style:none;}h2{font-size:27px;}h3{font-size:20px;}h4 span span strong{color:black!important;}a{color:#2279A2;text-decoration:none!important;}a:hover{text-decoration:underline!important;}body{background:#242424 url(img/background.jpg) repeat;}#wrap{width:1075px;margin:auto;}#header{margin-top:40px;position:relative;}#header h1 a{background:url(img/logo.png) no-repeat;width:270px;height:37px;text-indent:-9999px;float:left;}#menu{text-align:right;display:inline-block;position:absolute;right:0;}#menu li{float:left;margin-left:20px;font-size:14px;font-family:tahoma,verdana,helvetica,arial,sans-serif;}#menu li a{color:white;text-decoration:none!important;}.current_page_item a div{background-color:#87b440!important;}#menu li a:hover .menuLine{background-color:#136287;}#menu li .menuLine{color:white;background-color:#20485a;font-size:8px;font-weight:bold;padding:1px 3px 1px 0;font-family:helvetica,arial,sans-serif;}#menu li #active{background-color:#87b440;}#main{clear:both;overflow:hidden;}#main #primary{float:left;width:700px;margin-top:60px;position:relative;}#main #primary h2{color:white;font-weight:400;margin-top:10px;margin-bottom:10px;}#main #primary #morePrev{background-color:#e3e3e3;border:1px solid white;padding:20px;}#main #primary #morePrev #more{float:right;}.topLine{height:10px;width:100%;background-color:#2279a2;}#main #sidebar{float:right;width:300px;margin-top:60px;}#main #sidebar h2{color:white;font-weight:400;margin-top:10px;margin-bottom:10px;}#main #sidebar .widget{margin-bottom:20px;}#main #sidebar .widget ul{background-color:#e3e3e3;padding:20px;border:1px solid white;font-size:12px;}#main #primary .post-item{background:#e3e3e3;margin-bottom:38px;border:1px solid white;overflow:hidden;position:relative;padding:20px;}#main #primary .post-item h2{color:#2c2c2c;margin:0;line-height:1em;}.the-title{font-size:27px;text-align:center;}.post-item img{border:none;}.post-item p.meta{font-size:10px;}.post-item p.comments{position:absolute;bottom:10px;right:10px;}.post-item p{font-size:14px;line-height:20px;margin:20px 0 20px 0;}.post-item blockquote{color:#575757;font-style:italic;}.post-item code{background-color:#000000;border:1px solid #000000;border-radius:6px 6px 6px 6px;color:#D8D8D8;padding:10px;text-shadow:none;}.post-item ul{list-style:circle;}.topLine{height:10px;width:100%;background-color:#2279a2;}#sidebar #search{margin-left:50px;margin-right:0;height:40px;background-color:#e3e3e3;position:relative;border-radius:5px;-moz-border-radius:5px;-webkit-border-radius:5px;margin-bottom:30px!important;}#sidebar #search #searchSubmit{background-image:url('img/searchIcon.png');width:29px;height:23px;background-repeat:no-repeat;position:absolute;right:10px;top:8px;}#sidebar #search input{position:relative;font-size:16px;color:#2c2c2c;padding:10px;border:none;background:none;width:190px;}.widget_twitter .widgettitle{background-image:url('img/twitter.png');background-position:right;background-repeat:no-repeat;}.widgettitle a{text-decoration:none;color:white;}.widget_twitter li{padding:5px 0 5px 0;border-bottom:1px solid #666;border-top:1px solid #eee;}.widget_twitter li:first-child{padding-top:0;border-top:none;}.widget_twitter li:last-child{padding-bottom:0;border-bottom:none;}#recentcomments .widgettitle{background-image:url('img/twitter.png');background-position:right;background-repeat:no-repeat;}#recentcomments li{padding:5px 0 5px 0;border-bottom:1px solid #666;border-top:1px solid #eee;}#recentcomments li:first-child{padding-top:0;border-top:none;}#recentcomments li:last-child{padding-bottom:0;border-bottom:none;}#comments{color:white;margin-bottom:2px;}.comments li{background:#e3e3e3;margin-bottom:1px;border:1px solid white;overflow:hidden;position:relative;padding:10px;}.comments p{margin-bottom:15px;font-size:16px;}#main_comment p{margin-bottom:2px;}#comment-datetime{font-size:10px;}#respond{background:#e3e3e3;margin-top:20px;margin-bottom:28px;border:1px solid white;overflow:hidden;position:relative;padding:20px;}#respond label{width:4em;float:left;text-align:left;margin-right:0.5em;display:block}#respond h3{padding:2px;}#respond p{padding:2px;}#comment-ads{margin-bottom:10px;}#footer{height:100px;}#copyright{color:#FFFFFF;font-size:12px;}" -code: 200 -connect_time: 3.5e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-content/themes/ethicalhack3r/style.css -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:24 GMT - Content-Type: text/css - Transfer-Encoding: chunked - Connection: keep-alive - Last-Modified: Fri, 17 Feb 2012 19:44:20 GMT - ETag: "a425-1af4-4b92e2bb8ad00" - Vary: Accept-Encoding - CF-Cache-Status: HIT - Expires: Mon, 09 Jul 2012 12:15:24 GMT - Cache-Control: public, max-age=14400 - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.5e-05 -pretransfer_time: 3.4e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-content/themes/ethicalhack3r/style.css - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-content/themes/ethicalhack3r/style.css - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.101189 -status_message: -time: 0.116178 diff --git a/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 b/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 deleted file mode 100644 index 4d92d4a4..00000000 --- a/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 +++ /dev/null @@ -1,77 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.6e-05 -body: "" -code: 500 -connect_time: 2.6e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-includes/rss-functions.php -headers: | - HTTP/1.1 500 Internal Server Error - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:25 GMT - Content-Type: text/html - Transfer-Encoding: chunked - Connection: keep-alive - Vary: Accept-Encoding - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.6e-05 -pretransfer_time: 2.5e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-includes/rss-functions.php - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-includes/rss-functions.php - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.112819 -status_message: -time: 0.11291 diff --git a/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f b/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f deleted file mode 100644 index aa8a1134..00000000 --- a/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.0e-05 -body: "\n\ - \n\ -
\n\ - \n\ - \n\ - \n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -
- Semantic Personal Publishing Platform
-Welcome. WordPress is a very special project to me. Every developer and contributor adds something unique to the mix, and together we create something beautiful that I'm proud to be a part of. Thousands of hours have gone into WordPress, and we're dedicated to making it better every day. Thank you for making it part of your world.
-— Matt Mullenweg
-wp-config.php file with your database connection details.
- wp-config-sample.php with a text editor like WordPad or similar and fill in your database connection details.wp-config.php and upload it.wp-config.php file, and try again. If it fails again, please go to the support forums with as much data as you can gather.admin.If you are updating from version 2.7 or higher, you can use the automatic updater:
-index.php.If you have customized your theme templates, you may have to make some changes across major versions.
-WordPress can import from a number of systems. First you need to get WordPress installed and working as described above, before using our import tools.
-If you have any questions that aren't addressed in this document, please take advantage of WordPress' numerous online resources:
-You can post to your WordPress blog with tools like Windows Live Writer, Ecto, w.bloggar, Radio Userland (which means you can use Radio's email-to-blog feature), NewzCrawler, and other tools that support the blogging APIs! :) You can read more about XML-RPC support on the Codex.
-You can post from an email client! To set this up go to your "Writing" options screen and fill in the connection details for your secret POP3 account. Then you need to set up wp-mail.php to execute periodically to check the mailbox for new posts. You can do it with cron-jobs, or if your host doesn't support it you can look into the various website-monitoring services, and make them check your wp-mail.php URL.
Posting is easy: Any email sent to the address you specify will be posted, with the subject as the title. It is best to keep the address discrete. The script will delete emails that are successfully posted.
-We introduced a very flexible roles system in version 2.0. You can read more about Roles and Capabilities on the Codex.
-WordPress has no multi-million dollar marketing campaign or celebrity sponsors, but we do have something even better—you. If you enjoy WordPress please consider telling a friend, setting it up for someone less knowledgable than yourself, or writing the author of a media article that overlooks us.
-WordPress is the official continuation of b2/cafélog, which came from Michel V. The work has been continued by the WordPress developers. If you would like to support WordPress, please consider donating.
-WordPress is free software, and is released under the terms of the GPL version 2 or (at your option) any later version. See license.txt.
- - - -code: 200 -connect_time: 3.3e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/readme.html -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:24 GMT - Content-Type: text/html - Transfer-Encoding: chunked - Connection: keep-alive - Last-Modified: Wed, 20 Jun 2012 18:25:15 GMT - ETag: "a0c3-23d7-4c2eb853838c0" - Vary: Accept-Encoding - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.2e-05 -pretransfer_time: 3.1e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /readme.html - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/readme.html - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.112111 -status_message: -time: 0.19096 diff --git a/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 b/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 deleted file mode 100644 index 6d88628d..00000000 --- a/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 +++ /dev/null @@ -1,305 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 0.0 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ -My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.
\n\ -Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.
\n\ -The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.
\n\ - \n\ - \n\ -\n\ - 4 Comments\n\ -
\n\ -Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).
\n\ -Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.
\n\ -Legion by Rhino9
\n\ -Use: Windows Null Session share scanner.
\n\
- Released: 1999
\n\
- Platform: Windows
\n\
- Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\
- Download: http://packetstormsecurity.org/files/14711/legion.zip.html
\n\ - 10 Comments\n\ -
\n\ -A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.
\n\ -X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).
\n\ -The X-Frame-Options header may have three different values:
\n\ -DENY – No pages are allowed to be loaded.
\n\
- SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\
- Allow-From http://www.example.com – Only allow frames from www.example.com.
\n\ - 5 Comments\n\ -
\n\ -This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.
\n\ - \n\ - \n\ -\n\ - 6 Comments\n\ -
\n\ -I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.
\n\ -I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.
\n\ -\n\ -e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.
You can help by signing the petition here;
\n\
- http://epetitions.direct.gov.uk/petitions/17324
\n\ - No Comments\n\ -
\n\ -