LetsByteCode Headlines

The man who "almost broke the Internet"

Two weeks ago Sven Olaf Kamfius (Sven Olaf Kamphuis) was arrested in Spain, of the company Cyberbunker. He was taken to the Netherlands, where he was held in court.
Most likely, the lawsuit was filed against Kamfiusa antispam company Spamhaus – a recent victim of DDoS-attacks with the...
The man who "almost broke the Internet"

The man who "almost broke the Internet"

Two weeks ago Sven Olaf Kamfius (Sven Olaf Kamphuis) was arrested in Spain, of the company Cyberbunker. He was taken to the Netherlands, where he was held in court.
Most likely, the lawsuit was filed against Kamfiusa antispam company Spamhaus – a recent victim of DDoS-attacks with the...
The man who "almost broke the Internet"

The search continues for the sixth member of LulzSec

Last week in the UK ended the trial of four young boys, three of whom are considered key players in the famous hacker group LulzSec. Previously convicted of two more, including the informal leader Sabu, who for many months was working as an FBI informant . At the same time, law enforcement...
The search continues for the sixth member of LulzSec

Statistics on the botnet Carna

Analyst in Information Security Parth Shukla at the conference AusCERT prepared an interesting presentation dedicated to botnet Carna. Recall that it was through this global botnet that the largest scan of the Internet was carried out for research purposes – Internet Census 2012.

For ten...
Statistics on the botnet Carna

MitmProxy 0.9

The new version of one of the best MiTM HTTP-proxy with support for SSL, having a console interface and allows you to check and edit the traffic flow “on the fly”, and save them for later analysis. According to the words of the program’s Aldo Cortes (Aldo Cortesi), this...
MitmProxy 0.9

The new 0day-vulnerability in Linux 2.6.37 - 3.8.8

A few days ago an exploit ready was published, which carries an escalation of privileges in Linux 2.6.37 – 3.8.8. The code shown on the link, anyone can compile and run on your system, checking its operation. If it does not work, it’s not a reason to calm: it may just need a more...
The new 0day-vulnerability in Linux 2.6.37 - 3.8.8

Convert PDF to HTML5 without losing formatting

pdf2htmlEX - a great tool to convert PDF documents into normal HTML-page with formatting. Converter is surprisingly good at handling various documents, including research papers, journals, and other formulas.

A few examples for demonstration.

Typography (LaTeX): HTML / PDF
Cheat...
Convert PDF to HTML5 without losing formatting

Hardware acceleration of H.264 in Firefox

In this most recent build of Firefox Nightly (next stable Firefox 23) includes support for H.264 video hardware acceleration.

This feature will be included in the stable releases for different operating systems.For example, in Firefox 21 (in a few days), hardware support for H.264 is...
Hardware acceleration of H.264 in Firefox

USB-Trojan

In modern operating systems, there is an interesting feature – they have complete trust in devices such as a keyboard or mouse. Accordingly, if you build the device, which will emulate the desired input, and connect it to your computer, you can do anything.
WARNING:The information is...
USB-Trojan

Honeypot with fake passwords to hackers

It took just 18 hours after the expert in information security Kyle Wilhoit (Kyle Wilhoit) connected to the Internet with two fake and one real SCADA-system – and they have already started to attack someone. The widespread popularity among script kiddies search engines such as Shodan, as...
Honeypot with fake passwords to hackers

How to know the date of Gmail account creation

Some of us have registered a Gmail account many years ago and do not remember exactly when it was. It is difficult to even remember the year, not what month and day. Fortunately, we now have a way to find out the exact date.
Why do it? Well, first, it may just be curious. And secondly, this...
How to know the date of Gmail account creation

Windows 8 Update is changing course to 180 degrees

Microsoft is preparing a release of an updated version of Windows 8.1 with a change of the “key elements” of the operating system. This was said by the head of marketing and finance of Windows Tami Reller in an interview with Financial Times . She explained that refers to the...
Windows 8 Update is changing course to 180 degrees

Hacked Google office building

Even established companies such as Google are not protected from tampering. Moreover, the trouble can come from where no one is waiting. For example, the Australian division of Google clearly complied with the rules of information security towards computer networks and broke them through the...
Hacked Google office building

Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

After two more years of development, the Debian Project has finally issued the release its next major stable release of the popular operating system Debian 7.0 (code-named “Wheezy”). The new version has some interesting features, such as support multiarchitecture and special tools...
Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

Transformer Acer Aspire R7

Anyone who is tried of using a laptop with a touch-screen and the “eight” on board, familiar feeling of “breaking the pattern”. In addition to the usual touchpad and keyboard adds another touch screen – but what to do with the last is unclear. Why you need a...
Transformer Acer Aspire R7

Transformer Acer Aspire R7

Anyone who is tried of using a laptop with a touch-screen and the “eight” on board, familiar feeling of “breaking the pattern”. In addition to the usual touchpad and keyboard adds another touch screen – but what to do with the last is unclear. Why you need a...
Transformer Acer Aspire R7

Integrated Graphics Core i7 supports a resolution of 4K Ultra HD

Laptops and Tablets with the new Intel processors will be able to work at a resolution of 3840 × 2160, not even slowing in top-level games like Battlefield 3 and BioShock Infinite. At the very least, with this kind of performance, Intel promises for system-on-chip fourth-generation Core...
Integrated Graphics Core i7 supports a resolution of 4K Ultra HD

Super Dimension Fortress: completely anonymous publishing

Today it is difficult to publish information on the Internet without leaving a trace. With social networks, it is clear: they want to become attached to the default user name. But even pick up an anonymous blog on free hosting like WordPress.com or Tumblr, – a non-trivial task. There is...
Super Dimension Fortress: completely anonymous publishing

Hacked database of dams in the USA

Unidentified attackers were able to gain access to the National Register of Dams – a database maintained by the U.S. Army Corps of Engineers (United States Army Corps of Engineers). This is a valuable database of 79,000 dams in America, with their weaknesses, evaluating the number of dead...
Hacked database of dams in the USA

Hacking Wii U console and accessing the file system

Wiikey hacker group said on its website the “complete hack” authentication system disks Wii U, disk encryption, file system, and everything else you need to run arbitrary applications in the embedded version of Linux.
The group specializes in long-Wiikey consoles Wii. In particular,...
Hacking Wii U console and accessing the file system

Phenomenon "! 1" on Google.com

If you specify a non-existent URL in the domain Google.com, then loaded the standard plug with error 404 “Page Not Found”. Since two years, Google has changed the design of this page, so now it looks that way.

 
All of these two years in the page header are exclamation points...
Phenomenon "! 1" on Google.com