A flaw in PBLang 4.63 allows logged in users to delete another user's PM.
5e3cc7c61d07865ddffc43e6b349a3f23d299a4419ae5e573404fb52b77c58d5
sendpm.php in PBLang 4.63 allows logged in users to view password hashes of other users.
ebc77ac7b1bdabadb4c6d15fc2692a10091e6e66b2dc34a73e59a490349604cc
The profile.php script in 427BB is susceptible to cross site scripting and remote command execution flaws.
609a0dcb3fac72bf68ee3de64dc308e763c54ad82f66729d53d627c903561439
The profile.php script in 427BB is susceptible to cross site scripting attacks.
4e9b2a108ce0209eee52a787a7d44753ccb13dd0893f2c24c26f69b5cac98cce
The search.php script in Forumwa is susceptible to cross site scripting attacks.
6911e2b42224dba3a55f9e2c2d8696ec1a86792045002b7986a1b2a090c0c163
CaIRA: Computer and Internet-Related Acronyms. 1,725 acronyms and abbreviations with definitions and explanations. Includes a listing of all internet country abbreviations.
83ac0240a4fcd64c7877890aa47e1f4dafd74408abdf40036d78a987d242cb4b
ICQ Security Tutorial, version 1.5 - Includes information on bombing, flooding, hijacking, spoofing, getting the ICQ password, gaining access through ICQ webpages, getting IPs and ports, getting information about other ICQ users, adding users without their authorization nor without sending them a "you've been added" message, learning and playing with the ICQ protocol and what not. EVERYTHING you need to know about ICQ security.
330cffc80092dcd2786857c3dcbe17eeb5d624dd5a48add6aab38b67704d739a
Trojans: what they are, different kinds of trojans (RATs, keyloggers, password trojans etc') for Unix and Windows, how to look out for trojans and defeat them etc'. Everything you always wanted to know about trojans but were afraid to ask (in fear of appearing to be lame).
35cd278dc8708c046f0ccb7340296c5676e446468e162fa3226e24714507ea84
Speeding Up Your Internet Connection using DNS Caching under Unix and Windows: everything you've always wanted to know about DNS caching but were afraid to ask.
68e339cb0b62929ec6a1e6f0bca1896fd0fa6920a1475c05ac6a0430e116b8b7
A tutorial for a Unix newbie or semi-newbie who is interested in computer security and/or networking. Basic Local/Remote Unix Security: Change default configurations, basic packet filtering, how to secure your system's networking services (or completely remove them or some of them, in case you don't need them, in order to increate your computer's security), how to use, how to avoid trojans, what are sniffers, how to maintain local security between different users in your system (if you're not the only one using this system, whether it's locally or remotely), some stuff about SSH, how to protect yourself against computer viruses under the Unix system, what are security scanners and how to use them, why you should encrypt your important data and how etc'.
752f8d456cd2997c648ad6a15e70646527e51406f91a4e955ca9031248eac546
Don't know anything about PGP? Wanna know what is it good for? How to use it? What are the advantages of encrypting your files and your Email? How PGP works? Why is it so hard to crack? Want a simple tutorial to teach you all this? Then go for this one! Simple, easy to understand and relatively small.
4463f8f5e7bbb27c5b104cb8b41cfd2dd3abc45de190a40487ed476b83466913
Gives you access to the registry, dos, display properties etc' (control panel too in the next version). Archive password is set to p4ssw0rd. Use at your own risk.
c0e7602f9f22d7569c787cf797f50f6eaed01dba30d5b509ba3d1ea16f6564b9
Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).
5c15520fefd5605f5657f5a949af8ad6ed654a62e971f0b206e27b9b80e8e7c6