Sil of AntiOffline has discovered a disturbing bug in cans of Pepsi and Diet Pepsi. Apparently he has notified the vendors of this problem, yet they steadfastly refuse to release a patch. All known versions are affected. With Coke and Pepsi having most of the market share in cola drinks, surely this is an another argument for more soft drink diversity!
d269a0eb52cf0d0eab565a5afb0264fff9a992aef99a2ba9e47ea522849a6eee
PostScript version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.
07ce0af9507b3d59633a10839dec73e882872e79cab1fd4d98721ac7e992577d
Text version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.
4af7dd6373c07359980c03139c1927b168d13a6111720b6467405f02a2200192
Hunt is a program for intruding into a connection, watching it and resetting it. (source code package). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.
67bf57a29fe9cba3fbf27789e5ca66a5b59eb00eccb4775058cd8013fdd2288c
Hunt is a program for intruding into a connection, watching it and resetting it. (linux binary distribution). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.
4fbc536818885a42c005c10ae3f0bf335a07d693ae2b5626b127ad46db0f40b4
Version 1.3.1 of Snort, the lightweight network intrusion detection system. Version 1.3.1 fixes an annoying crash bug, plus enhances a number of features of the program. Invalid ICMP types/codes can now be filtered or monitored, the tcpdump file playback facility can use BPF filters, and the packet payload size check keyword now accepts greater than/less than modifiers.
6a7e0f7ecefe5665e005a26a74d0f35b9b2e824811ed00eef81ffb1e6a9b589b
Patched version of back oriface which is not detected by DrWeb 4.x,sPIDER, AVP 3.0, or Norton Antivirus 5.0 win (base 18.11.98). BO version 1.20 patch 7. Archive password is set to p4ssw0rd. Use at your own risk.
fcf192e868551e1cd5a3215303ca93595b2992b105541f6e76633cfffacb16e1
CGI vulnerability scanner version 1.56. Checks for over 90 CGI vulnerabilities. Tested on slackware linux with kernel 2.0.35-2.2.5, Freebsd 2.2.1-3.2, IRIX 5.3, DOS, and windows.
d7b293de5c0726621fc1fb781af0ef65a2cb57ac2a7465b5520f3f022b7a4f76
Winfingerprint 2 is a console based Win32 discovery tool. It is written in VC++ 6, and is currently in the process of being developed.
c6a1d75b61c3aac9f360d6afc530bc566057e23afa408505e3b508f155f0b914