Blogs

Microsoft Confirms 17-Year Old Windows bug -Ha-Ha-Ha Sure they didn't know....!

Microsoft late yesterday issued its second advisory of the last week, warning users that a 17-year-old bug in the kernel of all 32-bit versions of Windows could be used by hackers to hijack PCs.

The vulnerability in the Windows Virtual DOS Machine (VDM) subsystem was disclosed Tuesday by Google engineer Tavis Ormandy on the Full Disclosure security mailing list. Coincidentally, Ormandy received credit for reporting the single vulnerability that Microsoft fixed last week on its regular Patch Tuesday.

The VDM subsystem was added to Windows with the July 1993 release of Windows NT, Microsoft's first fully 32-bit operating system. VDM allows Windows NT and later to run DOS and 16-bit Windows software.

Yesterday's advisory spelled out the affected software -- all 32-bit editions of Windows, including Windows 7 -- and told users how to disable VDM as a workaround. Windows' 64-bit versions are not vulnerable to attack.

US Government Pushing against Web Censorhip

The U.S. Department of State will launch several new initiatives focused on fighting Internet censorship, including working with businesses and other groups to develop mobile applications that help residents of countries with repressive governments report problems, U.S. Secretary of State Hillary Clinton said Thursday.

The State Department will also sponsor an innovation competition looking for new ways to connect residents of other nations to Internet services, and it will support new circumvention technologies for dissidents whose connections to the open Internet are blocked, Clinton said during a speech at the Newseum in Washington, D.C.

"Both the American people and nations that censor the Internet should understand that our government is committed to helping promote Internet freedom," Clinton said. "We want to put these tools in the hands of people who will use them to advance democracy and human rights, to fight climate change and epidemics."

MeTuS 3.0

Metus 3.0

*Plz. Note: If you download this it will get bounced and not download if you have your AV on because this is a hacking tool that I am sharing with you but I assure you that I have it and use it and it's a false-positive you get. I am also using NOD32 and it has categorized it as a virus and it's not. *Also go to "you tube" and search "MeTuS 2.8" and it will show you how to use this properly, but remember this for educational uses only and I nor will SoldierX be held responsible for any illegal activities.

The following features have been updated/tweaked/added:

USB Spread on Cmd - Fud Autorun.inf
Ip Address (Local and Public)
Firefox Passwords (fixed)
Uninstall All (With Confirmation)
Confirmation Added to Update Function
Ping Pong Added
New/Smaller Design

Your 2.8 and below bots will work correctly on all functions except USB spread on command. This can be simply

Demonoid Has OPEN registration !

There I was wondering around my "web" and was not looking for it but fate slapped me in the face, what happened was a dream come true....Demonoid was open for NEW members and I was all over it. Now I have been a member now for two days and I'm all done with warez sight's forever. If Demonoid don't have it then no one has it. I'm posting this because I saw member's here who were looking for invites, well consider yourself "invited" < http://www.demonoid.com/ > but if I were you I'd hurry before the Demon closes the door again. Just remember to OBEY the rules and you'll be OK, and if you give an invite out if that person gets banned then you too might get banned. But my heart is and will always be with "SoldierX" everyone else is nothing but script-kiddies and show-off's and we don't need that. One last thing, Thanks goes out to "RaT" for making this forum https://www.soldierx.com and making it available to the world.

Former US officials in cyberattack simulation

Print AFP/File –
The logo of the White House Situation Room hangs on a wall inside the complex at the White House in Washington, …

by Chris Lefkow Chris Lefkow – Sat Feb 13, 9:28 pm ET
WASHINGTON (AFP) – Former top US intelligence officials will become cyberwarriors on Tuesday in a simulation of how the US government would respond to a massive cyberattack on the United States.

"The scenario itself is secret," said Eileen McMenamin, vice president of communications for the Bipartisan Policy Center (BPC), which is hosting the event dubbed "Cyber ShockWave."

"The participants don't even know what it is," McMenamin told AFP. "None of them know what's going to transpire."

For Cyber ShockWave, a room at the Mandarin Hotel here is being transformed into the White House Situation Room, where the president and his top advisers typically meet to address national emergencies.

Signatures - 1 - Open Source

"It HAS to be open source because otherwise nothing ever gets done!"

With few exceptions, I feel very strongly in this matter with information regarding to all aspects of life and the Universe.

Signatures - 0 - Tactics

I usually look for meaningful things to say in a signature, whether it is someone else's quote or mine own. So I decided to post my changes to my blog here and see if I can spark some discussion on various subjects I find interesting.

From Sun Tzu's "The Art of War", near the end of Chapter VI: "Weak Points and Strong", verse 28:
"Do not repeat the tactics which have gained you one victory, but let your methods be regulated by the infinite variety of circumstances."
- Art of War 6:28 (Translated)

Microblog

Yeah, so I had a car that was in our apartment's garage. Yesterday I found a tow sticker on it. They were completely within their right to put it on, but the thing is, I was also completely within my right to not have tags, as the car isn't driven. So, today I had to go out and fix up ole betsy, and get her purrin again, as she hadn't even been cranked in over a year. It's now my wake up time from yesterday, and I have now officially been awake for 24hrs straight. Thank god for the weekend: I'm going to bed!

PS: I know nothing about cars, so it's a good thing google is my bitch.

Over-Thinking

So a side project of mine has involved the building of a pure PHP web app to generate a presentation. First off there is no way this is the easiest way to generate a presentation but this is the project as I was placed into it. My problem stems from solving a simple problem with a complex solution. Below is an example of a function that builds a SELECT query. The function takes 7 parameters and does not execute a query.

//This functions takes 6 arguments.
//1     ::      A string containing the table name
//2     ::      An array of strings containing the field to select
//3*    ::      An array of strings containing the column fields names comprising the WHERE statement
//4*    ::      An array of strings containing the respective field values comprising the WHERE statement
//5     ::      An array of special options to determine how the query is run. [Ex: MULTIQUERY, PREFERREDONLY]
//6     ::      The mode [Ex: 0 = Normal, 1 = Debug]
//7     ::      The number of rows to keep when using multiquery.

Hello SX

Hi people,

Thank you for being tolerate of newbs like me. I greatly appreciate everyone's patience with me because I must sound like an idiot to the advanced members. I like the friendly atmosphere, and for once i feel like this is a group which i want to belong. Please keep up the good work, i love this site! I look forward towards finding my direction with the guidance of SX members.

Live long and prosper,

zsanfusa (Zac)

Syndicate content