tag:blogger.com,1999:blog-71290093353537151632024-03-12T21:58:27.149-07:00James Dillon: DeveloperI like to take things apart and see how they work.James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-7129009335353715163.post-1857530132034464692016-11-07T17:28:00.000-08:002016-11-07T17:28:24.223-08:00How to fix the millions of vulnerable IoT devices used it the Miari DDoS attacks.<h3 style="text-align: center;">
How to fix millions of vulnerable IoT devices used it the Miari DDoS attacks.</h3>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
15 years ago I received the call from my friend Don Jensen. He was the head IT guy for Granite Construction, Heavy Construction division. He had four remote sites infected with the Nimda worm. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="https://en.wikipedia.org/wiki/Nimda" target="_blank">Wikipedia </a>sums it up here:</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
"Nimda is a file infecting computer worm. It quickly spread, surpassing the economic damage caused by previous outbreaks such as Code Red. Nimda utilized several types of propagation techniques and this caused it to become the Internet’s most widespread virus/worm within 22 minutes.</div>
<div style="text-align: center;">
The worm was released on September 18, 2001. Nimda affected both user workstations (clients) running Windows 95, 98, NT, 2000 or XP and servers running Windows NT and 2000. </div>
<div style="text-align: center;">
The worm exploited various Microsoft IIS 4.0 / 5.0 directory traversal vulnerabilities. Nimda were hugely successful exploiting well known and long solved vulnerabilities in the Microsoft IIS server."</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
It was affecting all of the telephone service at the remote sites (Las Vegas, Minneapolis, Dallas, and Tampa). The phone systems were running Cisco Communication Center on top of Windows 2000 server. Microsoft Internet Information Server administration GUI was the admin control console.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
What a mess. I was at my home in California, and traveling to each remote site was not possible.</div>
<div style="text-align: center;">
This HAD to repair remotely, so I started to investigate what made Nimda tick, and found a solution. (This advisory from <a href="http://www.cert.org/historical/advisories/CA-2001-26.cfm" target="_blank">CERT </a>was really helpful.)</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
I used it against itself. I "hacked" each of the Windows servers using the exact same security hole that made Nimda possible: I opened a browser window, plugged in the IP address of the infected server, and began typing commands, starting with "CMD.EXE".</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
After the massive DDoS atack in October 2016, I started to think about how to remotely patch the millions of video cameras, DVR's, and doorbells that were being compromised by Mirai and downloaded the source code. I think this just might work, but it may not be legal to remotely patch and upgrade all the IoT devices in the world. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-52224462892066394892016-11-07T17:01:00.001-08:002016-11-07T17:01:26.056-08:00Installing Tails in VirtualBox: <div style="text-align: center;">
I am very fond of <a href="https://www.virtualbox.org/wiki/Downloads">VirtualBox </a>as a way to experiment with new operating systems, mostly based on Linux in one form or another. I installed VirtualBox of a old HP laptop and wanted to try out <a href="https://tails.boum.org/install/index.en.html">Tails</a>, a Linux operating system that can provide some protection against government spying (like the NSA).</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Here is how the folks at Tails describe it (<a href="https://tails.boum.org/about/index.en.html" target="_blank">from their web site</a>):</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
It aims at preserving your privacy and anonymity, and helps you to:</div>
<div style="text-align: center;">
use the Internet anonymously and circumvent censorship;</div>
<div style="text-align: center;">
all connections to the Internet are forced to go through the Tor network;</div>
<div style="text-align: center;">
leave no trace on the computer you are using unless you ask it explicitly;</div>
<div style="text-align: center;">
use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
amnesia, noun: forgetfulness; loss of long-term memory.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
incognito, adjective & adverb: (of a person) having one's true identity concealed.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Online anonymity and censorship circumvention</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Tails relies on the Tor anonymity network to protect your privacy online:</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
All software is configured to connect to the Internet through Tor, if an application tries to connect to the Internet directly, the connection is automatically blocked for security.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Tor is an open and distributed network that helps defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Tor protects you by bouncing your communications around a network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Using Tor you can:</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
be anonymous online by hiding your location,</div>
<div style="text-align: center;">
connect to services that would be censored otherwise;</div>
<div style="text-align: center;">
resist attacks that block the usage of Tor using circumvention tools such as bridges.</div>
<div style="text-align: center;">
To learn more about Tor, <a href="https://www.torproject.org/" target="_blank">see the official Tor website</a>. You can also read more here:</div>
<div style="text-align: center;">
<br /></div>
<ul style="background-color: white; font-family: "DejaVu Sans", Verdana, sans-serif; font-size: 14px; margin-left: 1.5em; max-width: 45em; padding: 0px;">
<li style="text-align: center;"><a href="https://www.torproject.org/about/overview.html.en#whyweneedtor" style="background: url("lib/link_out.gif") right bottom no-repeat; border-bottom: 1px solid rgb(0, 170, 0); color: #00aa00; padding-right: 13px; text-decoration: none;">Tor overview: Why we need Tor</a></li>
<li style="text-align: center;"><a href="https://www.torproject.org/about/overview.html.en#thesolution" style="background: url("lib/link_out.gif") right bottom no-repeat; border-bottom: 1px solid rgb(0, 170, 0); color: #00aa00; padding-right: 13px; text-decoration: none;">Tor overview: How does Tor work</a></li>
<li style="text-align: center;"><a href="https://www.torproject.org/about/torusers.html.en" style="background: url("lib/link_out.gif") right bottom no-repeat; border-bottom: 1px solid rgb(0, 170, 0); color: #00aa00; padding-right: 13px; text-decoration: none;">Who uses Tor?</a></li>
<li style="text-align: center;"><a href="https://trac.torproject.org/projects/tor/wiki/doc/TorALaymansGuide" style="background: url("lib/link_out.gif") right bottom no-repeat; border-bottom: 1px solid rgb(0, 170, 0); color: #00aa00; padding-right: 13px; text-decoration: none;">Understanding and Using Tor — An Introduction for the Layman</a></li>
</ul>
<div style="background-color: white; font-family: "DejaVu Sans", Verdana, sans-serif; font-size: 14px; margin-bottom: 1.5em; max-width: 45em; text-align: center;">
To learn more about how Tails ensures all its network connections use Tor, see our <a href="https://tails.boum.org/contribute/design/Tor_enforcement/" style="border-bottom: 1px solid rgb(0, 170, 0); color: #00aa00; text-decoration: none;">design document</a>.</div>
<div style="text-align: center;">
<br /></div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-89618273162249057352015-02-25T19:26:00.003-08:002015-02-25T19:38:35.538-08:00Installing KaOSx Linux in VirtualBoxHere is what I did to install KaOSx Linux in VirtualBox. KaOS is a an rolling distribution, fully focused on KDE/Qt. It uses pacman as package-manager and is based on Arch Linux. Arch Linux is bleeding edge rolling, whereas KaOS is a bit more conservative.<br />
<br />
To quote the website: "The idea behind KaOS is to create a tightly integrated rolling and transparent distribution for the modern desktop, build from scratch with a very specific focus. Focus on one DE (KDE), one toolkit (Qt), one architecture (x86_64) plus a focus on evaluating and selecting the most suitable tools and applications. Moving away from proprietary Operating Systems to open source options (Linux-based, BSD based, Solaris based) is about wanting freedom and choice in almost all cases. KaOS has made the choice to use the Linux kernel as a base (though the Illumos kernel is under constant evaluation, and a future switch is a wish). After that choice, the best available package manager, most flexible way of package building, repository maintenance is pacman/makepkg for a rolling distro like KaOS. As for the Desktop Environment, there will never be a change, whether it is Linux or Illumos based, KDE will be the choice, Qt the Toolkit. With those choices in place, April 2013 package building for this independent distribution was started. KaOS is a build from scratch distribution, every package in every repository is build by and for KaOS. By July 2013 the initial goal of about 1500 packages was reached."<br />
<br />
Hardware requirements?<br />
KDE is a modern Desktop Environment which can make use of most of any graphics or sound card capabilities. This does not mean KDE can’t be made to run on very low-end hardware, but in general there are better options available for such systems (OpenBox for example). The very minimal needed for hard-drive space is 8 Gb, but 25 Gb is recommended as minimal. KaOS will install with 1 Gb of RAM available, though a much better experience will start with 2 Gb of RAM. Since only x86_64 packages are available, a 64 bit capable cpu is needed.<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
I added 2 Gigs to the VM, and enabled 3D acceleration and PAE/NX.</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7ObImjkq4WByktoHxv9jxyVsw294B2U12M381qIKSAU3DQGWQ1A4GurC2sNkPVRUMEjbXg-Up92X3UljlVtYPgzV3nCzWy0VxZPM5-7xkDGIxOW0AmaY8tNrL5vmQ_3LzEL_JziKv76Q0/s1600/KaOSx.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7ObImjkq4WByktoHxv9jxyVsw294B2U12M381qIKSAU3DQGWQ1A4GurC2sNkPVRUMEjbXg-Up92X3UljlVtYPgzV3nCzWy0VxZPM5-7xkDGIxOW0AmaY8tNrL5vmQ_3LzEL_JziKv76Q0/s1600/KaOSx.png" height="298" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5aUGsLTJ7dtk3Pla7Aqt9Nbas26HQ46o19iJKFPi6tvMemmU3g7w6_nwKuJKhYNx4wsUgP12_2SWB5d0jM82z_FjpEuKSeZnIydLDGrgZqUxibLh6Pc1a1Ny8yXOHHILIdh4zjiIM01VW/s1600/KAOS.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5aUGsLTJ7dtk3Pla7Aqt9Nbas26HQ46o19iJKFPi6tvMemmU3g7w6_nwKuJKhYNx4wsUgP12_2SWB5d0jM82z_FjpEuKSeZnIydLDGrgZqUxibLh6Pc1a1Ny8yXOHHILIdh4zjiIM01VW/s1600/KAOS.png" height="300" width="400" /></a></div>
<div style="text-align: center;">
Boot up menu.Start KaOS Live with or without nVidia Drivers, Boot from first hard disk, preform and hardware detection or memory test. F1 is Help, F2 sets the default laungage, F3 sets the video mode, and F4 allows you to adjust the kernel paramiters at boot. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3hYlDUgpR56unAM2BhJl_x9IlrBaNJwZO-8cC621COI6g86XDiSozT2vy23Ac2CrXIOAAQme3U0F4MR5GaI48TMin_BGK7RGcnPg5Ay-LyiMOgG9m6Sm1cWJobyjo-VwKp7EK3bpxK4RH/s1600/KAOS-2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3hYlDUgpR56unAM2BhJl_x9IlrBaNJwZO-8cC621COI6g86XDiSozT2vy23Ac2CrXIOAAQme3U0F4MR5GaI48TMin_BGK7RGcnPg5Ay-LyiMOgG9m6Sm1cWJobyjo-VwKp7EK3bpxK4RH/s1600/KAOS-2.png" height="300" width="400" /></a></div>
<div style="text-align: center;">
Booting the kernel, no errors.</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDbFMygOoVLgSULd7H4SCij4IqKSLJkPI34TpLXkqn4ms8KzoEAIlPxGo2sH0qMuZJDmSSbzGw6Eonakpmzs9Xu6o-eVXW-yo0cJa9hcLCjNUYA0eRAo4gi8gvdugEYunqeeAMlnVGl1S3/s1600/KAOS-3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDbFMygOoVLgSULd7H4SCij4IqKSLJkPI34TpLXkqn4ms8KzoEAIlPxGo2sH0qMuZJDmSSbzGw6Eonakpmzs9Xu6o-eVXW-yo0cJa9hcLCjNUYA0eRAo4gi8gvdugEYunqeeAMlnVGl1S3/s1600/KAOS-3.png" height="300" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
First Installation screen. Welcome!</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbLZCfSy0k_-3bUnifXKBw6X5mBYeWrj3-JtyIYYArjFaWn1h0f4QBAftA2XcB_91GIGod0tphJtm-wl6Bv1xSPncKpU3KGj_PirXBvI9T1bMFIpjqE4_9iLyAcKXQR8KDrWuobXzNVOHl/s1600/KAOS-6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbLZCfSy0k_-3bUnifXKBw6X5mBYeWrj3-JtyIYYArjFaWn1h0f4QBAftA2XcB_91GIGod0tphJtm-wl6Bv1xSPncKpU3KGj_PirXBvI9T1bMFIpjqE4_9iLyAcKXQR8KDrWuobXzNVOHl/s1600/KAOS-6.png" height="300" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Select your time zone.</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjezlrBIPuNkwVLMb1pFqlWzovqp7sHfED7r5CqvLQ0N2L2kK0TZ7TKBDuKUzx2tqZDIwBLtYX27M6aVX6x-wHSbLeHwycKeuCbUT18k4twENjqEM-bmUpxXt1aNXeWKTAhVkHnXLJkOqtv/s1600/KAOS-8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjezlrBIPuNkwVLMb1pFqlWzovqp7sHfED7r5CqvLQ0N2L2kK0TZ7TKBDuKUzx2tqZDIwBLtYX27M6aVX6x-wHSbLeHwycKeuCbUT18k4twENjqEM-bmUpxXt1aNXeWKTAhVkHnXLJkOqtv/s1600/KAOS-8.png" height="300" width="400" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVi2y1WWEoxSFqb0ZYO8Cl-YHzxEhfPyMaTAg_I1bx2Kkr8LAJADMVgZ2r5WynJo4_DZPhcIqQne8h8wpYlJPjr-vMfIkVB4FXSlwFJmpqY7hX-jlCTk-px6GvbuDicU3SqIIDpu_bw1Wo/s1600/KAOS-Desktop.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVi2y1WWEoxSFqb0ZYO8Cl-YHzxEhfPyMaTAg_I1bx2Kkr8LAJADMVgZ2r5WynJo4_DZPhcIqQne8h8wpYlJPjr-vMfIkVB4FXSlwFJmpqY7hX-jlCTk-px6GvbuDicU3SqIIDpu_bw1Wo/s1600/KAOS-Desktop.png" height="300" width="400" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy_Mst0wHqLRN1xMUtVaKdf2bDdzbN0H9CBJuBDXYRlYPi6QngceMexeJXKqnVeZqBrp8Q971Dinkj-ejNcFU4N4UAB7r38k3BdD5x_vjiI61wkx911P-jlcF5xpgtvqPXi4WCFDIu0Of_/s1600/KAOS-locked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy_Mst0wHqLRN1xMUtVaKdf2bDdzbN0H9CBJuBDXYRlYPi6QngceMexeJXKqnVeZqBrp8Q971Dinkj-ejNcFU4N4UAB7r38k3BdD5x_vjiI61wkx911P-jlcF5xpgtvqPXi4WCFDIu0Of_/s1600/KAOS-locked.png" height="300" width="400" /></a></div>
<br />
<br />James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-17514524152096256162014-08-26T11:34:00.002-07:002014-08-26T11:34:41.211-07:00KALI Linux releases version 1.09The Kali Linux developers have released version 1.09 to the public. Kali Linux is a Linux distribution specifically intended for the network security and forensics professional, but makes a damn good all around Operating System for those who are concerned with computer security in general. Kali Linux describes itself as a "penetration testing platform" and "the most advanced and versatile penetration testing distribution ever created."<br />
<br />
Kali Linux contains a includes a vast collection of tools from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.<br />
<br />
They provide several ISO files for download, in 32, 64 bit and ARM, as well as several VMWare images.<br />
<br />
They also host the training and pen testing consultants <a href="http://www.offensive-security.com/">Offensive Security</a>. They offer:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQNeQlUGUUUfYb0pWwmIJAz1x4r1dedE2pr32flK_kUg5Ualmjlg06YlynVDIO-wLXB5iko1VJcjx8HMkckrNF_Nc2pANVUxVsjsiIVq-El365ZWmrrlPVrCL6Oo1_eTxBS-cZunULpsVG/s1600/home-slide-certification-alt.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQNeQlUGUUUfYb0pWwmIJAz1x4r1dedE2pr32flK_kUg5Ualmjlg06YlynVDIO-wLXB5iko1VJcjx8HMkckrNF_Nc2pANVUxVsjsiIVq-El365ZWmrrlPVrCL6Oo1_eTxBS-cZunULpsVG/s1600/home-slide-certification-alt.jpg" /></a></div>
<br />
<br />
Training and certifications in Network Security and Penetration Testing Training:<br />
<span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">Experience the industry’s most realistic </span><a href="http://www.offensive-security.com/information-security-training/penetration-testing-with-kali-linux/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Penetration Testing with Kali Linux">penetration testing training</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;"> and </span><a href="http://www.offensive-security.com/information-security-certifications/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Information Security Certifications">certifications</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">. Taught by the core developers of </span><a href="http://www.offensive-security.com/community-projects/kali-linux/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="BackTrack Linux">Kali Linux</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">, our </span><a href="http://www.offensive-security.com/information-security-training/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Information Security Training">information security traiining</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;"> will immerse you into the deep-end of real world penetration testing.</span><br />
<br />
Penetration Testing services:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyLuFE9oCS6I1XZwq3Zy36s1pNdEqv9Zs7Ak-yOqWyq5t9LbwbXvy6O9JlVbtGQrT-Et17UUwVFa8PYwGQ9or9P6PWEJ6R_ajuVpkAPS1v6CB9mt0ouaueybxn5Y_lbxXB5ocdaUa4Tyme/s1600/home-slide-pentest-asm-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyLuFE9oCS6I1XZwq3Zy36s1pNdEqv9Zs7Ak-yOqWyq5t9LbwbXvy6O9JlVbtGQrT-Et17UUwVFa8PYwGQ9or9P6PWEJ6R_ajuVpkAPS1v6CB9mt0ouaueybxn5Y_lbxXB5ocdaUa4Tyme/s1600/home-slide-pentest-asm-2.jpg" /></a></div>
<span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">We know penetration testing. Between </span><a href="http://www.offensive-security.com/information-security-training/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Information Security Training">Offensive Security Training</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">, </span><a href="http://www.offensive-security.com/community-projects/kali-linux/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Kali Linux">Kali Linux</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;"> and </span><a href="http://www.offensive-security.com/community-projects/the-exploit-database/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="The Exploit Database">the Exploit-Database</a><span style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; text-align: justify; word-spacing: 1px;">, you can trust that we have the expertise, knowledge and experience to provide you with high end </span><a href="http://www.offensive-security.com/offensive-security-solutions/penetration-testing-services/" style="background-color: #f9f9f9; color: #aaaaaa; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; outline: none 0px; text-align: justify; text-decoration: none; word-spacing: 1px;" title="Penetration Testing Services">penetration testing services</a><br />
<br />
<a href="http://www.offensive-security.com/">http://www.offensive-security.com/</a><br />
<br />
Kali Linux contains a vast array of tools and utilities from different niches of the security and forensics fields.<br />
<br />
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
EXPLOITATION TOOLS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/exploitation-tools/armitage" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Armitage">Armitage</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/exploitation-tools/backdoor-factory" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Backdoor Factory">Backdoor Factory</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/exploitation-tools/beef-xss" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BeEF">BeEF</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-auditing-tool" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-auditing-tool">cisco-auditing-tool</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-global-exploiter" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-global-exploiter">cisco-global-exploiter</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-ocs" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-ocs">cisco-ocs</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/cisco-torch" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-torch">cisco-torch</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/crackle" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="crackle">crackle</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/jboss-autopwn" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="jboss-autopwn">jboss-autopwn</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/exploitation-tools/linux-exploit-suggester" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Linux Exploit Suggester">Linux Exploit Suggester</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/maltego-teeth" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Maltego Teeth">Maltego Teeth</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/set" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SET">SET</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/exploitation-tools/shellnoob" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ShellNoob">ShellNoob</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sqlmap">sqlmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/thc-ipv6" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-IPV6">THC-IPV6</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/yersinia" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Yersinia">Yersinia</a></li>
</ul>
<br />
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
FORENSICS TOOLS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/binwalk" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Binwalk">Binwalk</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/bulk-extractor" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="bulk-extractor">bulk-extractor</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/capstone" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Capstone">Capstone</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/chntpw" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="chntpw">chntpw</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/cuckoo" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Cuckoo">Cuckoo</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/dc3dd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dc3dd">dc3dd</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/ddrescue" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ddrescue">ddrescue</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/dff" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DFF">DFF</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/distorm3" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="diStorm3">diStorm3</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/dumpzilla" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Dumpzilla">Dumpzilla</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/extundelete" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="extundelete">extundelete</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/foremost" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Foremost">Foremost</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/galleta" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Galleta">Galleta</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/guymager" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Guymager">Guymager</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/iphone-backup-analyzer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="iPhone Backup Analyzer">iPhone Backup Analyzer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/p0f" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="p0f">p0f</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/pdf-parser" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="pdf-parser">pdf-parser</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/pdfid" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="pdfid">pdfid</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/pdgmail" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="pdgmail">pdgmail</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/peepdf" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="peepdf">peepdf</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/regripper" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="RegRipper">RegRipper</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/forensics/volatility" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Volatility">Volatility</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/xplico" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Xplico">Xplico</a></li>
</ul>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
HARDWARE HACKING</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/hardware-hacking/android-sdk" style="color: #092334; outline: none 0px;" title="android-sdk">android-sdk</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/apktool" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="apktool">apktool</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/hardware-hacking/arduino" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Arduino">Arduino</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/dex2jar" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dex2jar">dex2jar</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/hardware-hacking/sakis3g" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Sakis3G">Sakis3G</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/smali" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="smali">smali</a></li>
</ul>
<br />
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
INFORMATION GATHERING</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/acccheck" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="acccheck">acccheck</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ace-voip" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ace-voip">ace-voip</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/amap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Amap">Amap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/automater" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Automater">Automater</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/bing-ip2hosts" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="bing-ip2hosts">bing-ip2hosts</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/braa" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="braa">braa</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/casefile" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CaseFile">CaseFile</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/cdpsnarf" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CDPSnarf">CDPSnarf</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/cisco-torch" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-torch">cisco-torch</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/cookie-cadger" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Cookie Cadger">Cookie Cadger</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/copy-router-config" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="copy-router-config">copy-router-config</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dmitry" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DMitry">DMitry</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dnmap">dnmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnsenum" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dnsenum">dnsenum</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnsmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dnsmap">dnsmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnsrecon" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DNSRecon">DNSRecon</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnstracer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dnstracer">dnstracer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dnswalk" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dnswalk">dnswalk</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dotdotpwn" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DotDotPwn">DotDotPwn</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/enum4linux" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="enum4linux">enum4linux</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/enumiax" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="enumIAX">enumIAX</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/exploitdb" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="exploitdb">exploitdb</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/fierce" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Fierce">Fierce</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/firewalk" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Firewalk">Firewalk</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/fragroute" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="fragroute">fragroute</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/fragrouter" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="fragrouter">fragrouter</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ghost-phisher" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Ghost Phisher">Ghost Phisher</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/golismero" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="GoLismero">GoLismero</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/goofile" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="goofile">goofile</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/hping3" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="hping3">hping3</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/intrace" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="InTrace">InTrace</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ismtp" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="iSMTP">iSMTP</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/lbd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="lbd">lbd</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/maltego-teeth" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Maltego Teeth">Maltego Teeth</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/masscan" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="masscan">masscan</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/metagoofil" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Metagoofil">Metagoofil</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/miranda" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Miranda">Miranda</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/nmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Nmap">Nmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ntop" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ntop">ntop</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/p0f" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="p0f">p0f</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/parsero" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Parsero">Parsero</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/recon-ng" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Recon-ng">Recon-ng</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/set" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SET">SET</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/smtp-user-enum" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="smtp-user-enum">smtp-user-enum</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/snmpcheck" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="snmpcheck">snmpcheck</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslcaudit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sslcaudit">sslcaudit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslsplit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SSLsplit">SSLsplit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslstrip" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sslstrip">sslstrip</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslyze" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SSLyze">SSLyze</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/thc-ipv6" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-IPV6">THC-IPV6</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/theharvester" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="theHarvester">theHarvester</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/tlssled" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="TLSSLed">TLSSLed</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/twofi" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="twofi">twofi</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/urlcrazy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="URLCrazy">URLCrazy</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/wireshark" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wireshark">Wireshark</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/wol-e" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WOL-E">WOL-E</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/xplico" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Xplico">Xplico</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
MAINTAINING ACCESS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/cryptcat" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CryptCat">CryptCat</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/cymothoa" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Cymothoa">Cymothoa</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/dbd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dbd">dbd</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/dns2tcp" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dns2tcp">dns2tcp</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/http-tunnel" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="http-tunnel">http-tunnel</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/httptunnel" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="HTTPTunnel">HTTPTunnel</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/intersect" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Intersect">Intersect</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/nishang" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Nishang">Nishang</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/polenum" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="polenum">polenum</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/powersploit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="PowerSploit">PowerSploit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/pwnat" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="pwnat">pwnat</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/ridenum" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="RidEnum">RidEnum</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/sbd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sbd">sbd</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/u3-pwn" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="U3-Pwn">U3-Pwn</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/webshells" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Webshells">Webshells</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/weevely" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Weevely">Weevely</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/maintaining-access/winexe" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Winexe">Winexe</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
PASSWORD ATTACKS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/acccheck" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="acccheck">acccheck</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/burpsuite" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Burp Suite">Burp Suite</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/cewl" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CeWL">CeWL</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/chntpw" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="chntpw">chntpw</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-auditing-tool" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-auditing-tool">cisco-auditing-tool</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/cmospwd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CmosPwd">CmosPwd</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/creddump" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="creddump">creddump</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/crunch" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="crunch">crunch</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/dbpwaudit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DBPwAudit">DBPwAudit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/findmyhash" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="findmyhash">findmyhash</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/gpp-decrypt" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="gpp-decrypt">gpp-decrypt</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/hash-identifier" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="hash-identifier">hash-identifier</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/hexorbase" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="HexorBase">HexorBase</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/hydra" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-Hydra">THC-Hydra</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/john" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="John the Ripper">John the Ripper</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/johnny" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Johnny">Johnny</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/keimpx" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="keimpx">keimpx</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/maltego-teeth" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Maltego Teeth">Maltego Teeth</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/maskprocessor" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Maskprocessor">Maskprocessor</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/multiforcer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="multiforcer">multiforcer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/ncrack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Ncrack">Ncrack</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/oclgausscrack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="oclgausscrack">oclgausscrack</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/pack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="PACK">PACK</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/patator" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="patator">patator</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/phrasendrescher" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="phrasendrescher">phrasendrescher</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/polenum" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="polenum">polenum</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/rainbowcrack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="RainbowCrack">RainbowCrack</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/rcracki-mt" style="color: #092334; outline: none 0px;" title="rcracki-mt">rcracki-mt</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/rsmangler" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="RSMangler">RSMangler</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/sqldict" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SQLdict">SQLdict</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/statsprocessor" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Statsprocessor">Statsprocessor</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/thc-pptp-bruter" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-pptp-bruter">THC-pptp-bruter</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/truecrack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="TrueCrack">TrueCrack</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/webscarab" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WebScarab">WebScarab</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/password-attacks/wordlists" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="wordlists">wordlists</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/zaproxy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="zaproxy">zaproxy</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
REPORTING TOOLS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/casefile" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CaseFile">CaseFile</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/cutycapt" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CutyCapt">CutyCapt</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/dos2unix" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dos2unix">dos2unix</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/dradis" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Dradis">Dradis</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/keepnote" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="KeepNote">KeepNote</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/magictree" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="MagicTree">MagicTree</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/metagoofil" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Metagoofil">Metagoofil</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/nipper-ng" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Nipper-ng">Nipper-ng</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reporting-tools/pipal" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="pipal">pipal</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
REVERSE ENGINEERING</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/apktool" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="apktool">apktool</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/dex2jar" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="dex2jar">dex2jar</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/distorm3" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="diStorm3">diStorm3</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/edb-debugger" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="edb-debugger">edb-debugger</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/jad" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="jad">jad</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/javasnoop" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="javasnoop">javasnoop</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/jd-gui" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="JD-GUI">JD-GUI</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/ollydbg" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="OllyDbg">OllyDbg</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/smali" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="smali">smali</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/valgrind" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Valgrind">Valgrind</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/reverse-engineering/yara" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="YARA">YARA</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
SNIFFING & SPOOFING</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/burpsuite" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Burp Suite">Burp Suite</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/dnschef" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DNSChef">DNSChef</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/fiked" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="fiked">fiked</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/hamster-sidejack" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="hamster-sidejack">hamster-sidejack</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/hexinject" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="HexInject">HexInject</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/iaxflood" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="iaxflood">iaxflood</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/inviteflood" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="inviteflood">inviteflood</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ismtp" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="iSMTP">iSMTP</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/isr-evilgrade" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="isr-evilgrade">isr-evilgrade</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/mitmproxy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mitmproxy">mitmproxy</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/ohrwurm" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ohrwurm">ohrwurm</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/protos-sip" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="protos-sip">protos-sip</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/rebind" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="rebind">rebind</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/responder" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="responder">responder</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/rtpbreak" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="rtpbreak">rtpbreak</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/rtpinsertsound" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="rtpinsertsound">rtpinsertsound</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/rtpmixsound" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="rtpmixsound">rtpmixsound</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/sctpscan" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sctpscan">sctpscan</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/siparmyknife" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SIPArmyKnife">SIPArmyKnife</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/sipp" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SIPp">SIPp</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/sipvicious" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SIPVicious">SIPVicious</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/sniffjoke" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SniffJoke">SniffJoke</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslsplit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SSLsplit">SSLsplit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/sslstrip" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sslstrip">sslstrip</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/thc-ipv6" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-IPV6">THC-IPV6</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/voiphopper" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="VoIPHopper">VoIPHopper</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/webscarab" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WebScarab">WebScarab</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/wifi-honey" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wifi Honey">Wifi Honey</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/wireshark" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wireshark">Wireshark</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/xspy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="xspy">xspy</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/yersinia" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Yersinia">Yersinia</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/zaproxy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="zaproxy">zaproxy</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
STRESS TESTING</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/dhcpig" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DHCPig">DHCPig</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/funkload" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="FunkLoad">FunkLoad</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/iaxflood" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="iaxflood">iaxflood</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/inundator" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Inundator">Inundator</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/sniffingspoofing/inviteflood" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="inviteflood">inviteflood</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/ipv6-toolkit" style="color: #092334; outline: none 0px;" title="ipv6-toolkit">ipv6-toolkit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/mdk3" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mdk3">mdk3</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/reaver" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Reaver">Reaver</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/rtpflood" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="rtpflood">rtpflood</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/slowhttptest" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SlowHTTPTest">SlowHTTPTest</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/t50" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="t50">t50</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/termineter" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Termineter">Termineter</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/thc-ipv6" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-IPV6">THC-IPV6</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/stress-testing/thc-ssl-dos" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-SSL-DOS">THC-SSL-DOS</a></li>
</ul>
</div>
<div>
<span style="color: #666666; font-family: Lucida Sans Unicode, Lucida Grande, Droid Sans, sans-serif;"><span style="font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; word-spacing: 1px;"><br /></span></span></div>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
VULNERABILITY ANALYSIS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/bbqsql" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BBQSQL">BBQSQL</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/bed" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BED">BED</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-auditing-tool" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-auditing-tool">cisco-auditing-tool</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-global-exploiter" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-global-exploiter">cisco-global-exploiter</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/cisco-ocs" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-ocs">cisco-ocs</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/cisco-torch" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="cisco-torch">cisco-torch</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/copy-router-config" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="copy-router-config">copy-router-config</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/dbpwaudit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DBPwAudit">DBPwAudit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/doona" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Doona">Doona</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/dotdotpwn" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DotDotPwn">DotDotPwn</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/greenbone-security-assistant" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Greenbone Security Assistant">Greenbone Security Assistant</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/gsd" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="GSD">GSD</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/hexorbase" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="HexorBase">HexorBase</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/inguma" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Inguma">Inguma</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/jsql" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="jSQL">jSQL</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/lynis" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Lynis">Lynis</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/nmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Nmap">Nmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/ohrwurm" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ohrwurm">ohrwurm</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/openvas-administrator" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="openvas-administrator">openvas-administrator</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/openvas-cli" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="openvas-cli">openvas-cli</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/openvas-manager" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="openvas-manager">openvas-manager</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/openvas-scanner" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="openvas-scanner">openvas-scanner</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/oscanner" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Oscanner ">Oscanner</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/powerfuzzer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Powerfuzzer">Powerfuzzer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sfuzz" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sfuzz">sfuzz</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sidguesser" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SidGuesser">SidGuesser</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/siparmyknife" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="SIPArmyKnife">SIPArmyKnife</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sqlmap">sqlmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlninja" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Sqlninja">Sqlninja</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlsus" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sqlsus">sqlsus</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/thc-ipv6" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="THC-IPV6">THC-IPV6</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/tnscmd10g" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="tnscmd10g">tnscmd10g</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/unix-privesc-check" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="unix-privesc-check">unix-privesc-check</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/yersinia" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Yersinia">Yersinia</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
WEB APPLICATIONS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/apache-users" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="apache-users">apache-users</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/arachni" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Arachni">Arachni</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/bbqsql" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BBQSQL">BBQSQL</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/blindelephant" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BlindElephant">BlindElephant</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/burpsuite" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Burp Suite">Burp Suite</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/cutycapt" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="CutyCapt">CutyCapt</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/davtest" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DAVTest">DAVTest</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/deblaze" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="deblaze">deblaze</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/dirb" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DIRB">DIRB</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/dirbuster" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="DirBuster">DirBuster</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/fimap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="fimap">fimap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/funkload" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="FunkLoad">FunkLoad</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/grabber" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Grabber">Grabber</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/jboss-autopwn" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="jboss-autopwn">jboss-autopwn</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/joomscan" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="joomscan">joomscan</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/jsql" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="jSQL">jSQL</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/maltego-teeth" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Maltego Teeth">Maltego Teeth</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/padbuster" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="PadBuster">PadBuster</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/paros" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Paros">Paros</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/parsero" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Parsero">Parsero</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/plecost" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="plecost">plecost</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/powerfuzzer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Powerfuzzer">Powerfuzzer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/proxystrike" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ProxyStrike">ProxyStrike</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/recon-ng" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Recon-ng">Recon-ng</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/skipfish" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Skipfish">Skipfish</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlmap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sqlmap">sqlmap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlninja" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Sqlninja">Sqlninja</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/vulnerability-analysis/sqlsus" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="sqlsus">sqlsus</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/ua-tester" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="ua-tester">ua-tester</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/uniscan" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Uniscan">Uniscan</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/vega" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Vega">Vega</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/w3af" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="w3af">w3af</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/webscarab" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WebScarab">WebScarab</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/webshag" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Webshag">Webshag</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/webslayer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WebSlayer">WebSlayer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/websploit" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="WebSploit">WebSploit</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/wfuzz" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wfuzz">Wfuzz</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/xsser" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="XSSer">XSSer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/web-applications/zaproxy" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="zaproxy">zaproxy</a></li>
</ul>
<div>
<h5 style="background: url(http://tools.kali.org/wp-content/themes/persuasion/images/shortcodes/inset_line.png) 0% 100% no-repeat rgb(249, 249, 249); color: #092334; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 10px; font-weight: normal; letter-spacing: 1.6px; line-height: 20px; margin: 0px 0px 20px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline; word-spacing: 1px;">
WIRELESS ATTACKS</h5>
<ul class="lcp_catlist" id="lcp_instance_0" style="background-color: #f9f9f9; color: #666666; font-family: 'Lucida Sans Unicode', 'Lucida Grande', 'Droid Sans', sans-serif; font-size: 12px; letter-spacing: 0.10000000149011612px; line-height: 20px; list-style-image: initial; list-style-position: outside; margin: 0px 0px 20px; padding: 0px 0px 0px 25px; vertical-align: baseline; word-spacing: 1px;">
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/aircrack-ng" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Aircrack-ng">Aircrack-ng</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/asleap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Asleap">Asleap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/bluelog" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Bluelog">Bluelog</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/bluemaho" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BlueMaho">BlueMaho</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/bluepot" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Bluepot">Bluepot</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/blueranger" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="BlueRanger">BlueRanger</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/bluesnarfer" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Bluesnarfer">Bluesnarfer</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/bully" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Bully">Bully</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/cowpatty" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="coWPAtty">coWPAtty</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/crackle" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="crackle">crackle</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/eapmd5pass" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="eapmd5pass">eapmd5pass</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/fern-wifi-cracker" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Fern Wifi Cracker">Fern Wifi Cracker</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/information-gathering/ghost-phisher" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Ghost Phisher">Ghost Phisher</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/giskismet" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="GISKismet">GISKismet</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/gqrx" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Gqrx">Gqrx</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/gr-scan" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="gr-scan">gr-scan</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/kalibrate-rtl" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="kalibrate-rtl">kalibrate-rtl</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/killerbee" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="KillerBee">KillerBee</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/kismet" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Kismet">Kismet</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/mdk3" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mdk3">mdk3</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/mfcuk" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mfcuk">mfcuk</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/mfoc" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mfoc">mfoc</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/mfterm" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="mfterm">mfterm</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/multimon-ng" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Multimon-NG">Multimon-NG</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/reaver" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Reaver">Reaver</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/redfang" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="redfang">redfang</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/rtlsdr-scanner" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="RTLSDR Scanner">RTLSDR Scanner</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/spooftooph" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Spooftooph">Spooftooph</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/wifi-honey" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wifi Honey">Wifi Honey</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/wifitap" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wifitap">Wifitap</a></li>
<li style="margin: 0px; padding: 0px; vertical-align: baseline;"><a href="http://tools.kali.org/wireless-attacks/wifite" style="color: #aaaaaa; outline: none 0px; text-decoration: none;" title="Wifite">Wifite</a></li>
</ul>
<div>
The ISO download page is here: <a href="http://www.kali.org/downloads/">http://www.kali.org/downloads/</a></div>
<div>
<br /></div>
<div>
Link to the VMWare images for 64 bit (AMD), 32 bit PAE(i686), 32 bit i486, as well as custom images for the Rasberry Pi and various ARM cpu's is here: </div>
<div>
<a href="http://www.offensive-security.com/kali-linux-vmware-arm-image-download/">http://www.offensive-security.com/kali-linux-vmware-arm-image-download/</a></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-41916203964196098242014-05-09T07:52:00.002-07:002014-05-09T07:52:17.357-07:00The Telecommunication Oligopoly, FCC, Antitrust and Net Neutrality in general<div id="watch-uploader-info" style="background-color: white; border: 0px none; color: #333333; font-family: arial,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 17px; margin: 0px; padding: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<b style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-size: 13px; font-weight: bold; margin: 0px; padding: 0px;"></b><br />
<b style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-size: 13px; font-weight: bold; margin: 0px; padding: 0px;"><span class="watch-video-date" id="eow-date" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; font-size: 13px; margin: 0px; padding: 0px;"></span></b></div>
<div id="watch-description-text" style="background-color: white; border: 0px none; color: #333333; font-family: arial,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 17px; margin: 0px; padding: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;">
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<h2>
The Telecommunication Oligopoly, FCC, Antitrust and Net Neutrality. </h2>
Comprehensive info on the "Net Neutrality" issue.<br />
</div>
<iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/NAxMyTwmu_M" width="560"></iframe><div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<br /></div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
For anyone who communicates through high-bandwidth media, the
FCC’s proposal would be very bad. </div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<br />
Video script and better formatted version of the links below can be found on the blog:<span class="Apple-converted-space"> </span></div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://vihart.com/net-neutrality-in-the-us-now-what/" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://vihart.com/net-neutrality-in-the-us-now-what/">http://vihart.com/net-neutrality-in-t...</a><br />
<br />
Politicians love when you personally contact them! It is a fact. </div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
List of FCC commissioners and their twitters, emails, blogs, instagrams, etc:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://www.fcc.gov/leadership" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://www.fcc.gov/leadership">http://www.fcc.gov/leadership</a><br />
<br />
Don't know how to contact your representative? </div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
Find out who they are and let them know you're watching them!</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://whoismyrepresentative.com/" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://whoismyrepresentative.com/">http://whoismyrepresentative.com/</a><br />
<br />
Comment form for proceeding 14-28 "Protecting and Promoting the Open Internet"<br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://apps.fcc.gov/ecfs/upload/display?z=ixfld" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://apps.fcc.gov/ecfs/upload/display?z=ixfld">http://apps.fcc.gov/ecfs/upload/displ...</a><br />
<br />
Comment form for proceeding 14-57 "Applications of Comcast Corporation and Time Warner Cable Inc. for Consent to Assign or Transfer Control of Licenses and Applications"<br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://apps.fcc.gov/ecfs/upload/display?z=v67j6" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://apps.fcc.gov/ecfs/upload/display?z=v67j6">http://apps.fcc.gov/ecfs/upload/displ...</a><br />
<br />
The above proceeding has<span class="Apple-converted-space"> </span><br />
<br />
List of all proceedings available for comment:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://apps.fcc.gov/ecfs/hotdocket/list" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://apps.fcc.gov/ecfs/hotdocket/list">http://apps.fcc.gov/ecfs/hotdocket/list</a><br />
<br />
General "open internet" FCC inbox: openinternet@fcc.gov<br />
<br />
whitehouse.gov petition for net neutrality in general:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="https://petitions.whitehouse.gov/petition/maintain-true-net-neutrality-protect-freedom-information-united-states/9sxxdBgy" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="https://petitions.whitehouse.gov/petition/maintain-true-net-neutrality-protect-freedom-information-united-states/9sxxdBgy">https://petitions.whitehouse.gov/peti...</a><br />
<br />
whitehouse.gov petition for reclassifying broadband as common carrier, specifically:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="https://petitions.whitehouse.gov/petition/reclassify-internet-broadband-providers-common-carriers/4MrqLTlV" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="https://petitions.whitehouse.gov/petition/reclassify-internet-broadband-providers-common-carriers/4MrqLTlV">https://petitions.whitehouse.gov/peti...</a><br />
<br />
Once you have a whitehouse.gov account, you can sign petitions about all sorts of things you care about!<span class="Apple-converted-space"> </span><br />
<br />
There's a rally in Washington DC on May 15 2014 if you're around:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://act.freepress.net/survey/DC_May_15/" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://act.freepress.net/survey/DC_May_15/">http://act.freepress.net/survey/DC_Ma...</a><br />
<br />
Learn more about all this stuff:<br />
<br />
Court case ruling cable internet as an "information service" rather than "telecommunications service":</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/National_Cable_%26_Telecommunications_Association_v._Brand_X_Internet_Services" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/National_Cable_%26_Telecommunications_Association_v._Brand_X_Internet_Services">http://en.wikipedia.org/wiki/National...</a><br />
Communications act of 1934, describing common carriers under title II:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Communications_Act_of_1934" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Communications_Act_of_1934">http://en.wikipedia.org/wiki/Communic...</a><br />
Telecommunications act of 1996, including Title V, the CDA:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Telecommunications_Act_of_1996" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Telecommunications_Act_of_1996">http://en.wikipedia.org/wiki/Telecomm...</a><br />
Communications Decency Act, part of the Telecommunications act of 1996, which protected ISPs from liability:</div>
<div id="eow-description" style="background-color: transparent; border: 0px none; font-size: 13px; margin: 0px; padding: 0px;">
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Communications_Decency_Act" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Communications_Decency_Act">http://en.wikipedia.org/wiki/Communic...</a><br />
<br />
The FCC's Open Internet Order 2010:<br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/FCC_Open_Internet_Order_2010" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/FCC_Open_Internet_Order_2010">http://en.wikipedia.org/wiki/FCC_Open...</a><br />
Verizon had the above overturned in 2014 as not applying to non-common carriers:<br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Verizon_Communications_Inc._v._Federal_Communications_Commission_(2014" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Verizon_Communications_Inc._v._Federal_Communications_Commission_(2014">http://en.wikipedia.org/wiki/Verizon_...</a>)<br />
<br />
A couple other attempts at net neutrality things:<br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Internet_Freedom_and_Nondiscrimination_Act_of_2006" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Internet_Freedom_and_Nondiscrimination_Act_of_2006">http://en.wikipedia.org/wiki/Internet...</a><br />
<a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Communications_Opportunity,_Promotion_and_Enhancement_Bill_of_2006" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Communications_Opportunity,_Promotion_and_Enhancement_Bill_of_2006">http://en.wikipedia.org/wiki/Communic...</a><br />
<br />
Data on internet speed from study "The Cost of Connectivity":<a class="yt-uix-redirect-link" dir="ltr" href="http://oti.newamerica.net/publications/policy/the_cost_of_connectivity_2013" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://oti.newamerica.net/publications/policy/the_cost_of_connectivity_2013">http://oti.newamerica.net/publication...</a><br />
<br />
Terms to know<br />
Antitrust law:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/United_States_antitrust_law" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/United_States_antitrust_law">http://en.wikipedia.org/wiki/United_S...</a><br />
Cartel:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Cartel" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Cartel">http://en.wikipedia.org/wiki/Cartel</a><br />
Common carrier:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Common_carrier" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Common_carrier">http://en.wikipedia.org/wiki/Common_c...</a><br />
DMCA:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/DMCA" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/DMCA">http://en.wikipedia.org/wiki/DMCA</a><br />
FCC:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Federal_Communications_Commission" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Federal_Communications_Commission">http://en.wikipedia.org/wiki/Federal_...</a><br />
Game theory:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Game_theory" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Game_theory">http://en.wikipedia.org/wiki/Game_theory</a><br />
ISP:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/ISP" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/ISP">http://en.wikipedia.org/wiki/ISP</a><br />
Monopoly:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Monopoly" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Monopoly">http://en.wikipedia.org/wiki/Monopoly</a><br />
Net neutrality:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Net_neutrality" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Net_neutrality">http://en.wikipedia.org/wiki/Net_neut...</a><br />
Oligopoly:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Oligopoly" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Oligopoly">http://en.wikipedia.org/wiki/Oligopoly</a><br />
Telecommunication:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://en.wikipedia.org/wiki/Telecommunications" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://en.wikipedia.org/wiki/Telecommunications">http://en.wikipedia.org/wiki/Telecomm...</a><br />
<br />
Also see these other videos on the topic:<br />
BlinkPopShift:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://youtu.be/bzUuOscaDbI" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://youtu.be/bzUuOscaDbI">http://youtu.be/bzUuOscaDbI</a><br />
CGPGrey:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="https://www.youtube.com/watch?v=wtt2aSV8wdw" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="https://www.youtube.com/watch?v=wtt2aSV8wdw">https://www.youtube.com/watch?v=wtt2a...</a><br />
Extra Credits:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://youtu.be/wQtiIazfoQM" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://youtu.be/wQtiIazfoQM">http://youtu.be/wQtiIazfoQM</a><br />
Hank Green:<span class="Apple-converted-space"> </span><a class="yt-uix-redirect-link" dir="ltr" href="http://youtu.be/mc2aso6W7jQ" rel="nofollow" style="background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 0px; color: #1b7fcc; cursor: pointer; font-size: 13px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://youtu.be/mc2aso6W7jQ">http://youtu.be/mc2aso6W7jQ</a><br />
<br />
<br />
Thankyou Emily Eifler and Christopher Hart for their advice!</div>
</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-25380327237235747562014-05-03T10:25:00.001-07:002014-05-03T10:25:23.851-07:00McIntosh MC402<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDUt9lVCIpPftIgtciwEiSnjePbT2BsKEH5KZ3x2fJeDOarMQKBFnwtBLhyXKkc32xq7RkFexu79oOqN40q9ZKyv0RnrpuBvGbS9WzSrh60NySBQ_Hp6GJLk2AimrZQEAJBL8vAZTUZk8q/s1600/McIntoshBrushedLPlogo_10_N.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDUt9lVCIpPftIgtciwEiSnjePbT2BsKEH5KZ3x2fJeDOarMQKBFnwtBLhyXKkc32xq7RkFexu79oOqN40q9ZKyv0RnrpuBvGbS9WzSrh60NySBQ_Hp6GJLk2AimrZQEAJBL8vAZTUZk8q/s1600/McIntoshBrushedLPlogo_10_N.jpg" /></a></div>
<div style="text-align: center;">
<br /></div>
<h2 style="text-align: center;">
McIntosh MC402</h2>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmmwPTtL7-73LITiG5bWq0lvncVYA11burVJK35DngQ5PQwZa8W2ma7qQ6c0UPXOzKIaJpRGLy7Fd8VvHrfG9LhUIPScT2l4Zg7m9Ae47ayTEiSmd6H6kJrRRaHw1fZqf6MGtCA4adiX6T/s1600/mc402crop1_N.bmp" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmmwPTtL7-73LITiG5bWq0lvncVYA11burVJK35DngQ5PQwZa8W2ma7qQ6c0UPXOzKIaJpRGLy7Fd8VvHrfG9LhUIPScT2l4Zg7m9Ae47ayTEiSmd6H6kJrRRaHw1fZqf6MGtCA4adiX6T/s1600/mc402crop1_N.bmp" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><h2>
McIntosh MC402</h2>
</td></tr>
</tbody></table>
<br />
<div class="separator" style="clear: both; text-align: center;">
If you are looking for a high power amplifier that combines the power and lush sound of many of the finest amps available at any price, look no further. Continuing the McIntosh tradition of innovation and exceptional performance, The McIntosh MC402 delivers absolute transparency and musical accuracy.</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheNLqDi6Her_MTs0VnkY4_nnJ1gpg0-InZ7nqZGH1JHMnE_i7i3WcRMpHjFzd-3SQ6xqxuCq7JbCQJz7SCdOlL2Hb_6yZjWsvyALG8mnx4HN4pfVgVxsUGViK6djjRtVuAs8Q-SzX5gbWr/s1600/McIntosh+MC402_600x450.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheNLqDi6Her_MTs0VnkY4_nnJ1gpg0-InZ7nqZGH1JHMnE_i7i3WcRMpHjFzd-3SQ6xqxuCq7JbCQJz7SCdOlL2Hb_6yZjWsvyALG8mnx4HN4pfVgVxsUGViK6djjRtVuAs8Q-SzX5gbWr/s1600/McIntosh+MC402_600x450.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: small;">Winner of "The Absolute Sound Editor's Choice Award" 2005. </span></td></tr>
</tbody></table>
<div style="text-align: center;">
From the MacIntosh web site: </div>
<div style="text-align: center;">
"New quad-differential design cancels virtually all distortion and consists of four complete amplifier circuits, each a mirror image of the other, whose outputs are combined in the unique McIntosh made autoformers, delivering absolute transparency and musical accuracy into loads of 2, 4, or 8 ohms. A new three dimensional glass faceplate design adds elegance while the illuminated peak-responding meters show the true output regardless of load. "</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBNNL-3bubp-pw0p6mM-4LMxqegVEf_AQOeomxL00nW95wTAhlBOzPqOHDYci6HPOuxCWRinOhlN9pGaP_2_OewMA_YkHJ1W7l3HGYLfxPyzXaozvwdUlzcVyeEzEWip_xbbIxUa58kqEU/s1600/McIntosh+MC402-00_600x450.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBNNL-3bubp-pw0p6mM-4LMxqegVEf_AQOeomxL00nW95wTAhlBOzPqOHDYci6HPOuxCWRinOhlN9pGaP_2_OewMA_YkHJ1W7l3HGYLfxPyzXaozvwdUlzcVyeEzEWip_xbbIxUa58kqEU/s1600/McIntosh+MC402-00_600x450.jpg" /></a></div>
<div style="text-align: center;">
This amp has a very natural sound. Very round and full, with effortless crescendos. The bass is deep and powerful - you can feel it. Sonically accurate and natural is what impresses me the most. The best part is the imaging. Wherever the soloist is, you can close your eyes and hear exactly where they are! This amp images better than anything else I have ever heard. Truly excellent sound stage. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The MacIntosh MC402 has multiple protection circuits, including the exclusive McIntosh Power Assurance System, thermal sensors, and turn-on delay circuits. Most other amps are overheating themselves to an early retirement. This amp runs extremely cool. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
If you want an amplifier that will last a long time, this will do the job for decades to come. The build quality is state of the art. Inspecting the inside, it resembles military and NASA grade equipment. It's not hard to imagine that this amplifier will outlive me. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The MC402 delivers 400 Watts per channel in stereo or 800 Watts in mono into 2, 4, or 8-Ohm loads.</div>
<div style="text-align: center;">
Its extraordinary quad-differential design consists of four complete amplifier circuits, whose outputs are combined in the unique McIntosh-crafted autoformers.</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6T01hyeSUxi3ivjLmxAjIZSEiCHNgn3ysqULac86DRAZxmb0yW5ly22DlFzs6Dz_vlkHHtbO0xqdbC1_5uqYXm02k51-5Gm8WIrGsa-Fw0FsjwSUnKYYWAY5eR2_p-ksSi0thq6yNikYP/s1600/McIntosh+MC402-005_600x450.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6T01hyeSUxi3ivjLmxAjIZSEiCHNgn3ysqULac86DRAZxmb0yW5ly22DlFzs6Dz_vlkHHtbO0xqdbC1_5uqYXm02k51-5Gm8WIrGsa-Fw0FsjwSUnKYYWAY5eR2_p-ksSi0thq6yNikYP/s1600/McIntosh+MC402-005_600x450.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: small;">The classic glass faceplate and the Fiber-Optic illuminated peak-responding meters adds elegance to any home theater installation.</span></td></tr>
</tbody></table>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
This was given The Absolute Sound Editor's Choice Award 2005.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Features</div>
<div style="text-align: center;">
Fully Balanced Differential Design</div>
<div style="text-align: center;">
Exclusive McIntosh Output Autoformer</div>
<div style="text-align: center;">
Illuminated Peak-Responding meters</div>
<div style="text-align: center;">
Balanced Connections</div>
<div style="text-align: center;">
Remote Power Control</div>
<div style="text-align: center;">
DC Failure Protection</div>
<div style="text-align: center;">
Power Guard </div>
<div style="text-align: center;">
Clipping Protection</div>
<div style="text-align: center;">
Sentry Monitor </div>
<div style="text-align: center;">
Current Protection</div>
<div style="text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf8Gp7Ni-_Wv3kevu8aQGZM4bj1emq3h_7caooJU1ZmmwpFJnBL9rxCnC7PoPGH_AwKFfcx5Ad__GLa97_Hcu2SFDA19dxk7pZnfHfhV5KXTuaJGweuMhJNlqvnt2Mqd2BkoYcgEGC2911/s1600/McIntosh+MC402-rear_600x450.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf8Gp7Ni-_Wv3kevu8aQGZM4bj1emq3h_7caooJU1ZmmwpFJnBL9rxCnC7PoPGH_AwKFfcx5Ad__GLa97_Hcu2SFDA19dxk7pZnfHfhV5KXTuaJGweuMhJNlqvnt2Mqd2BkoYcgEGC2911/s1600/McIntosh+MC402-rear_600x450.jpg" /></a></div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-41617565631004479062014-04-09T08:19:00.002-07:002014-04-09T11:26:27.006-07:00Heartbleed Bug (vulnerable OpenSSL) CVE-2014-0160<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCwC0EJR8ZNY1LhkyHNp6G7PkKb642KBHJ-D_uwg43DUW0fyBT3Jv9bgUbCvuAPomhEBrbRJgVeJPtRYuKJy8ysNnjd70NX9NW891G3_aodBCr8PpRVzEqVXeoXymHdKMscviV-YW9N__1/s1600/heartbleed.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCwC0EJR8ZNY1LhkyHNp6G7PkKb642KBHJ-D_uwg43DUW0fyBT3Jv9bgUbCvuAPomhEBrbRJgVeJPtRYuKJy8ysNnjd70NX9NW891G3_aodBCr8PpRVzEqVXeoXymHdKMscviV-YW9N__1/s1600/heartbleed.png" height="320" width="264" /></a></div>
<h1 style="background-color: white; box-sizing: border-box; color: #222222; font-family: Lato, sans-serif; font-weight: 400; line-height: 1.1; margin: 1em 0px; text-align: center;">
<span style="background-color: transparent;">The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected by the SSL encryption used to secure the Internet. SSL provides security and privacy for applications such as web, email, instant messaging (IM) and virtual private networks (VPNs).</span></h1>
<div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The Heartbleed bug allows anyone on the Internet to read the user names and passwords, instant messages, emails and business critical documents and communication protected by the vulnerable versions of the OpenSSL software. It compromises the secret keys used to identify the service providers and to encrypt the traffic. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Operating system distributions that have shipped with the vulnerable OpenSSL version:</div>
<div style="text-align: center;">
Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4</div>
<div style="text-align: center;">
Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11</div>
<div style="text-align: center;">
CentOS 6.5, OpenSSL 1.0.1e-15</div>
<div style="text-align: center;">
Fedora 18, OpenSSL 1.0.1e-4</div>
<div style="text-align: center;">
OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) </div>
<div style="text-align: center;">
OpenBSD 5.4 (OpenSSL 1.0.1c 10 May 2012)</div>
<div style="text-align: center;">
FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013</div>
<div style="text-align: center;">
NetBSD 5.0.2 (OpenSSL 1.0.1e)</div>
<div style="text-align: center;">
OpenSUSE 12.2 (OpenSSL 1.0.1c)</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Operating system distribution with versions that are not vulnerable:</div>
<div style="text-align: center;">
Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14</div>
<div style="text-align: center;">
SUSE Linux Enterprise Server</div>
<div style="text-align: center;">
FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013</div>
<div style="text-align: center;">
FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013</div>
<div style="text-align: center;">
FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
This was published as a follow-up to the OpenSSL advisory on 7th of April 2014. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The OpenSSL project has made a statement at</div>
<div style="text-align: center;">
https://www.openssl.org/news/secadv_20140407.txt.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
NCSC-FI published an advisory at</div>
<div style="text-align: center;">
https://www.cert.fi/en/reports/2014/vulnerability788210.html. </div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Individual vendors of operating system distributions, affected owners of Internet services, software packages and appliance vendors may issue their own advisories.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
References:</div>
<div style="text-align: center;">
CVE-2014-0160</div>
<div style="text-align: center;">
NCSC-FI case# 788210</div>
<div style="text-align: center;">
http://www.openssl.org/news/secadv_20140407.txt </div>
<div style="text-align: center;">
(published 7th of April 2014, ~17:30 UTC)</div>
<div style="text-align: center;">
http://blog.cloudflare.com/staying-ahead-of-openssl-vulnerabilities </div>
<div style="text-align: center;">
(published 7th of April 2014, ~18:00 UTC)</div>
<div style="text-align: center;">
http://heartbleed.com</div>
<div style="text-align: center;">
(published 7th of April 2014, ~19:00 UTC)</div>
<div style="text-align: center;">
http://www.ubuntu.com/usn/usn-2165-1/</div>
<div style="text-align: center;">
http://www.freshports.org/security/openssl/</div>
<div style="text-align: center;">
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160</div>
<div style="text-align: center;">
https://rhn.redhat.com/errata/RHSA-2014-0376.html</div>
<div style="text-align: center;">
http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html</div>
<div style="text-align: center;">
https://lists.fedoraproject.org/pipermail/announce/2014-April/003205.html</div>
<div style="text-align: center;">
http://www.kb.cert.org/vuls/id/720951</div>
<div style="text-align: center;">
https://www.cert.fi/en/reports/2014/vulnerability788210.html</div>
<div style="text-align: center;">
https://www.cert.at/warnings/all/20140408.html</div>
<div style="text-align: center;">
http://www.circl.lu/pub/tr-21/<br />
<br />
Test your server for HeartBleed bug here:<br />
https://heartbleed.hostgator.com/</div>
</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-91815226825999037172014-04-05T16:27:00.001-07:002014-04-05T16:27:12.479-07:00The NSA domestic spying program is wrong! - Wednesday, April 19, 2006<center>
</center>
<div id="main">
<div id="main2">
<div class="adsense" style="padding: 0px 3px 0.5em 3px; text-align: center;">
This is a repeat post of an article I wrote back in<br />
</div>
<h2 class="date-header" style="text-align: center;">
Wednesday, April 19, 2006</h2>
<div class="post">
<a href="https://draft.blogger.com/null" name="114547417579848698"></a>
<h3 class="post-title" style="text-align: center;">
<a href="http://www.spamdailynews.com/publish/ATT_tech_outs_NSA_spy_room.asp" title="external link">
The NSA domestic spying program is wrong!
</a>
</h3>
<div class="post-body">
<br />
The Bush administration seems
to be shreding the fourth admendment as fast as they can, with little or
no regard for the Bill of Rights, the Constitution, or any checks and
balances imposed by laws or Congress.<br /><br />Looking at the news lately,
I have been outraged, but not shocked at what we have dicovered in the
last few weeks from the papers the EFF has filed in court to block
AT&T from wholesale eavedropping on ALL internet and phone traffic
across the country and around the world.<br /><br />The thing that got my attention was the equipment being used. It is a pretty high-end <span class="general_text"><span class="article_text"><span class="image_caption">gizmo called the </span></span></span><span class="general_text"><span class="article_text"><a href="http://www.dailykos.com/storyonly/2006/4/8/14724/28476">Narus STA 6400</a>, which is a semantic traffic analyzer. The Narus STA technology is used by intelligence agencies because it is able to </span></span><span class="general_text"><span class="article_text"><span class="image_caption">analyze </span></span></span><span class="general_text"><span class="article_text">large amounts of data.</span></span>
Like 10 Gigabytes of data per second, tapping into the OC-192 fiber
that makes up the backbone of all IP communications worldwide! Here is a
little bit about this wonderful device from Narus...<br /><br /><a href="http://photos1.blogger.com/blogger/182/2489/1600/intercept-diagram-1.gif"><img alt="" border="0" src="http://photos1.blogger.com/blogger/182/2489/400/intercept-diagram-1.gif" style="cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;" /></a><span class="general_text"><span class="article_text"><span class="image_caption"><a href="http://www.narus.com/products/intercept.html" rel="nofollow" target="narus">NarusInsight Intercept Suite</a>
- Packet-level, flow-level, and application-level usage information is
captured and analyzed as well as raw user session packets for forensic
analysis, surveillance or in satisfying regulatory compliance for lawful
intercept. The capabilities include playback of streaming media (i.e.
VoIP), rendering of Web pages, examination of e-mail and the ability to
analyze the payload/attachments of e-mail or file transfer protocols.
(source: Narus.com)</span></span></span><br /><br /><a href="http://photos1.blogger.com/blogger/182/2489/1600/discover-diagram-1.gif"><img alt="" border="0" src="http://photos1.blogger.com/blogger/182/2489/400/discover-diagram-1.gif" style="cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;" /></a><span class="general_text"><span class="article_text"><span class="image_caption">The <a href="http://www.narus.com/products/discover.html" rel="nofollow" target="narus1">NarusInsight Discover Suite</a>
(NDS) captures and classifies traffic and data on monitored links in
real time at true carrier speeds (up to 10G/OC-192). Detailed layer 3 to
layer 7 data are collected and correlated across every link and element
on the network.<br />NDS empowers users to manage IP traffic and
applications including VoIP, Skype, P2P (e.g., BitTorrent,
e-Donkey/e-Mule, FastTrack/Kazaa, Gnutella, etc.), messaging (AOL
IM/ICQ, Yahoo IM, MSN Messenger, Jabber, IRC, MMS), streaming media
(RTP, RTCP, RTSP), e-mail (SMTP,POP3,IMAP), Web browsing and push to
talk (PTT). (source: Narus)</span></span></span><br />If it was only
being used to spy on "terrorists", and if proper proceedures were
followed, nobody would bat an eye. Support would be universal, as long
as the laws were followed and a court warrent was obtained in the 72
hour timeframe. FISA was put in place to <a href="http://www.epic.org/privacy/surveillance/spotlight/0106/default.html">limit the power </a>the
federal goverment had on wire-tapping private citizens after the Nixon
administration took massive amounts of wire-tapped phone calls and used
it for political purposes.<br /><br />Knowing a little about the program, it
seems my darkest fears are true. I suspected that they were doing
exactly what they claim to not be doing, wholesale interception of ALL
Internet traffic and phone calls, using packet analyzers to sift thru a
ocean of data, looking for a few key words or any suspicious activity.<br /><br />This
means any phone call, any email, any Instant Messaging, any P2P
programs, and all of your web surfing has been intercepted and analyized
by the NSA and the Bush administration.<br /><br />If that makes you feel all warm and fuzzy, like he is just trying to "protect" us from the evil-doers, think about this.<br /><br />This
is the guy who exposed a CIA undercover agent for political purposes,
to refute the claims her husband was making regarding the facts leading
us into war in Iraq. If you think he would do a end-run around Congress
and the FISA courts to "protect" us, and not use anything he learns for
political purposes, you are badly mistaken. They would use anything they
learn to the fullest advantage, to expose some political enemy's dirty
secrets, or to extort favors from a business, and Congress is just now
finding out about it.<br /><br />We will see in the next election how much outrage is in the country over this.<br /><br />WHAT FOLLOWS IS THE ACTUALL LETTER FROM MARK KLEIN.<br /><br /><span class="general_text"><span class="article_text"><span class="general_text"><br /><center>
<b>Statement</b><br />--Mark Klein, April 6, 2006</center>
<br /><br /><b>My Background:</b><br /><br />For 22 and 1/2 years I worked as an AT&T technician, first in New York and then in California.<br /><br /><b>What I Observed First-Hand:</b><br /><br />In
2002, when I was working in an AT&T office in San Francisco, the
site manager told me to expect a visit from a National Security Agency
agent, who was to interview a management-level technician for a special
job. The agent came, and by chance I met him and directed him to the
appropriate people.<br /><br />In January 2003, I, along with others, toured
the AT&T central office on Folsom Street in San Francisco --
actually three floors of an SBC building. There I saw a new room being
built adjacent to the 4ESS switch room where the public's phone calls
are routed. I learned that the person whom the NSA interviewed for the
secret job was the person working to install equipment in this room. The
regular technician work force was not allowed in the room.<br /><br />In
October 2003, the company transferred me to the San Francisco building
to oversee the Worldnet Internet room, which included large routers,
racks of modems for customers' dial-in services, and other equipment. I
was responsible for troubleshooting problems on the fiber optic circuits
and installing new circuits.<br /><br />While doing my job, I learned that
fiber optic cables from the secret room were tapping into the Worldnet
circuits by splitting off a portion of the light signal. I saw this in a
design document available to me, entitled "Study Group 3, LGX/Splitter
Wiring, San Francisco" dated Dec. 10, 2002. I also saw design documents
dated Jan. 13, 2004 and Jan. 24, 2003, which instructed technicians on
connecting some of the already in-service circuits to the "splitter"
cabinet, which diverts some of the light signal to the secret room. The
circuits listed were the Peering Links, which connect Worldnet with
other networks and hence the whole country, as well as the rest of the
world.<br /><br />One of the documents listed the equipment installed in the
secret room, and this list included a Narus STA 6400, which is a
"Semantic Traffic Analyzer". The Narus STA technology is known to be
used particularly by government intelligence agencies because of its
ability to sift through large amounts of data looking for preprogrammed
targets. The company's advertising boasts that its technology "captures
comprehensive customer usage data ... and transforms it into actionable
information.... (It) provides complete visibility for all internet
applications."<br /><br />My job required me to connect new circuits to the
"splitter" cabinet and get them up and running. While working on a
particularly difficult one with a technician back East, I learned that
other such "splitter" cabinets were being installed in other cities,
including Seattle, San Jose, Los Angeles and San Diego.<br /><br /><b>What is the Significance and Why Is It Important to Bring These Facts to Light?</b><br /><br />Based
on my understanding of the connections and equipment at issue, it
appears the NSA is capable of conducting what amounts to vacuum-cleaner
surveillance of all the data crossing the Internet -- whether that be
peoples' e-mail, Web surfing or any other data.<br /><br />Given the public
debate about the constitutionality of the Bush administration's spying
on U.S. citizens without obtaining a FISA warrant, I think it is
critical that this information be brought out into the open, and that
the American people be told the truth about the extent of the
administration's warrantless surveillance practices, particularly as it
relates to the Internet.<br /><br />Despite what we are hearing, and
considering the public track record of this administration, I simply do
not believe their claims that the NSA's spying program is really limited
to foreign communications or is otherwise consistent with the NSA's
charter or with FISA. And unlike the controversy over targeted wiretaps
of individuals' phone calls, this potential spying appears to be applied
wholesale to all sorts of Internet communications of countless
citizens.<br /><br />Attorney contact information:<br /><br /><b>Miles Ehrlich</b><br />Ramsey & Ehrlich LLP<br /><br /><small>Source: Legal Pad<br /></small></span></span></span>Link to the full story is <a href="http://www.spamdailynews.com/publish/ATT_tech_outs_NSA_spy_room.asp">here.</a><br /><br /><br /><br />God help us.<br /><br />Can you call or write your Senator and Congressmen for me? Not that it will do us any good but it's a start..</div>
</div>
</div>
</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-76191407385496754102014-03-26T10:18:00.002-07:002014-03-26T10:21:24.444-07:00I have wanted to do this for a long time…<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu9Pvuh4zWADTp5yrc2NawOSfgC0Ab7cQf5U5nOJZq2ODmd9tQXdIbpXpT5Bw5cN90DS8EAft4xS7s-61IBBpdTXod1obwkuw-GbineFVRVcick7NlP37W4S9c8H9QVqckwC1GqMP5wJMQ/s1600/idiot.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="OMG, you ARE an Idiot!" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu9Pvuh4zWADTp5yrc2NawOSfgC0Ab7cQf5U5nOJZq2ODmd9tQXdIbpXpT5Bw5cN90DS8EAft4xS7s-61IBBpdTXod1obwkuw-GbineFVRVcick7NlP37W4S9c8H9QVqckwC1GqMP5wJMQ/s1600/idiot.jpg" height="515" title="OMG, you ARE an Idiot!" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">OMG, you ARE an Idiot!</td></tr>
</tbody></table>
<br />James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-34405577029347054612014-03-24T12:29:00.001-07:002014-03-24T12:29:04.269-07:00The public cloud is the way of the future: Urs Hölzle, Google technical infrastructure<div style="text-align: center;">
Urs Hölzle oversaw the creation of the world’s largest computer. It’s a machine that spans the globe — from The Dalles, Oregon to Hamina, Finland to Quilicura, Chile — and you use it every day. It’s called Google.</div>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLsq_J63bSChUoFfqmcLnEEjUdruvbdyYTDdA_mwQrNnTuI7Qmjr4JjBfXSeCykfVX5gn6YtFLw8YwalwMOHjGLVD4j_IvBwX8k-GVpDgAhtEJKsfGhA6m-4ft8Nf6NcYwy0pHyG2ylf89/s1600/team_data-center_image_726x726.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Google Data Center Engineering team build and operate the most efficient, global-scale Data Centers in the world. " border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLsq_J63bSChUoFfqmcLnEEjUdruvbdyYTDdA_mwQrNnTuI7Qmjr4JjBfXSeCykfVX5gn6YtFLw8YwalwMOHjGLVD4j_IvBwX8k-GVpDgAhtEJKsfGhA6m-4ft8Nf6NcYwy0pHyG2ylf89/s1600/team_data-center_image_726x726.jpg" height="225" title="Google Data Center Engineering team build and operate the most efficient, global-scale Data Centers in the world. " width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Google Data Center Engineering team build and operate the most efficient, global-scale Data Centers in the world. </td></tr>
</tbody></table>
<div style="text-align: center;">
In 1999, Hölzle was a computer science professor of the University of California, Santa Barbara, when Larry Page and Sergey Brin asked him to help rethink the hardware and software underpinning the Google search engine. At the time, Google Search ran on about hundred computer servers in a single Northern California data center, and over the next 15 years, alongside some of the brightest minds in computer science, Hölzle would transform this tiny collection of machines into a global network of data centers that operate very much like a single system, allowing Google to operate a vast empire of web services, from Google Search to Gmail to Google Maps to Google Apps.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
He’s the man most responsible for ensuring that Google’s services run as efficiently as they do.</div>
<div style="text-align: center;">
With an air of extreme confidence — not to mention a diamond stud earring — the Swiss native heads Google’s technical infrastructure team, known “TI” inside the company. When he discusses other Google teams, Hölzle calls them his “customers.” The Search team is a customer, and so are the Gmail and Google Maps teams. He and his TI engineers provide the infrastructure — the global computer — that these teams use in delivering their web and mobile services to millions upon millions of people. He is, in short, the man most responsible for ensuring that these Google services run as efficiently as they do.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
But this past January, Hölzle sent a thunderclap of a corporate memo across the company, laying out a new direction for both his team and the entire Google empire. In the months to come, he wrote, he and his team would be giving a little less attention to internal “customers” like Google Search and Gmail, so that they could concentrate on serving a new kind of customer outside the company. They were preparing a major expansion of the company’s cloud computing services — services that let outside businesses or software developers run their own software atop Google’s global infrastructure. “We will spend the majority of our development efforts on this New World,” wrote Hölzle. “Every developer will want to live in this world…and it’s our job to build it.”</div>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRXdL13l6N29joNqfZ28ZhXftJ0Ceh0fWXqrAF19N9rt2RB2qW_bLj0uzV8fmyNoxfPqvWdsAb8YwrrD4VfNykuLZrE-VGH4DCij30DLgr3jau1vavOy3dZuKJHTaYJKpExS6E6amcnHce/s1600/story_switch-to-the-next-wave-of-networking_image_726x726.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Urs Hölzle details our adoption of the new, open-source infrastructure technology OpenFlow " border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRXdL13l6N29joNqfZ28ZhXftJ0Ceh0fWXqrAF19N9rt2RB2qW_bLj0uzV8fmyNoxfPqvWdsAb8YwrrD4VfNykuLZrE-VGH4DCij30DLgr3jau1vavOy3dZuKJHTaYJKpExS6E6amcnHce/s1600/story_switch-to-the-next-wave-of-networking_image_726x726.jpg" height="225" title="Urs Hölzle details our adoption of the new, open-source infrastructure technology OpenFlow " width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="background-color: white; color: #444444; font-family: arial, sans-serif; line-height: 20.020000457763672px; text-align: start;">Urs Hölzle details our adoption of the new, open-source infrastructure technology OpenFlow.</span></td></tr>
</tbody></table>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Google has long offered cloud services that let outsiders build websites and other applications without buying, installing, or operating their own computer hardware. It unveiled a service called Google App Engine in 2008, and in 2012, it followed with a sister service, Google Compute Engine. But in this market — a market that represents the future of computing — Google has always trailed Jeff Bezos and Amazon, who pioneered the idea. And for years, Hölzle and company treated cloud computing as a sideline. But he now says Google is intent on turning this into an enormous business, a business whose revenues could even surpass what the company pulls in from online advertising.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
That may seem like a stretch. Online advertising has made Google one of the richest companies on earth. But his point is that the potential market for cloud computing is far greater than what’s available from advertising, even in the rapidly growing world of smartphone and tablet ads. “It has become clear that the public cloud is the way of the future,” Hölzle says during an interview at Google headquarters, looking more like a session musician than a computer scientist, with his earring, his closely cropped beard, and uplift of salt-and-pepper hair. “One day, this could be bigger than ads. Certainly, in terms of market potential, it is.”</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvm68VOdb5Z6mbDpevfBKTf5EJ9QH2y8yxUv1J9Pl2WbQnvYeA4hsZ1_an5FQAsa9ZfYtjjgJqXvBcIxzAvODOd-EkkQMuYLbDmATzqw7Tku9p2DyIbFqF5OYIIB3dBc_pwR-3waCP9jAC/s1600/R51C4675.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Google Mountain View (Global HQ)" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvm68VOdb5Z6mbDpevfBKTf5EJ9QH2y8yxUv1J9Pl2WbQnvYeA4hsZ1_an5FQAsa9ZfYtjjgJqXvBcIxzAvODOd-EkkQMuYLbDmATzqw7Tku9p2DyIbFqF5OYIIB3dBc_pwR-3waCP9jAC/s1600/R51C4675.jpg" height="266" title="Google Mountain View (Global HQ)" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Google Mountain View (Global HQ)</td></tr>
</tbody></table>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
To be sure, Hölzle is looking years down the road. And he admits that both Google and the larger cloud computing market have a long way to go. But many others say that cloud computing is poised to expand in enormous ways, slowly eating away at the $600-billion information-technology market that spans all the hardware and software the world’s businesses use to run their operations. According to James Staten, an analyst with tech research outfit Forrester, cloud computing will account for about 15 percent of this IT market by 2020 — that’s $40 billion — and much like Google, Amazon believes cloud services could become its biggest business.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
‘It has become clear that the public cloud is the way of the future. One day, this could be bigger than ads. Certainly, in terms of market potential, it is’ At the moment, Amazon still dominates the cloud computing world, after inventing the market with services like the Elastic Compute Cloud, a way of instantly running software, and the Simple Storage Service, a means of storing large amounts of data. And other rivals abound, including Microsoft, with its Windows Azure service, and Rackspace, with its Rackspace Cloud. But Hölzle believes that Google’s vast infrastructure gives the company an edge — in terms of speed, efficiency, price, and more. “We’ve done much of the hard lifting already for our internal needs,” his memo read. “We have a latent advantage in this business.”</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
This isn’t far from the truth. In serving up Google Search and Gmail and the rest of its own web products, Google operates a much larger online infrastructure than even Amazon or Microsoft — a 2010 study said that Google’s global network was larger than all but one of the companies that provide the backbone for the entire internet — and it’s widely acknowledged that this massive computing system is the world’s most technically advanced. Over the last fifteen years, as the Google empire expanded to unprecedented sizes, Hölzle and his team, including engineers such as Jeff Dean and Sanjay Ghemawat and Luiz Barroso, designed entirely new kinds of data center hardware and software in order to keep up with this growth, and the rest of the computing world is now striving to imitate these technologies.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The question is whether Google can translate this into a different kind of success. History has shown that the best technology doesn’t always win the day. Marketing can play a role, but so can timing — or just plain luck. “Google has the best infrastructure. They have the best engineers. They have the best software. I firmly believe that,” says Mike Miller, a founder of a cloud computing company called Cloudant, which is now owned by Google rival IBM. “But the trick is that’s not always enough. Think back to Betamax versus VHS.”</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
‘The World’s Biggest Cloud’</div>
<div style="text-align: center;">
Google’s new push begins tomorrow morning. At an event in San Francisco, the company will unveil several changes to its portfolio of cloud services, while providing a look “behind the scenes of the world’s biggest cloud.” In a rare public appearance, Hölzle will give the keynote, laying out his vision for the future of the market.</div>
<div class="location-container americas" style="background-color: white; color: #444444; font-family: arial, sans-serif; font-size: 13px; line-height: 20.020000457763672px; min-width: 210px;">
<h3 style="font-family: 'open sans', arial, sans-serif; font-size: 14px; line-height: 1.43; margin: 1.236em 0px 0.618em; text-align: center;">
Google Data Center Locations</h3>
<h3 style="font-family: 'open sans', arial, sans-serif; font-size: 14px; line-height: 1.43; margin: 1.236em 0px 0.618em; text-align: center;">
Americas</h3>
<div>
<ul style="list-style: none; margin: 0px 10.5px 0px 0px; padding: 0px;">
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/berkeley-county/" id="link-berkeley-county" style="color: #7759ae; text-decoration: none;">Berkeley County, South Carolina</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/council-bluffs/" id="link-council-bluffs" style="color: #7759ae; text-decoration: none;">Council Bluffs, Iowa</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/douglas-county/" id="link-douglas-county" style="color: #7759ae; text-decoration: none;">Douglas County, Georgia</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/quilicura/" id="link-quilicura" style="color: #7759ae; text-decoration: none;">Quilicura, Chile</a></li>
</ul>
<ul style="list-style: none; margin: 0px 10.5px 0px 0px; padding: 0px;">
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/mayes-county/" id="link-mayes-county" style="color: #7759ae; text-decoration: none;">Mayes County, Oklahoma</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/lenoir/" id="link-lenoir" style="color: #7759ae; text-decoration: none;">Lenoir, North Carolina</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/the-dalles/" id="link-the-dalles" style="color: #7759ae;">The Dalles, Oregon</a></li>
</ul>
</div>
</div>
<div class="location-container asia" style="background-color: white; color: #444444; font-family: arial, sans-serif; font-size: 13px; line-height: 20.020000457763672px; min-width: 210px;">
<h3 style="font-family: 'open sans', arial, sans-serif; font-size: 14px; line-height: 1.43; margin: 1.236em 0px 0.618em; text-align: center;">
Asia</h3>
<div>
<ul style="list-style: none; margin: 0px 10.5px 0px 0px; padding: 0px;">
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/changhua-county/" id="link-changhua-county" style="color: #7759ae; text-decoration: none;">Changhua County, Taiwan</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/singapore/" id="link-singapore" style="color: #7759ae; text-decoration: none;">Singapore</a></li>
</ul>
</div>
</div>
<div class="location-container europe" style="background-color: white; color: #444444; font-family: arial, sans-serif; font-size: 13px; line-height: 20.020000457763672px; min-width: 210px;">
<h3 style="font-family: 'open sans', arial, sans-serif; font-size: 14px; line-height: 1.43; margin: 1.236em 0px 0.618em; text-align: center;">
Europe</h3>
<div>
<ul style="list-style: none; margin: 0px 10.5px 0px 0px; padding: 0px;">
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/hamina/" id="link-hamina" style="color: #7759ae; text-decoration: none;">Hamina, Finland</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/st-ghislain/" id="link-st-ghislain" style="color: #7759ae; text-decoration: none;">St Ghislain, Belgium</a></li>
<li style="margin-bottom: 2px; text-align: center;"><a href="http://www.google.com/about/datacenters/inside/locations/dublin/" id="link-dublin" style="color: #7759ae; text-decoration: none;">Dublin, Ireland</a></li>
<li style="margin-bottom: 2px; text-align: center;"><br /></li>
</ul>
</div>
</div>
<div style="text-align: center;">
Like other cloud giants, Google and Hölzle aim to make life easier for anyone who’s building a new website or new a mobile app, storing or processing large amounts of data, or just trying to see if some code will run. Rather than setting up their own infrastructure, businesses and developers can just open up a web browser and run their software on Google’s network. Many are already doing this. According to Google, its cloud services now run 4.75 million active applications, including names like SnapChat and Pulse. Google App Engine alone handles 28 billion online requests a day, or about 10 times more than Wikipedia, one of the largest sites on the web. But the process should be far easier than it is today, Hölzle says, and Google has already taken a big step in this direction.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
‘What you really want is to mix and match,’ Hölzle says, indicating the company will combine the advantages of App Engine and Compute Engine.</div>
<div style="text-align: center;">
Today, if you build a website on Google App Engine, the service will automatically expand the site across more and more machines as more and more people visit it. The problem is that you can’t just hoist any software onto the service. You have to build your site in a certain way, using specific languages, software libraries, and frameworks. The company’s other service, Google Cloud Engine, addresses that issue, giving you raw virtual machines, or VMs, where you can run anything you like. But the onus is on you to manage these VMs — to spin up more, for instance, as you need them. This is a tradeoff you see on most cloud services. But, Hölzle tells us, Google has now bridged the gap. “What you really want is to mix and match,” he says, indicating the company will unveil a service that combines the advantages of App Engine and Compute Engine.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
He also says that cloud computing is too expensive. Indeed, many small businesses and developers complain there are situations where cloud services are far more expensive than buying and operating your own gear. It would seem that companies like Amazon charge an inexplicably high premium for their services — at least in certain cases. But Hölzle believes that because Google is operating at such an enormous scale, it can help solve this problem as well. Just as a massive retailer like WalMart can drive down the cost of toothpaste, Google can drive down the cost of compute cycles. “For cloud success, you not only have to be technically good,” he says, hinting that company will also significantly drop prices at tomorrow’s event. “You have to economically beat the alternative.”</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
That’s certainly true. And like Google’s efforts to dovetail the worlds of App Engine and Compute Engine, a price drop is certainly welcome. But it’s yet to seen how far such changes can take the company. Forrester analyst Staten believes that Google remains a long way from taking control of the market. “Google is still playing catchup,” he says. On the whole, he explains, Google’s services aren’t as mature as offerings from the likes of Amazon and Microsoft, meaning they don’t offer quite as many tools for rapidly building and running software. That said, he does think Hölzle and company will contend with the Amazons and the Microsofts and the IBMs in the long term, as they all fight for a slice of that $600-billion pie.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
The Snowden Problem</div>
<div style="text-align: center;">
The added rub is that these rivals are fighting more than just each other. Many of the world’s businesses are still reluctant to run their applications or store their data in the cloud, fearing it will compromise their privacy and their security. This is a particular worry now that ex-government contractor Edward Snowden has exposed the NSA’s efforts to eavesdrop on Google and other big-name web companies. What’s more, in many parts of the world, government regulations prohibit businesses from storing data outside of local borders — something that can’t always be accommodated in the cloud, where data can flow freely from place to place. But in typical Google fashion, Hölzle believes that the world will evolve to the point where people realize their data is actually be safer on Google and where government regulations bend for global cloud services.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Hölzle believes that the world will evolve to the point where people realize their data is actually safer on Google and where government regulations bend for global cloud services.</div>
<div style="text-align: center;">
He acknowledges that regulatory issues are largely outside of Google’s control, but he says security is another matter. In the future, he explains, most security experts will realize that your data is actually more secure if you trust it to Google and other cloud services than if you don’t. “Cloud based systems are often a step ahead because they evolve more rapidly,” he says, before boasting of Google’s track record in particular. “If you look at the long history of NSA disclosures, you actually see in these documents that we are harder to crack than most companies.”</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Others take a slightly different view of how this market will evolve. Lucas Carlson, a cloud computing veteran who now oversees services at internet service provider CenturyLink, believes there will always be businesses who insists on running their software in-house for security, regulatory, and other reasons. “I think there will always, forevermore, be a balance between the public and the private,” he says. But he also believes that public cloud services like Google Compute Engine and his own CenturyLink Cloud will continue to expand their reach, and according to Forrester’s James Staten, this is already happening at an unprecedented clip. Despite security and regulatory concerns, cloud services are doubling their share of the IT market each year.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
As this market grows, the bigger question is what role Google will play. It certainly has the technology and the talent to close the gap on Amazon. And now it has the ambition as well. Urs Hölzle makes some bold statements about how far these ambitions can take the company. But they shouldn’t be discounted. Google is many things — a search company, an ad company, a map company, a phone company, a company that dabbles in everything from computerized eyewear to self-driving cars — but more than anything else, it’s a company that has mastered the art of global computing. No one would be surprised if this now becomes its biggest business.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Cade Metz</div>
<div style="text-align: center;">
Cade Metz is the editor of Wired Enterprise</div>
<div style="text-align: center;">
Please e-mail him: cade_metz at wired.com.</div>
<div style="text-align: center;">
Follow @cademetz on Twitter.</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-52725404753840769052014-03-24T09:42:00.001-07:002014-03-24T09:42:10.627-07:00Pioneer Stereo Receiver Model SX-850<div style="text-align: center;">
Pioneer Stereo Receiver Model SX-850</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqhjUs51vrOOqYOZ85byiwag-f6H12YJjdvK59y-DnjibIfUHQBcKA7aDuhK84rPeU4FoNnIRvun0BOad03BKLLWzklmxnXPLSnmhCuTLOubsptV3y_F5j1YiNOxpxBUI0Oj6AUn2tugqF/s1600/sx850-front.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Pioneer Stereo Receiver Model SX-850" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqhjUs51vrOOqYOZ85byiwag-f6H12YJjdvK59y-DnjibIfUHQBcKA7aDuhK84rPeU4FoNnIRvun0BOad03BKLLWzklmxnXPLSnmhCuTLOubsptV3y_F5j1YiNOxpxBUI0Oj6AUn2tugqF/s1600/sx850-front.JPG" height="300" title="Pioneer Stereo Receiver Model SX-850" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: small;">Pioneer Stereo Receiver Model SX-850</span></td></tr>
</tbody></table>
<div style="text-align: center;">
This Pioneer SX-850 Vintage receiver sounds GREAT!! In very good condition with xlint phono stage and a tuner that picks up everything. Clean, high power tested at 87 rms per side at less than .05%,. These Pioneer receivers are really well built in Japan. The Pioneer AM/FM stereo receiver model SX-850 was introduced in 1976 and manufactured up till 1977. Rated at 85 watts per channel RMS and a price tag of $500.00 back then. Features, separate bass and treble controls with turnover switches from 200hz and 400hz bass, 5k and 25k treble, also tone on/off FM Mpx filter and muting on/off switches, low and high filters on/off, two tape in/outputs, duplicate switch, adaptor switch that enables you to add an equalizer etc. two phono inputs and one aux input, phono two selector is also the mic selector, mode stereo and mono, loudness on/off, mic input, muting switch and both signal and tuning meters. This receiver was built to last and perform for many years. I have repaired several of these. I will try to find the service manual, it's around here somewhere. These sound great. You will never see a receiver built like this again.</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXpxtHxQrgnCzPpL0QFt6ODN8k7A-CB_7NItfW8leAB3jAvqKek1u2AopsHhgp6rilFQooFE4DbyPz0QcrJDMk632UvRK4J32z8PQ7Qm68w4TEwMrCiMGmWYaSAEj0UZ9wng0gbATfCJAn/s1600/sx850.JPG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Pioneer Stereo Receiver Model SX-850" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXpxtHxQrgnCzPpL0QFt6ODN8k7A-CB_7NItfW8leAB3jAvqKek1u2AopsHhgp6rilFQooFE4DbyPz0QcrJDMk632UvRK4J32z8PQ7Qm68w4TEwMrCiMGmWYaSAEj0UZ9wng0gbATfCJAn/s1600/sx850.JPG" height="300" title="Pioneer Stereo Receiver Model SX-850" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: small;">Pioneer Stereo Receiver Model SX-850</span></td></tr>
</tbody></table>
<div style="text-align: center;">
Specifications:</div>
<div style="text-align: center;">
Power Output: 85 watts per channel RMS into 8 ohms.</div>
<div style="text-align: center;">
Harmonic Distortion: Less than 0.05%</div>
<div style="text-align: center;">
Intermodulation Distortion: Less than 0.03%</div>
<div style="text-align: center;">
FM Sensitivity: 1.8uV</div>
<div style="text-align: center;">
FM Capture Ratio: 1.00</div>
<div style="text-align: center;">
FM Harmonic Distortion Mono: <0 .15="" p=""><div style="text-align: center;">
FM Harmonic Distortion Stereo: <0 .3="" p=""><div style="text-align: center;">
Dimensions: 20.75 x 6.75 x 16.25</div>
<div style="text-align: center;">
Weight: 42.00 lbs</div>
</0></div>
</0></div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-35893992882110650342014-03-18T07:14:00.001-07:002014-03-18T07:14:03.241-07:00NSA’s Facebook Malware DenialCompare the NSA’s Facebook Malware Denial to its Own Secret Documents<br />
<br />
A top-secret NSA presentation reveals how the agency used Facebook to hack into targeted computers for surveillance. On Wednesday, Glenn Greenwald and I revealed new details about the National Security Agency’s efforts to radically expand its ability to hack into computers and networks across the world. The story has received a lot of attention, and one detail in particular has sparked controversy: specifically, that the NSA secretly pretended to be a Facebook server in order to covertly infect targets with malware “implants” used for surveillance.<br />
This revelation apparently infuriated Facebook founder Mark Zuckerberg so much that he got on the phone to President Barack Obama to complain about it. “I’ve been so confused and frustrated by the repeated reports of the behavior of the US government,” Zuckerberg wrote in a blog post Thursday. “When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.”<br />
That wasn't all. Wired ran a piece saying that the NSA’s widespread use of its malware tools “acts as implicit permission to others, both nation-state and criminal.” Slate noted that the NSA’s hacking platform appears to be “becoming a bit more like the un-targeted dragnets everyone has been so upset about.” Meanwhile, Ars Technica wrote that the surveillance technology we exposed “poses a risk to the entire Internet.”<br />
In response, the NSA has attempted to quell the backlash by putting out a public statement dismissing what it called “inaccurate” media reports. The agency denied that it was “impersonating U.S. social media or other websites” and said that it had not “infected millions of computers around the world with malware.” The statement follows a trend that has repeatedly been seen in the aftermath of major disclosures from documents turned over by NSA whistleblower Edward Snowden, in which the NSA or one of its implicated allies issues a carefully worded non-denial denial that on the face of it seems to refute an allegation but on closer inspection does not refute it at all.<br />
Prior to publishing our story, we asked the NSA to explain its use of Facebook to deploy malware as part of a top-secret initiative codenamed QUANTUMHAND. The NSA declined to answer all of our questions or offer context for the documents. We went into meticulous detail in our report, which went through a rigorous fact-checking process because of the gravity of the revelations. What we reported, accurately, was that the Snowden files showed how the agency had in some cases “masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive.” The source for that detail was not plucked from thin air; it was rooted in multiple documents that refer to the technique in action, including the internal NSA animation that we published.<br />
A particular short excerpt from one of the classified documents, however, has taken on new significance due to the NSA’s statement. The excerpt is worth drawing attention to here because of the clarity of the language it uses about the Facebook tactic and the light it shines on the NSA’s denial. Referencing the NSA’s Quantum malware initiative, the document, dated April 2011, explains how the NSA “pretends” to be Facebook servers to deploy its surveillance “implants” on target’s computers:<br />
<br />
It is difficult to square the NSA secretly saying that it “pretends to be the Facebook server” while publicly claiming that it “does not use its technical capabilities to impersonate U.S. company websites.” Is the agency making a devious and unstated distinction in its denial between “websites” and “servers”? Was it deliberate that the agency used the present tense “does not” in its denial as opposed to the past tense “did not”? Has the Facebook QUANTUMHAND technique been shut down since our report? Either way, the language used in the NSA’s public statement seems highly misleading – which is why several tech writers have rightly treated it with skepticism.<br />
The same is true of the NSA’s denial that it has not “infected millions of computers around the world with malware” as part of its hacking efforts. Our report never actually accused the NSA of having achieved that milestone. Again, we reported exactly what the NSA’s own documents say: that the NSA is working to “aggressively scale” its computer hacking missions and has built a system called TURBINE that it explicitly states will “allow the current implant network to scale to large size (millions of implants).” Only a decade ago, the number of implants deployed by the NSA was in the hundreds, according to the Snowden files. But the agency now reportedly manages a network of between 85,000 and 100,000 implants in computers systems worldwide – and, if TURBINE’s capabilities and the NSA’s own documents are anything to go by, it is intent on substantially increasing those numbers.<br />
The rapid proliferation of these hacking techniques in the past decade, under cover of intense secrecy, is extraordinary and unprecedented. The NSA insists in its denial that its hacking efforts are not “indiscriminate.” Yet how the agency defines “indiscriminate” in this context remains unclear. The Intercept asked the NSA to clarify some of these issues for this post. Does the agency deny that it has used the QUANTUMHAND method to pretend to be a Facebook server in order to deploy malware implants? How does the NSA distinguish “indiscriminate” from “discriminate”? In what specific legal, policy, and operational context does the implants system function? The agency declined to answer all of these questions. Instead, spokeswoman Vanee’ Vines said that the NSA stood by its original statement, adding only that “unauthorized and selective publication” of the documents “may lead to incorrect assumptions.”<br />
The NSA’s outgoing chief has claimed that the agency supports increased transparency in the wake of the Snowden leaks – but its response to the latest disclosures illustrates that it is failing to live up to that commitment. If the NSA truly wants to gain citizens’ trust, it should rethink its slippery public relations strategy. A good first step would be to stop issuing dubious denials that seem to sit so starkly at odds with what its officials were saying in secret when they thought nobody would ever learn about what they were doing.<br />
By Ryan Gallagher15 Mar 2014James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-75606895478535970392014-03-14T11:53:00.002-07:002014-03-14T11:55:01.445-07:00NSA denies infecting millions of PC's<div style="text-align: center;">
</div>
<div style="text-align: center;">
<header class="storyHeader">
<h1 itemprop="headline">
NSA denies infecting millions of PC's. </h1>
<div class="summary" itemprop="description">
Summary: The
US National Security Agency (NSA) has denied claims that it conducts
indiscriminate hacking and says it doesn’t impersonate US social media
or websites.
</div>
</header><header class="storyHeader">Just because the NSA has the systems to hijack millions of
computers across the world, it doesn't mean it's actually doing so, the
US spy agency has said.</header></div>
<div style="text-align: center;">
</div>
<div class="storyBody" itemprop="articleBody" style="text-align: center;">
</div>
<div class="storyBody" itemprop="articleBody" style="text-align: center;">
"Recent media reports that allege NSA has infected millions of
computers around the world with malware, and that NSA is impersonating
US social media or other websites, are inaccurate," the NSA said in a
statement to media yesterday.<br />
<br />
The statement followed <a href="https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/" target="_blank">reports</a>
based on classified NSA documents from whistleblower Edward Snowden
that revealed the existence of Turbine, an NSA system that allowed the
agency to perform automated control malware implants "by groups instead
of individually".<br />
<br />
The Turbine capabilities appeared around 2009, marking a departure
from its old approach where manually deployed implants were reserved for
targets that couldn’t be monitored through traditional wiretaps,
according to the report on Tuesday by <i>The Intercept</i>.<br />
<br />
According to the report, Turbine was built to compensate for the
human limitations around hacking at scale. Turbine became part of its
elite hacking squad, the Tailored Access operations unit, enabling it
conduct "industrial-scale exploitation" and manage "millions of
implants".<br />
<br />
<i>The Intercept</i>'s report did not allege NSA actually used the
system to infect millions of people's computers and points to previous
reports based on Snowden documents that put the number of implants
deployed by the agency at between 85,000 to 100,000. And while Turbine may make it capable of attacking users by group
rather than individually, the NSA has denied it operates indiscriminate
cyber attacks. It also appears to have denied a claim that it had
spoofed a Facebook server to phish its targets.<br />
<br />
"NSA's authorities require that its foreign intelligence operations
support valid national security requirements, protect the legitimate
privacy interests of all persons, and be as tailored as feasible. NSA
does not use its technical capabilities to impersonate U.S. company
websites. Nor does NSA target any user of global Internet services
without appropriate legal authority. Reports of indiscriminate computer
exploitation operations are simply false," it said. "NSA uses its technical capabilities only to support lawful and
appropriate foreign intelligence operations, all of which must be
carried out in strict accordance with its authorities. Technical
capability must be understood within the legal, policy, and operational
context within which that capability must be employed." The nominee to head up the NSA US Navy vice admiral Michael S Rogers earlier this week outlined <a href="http://www.zdnet.com/nsa-our-zero-days-put-you-at-risk-but-we-do-what-we-like-with-them-7000027296/" target="_blank">how the agency handles zero day flaws in software and devices</a>, which are one of the key assets it uses to exploit computers. According to Rogers, the NSA's default position is to disclose software vulnerabilities to vendors of the affected product. But that position stands in contrast the $25m it spent on acquiring
zero day flaws from third-party security firms, which could otherwise
have sold or reported them to the vendor.<br />
<h3>
Read more on the NSA</h3>
<ul>
<li><a href="http://www.zdnet.com/nsa-our-zero-days-put-you-at-risk-but-we-do-what-we-like-with-them-7000027296/" style="line-height: 1.5em;">NSA: Our zero days put you at risk, but we do what we like with them</a></li>
<li><a href="http://www.zdnet.com/top-nsa-hacks-of-our-computers-7000024787/" style="line-height: 1.5em;">Top NSA hacks of our computers</a></li>
<li><a href="http://www.zdnet.com/nsa-leaks-fueled-needed-debate-snowden-7000027172/" style="line-height: 1.5em;">NSA leaks fueled needed debate: Snowden</a></li>
</ul>
</div>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-50825684950803917562014-03-13T18:58:00.002-07:002014-03-13T20:19:17.489-07:00The Snowden Files: Story of the year?<table class="data"><tbody>
<tr><th> The Edward Snowden files: revelations about the extent of the NSA surveillance has been a real eye opener for some. Here is a list of article from one of my top news web sites: slashdot.org<br />
<br />
<br />
Edward Snowden timeline from slashdot.org: </th></tr>
</tbody></table>
<table class="data"><tbody>
<tr><th><br /></th></tr>
</tbody></table>
<table class="data"><tbody>
<tr align="center"><th></th></tr>
</tbody></table>
<table class="data"><tbody>
<tr><th>Date / Time</th><th>Story</th></tr>
<tr class="data_hl1">
<td>Sunday March 09, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/03/10/0037259/snowden-says-no-one-listened-to-10-attempts-to-raise-concerns-at-nsa" rel="nofollow">Snowden Says No One Listened To 10 Attempts To Raise Concerns At NSA</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday March 04, 2014 </td>
<td><a href="http://tech.slashdot.org/story/14/03/01/2022248/snowdens-nsa-leaks-gave-ietf-a-needed-security-wake-up-call" rel="nofollow">Snowden's NSA Leaks Gave IETF a Needed Security Wake-up Call</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday February 27, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/27/1832209/gchq-intercepted-webcam-images-of-millions-of-yahoo-users" rel="nofollow">GCHQ Intercepted Webcam Images of Millions of Yahoo Users</a></td>
</tr>
<tr class="data_hl2">
<td>Wednesday February 19, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/19/1325251/high-court-rules-detention-of-david-miranda-was-lawful" rel="nofollow">High Court Rules Detention of David Miranda Was Lawful</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday February 13, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/13/1533249/nsa-others-implicated-in-making-snowden-data-leaks-possible" rel="nofollow">NSA: Others Implicated in Making Snowden Data Leaks Possible</a></td>
</tr>
<tr class="data_hl2">
<td>Monday February 10, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/10/2318244/3-reasons-to-hate-mass-surveillance-3-ways-to-fight-it" rel="nofollow">3 Reasons To Hate Mass Surveillance; 3 Ways To Fight It</a></td>
</tr>
<tr class="data_hl1">
<td>Sunday February 09, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/08/1438242/snowden-docs-show-uks-digital-spies-using-viruses-honey-traps" rel="nofollow">Snowden Docs Show UK's Digital Spies Using Viruses, Honey Traps</a></td>
</tr>
<tr class="data_hl2">
<td>Saturday February 08, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/09/0210252/snowden-used-software-scraper-say-nsa-officials" rel="nofollow">Snowden Used Software Scraper, Say NSA Officials</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday February 06, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/06/1423251/how-edward-snowdens-actions-have-impacted-defense-contractors" rel="nofollow">How Edward Snowden's Actions Have Impacted Defense Contractors</a></td>
</tr>
<tr class="data_hl2">
<td>Friday January 31, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/02/01/0026250/now-on-video-gchq-destroying-laptop-full-of-snowden-disclosures" rel="nofollow">Now On Video: GCHQ Destroying Laptop Full of Snowden Disclosures</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday January 29, 2014 </td>
<td><a href="http://politics.slashdot.org/story/14/01/29/1627245/edward-snowden-nominated-for-nobel-peace-prize" rel="nofollow">Edward Snowden Nominated For Nobel Peace Prize</a></td>
</tr>
<tr class="data_hl2">
<td>Monday January 27, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/01/27/0117237/edward-snowden-says-nsa-engages-in-industrial-espionage" rel="nofollow">Edward Snowden Says NSA Engages In Industrial Espionage</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday January 15, 2014 </td>
<td><a href="http://news.slashdot.org/story/14/01/15/1324216/nyt-nsa-put-100000-radio-pathway-backdoors-in-pcs" rel="nofollow">NYT: NSA Put 100,000 Radio Pathway "Backdoors" In PCs</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday January 09, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/01/09/1640227/eu-committee-issues-report-on-nsa-surveillance-snowden-to-testify" rel="nofollow">EU Committee Issues Report On NSA Surveillance; Snowden To Testify</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday January 02, 2014 </td>
<td><a href="http://yro.slashdot.org/story/14/01/02/1328241/the-new-york-times-pushes-for-clemency-for-snowden" rel="nofollow">The New York Times Pushes For Clemency For Snowden</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday December 31, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/31/1642252/no-question-snowden-was-2013s-most-influential-tech-figure" rel="nofollow">No Question: Snowden Was 2013's Most Influential Tech Figure</a></td>
</tr>
<tr class="data_hl1">
<td>Monday December 30, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/31/0051242/usa-today-names-edward-snowden-tech-person-of-the-year" rel="nofollow">USA Today Names Edward Snowden Tech Person of the Year</a></td>
</tr>
<tr class="data_hl2">
<td>Wednesday December 25, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/25/1729228/snowden-gives-alternative-christmas-message-on-channel-4" rel="nofollow">Snowden Gives Alternative Christmas Message On Channel 4</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday December 24, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/24/149210/snowden-says-his-mission-is-accomplished" rel="nofollow">Snowden Says His Mission Is Accomplished</a></td>
</tr>
<tr class="data_hl2">
<td>Sunday December 22, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/22/1623245/privacy-advocate-jacob-appelbaum-reports-break-in-of-berlin-apartment" rel="nofollow">Privacy Advocate Jacob Appelbaum Reports Break-In Of Berlin Apartment</a></td>
</tr>
<tr class="data_hl1">
<td>Sunday December 15, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/15/0443230/nsa-has-no-clue-as-to-scope-of-snowdens-data-trove" rel="nofollow">NSA Has No Clue As To Scope of Snowden's Data Trove</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday December 12, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/12/12/1333254/nz-travelers-electronics-taken-at-airport-interest-in-snowden-to-blame" rel="nofollow">NZ Traveler's Electronics Taken At Airport; Interest in Snowden to Blame?</a></td>
</tr>
<tr class="data_hl1">
<td>Saturday November 30, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/30/1328259/snowden-document-says-dutch-secret-service-hacks-internet-forums" rel="nofollow">Snowden Document Says Dutch Secret Service Hacks Internet Forums</a></td>
</tr>
<tr class="data_hl2">
<td>Wednesday November 27, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/27/1736236/nsa-planned-to-discredit-radicals-based-on-web-browsing-habits" rel="nofollow">NSA Planned To Discredit Radicals Based On Web-Browsing Habits</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday November 26, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/26/1431205/washington-post-assange-unlikely-to-be-prosecuted-in-us" rel="nofollow">Washington Post: Assange 'Unlikely To Be Prosecuted In US'</a></td>
</tr>
<tr class="data_hl2">
<td>Monday November 25, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/25/0546240/singapore-south-korea-help-nsa-tap-undersea-cables" rel="nofollow">Singapore & South Korea Help NSA Tap Undersea Cables</a></td>
</tr>
<tr class="data_hl1">
<td>Sunday November 24, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/11/24/0219251/indonesian-politicians-plan-to-quiz-snowden-following-visit-by-russians" rel="nofollow">Indonesian Politicians Plan To Quiz Snowden Following Visit By Russians</a></td>
</tr>
<tr class="data_hl2">
<td>Sunday November 24, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/23/2125212/nsa-infected-50000-computer-networks-with-malicious-software" rel="nofollow">NSA Infected 50,000 Computer Networks With Malicious Software</a></td>
</tr>
<tr class="data_hl1">
<td>Saturday November 16, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/16/2242223/how-big-companies-can-hamper-the-surveillance-infrastructure" rel="nofollow">How Big Companies Can Hamper the Surveillance Infrastructure </a></td>
</tr>
<tr class="data_hl2">
<td>Friday November 15, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/14/2354216/nsa-wants-to-reveal-its-secrets-to-prevent-snowden-from-revealing-them-first" rel="nofollow">NSA Wants To Reveal Its Secrets To Prevent Snowden From Revealing Them First</a></td>
</tr>
<tr class="data_hl1">
<td>Friday November 08, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/11/08/163245/snowden-used-social-engineering-to-get-classified-documents" rel="nofollow">Snowden Used Social Engineering To Get Classified Documents</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday November 07, 2013 </td>
<td><a href="http://it.slashdot.org/story/13/11/07/038216/edward-snowden-leaks-could-help-paedophiles-escape-police-says-uk-government" rel="nofollow">Edward Snowden Leaks Could Help Paedophiles Escape Police, Says UK Government</a></td>
</tr>
<tr class="data_hl1">
<td>Monday November 04, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/11/04/0223234/feinstein-and-rogers-no-clemency-for-snowden" rel="nofollow">Feinstein and Rogers: No Clemency For Snowden</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday October 31, 2013 </td>
<td><a href="http://it.slashdot.org/story/13/10/31/1321222/edward-snowdens-new-job-tech-support" rel="nofollow">Edward Snowden's New Job: Tech Support</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday October 29, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/10/29/0020206/uk-prime-minister-threatens-to-block-further-snowden-revelations" rel="nofollow">UK Prime Minister Threatens To Block Further Snowden Revelations</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday October 24, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/10/24/1428237/meps-vote-to-suspend-data-sharing-with-us" rel="nofollow">MEPs Vote To Suspend Data Sharing With US</a></td>
</tr>
<tr class="data_hl1">
<td>Sunday October 20, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/10/20/1539210/nsa-hacked-email-account-of-mexican-president" rel="nofollow">NSA Hacked Email Account of Mexican President</a></td>
</tr>
<tr class="data_hl2">
<td>Saturday October 12, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/10/13/0237210/could-snowden-have-been-stopped-in-2009" rel="nofollow">Could Snowden Have Been Stopped In 2009?</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday October 10, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/10/10/1853206/inside-the-guardian-and-the-snowden-leaks" rel="nofollow">Inside the Guardian and the Snowden Leaks</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday October 10, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/10/10/0033229/guardian-ignores-mi5-warnings-vows-to-publish-more-snowden-leaks" rel="nofollow">Guardian Ignores MI5 Warnings, Vows To 'Publish More Snowden Leaks'</a></td>
</tr>
<tr class="data_hl1">
<td>Saturday September 21, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/09/21/2045223/letter-to-extended-family-assures-that-nsa-will-weather-this-storm" rel="nofollow">Letter to "Extended Family" Assures That NSA Will "Weather This Storm"</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday September 03, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/09/02/1613238/new-snowden-revelation-terrorists-attempting-to-infiltrate-cia" rel="nofollow">New Snowden Revelation: Terrorists Attempting To Infiltrate CIA</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday September 03, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/31/2223212/us-mounted-231-offensive-cyber-operations-in-2011-runs-worldwide-botnet" rel="nofollow">US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet</a></td>
</tr>
<tr class="data_hl2">
<td>Friday August 30, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/31/0110255/uk-high-court-gives-ok-to-investigation-of-data-siezed-from-david-miranda" rel="nofollow">UK High Court Gives OK To Investigation of Data Siezed From David Miranda</a></td>
</tr>
<tr class="data_hl1">
<td>Thursday August 29, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/29/1544210/snowden-spoofed-top-officials-identity-to-mine-nsa-secrets" rel="nofollow">Snowden Spoofed Top Officials' Identity To Mine NSA Secrets</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday August 27, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/08/27/1238203/report-snowden-stayed-at-russian-consulate-while-in-hong-kong" rel="nofollow">Report: Snowden Stayed At Russian Consulate While In Hong Kong</a></td>
</tr>
<tr class="data_hl1">
<td>Friday August 23, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/08/23/2256208/the-register-4-ways-the-guardian-could-have-protected-snowden" rel="nofollow">The Register: 4 Ways the Guardian Could Have Protected Snowden</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday August 20, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/19/159236/members-of-parliament-demand-explanation-for-detention-of-david-miranda" rel="nofollow">Members of Parliament Demand Explanation For Detention of David Miranda</a></td>
</tr>
<tr class="data_hl1">
<td>Monday August 19, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/08/20/0217238/uk-government-destroys-guardians-snowden-drives" rel="nofollow">UK Government Destroys Guardian's Snowden Drives</a></td>
</tr>
<tr class="data_hl2">
<td>Saturday August 17, 2013 </td>
<td><a href="http://it.slashdot.org/story/13/08/17/0426206/lavabitcom-owner-i-could-be-arrested-for-resisting-surveillance-order" rel="nofollow">Lavabit.com Owner: 'I Could Be Arrested' For Resisting Surveillance Order</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday August 13, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/08/12/2222218/photocopying-michelle-obamas-diary-just-in-case" rel="nofollow">Photocopying Michelle Obama's Diary, Just In Case</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday August 08, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/08/1956215/encrypted-email-provider-lavabit-shuts-down-blames-us-govt" rel="nofollow">Encrypted Email Provider Lavabit Shuts Down, Blames US Gov't</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday August 07, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/08/07/1633256/snowden-gave-15000-documents-to-glenn-greenwald-obama-cancels-russia-summit" rel="nofollow">Snowden Gave 15,000 Documents to Glenn Greenwald; Obama Cancels Russia Summit</a></td>
</tr>
<tr class="data_hl2">
<td>Wednesday August 07, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/08/07/1250251/former-nsa-chief-warns-hackers-will-attack-us-if-snowden-is-captured" rel="nofollow">Former NSA Chief Warns Hackers Will Attack US If Snowden Is Captured</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday August 06, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/06/1649205/def-con-hackers-on-whether-theyd-work-for-the-nsa" rel="nofollow">Def Con Hackers On Whether They'd Work For the NSA</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday August 01, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/08/01/1255257/snowden-granted-one-year-asylum-in-russia" rel="nofollow">Snowden Granted One-Year Asylum In Russia</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday July 31, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/31/1532212/training-materials-for-nsa-spying-tool-xkeyscore-revealed" rel="nofollow">Training Materials for NSA Spying Tool "XKeyScore" Revealed</a></td>
</tr>
<tr class="data_hl2">
<td>Friday July 26, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/27/0059243/us-promises-not-to-kill-or-torture-snowden" rel="nofollow">US Promises Not To Kill Or Torture Snowden</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday July 24, 2013 </td>
<td><a href="http://news.slashdot.org/story/13/07/24/1552257/edward-snowden-still-stuck-at-airport-may-be-permitted-entry-into-russia-soon" rel="nofollow">Edward Snowden Still Stuck At Airport, May Be Permitted Entry Into Russia Soon</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday July 16, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/15/1155209/edward-snowden-nominated-for-nobel-peace-prize" rel="nofollow">Edward Snowden Nominated For Nobel Peace Prize</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday July 16, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/16/1312229/citing-snowden-leaks-russia-again-demands-un-takeover-of-internet" rel="nofollow">Citing Snowden Leaks, Russia Again Demands UN Takeover of Internet</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday July 16, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/15/1811243/angela-merkel-tells-us-firms-to-meet-german-privacy-rules" rel="nofollow">Angela Merkel Tells US Firms To Meet German Privacy Rules</a></td>
</tr>
<tr class="data_hl1">
<td>Friday July 12, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/13/008230/microsofts-cooperation-with-nsa-either-voluntary-or-reveals-new-legal-tactic" rel="nofollow">Microsoft's Cooperation With NSA Either Voluntary, Or Reveals New Legal Tactic</a></td>
</tr>
<tr class="data_hl2">
<td>Thursday July 11, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/11/2041244/ms-handed-nsa-access-to-encrypted-chat-email" rel="nofollow">MS Handed NSA Access To Encrypted Chat & Email</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday July 09, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/07/06/0156233/snowden-offered-asylum-by-venezuelan-president" rel="nofollow">Snowden Offered Asylum By Venezuelan President</a></td>
</tr>
<tr class="data_hl2">
<td>Wednesday July 03, 2013 </td>
<td><a href="http://politics.slashdot.org/story/13/07/03/1517222/bolivian-presidents-plane-rerouted-over-snowden-suspicions" rel="nofollow">Bolivian President's Plane 'Rerouted Over Snowden Suspicions'</a></td>
</tr>
<tr class="data_hl1">
<td>Tuesday July 02, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/02/0140234/edward-snowden-files-for-political-asylum-in-russia" rel="nofollow">Edward Snowden Files For Political Asylum In Russia</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday July 02, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/07/01/0747201/more-details-emerge-on-how-the-us-is-bugging-its-european-allies" rel="nofollow">More Details Emerge On How the US Is Bugging Its European Allies</a></td>
</tr>
<tr class="data_hl1">
<td>Saturday June 29, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/06/30/0140242/snowden-nsa-spying-on-eu-diplomats-and-administrators" rel="nofollow">Snowden: NSA Spying On EU Diplomats and Administrators</a></td>
</tr>
<tr class="data_hl2">
<td>Saturday June 22, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/06/21/2252227/us-charges-edward-snowden-with-espionage" rel="nofollow">US Charges Edward Snowden With Espionage</a></td>
</tr>
<tr class="data_hl1">
<td>Wednesday June 12, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/06/12/2032210/snowdens-big-truth-we-are-all-less-free" rel="nofollow">Snowden's Big Truth: We Are All Less Free</a></td>
</tr>
<tr class="data_hl2">
<td>Tuesday June 11, 2013 </td>
<td><a href="http://yro.slashdot.org/story/13/06/09/1958200/nsa-whistleblower-outs-himself" rel="nofollow">NSA WhistleBlower Outs Himself </a></td></tr>
</tbody></table>
James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-16190014672135245012014-02-15T09:48:00.001-08:002014-02-15T09:48:14.978-08:00Floppy Music: Soft Cell - tainted love<center>
<iframe width="560" height="315" src="//www.youtube.com/embed/nOMX3deeW6Q" frameborder="0" allowfullscreen></iframe>
</center>
<br>
"Tainted Love" played on 13 floppy drives & 1 hard drive.James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.comtag:blogger.com,1999:blog-7129009335353715163.post-71741386522777208282012-04-27T19:34:00.000-07:002014-03-23T14:38:53.969-07:00Basic Electronics Class Videos<center>
Electronics Tutorial #1 - Electricity - Voltage, Current, Power, AC and DC
<iframe width="560" height="315" src="//www.youtube.com/embed/F_5sV8s9ZEA" frameborder="0" allowfullscreen></iframe><br><br>
How to test a transistor and diode.
<iframe width="560" height="315" src="//www.youtube.com/embed/_3G8t-cV1d8" frameborder="0" allowfullscreen></iframe><br><br>
How to use a multimeter for advanced measurements: Part 1
<iframe width="560" height="315" src="//www.youtube.com/embed/JlZtn2PTuYo" frameborder="0" allowfullscreen></iframe><br><br>
How to use a multimeter for advanced measurements: Part 2
<iframe width="560" height="315" src="//www.youtube.com/embed/Kqa51Femytw" frameborder="0" allowfullscreen></iframe><br><br>
Electronics Tutorial #9 - Capacitors - Part 1
<iframe width="560" height="315" src="//www.youtube.com/embed/_S-kbHdduB4" frameborder="0" allowfullscreen></iframe><br><br>
Electronics Tutorial #9 - Capacitors - Part 2
<iframe width="560" height="315" src="//www.youtube.com/embed/2Ua5XrpSUn8" frameborder="0" allowfullscreen></iframe><br><br>
How to use an oscilloscope / What is an oscilloscope
<iframe width="560" height="315" src="//www.youtube.com/embed/CzY2abWCVTY" frameborder="0" allowfullscreen></iframe><br><br>
<br>
</center>James Dillonhttp://www.blogger.com/profile/00517779620333212437noreply@blogger.com