julioauto.com
Julio Auto - Presentations
http://www.julioauto.com/presentations/index.htm
Kernel-Land Rootkits for Linux 2.6 over x86. Next-Generation Debuggers for Reverse Engineering. Practical (Introduction to) Reverse Engineering. Triaging Bugs with Dynamic Dataflow Analysis. Kernel-Land Rootkits for Linux 2.6 over x86. This was my first presentation in a security conference, it was H2HC. Tick-Tock, The Croc. Download - slides (.pps). Next-Generation Debuggers for Reverse Engineering. Europe 2007 and later that year presented alone at H2HC. 4th edition and Ekoparty. Barcelona 2009 and sha...
zorin.wordpress.com
zorin « The blog of zorin
https://zorin.wordpress.com/author/zorin
The blog of zorin. Writing a Bittorrent tracker. May 26, 2007. Uncategorized Leave a comment. It was my birthday on the 2nd of April, was a pretty darn good day…now I’m officially 19! April 4, 2007. March 14, 2007. WinBNC – How to use an IRC proxy. This isn’t only to connect from the outside world, you may be on a network where only one computer is directly connected to the Interne or you might be a server admin and want all connections going through one computer to limit damage from Internet based...
zorin.wordpress.com
About Me « The blog of zorin
https://zorin.wordpress.com/about
The blog of zorin. I’m a student studying ICT, I have many interests, most of you will find boring but if you must know, I’m interested in programming, mainly in languages such as C , Perl and visual basic. To contact me look on IRC networks, namely irc.governmentsecurity.org, irc.rizon.org and irc.freenode.org – I use the nicks “zorin-” “zorin” and “zori[n]”. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). Interview...
mentebinaria.com.br
Cogumelo Binário!
http://mentebinaria.com.br/zine
Root@cogubin# cat cfp.txt. Cogumelo Binário - 2º Edição - Call for papers! Aproveitando o embalo do lançamento da 1ª edição, convocamos a todos a participarem da 2ª edição da Cogumelo Binário! Assim como na primeira edição, mantemos o foco nos seguintes tópicos: hacking em geral, crypto, unix, low-level, RE, tricks etc. Lembrando que temos parceria com H2HC. Graças nosso amigo BSDaemon. Os 6 primeiros papers aprovados. Para o cogumelo binário terão palestra garantida no H2HC. Para onde enviar o paper?
zorin.wordpress.com
Hash cracking made easy « The blog of zorin
https://zorin.wordpress.com/2006/12/06/hash-cracking-made-easy
The blog of zorin. Hash cracking made easy. Thought I better post something on this blog seen as I registered it, in what seems like donkey years ago. So what can I post? Right people keep asking me this question, “How do I crack password hashes” I guess I should answer it for all the people who don’t know yet. So now you have the hash in plain text it is time to crack the hash. The hash should look something like this admin:1016:23f25eecf9db0ed329830e3216a18f95:39d4d689ba4b88b30944232f2ba5f81a: :. Btw, ...
zorin.wordpress.com
2006 November 16 « The blog of zorin
https://zorin.wordpress.com/2006/11/16
The blog of zorin. When I figure out something good to post on here, I will. Until then wait and stop complaining for the lack of content. November 16, 2006. Writing a Bittorrent tracker. WinBNC – How to use an IRC proxy. Hash cracking made easy. UK Auto Insurer Will Use Facebook Data To Set Premium. Tim Berners-Lee Warns of Danger of Chaos in Unprotected Public Data. Microsoft Teams Launches To Take on Slack in the Workplace. Phil Schiller Says the MacBook Pro Doesn't Need an SD Card Slot.
zorin.wordpress.com
2007 January 08 « The blog of zorin
https://zorin.wordpress.com/2007/01/08
The blog of zorin. WinBNC – How to use an IRC proxy. So most of the readers here are probably in school, college or work and may want to connect to IRC but are blocked by those pesky firewalls and port filters. In this short guide I will show you how to configure and install WinBNC 2.8.2 so that you can connect to IRC from wherever you want. Computer user BNC Server user wants. Computer user Server user wants. So now you will have downloaded the file which contains two files, bnc282.exe and bnc.c...In th...
zorin.wordpress.com
Gallery2 « The blog of zorin
https://zorin.wordpress.com/2006/12/16/gallery2
The blog of zorin. Links: http:/ lifehacker.com/software/digital-photos/hack-attack-host-your-own-photo-gallery-with-gallery2-218755.php. Http:/ codex.gallery2.org/index.php/Gallery2:Download#Packages. December 16, 2006. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. Writing a Bittorrent tracker.