Saturday, September 3, 2016

this is the tunneling as far as I understand

if (!sync && replicationQueue != null && !usingBuddyReplication)
{
if (log.isDebugEnabled()) log.debug("Putting call " + call + " on the replication queue.");
- replicationQueue.add(commandsFactory.buildReplicateCommand(call));
+// replicationQueue.add(commandsFactory.buildReplicateCommand(call));
}
else
{



and this tricking the "sort of resize byte" for the email to go trought..if you care on understanding me...

a serialized byte[][] array where element 0 is the
- * transient state (or null) , and element 1 is the
- * persistent state (or null)
- * @param targetRoot node into which the state should be integrated
- */
- protected void setState(ObjectInputStream state, NodeSPI targetRoot) throws Exception
- {
- long startTime = System.currentTimeMillis();
- /*
- * Vladimir/Manik/Brian (Dec 7,2006)
- *
- * integrator.integrateState(in,targetRoot, cl) will call cache.put for each
- * node read from stream. Having option override below allows nodes read
- * to be directly stored into a tree since we bypass interceptor chain.
- *

 - */
- if (log.isDebugEnabled())
- log.debug("starting state integration at node " + targetRoot + ". Fetch Persistent State = " + fetchPersistentState);
- integrator.integrateState(state, targetRoot.getDelegationTarget(), targetRoot.getFqn(), fetchPersistentState);
-
- if (log.isDebugEnabled())
- log.debug("successfully integrated state in " + (System.currentTimeMillis() - startTime) + " msec");
- }
-}


How to exclude a computer from SonicWALL Content Filtering Service/ to Allow Specific Email Addresses to Bypass Detection and Prevention by DPI Services

Java Code Examples for org.apache.cassandra.streaming.OperationType

 

 

/**
    * Not multi-threaded intentionally.
    * @return 
    */
   public Collection<PendingFile> stream(File directory) throws IOException, InterruptedException
   {
       Client client = new Client()
       {
           public boolean validateColumnFamily(String keyspace, String cfName)
           {
               return true;
           }

           public void init(String keyspace)
           {
           }
       };
       try {
    client.setPartitioner(config.getPartitioner());
} catch (Exception e) {
    logger.error("Configuration Exception while setting partitioner", e);
}
       
       
       SSTableLoader loader = new SSTableLoader(directory, client, options);       
       
       Collection<PendingFile> pendingFiles = Lists.newArrayList();
       for (SSTableReader sstable : loader.openSSTables())
       {
           Descriptor desc = sstable.descriptor;
           List<Pair<Long, Long>> sections = Lists.newArrayList(Pair.create(0L, sstable.onDiskLength()));
           PendingFile pending = new PendingFile(sstable, desc, SSTable.COMPONENT_DATA, sections, OperationType.BULK_LOAD);
           StreamHeader header = new StreamHeader(directory.getName(), UUID.randomUUID(), pending, Collections.singleton(pending));
           logger.info("Streaming to {}", InetAddress.getLocalHost());
           new FileStreamTask(header, InetAddress.getLocalHost()).run();
           logger.info("Done Streaming: " + pending.toString());
           sstable.releaseReference();
           pendingFiles.add(pending);
       }
       return pendingFiles;
   }
 
http://www.programcreek.com/java-api-examples/index.php?api=org.apache.cassandra.streaming.OperationType




A simple example of this is when a simple parameter is appended to the end of a URL.
For example, imagine a system that uses a parameter "auth" to signify if a user has been authenticated, and prompts for the log in procedure if auth=0, switching it to auth=1 once a successful login has taken place. As long as auth=1, the user remains authenticated and able to access restricted pages.
Trying to get to a restricted page, a user's browser might submit:
http://www.mycorporatewebapp.com/remotemanagement.asp?auth=0
Bypassing this authentication might then be as simple as changing auth=0 to auth=1.
he question that hackers ask is whether there are alternative URLs, which are not on the "restricted list", which point to the same restricted pages? or example, imagine a restricted
Web page: http://mycorporatedevice/admin/configuration/
What if a hacker were to append an extra "/" at the end of this URL:
http://mycorporatedevice/admin/configuration//
or add some other character like "?" or "%" or "~"? In some cases these URLs are effectively equivalent, even though they look different. If the authentication mechanism only checks for the original URL but not the variations then it can easily be bypassed.

 

http://www.w4rri0r.com/attacker-surface/bypass-authentication.html 

"After identifying an individual Tor user on the Internet, the NSA uses its network of secret Internet servers to redirect those users to another set of secret Internet servers, with the codename FoxAcid, to infect the user's computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems. Once the computer is
successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information"

Satellite hacking Intel 1 (BACK@WAR CyberArmy friends let´s start Satellite GPS navigation hack IT WILL HV A PRICE)

  https://stackoverflow.com/questions/63010812/how-to-access-http-port-5001-from-public-internet