Tuesday, September 6, 2016
Monday, September 5, 2016
"Smart" windows (electrochromic glass) - The optic electronics device is:
electrochromic glass ("smart" glass), which changes from light to
dark (clear to opaque) and back again, at the push of a button
http://www.explainthatstuff.com/electrochromic-windows.html
http://www.explainthatstuff.com/electrochromic-windows.html
Thermal/optical camouflage with controlled heat emission....20 yellow cakes ready to use
PATENT : http://www.google.com/patents/US4560595
WITCH IS BASICLY THIS...HOWEVER STILL WITH OPTIC-ELECTRONICS..RADIANT BARRIER
http://www.radiantbarrier.com/plus-insulation.htm
WITCH IS BASICLY THIS...HOWEVER STILL WITH OPTIC-ELECTRONICS..RADIANT BARRIER
http://www.radiantbarrier.com/plus-insulation.htm
welcome back to war! Good morning! so, again how to cover a yellow cake
from the gamma rays radar detection? I've been here making a quick
search, and something come up, why not a quartz crystal modulator??? and
how exacly can be used,,, can we skip the vaccum??? we already checked
that vaccum deposit would work...but there's some difficulty on the
right transportation for that! In this case we need to microbalance the
gamma ray frequency...
Quartz crystal microbalance
20 YELLOW CAKES READY TO USE...
I ended the computation discipline for a while, I achieved my goal, I
let you think about it! So, you're saying you have 20 yellow cakes ready
to use? And you say the botton question are in fact the gamma rays
detection; I know that! I've been trought a lot of aspects, including
the temperature, nevertheless gamma emissions cross trought cold; I've
been trough dense materials, and I defintely not overcome the lead
question, because its only possible to cover the nuke with as much dense
lead is, or to replace it, platinium, the most rare and expensive metal
that is; So, don't break our agreement, and I will find a solution.
Ok! I have a break here !!!! electronics !!! let me start by this
"If the metal is not grounded or connected to any other electron source, there will be excess positive charge accumulated on the surface which will stop further photoemission"
in that case we need an eletrostatic material...as a conductor to change the charge
https://en.wikipedia.org/wiki/Conductive_polymer
Ok! I have a break here !!!! electronics !!! let me start by this
"If the metal is not grounded or connected to any other electron source, there will be excess positive charge accumulated on the surface which will stop further photoemission"
in that case we need an eletrostatic material...as a conductor to change the charge
https://en.wikipedia.org/wiki/Conductive_polymer
Sunday, September 4, 2016
You're the top geeks on the world I'm very very proud to have you as my
friends, I said this morning to you, I know something you don't know,
but I don't remember what it is, Jesus doesn't want to me to remember
and doesn't want me to say to you right now; I'm the google cracker :) the first 4 bytes, 4 imput class on a java object must match the firewall code;
"This means making the constructor private or default access ("package-private"), or being in a package controlled by the package.access security property. Immutable classes themselves should declare fields final and protect against any mutable inputs and outputs as described in Guideline 6-2. Construction of immutable objects can be made easier by providing builders (cf. Effective Java [6])."
http://www.oracle.com/technetwork/java/seccodeguide-139067.html#6
"This means making the constructor private or default access ("package-private"), or being in a package controlled by the package.access security property. Immutable classes themselves should declare fields final and protect against any mutable inputs and outputs as described in Guideline 6-2. Construction of immutable objects can be made easier by providing builders (cf. Effective Java [6])."
http://www.oracle.com/technetwork/java/seccodeguide-139067.html#6
How can I access a private constructor of a class?
One way to bypass the restriction is to use reflections:
import java.lang.reflect.Constructor;
public class Example {
public static void main(final String[] args) throws Exception {
Constructor<Foo> constructor = Foo.class.getDeclaredConstructor(new Class[0]);
constructor.setAccessible(true);
Foo foo = constructor.newInstance(new Object[0]);
System.out.println(foo);
}
}
class Foo {
private Foo() {
// private!
}
@Override
public String toString() {
return "I'm a Foo and I'm alright!";
}
}
Cisco Crypto ACLs – Do they really need to match?
When starting out with IPsec tunnels it seems to be a common
misconception that the crypto ACL, sometimes referred to as the
encryption domain or the interesting traffic, must match 100% or be
mirrored at both peers or the tunnel won't come up. This isn't strictly
true. Whilst the ISAKMP phase 1 and IPsec phase 2 proposals must match,
the crypto ACL can be different.
Assume that at the local peer traffic to be encrypted originates from 10.0.0.0/24 and is destined for 192.168.0.0/24. The crypto ACL would be:
But what about the following?
IPsec phase 2 can still be established even though the crypto ACL
isn't mirrored at the local and remove peer. The local peer specifies
10.0.0.0/24 but the remote peer specifies 10.0.0.0/8. In this scenario
IPsec phase 2 can only be initiated from the peer that has the larger
subnet. This is true for both Cisco ASA and IOS.
And in the example above, in the local peer's ACL there's a deny ACE but none on the remote peer's ACL. In this scenario any traffic originating on the local peer from 10.0.0.0/24 destined to 192.168.0.200/32 won't traverse the tunnel. The device (ASA or IOS router) will look at the next crypto map in the sequence and try to match traffic there. If no crypto maps are found it'll flow unencrypted out of the egress interface.
Obviously be careful with mismatching subnets and using deny ACEs in the crypto ACL because you may end up with traffic trying to enter the wrong tunnel and other strange things happening.
https://0wned.it/2014/10/13/cisco-crypto-acls-do-they-really-need-to-match/
Assume that at the local peer traffic to be encrypted originates from 10.0.0.0/24 and is destined for 192.168.0.0/24. The crypto ACL would be:
Local Peer
1
|
access-list crypto_acl permit ip 10.0.0.0 255.255.255.0 192.168.0.0 255.255.255.0
|
Remote Peer
1
|
access-list crypto_acl permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.0
|
Local Peer
1
2
|
access-list crypto_acl deny ip 10.0.0.0 255.255.255.0 host 192.168.0.200
access-list crypto_acl permit ip 10.0.0.0 255.255.255.0 host 192.168.0.100
|
Remote Peer
1
|
access-list crypto_acl permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.0.0.0
|
And in the example above, in the local peer's ACL there's a deny ACE but none on the remote peer's ACL. In this scenario any traffic originating on the local peer from 10.0.0.0/24 destined to 192.168.0.200/32 won't traverse the tunnel. The device (ASA or IOS router) will look at the next crypto map in the sequence and try to match traffic there. If no crypto maps are found it'll flow unencrypted out of the egress interface.
Obviously be careful with mismatching subnets and using deny ACEs in the crypto ACL because you may end up with traffic trying to enter the wrong tunnel and other strange things happening.
https://0wned.it/2014/10/13/cisco-crypto-acls-do-they-really-need-to-match/
Saturday, September 3, 2016
this is the tunneling as far as I understand
if (!sync && replicationQueue != null && !usingBuddyReplication)
{
if (log.isDebugEnabled()) log.debug("Putting call " + call + " on the replication queue.");
- replicationQueue.add(commandsFactory.buildReplicateCommand(call));
+// replicationQueue.add(commandsFactory.buildReplicateCommand(call));
}
else
{
and this tricking the "sort of resize byte" for the email to go trought..if you care on understanding me...
a serialized byte[][] array where element 0 is the
- * transient state (or null) , and element 1 is the
- * persistent state (or null)
- * @param targetRoot node into which the state should be integrated
- */
- protected void setState(ObjectInputStream state, NodeSPI targetRoot) throws Exception
- {
- long startTime = System.currentTimeMillis();
- /*
- * Vladimir/Manik/Brian (Dec 7,2006)
- *
- * integrator.integrateState(in,targetRoot, cl) will call cache.put for each
- * node read from stream. Having option override below allows nodes read
- * to be directly stored into a tree since we bypass interceptor chain.
- *
- */
- if (log.isDebugEnabled())
- log.debug("starting state integration at node " + targetRoot + ". Fetch Persistent State = " + fetchPersistentState);
- integrator.integrateState(state, targetRoot.getDelegationTarget(), targetRoot.getFqn(), fetchPersistentState);
-
- if (log.isDebugEnabled())
- log.debug("successfully integrated state in " + (System.currentTimeMillis() - startTime) + " msec");
- }
-}
if (!sync && replicationQueue != null && !usingBuddyReplication)
{
if (log.isDebugEnabled()) log.debug("Putting call " + call + " on the replication queue.");
- replicationQueue.add(commandsFactory.buildReplicateCommand(call));
+// replicationQueue.add(commandsFactory.buildReplicateCommand(call));
}
else
{
and this tricking the "sort of resize byte" for the email to go trought..if you care on understanding me...
a serialized byte[][] array where element 0 is the
- * transient state (or null) , and element 1 is the
- * persistent state (or null)
- * @param targetRoot node into which the state should be integrated
- */
- protected void setState(ObjectInputStream state, NodeSPI targetRoot) throws Exception
- {
- long startTime = System.currentTimeMillis();
- /*
- * Vladimir/Manik/Brian (Dec 7,2006)
- *
- * integrator.integrateState(in,targetRoot, cl) will call cache.put for each
- * node read from stream. Having option override below allows nodes read
- * to be directly stored into a tree since we bypass interceptor chain.
- *
- */
- if (log.isDebugEnabled())
- log.debug("starting state integration at node " + targetRoot + ". Fetch Persistent State = " + fetchPersistentState);
- integrator.integrateState(state, targetRoot.getDelegationTarget(), targetRoot.getFqn(), fetchPersistentState);
-
- if (log.isDebugEnabled())
- log.debug("successfully integrated state in " + (System.currentTimeMillis() - startTime) + " msec");
- }
-}
How to exclude a computer from SonicWALL Content Filtering Service/ to Allow Specific Email Addresses to Bypass Detection and Prevention by DPI Services
Java Code Examples for org.apache.cassandra.streaming.OperationType
/** * Not multi-threaded intentionally. * @return */ public Collection<PendingFile> stream(File directory) throws IOException, InterruptedException { Client client = new Client() { public boolean validateColumnFamily(String keyspace, String cfName) { return true; } public void init(String keyspace) { } }; try { client.setPartitioner(config.getPartitioner()); } catch (Exception e) { logger.error("Configuration Exception while setting partitioner", e); } SSTableLoader loader = new SSTableLoader(directory, client, options); Collection<PendingFile> pendingFiles = Lists.newArrayList(); for (SSTableReader sstable : loader.openSSTables()) { Descriptor desc = sstable.descriptor; List<Pair<Long, Long>> sections = Lists.newArrayList(Pair.create(0L, sstable.onDiskLength())); PendingFile pending = new PendingFile(sstable, desc, SSTable.COMPONENT_DATA, sections, OperationType.BULK_LOAD); StreamHeader header = new StreamHeader(directory.getName(), UUID.randomUUID(), pending, Collections.singleton(pending)); logger.info("Streaming to {}", InetAddress.getLocalHost()); new FileStreamTask(header, InetAddress.getLocalHost()).run(); logger.info("Done Streaming: " + pending.toString()); sstable.releaseReference(); pendingFiles.add(pending); } return pendingFiles; }
http://www.programcreek.com/java-api-examples/index.php?api=org.apache.cassandra.streaming.OperationType
A simple example of this is when a simple parameter is appended to the end of a URL.
For example, imagine a system that uses a parameter "auth" to signify
if a user has been authenticated, and prompts for the log in procedure
if auth=0, switching it to auth=1 once a successful login has taken
place. As long as auth=1, the user remains authenticated and able to
access restricted pages.
Trying to get to a restricted page, a user's browser might submit: http://www.mycorporatewebapp.com/remotemanagement.asp?auth=0
Bypassing this authentication might then be as simple as changing auth=0 to auth=1.
he question that hackers ask is whether there are alternative URLs,
which are not on the "restricted list", which point to the same
restricted pages? or example, imagine a restricted
Web page: http://mycorporatedevice/admin/configuration/
What if a hacker were to append an extra "/" at the end of this URL:
http://mycorporatedevice/admin/configuration//
or add some other character like "?" or "%" or "~"? In some cases these
URLs are effectively equivalent, even though they look different. If
the authentication mechanism only checks for the original URL but not
the variations then it can easily be bypassed.
http://www.w4rri0r.com/attacker-surface/bypass-authentication.html
Subscribe to:
Posts (Atom)
Ambassador @EmbaixadaRusPt URGENT INTEL the guy hedge fund is stable wontget higher to convince investors until end of the day @realDonaldTrump desesperate either help friends either stay with some cents @USTreasury @POLITICOEurope @ecb @FT @WSJ @EUCouncil @DeptofDefense
https://www.mediaite.com/news/billionaire-trump-backer-bill-ackman-skewers-howard-lutnicks-glaring-conflict-of-interest-he-profits-when-ou...
