How to Obscure Any URL: How Spammers And Scammers Hide and Confuse. There are several tricks that can be used to make it nearly impossable to recognise a URL.
80c93bd618f9bacdf4e5e0332f855a589fd0810f8bb177d90735b20ddccaf233
snortlog.pl is a Perl script which looks up the hostnames of machines mentioned in a snort IDS alert and outputs the relavent information in a nice list.
98dfade3c57569947f129626d47b4be6447d590f6a3ba798295069ceb33e8950
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. This paper builds on a case study, of an anonymous auction between mistrustful principals with no trusted arbitrator, to introduce "anonymous broadcast" as a new protocol building block.
2f16d0a33c26665f4722f2e8a65ae5abe50817696ba1995bbed8c0b49e19e0bf
Lookout version 1.2 is a Windows tool which sends raw data over a tcp connection, allowing the inspection of protocols and the testing of buffers. Lookout connects to a foreign host's port and allows you to communicate with the host. Alternatively, Lookout can listen on a port and wait for another host to connect. Once connected, you can send raw data (including an option for a variable-length string) to the remote host.
a7d75136b4fc6be92ad9bf22b7354f8a741f588c62101e1a1e983cb454a03c1b
This program lets you comfigure and remove a SubSeven server, including some of its hidden features. Main purpose is changing settings that server editor and client dont allow you to alter. Works with SubSeven 2.1, 2.1b, and 2.0. Shows notification info (uin, email, irc). Archive password is set to p4ssw0rd. Use at your own risk.
6ec35e83bbd20741ab81dc899d5c3d1fa59e08a9460e8c5851a020eef261893a
Information on the removal of Subseven 2.1. Archive password is set to p4ssw0rd. Use at your own risk.
cbd376667b7ab0f1081e91a4aa0565754b4046f8e4163759027cb2f2ae0d4e26
Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
d200416a1d8428b573d8ae3049b70f3cd23118c6800d2d3134856baf9648da52
syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.
c849d92e357e7556a3bfac1ca210678d6f43965a900b2bd57cdd787bc66fcc7b