Facebook Status Via All Devices

1. Via iOS 7
2. Via BlackBerry 8800
3. Via MacOS X 10.9 Mavericks
4. Via Mỹ Phẩm Gia Nguyễn
5. Via Nội Thất Phúc Đan
6. Via Nhất Tâm Sewing
7. Via rdtech-iuh.vn

HOW TO INSTALL JUNOS FREEBSD ? – YouTube

HOW TO INSTALL JUNOS FREEBSD ? – YouTube.

HOW TO INSTALL CISCO ASDM ? – YouTube

HOW TO INSTALL CISCO ASDM ? – YouTube.

CVE-2012-4914 Cool PDF Image Stream Buffer Overflow Metasploit Demo – YouTube

CVE-2012-4914 Cool PDF Image Stream Buffer Overflow Metasploit Demo – YouTube.

VirtualBox Guest Additions on Fedora 18/17, CentOS/RHEL 6.3/5.9

This is guide, howto install Oracle VirtualBox Guest Additions on Fedora, CentOS and Red Hat (RHEL). This guide should work with Fedora 18/17/16/15/14/13/12, CentOS 6.3/6.2/6.1/6.0/5.9, Red Hat (RHEL) 6.3/6.2/6.1/6/5.9.

VirtualBox Guest Additions is special software that can be installed inside Linux virtual machines to improve performance and make integration much more seamless. Among the features provided by these VirtualBox Guest Additions are mouse pointer integration and arbitrary screen solutions (e.g. by resizing the guest window). Tiếp tục đọc

Adobe Flash CVE-2013-0634 Exploitation Demo – YouTube

Adobe Flash CVE-2013-0634 Exploitation Demo – YouTube.

CVE-2012-3485 Setuid Tunnelblick Privilege Escalation Metasploit Demo – YouTube

CVE-2012-3485 Setuid Tunnelblick Privilege Escalation Metasploit Demo – YouTube.

CVE-2013-1763 SOCK_DIAG vulnerability in Linux kernel 3.3 to 3.8 Demo – YouTube

CVE-2013-0431 Java Applet JMX Remote Code Execution Metasploit Demo – YouTube

CVE-2013-0431 Java Applet JMX Remote Code Execution Metasploit Demo – YouTube.

Hack Remote PC using Microsoft Internet Explorer exec Command Use-After-Free Vulnerability

This module exploits a vulnerability found in Microsoft Internet Explorer (MSIE). When rendering an HTML page, the CMshtmlEd object gets deleted in an unexpected manner, but the same memory is reused again later in the CMshtmlEd::Exec() function, leading to a use-after-free condition. Please note that this vulnerability has been exploited in the wild since Sep 14 2012, and there is currently no official patch for it.

Exploit Targets

Internet Explorer 7 on XP SP2

Internet Explorer 8 on Windows 7 Tiếp tục đọc