Chrome install - drag + drop onto extensions window at chrome://extensions
{ | |
"created_at": "Mon May 30 07:55:10 +0000 2016", | |
"id": 737190602110963712, | |
"id_str": "737190602110963712", | |
"text": "URL shorteners. Again. Everyone with an inch of clue said these things were a bad idea from day 1. https:\/\/t.co\/R7AHg9Iltx", | |
"truncated": false, | |
"entities": { | |
"hashtags": [], | |
"symbols": [], | |
"user_mentions": [], |
Plugin multi-meta-box found running on commercial Wordpress install. First line of code in the first file (line 10 overall) is a straight forward SQLi.
Legal docs at: http://files.nikcub.com/sr/
18 Feb 2014 - BlackHat Call for Papers opens [[1][1]]
04 Apr 2014 - BlackHat call for papers closes [[1][1]]
21 May 2014 - "You don't have to be the NSA to break Tor: Deanonymizing users on a buget" appears on BlackHat schedule [[2][2]]
vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day | |
#Category: web application | |
#Type: SQL Injection | |
#Requirements: Firefox/Live HTTP Headers/ | |
#Dork: Powered by vBulletin™ Version 5.0.0 Beta (or) Use ur Brain you'll get more o_O | |
Step 1 | |
Create an Account on vBulletin forum Verify the account and Activate it |
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
Version: GnuPG/MacGPG2 v2.0.20 (Darwin) | |
Comment: GPGTools - https://gpgtools.org | |
mQMuBFJU3swRCADbRVdSEXGq7+TfRZG5N0WML4g0BJUSk92Yvm9hbLZBG4QZ90Ud | |
cr5TrM2gclOq5KL3DeSBqgX8d3o67d6fkIAAu70BObg2LcammEFUIxRPpkYgtnBr | |
MMJByXxUVE3ZX3z2Uc/8LHjYLSRJvzsVImLa85sNpNB58GVeTbqFdVYohOunsjpO | |
2vNlNK3yVBwqqi/stq+9cDexDkr4WXeBtuc0AiROF3Ar1KYeRyGB8nzXQfOFxr8q | |
xe7KQ89Sf9O8kf1ktlCNnb0MmTPPAMvM6hnWRtJuOxynM3AZyiOJqN+hod0QsN6y | |
twnLc6ZJ8jADCd0XFo0k7m3bTNHs5MiKXC+rAQChIlwunQqEXdlqUeT7xRNiseeb |
repost of my comment on Facebook here: https://www.facebook.com/lisapadilla/posts/627211503961250?comment_id=7377112&offset=0&total_comments=45
for those that don't have permission to view it.
I'll go on the record in this thread to say that I lived in the same house as Arrington for the entire time he dated Jenn. I never once saw even a hint of physical abuse, let alone rape or any of the other things that have been suggested. He broke off the relationship and she was extremely attached to him and jealous of his new relationships. I have screen shots of previous Facebook posts Jenn has made where she has aired dirty laundry. She deleted at least one of those messages. Every time I have spoken to and caught up with Mike in the past few years he has mentioned the ongoing problem he has with her. I won't go into the details of what he told me, but I will say that I am very very skeptical of the post she made. Infact, when she made the post I immediately took a screenshot of it and emailed it to mike w
go to settings > applications and paste the following javascript into your browser console or the address bar: | |
javascript:var a=document.querySelectorAll('button.revoke');for(var i=0, len=a.length; i<len; i++) { if(a[i].innerHTML=="Revoke access"){a[i].click();}; | |
that will automatically click 'revoke' for all the applications | |
not that some browsers, such as chrome, will remove the 'javascript:' part if you paste it in, just type it back in and press enter. leave the browser open for 15-20 seconds and then refresh |
<h3>Step 1</h3> | |
<p>Visit the Twitter settings page for OAuth applications by going to Settings > Applications or https://twitter.com/settings/applications</p> | |
<p>Paste the following Javascript into your browser URL bar and hit enter</p> | |
<pre>javascript:var a=document.querySelectorAll('button.revoke');for(var i=0, len=a.length; i<len; i++) { if(a[i].innerHTML=="Revoke access"){a[i].click();};</pre> | |
<p>Note: Some browsers, such as 'chrome' will remove the javascript: part of that URL when you paste it in. Just type it back in.</p> |
MEGA LIMITED TERMS OF SERVICE ("TERMS") | |
1. Welcome to MEGA. We are an Internet services provider and provide services made available at our website at https://mega.co.nz, subdomains and related sites ("website"), which enables users (depending which MEGA plan they are on), amongst other things, to encrypt by way of user controlled encryption ("UCE"), use our application programming interface ("API"), upload, store, manage, download and decrypt files, information, material and other data ("data") and give access to that data to others (all together, services). If you have questions about how to use our services or the great things you can do with Mega, see our FAQ first. | |
2. These terms are binding and apply to any use of the services and website by you and anyone that you allow to access your data or our services. By using our services or the website, you and they irrevocably agree to these terms. If you do not like these terms or don't want to be bound, you can't use our services and the website. | |
3. We can |