Thursday, May 28, 2020

Curbside service at Irondale Library CORRECTION

There was a mistake on our previous email...
There was a mistake on our previous email...
105 20TH STREET SOUTH IRONDALE, AL 35210

Correction: 

We are not currently receiving items owned by other libraries. At this time, we do not know when van delivery service will resume.

Only items owned by Irondale Public Library will be available for curbside service at Irondale Library.
Curbside header image

While the library building remains closed to the public, we are here and ready to offer curbside access to library materials.


Curbside Service hours:
Monday – Thursday 10:00 am – 1:00 pm and 2:00 pm – 5:30 pm,
Friday 10:00 am – 1:00 pm

Place holds online, through the library app, or by phone. You will need an active library card, in good standing, to place holds.


When you have items ready for pick-up, staff will contact you. We appreciate your patience as we navigate this new service.

What to expect:

Staff will wear face masks and gloves to gather and prepare your items for pick up.
  • It may take up to 24 hours before we can process holds for items in the Irondale Library collection. We are not currently receiving items owned by other libraries
  • Pull up to the front or side of Irondale Library. Call 205-951-1415, press 1 and let the staff know you've arrived
  • Remain in your car while we bring out your bagged items to the pick-up table
  • Once your bag is on the pick-up table, you may exit your car and pick up your bag. Your receipt is in the bag

Now accepting returns!

We are accepting library materials that belong to any public library in Jefferson County.

Return items to the labeled bin, inside the double doors at the front of the library. There will be signs. 

This week only, until Friday, items may be returned  10:00 am – 4:00pm
Beginning June 1, the hours will be:
  • Monday – Thursday 10:00am – 5:30pm and 
  • Friday 10:00 am – 1:00pm
Returned items will be quarantined for up-to 7 days before being checked-in.
They will stay on your account until they are checked-in. No fines will be assessed during this time.
Staff are not allowed to accept returned items handed directly to them. Library returns may be placed in the designated plastic bin inside the double doors at the front of the library. There will be signs.

If you need us:

Staff are available by phone and email. 205-951-1415 and Librarian@IrondaleLibrary.org
Monday - Thursday, 9:30 - 5:30 and Friday, 9:30 - 1:00pm
powered by emma

Curbside service at Irondale Library

beginning June 1.
beginning June 1.
105 20TH STREET SOUTH IRONDALE, AL 35210
Curbside header image

While the library building remains closed to the public, we are here and ready to offer curbside access to library materials.


Curbside Service hours:
Monday – Thursday 10:00 am – 1:00 pm and 2:00 pm – 5:30pm,
Friday 10:00 am – 1:00 pm

Place holds online, through the library app, or by phone. You will need an active library card, in good standing, to place holds.

When you have items ready for pick-up, staff will contact you. We appreciate your patience as we navigate this new service.

What to expect:

Staff will wear face masks and gloves to gather and prepare your items for pick up.
  • It may take up to 24 hours before we can process holds for items in the Irondale Library collection, and several days to recieve items owned by other libraries
  • Pull up to the front or side of Irondale Library. Call 205-951-1415, press 1 and let the staff know you've arrived
  • Remain in your car while we bring out your bagged items to the pick-up table
  • Once your bag is on the pick-up table, you may exit your car and pick up your bag. Your receipt is in the bag

Now accepting returns!

We are accepting library materials that belong to any public library in Jefferson County.

Return items to the labeled bin, inside the double doors at the front of the library. There will be signs. 

This week only, until Friday, items may be returned  10:00 am – 4:00pm
Beginning June 1, the hours will be:
  • Monday – Thursday 10:00am – 5:30pm and 
  • Friday 10:00 am – 1:00pm
Returned items will be quarantined for up-to 7 days before being checked-in.
They will stay on your account until they are checked-in. No fines will be assessed during this time.
Staff are not allowed to accept returned items handed directly to them. Library returns may be placed in the designated plastic bin inside the double doors at the front of the library. There will be signs.

If you need us:

Staff are available by phone and email. 205-951-1415 and Librarian@IrondaleLibrary.org
Monday - Thursday, 9:30 - 5:30 and Friday, 9:30 - 1:00pm
powered by emma

Sunday, May 24, 2020

Your opérating systém has béen hackéd by cybércriminals. Changé thé authorization méthod.

Héllo!

I'm a programmér who crackéd your émail account and dévicé about half yéar ago.
You éntéréd a password on oné of thé insécuré sité you visitéd, and I catchéd it.

Of coursé you can will changé your password, or alréady madé it.
But it doésn't mattér, my rat softwaré updaté it évéry timé.

Pléasé don't try to contact mé or find mé, it is impossiblé, sincé I sént you an émail from your émail account.

Through your é-mail, I uploadéd malicious codé to your Opération Systém.
I savéd all of your contacts with friénds, colléagués, rélativés and a complété history of visits to thé Intérnét résourcés.
Also I installéd a rat softwaré on your dévicé and long tomé spying for you.

You aré not my only victim, I usually lock dévicés and ask for a ransom.
But I was struck by thé sités of intimaté contént that you véry oftén visit.

I am in shock of your réach fantasiés! Wow! I'vé névér séén anything liké this!
I did not évén know that SUCH contént could bé so éxciting!

So, whén you had marturbate on intimé sités (you know what I méan!)
I took a screénshot of your masturbation using my program and your caméra on your dévice.
Aftér that, I jointéd thém to thé contént of thé curréntly viéwéd sité.

Will bé funny whén I sénd thésé photos to your contacts! And if your rélativés séé it?
BUT I'm suré you don't want it. I définitély would not want to ...

I will not do this if you pay mé a littlé amount.
I think $927 is a nicé pricé for it!

I accépt only Bitcoins.
My BTC wallét: 16KfJgmrHrKWS54EjTzgYa3cTmHM8QGHyw

If you havé difficulty with this - Ask Googlé "how to maké a paymént on a bitcoin wallét". It's éasy.
Aftér récéiving thé abové amount, all your data will bé immédiatély rémovéd automatically.
My virus will also will bé déstroy itsélf from your opérating systém.

My Trojan havé auto alért, aftér this émail is lookéd, I will bé know it!

You havé 2 days (48 hours) for maké a paymént.
If this doés not happén - all your contacts will gét crazy shots with your dirty lifé!
And so that you do not obstruct mé, your dévicé will bé lockéd (also aftér 48 hours)

Do not také this frivolously! This is thé last warning!
Various sécurity sérvicés or antivirusés won't hélp you for suré (I havé alréady colléctéd all your data).

Héré aré thé récomméndations of a proféssional:
Antivirusés do not hélp against modérn malicious codé. Just do not éntér your passwords on unsafé sités!

I hopé you will bé prudént.
Byé.

Friday, May 22, 2020

TYPES OF HACKING

Types of hacking?
We can segregate hacking into different categories, based on what being hacked. Here is a set of examples-

1-Website Hacking- Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.

2-Network Hacking-Hacking a network means gathering information about a network by using tool like Telnet, Nslookup, Ping, Tracert, Netstat etc with the intent to harm the network system and hamper its operation.

3-Email Hacking-It includes getting unauthorized access on an Email account and using it without taking the permission of the owner.

4-Ethical Hacking-It involves finding weakness in a computer or network system for testing purpose and finally getting them fixed.

5-Password Hacking-This is the process of recovering secret password from data that has been stored in or transmitted by a computer system.

6-Computer Hacking-This is the process of stealing computer ID & Passwords by applying hacking methods and getting unauthorized access to a computer system.

More information


  1. Hacking Course
  2. Hacking Virus
  3. Libro Hacking Etico
  4. Sean Ellis Hacking Growth
  5. Programas Para Hackear
  6. Hacking Net

Thursday, May 21, 2020

DEFINATION OF HACKING

DEFINATION OF HACKING

Hacking is an attempt to exploit a  computer system vulnerabilities or a private network inside a computer to gain unauthorized acess.
Hacking is identifying and exploiting weakness in computer system and/ or computer networks for finding the vulnerability and loopholes.
Related posts

ShellShock Payload Sample Linux.Bashlet



Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:

File: fu4k_2485040231A35B7A465361FAF92A512D
Size: 152
MD5: 2485040231A35B7A465361FAF92A512


VIrustotal

SHA256: e74b2ed6b8b005d6c2eea4c761a2565cde9aab81d5005ed86f45ebf5089add81
File name: trzA114.tmp
Detection ratio: 22 / 55
Analysis date: 2014-10-02 05:12:29 UTC ( 6 hours, 50 minutes ago )
Antivirus Result Update
Ad-Aware Linux.Backdoor.H 20141002
Avast ELF:Shellshock-A [Expl] 20141002
Avira Linux/Small.152.A 20141002
BitDefender Linux.Backdoor.H 20141002
DrWeb Linux.BackDoor.Shellshock.2 20141002
ESET-NOD32 Linux/Agent.AB 20141002
Emsisoft Linux.Backdoor.H (B) 20141002
F-Secure Linux.Backdoor.H 20141001
Fortinet Linux/Small.CU!tr 20141002
GData Linux.Backdoor.H 20141002
Ikarus Backdoor.Linux.Small 20141002
K7AntiVirus Trojan ( 0001140e1 ) 20141001
K7GW Trojan ( 0001140e1 ) 20141001
Kaspersky Backdoor.Linux.Small.cu 20141001
MicroWorld-eScan Linux.Backdoor.H 20141002
Qihoo-360 Trojan.Generic 20141002
Sophos Linux/Bdoor-BGG 20141002
Symantec Linux.Bashlet 20141002
Tencent Win32.Trojan.Gen.Vdat 20141002
TrendMicro ELF_BASHLET.A 20141002
TrendMicro-HouseCall ELF_BASHLET.A 20141002
nProtect Linux.Backdoor.H 20141001
More articles
  1. Nfc Hacking
  2. Escuela De Hacking
  3. Hacking Social
  4. Hacking Etico Que Es
  5. Computer Hacking
  6. Hacking Con Buscadores Pdf
  7. Raspberry Pi Hacking
  8. Chema Alonso Wikipedia
  9. Phishing Hacking
  10. Hacking Quotes

The OWASP Foundation Has Selected The Technical Writer For Google Season Of Docs

The OWASP Foundation has selected the technical writer for Google Season of Docs by Fabio Cerullo


The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.

During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.

The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.

After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.

Congratulations to Nirojan Selvanathan!

Please refer to the linked document where you could look at the deliverables and work execution plan.



Related links
  1. Best Hacking Books
  2. Que Es Un Hacker
  3. Funnel Hacking Live
  4. Curso Hacking Gratis
  5. Certificacion Ethical Hacking
  6. Sean Ellis Growth Hacking
  7. Hacking Tools

Linux Command Line Hackery Series - Part 5



Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control processes on our Linux box, so wrap your sleeves up and let's get started.

Command:    ps
Syntax:           ps [options]
Description:  ps displays information about the currently running processes. Some of the common flags of ps are described briefly below
Flags: 
  -A or -e -> select all processes
  -a -> select all processes except both session leaders and processes not associated with a terminal.
  T -> select all processes associated with current terminal
  -u <username or id> -> select all processes of a given user or userlist

Open up a terminal and type ps:

ps

what you'll see is a list of processes currently running in your terminal. One important thing to notice in the output is what's called as PID which stands for process ID. It is the number that uniquely identifies a process. Just keep that PID concept in mind we'll use it soon.

OK I know that's not really what you want to see rather you want to see all the processes that are currently running on your box. Don't worry we have flags to rescue, in order to see all the processes you can use the -e flag like this:

ps -e

Boom! you get a long list of processes currently running on your machine (don't stare at me like that, you asked and I gave you that). If you want to see processes of a particular user you can type the following command in your terminal:

ps -u bob

here "bob" is a username. This command will list all processes of the user with effective user name of bob.

You can do a full-format listing of the processes using the -f flag like this:

ps -fu bob

But the output of the ps command is a snapshot not really a live preview of what is going on in your box. I know your next question is going to be something like this, Isn't there a command in Linux that gives me a live updating information of the processes? Yes, there is a command called top that we'll learn about next.

Command:    top
Syntax:           top [options]
Description:  top gives a dynamic real-time view of a running system. That is, it gives the up-to-date information about all the processes running on your Linux box (sounds fun!). Besides giving information about current processes and threads top also provides a brief system summary.

To start top just type this command:

top

and you'll get a nice and cute looking ugly display :). Well what the heck is going on here you might ask, right? What you get is information about what is going on with your computer. To see what more can you do with top just type <h> within the program window and you'll be given list of options that you can play with.

OK looking at what processes are going on in your box is cool but what if you want to terminate (or close) a process, is there a command line utility for that? Yes, there is and that's what we are going to look at next.

Command:   kill
Syntax:          kill [options] <pid> [...]
Description:  kill is used to send a signal to process which by default is a TERM signal meaning kill by default sends a signal of termination to process (Cruel guy). To list the available signals we can use the -l or -L flag of the kill command.


To simply terminate a process we provide kill command a PID (process ID) and it will send the TERM signal to the process. So to kill a process first we'll list the running processes and then we'll keep the PID of the process in mind that we want to terminate. After that we'll issue the kill command with the PID that we just found.

ps -ax
kill 1153

the above command will send a TERM signal to the process whose PID is 1153, as simple as that.

We can also use our already learned skills to refine the output of ps command. Say we have a xterm terminal running on our box and we want to terminate it. By using ps command all alone we'll get a long listing of all processes running on our box. But we can limit the output of ps command to just those processes that we're interested in by piping ps command with the grep command like this:

ps -ax | grep xterm

wow! that's amazing, we're able to pull out only those results from the ps command that contained xterm in them. Isn't that a cool trick? But what is that vertical bar ( ) doing in the middle, you may be thinking, right? Remember we learned about the input and output re-directors previously, the vertical bar (pipe in geeky terms) is another re-director whose task is to redirect the output of one command as input to another command. Here the pipe redirects the output of ps -ax command as input to grep command and of-course from the previous article you know that grep is used to search for a PATTERN in the given input. That means the above command searches for the xterm word in the output of ps -ax command and then displays just those lines of ps -ax command which contain xterm. Now get that PID and kill that process.

That's it for today, try these commands up on your own box and remember practice is gonna make you master the Linux command line. :)

Continue reading