Jump to content

  • Log in with Facebook Log in with Twitter Log In with Steam Log In with Google Sign In
  • Create Account

DFighter

DFighter's Photo

DFighter

Member Since 28 Dec 2011
OFFLINE Last Active Private
****-

amature makes a firework show by himself

05 January 2017 - 10:03 AM


WikiLeaks vows to ‘blow you away’ in 2017 ‘showdown

03 January 2017 - 06:21 AM

Attached File  586ba1ecc46188e63d8b45a0.jpg   64.73KB   2 downloads
 

WikiLeaks has promised 2017 will be an even bigger year for leaks than 2016, which saw the whistleblowing site publish thousands of documents exposing US political secrets, covert trade deals and private communications from global leaders.
“If you thought 2016 was a big WikiLeaks year, 2017 will blow you away,” WikiLeaks tweeted on Monday, giving no hints as to what may be in store.
 
The tweet also included a link to its website’s donation page so people can help the site “prepare for the showdown.”

t proved a very busy 2016 for the whistleblowing site, as it delivered a massive trove of documents over the 12-month period.
 
This included more than 50,000 emails from Hillary Clinton’s campaign chair JohnPodesta and more than 27,000 emails from the Democratic National Committee, which confirmed the DNC worked against Democratic presidential candidate Bernie Sanders, favoring Clinton.

More US State Department cables were released, as well as documents which gave an insight into the US arming of Yemen. Text from the Transatlantic Trade and Investment Partnership (TTIP) and Trade in Services Agreement (TiSA) was also revealed.
 
The emails relating to the US election rocked the Democratic establishment and delivered a blow to the Clinton campaign in the lead-up to the November election.
WikiLeaks also confirmed that founder Julian Assange will take part in a Reddit Ask Me Anything (AMA) on Thursday at 14:00 GMT (9am EST). The tweet announcing the AMA contained the hashtag ‘proofoflife’, presumably referencing concerns raised by some for the WikiLeaks editor’s wellbeing.

Source + tweets: https://www.rt.com/n...showdown-leaks/

 


Spectacular first meteor shower of 2017 to light up Northern Hemisphere

03 January 2017 - 06:19 AM

Attached File  586b96e3c46188ec378b4578.jpg   106.38KB   2 downloads
 

The New Year’s fireworks aren’t over yet as the first major meteor shower of 2017 looks set to light up the night sky in North America and Asia. Taking place over January 3 and 4, the Quadrantid shower could see more than 100 shooting stars per hour.
Originating near the North Star, the shower will be visible mainly in the Northern Hemisphere, with North America expected to be able to view it early on January 3 and Asia late on January 4, according to NASA.



Stargazers will have to stay glued to the skies though, as the time of the estimated one-hour shower cannot be pinpointed. Unfortunately for those in Europe, there’s unlikely to be much of a show as the shower is expected to occur during daylight hours.The shower occurs every year when the Earth passes through a tail of rubble, following a small solar system body called 2003 EH1 – the remnants of a shattered comet which, for a brief period, intersects Earth’s orbit.
Earth moves through the shower at a perpendicular angle, meaning the spectacle lasts only a short period, with the peak usually taking little more than an hour.

erfect conditions are expected for this year’s shower, with the moon’s partial illumination at present keeping the sky sufficiently dark.
Despite its reputation for putting on a great show, the shower isn’t as widely viewed as others, due in part to it taking place in January, when much of the Northern Hemisphere is in the depths of winter.
“Extra motivation to go out and view the Quadrantid is provided by the showers reputation of producing spectacular fireballs,” according to Brian Day from NASA’s Ames Research Center.

Quadrantid actually emerges from the constellation Bootes, despite its name. When first discovered the shower was named after the obsolete constellation Quadrans Muralis, which was removed in 1922 when the International Astronomical Union adopted the modern list of 88 recognized constellations.

source: https://www.rt.com/v...or-shower-2017/


Even amateurs can hack online bookings, get free flights – cybersecurity expert

28 December 2016 - 09:59 AM

Attached File  5863aaf8c4618829028b45c9.jpg   114.1KB   4 downloads
 

Almost anyone with basic computer skills can change online bookings and steal flights, German cyber experts warned after a remarkable hacking experiment. The issue lies with booking systems being too archaic, they said.
Online booking often provides more convenience for passengers, but ageing computer systems used for the purpose are vulnerable to fairly primitive hacks, according to German cyber security experts.
 
Flight bookings worldwide are managed by the so-called Global Distributed Systems (GDS) that connect travel agencies, online booking websites, airlines and passengers. Amadeus, Sabre, and Travelport, the three largest GDS networks, administer more than 90 percent of the bookings as well as numerous hotel, car, and other travel reservations, according to Security Research Labs (SR Labs), a Berlin-based hacking research collective.
Karsten Nohl, founder and head of SR Labs, told the Sueddeutsche Zeitung newspaper and broadcaster WDR that intruders are able to hack into six-character booking codes used by customers for identification, online check-in and selecting seats. 
 
In a hacking experiment, Nohl demonstrated a computer program cracking the six-letter booking codes within minutes. He said breaking the codes is easy as they use only capital letters and digits. Hackers can employ the code to gain access to the actual passenger’s account and change the departure time and email address.
“Today’s GDSs go back to the ‘70s and ‘80s, built around mainframe computers and leased lines. The systems have since been interwoven with web services, but still lack several web security best practices,” the SR Labs website wrote. 
 
“The way 6-digit booking codes are chosen makes them weaker than a 5-digit password (<28.5 bits), which would be considered insecure for most applications.”
Online check-ins and the EU’s visa-free Schengen zone mean that most European passengers do not have to show their IDs at airports while traveling in the bloc. Changing departure time and email address increases the possibility that the actual passenger would know nothing of his data breach.
 
“Everyone can really manage to do it,” Nohl told Sueddeutsche Zeitung, claiming that it does not require advanced hacking skills. “Booking systems lack a security feature that we know from all other computer systems – the password,” he stressed.
Nohl said that nothing happens if the hacker-generated booking code is wrong. Modern websites and computer systems actually limit the number of attempts to try a code from a single IP address, but archaic systems operated by many airlines have no such limit. “This is an industry-wide problem,” he asserted.

 

Speaking to RT, Nohl said the security flaws “open doors to both privacy intrusion and fraud,” adding that passengers’ private data is secured with just a six-digit code printed on many pieces of paper “you probably throw away at the airport.”
“Plenty of people can access this information that you would consider private. The ultimate goal here would be to introduce passwords, just like any other internet service requires a password. But many companies, hundreds of companies would have to agree on how to do that and this would take a few years,” he said.
 
It is not the first time passengers’ privacy has been exposed as vulnerable to security flaws. In August, Sueddeutsche Zeitung said the names, credit card numbers and flight data belonging to millions of airline passengers in Europe could be accessed due to online security gaps revealed at Germany’s largest wholesale ticket 
The newspaper report said every link to an itinerary receipt – distributed by wholesale dealer Aerticket –ended with an eight-digit number, but the company’s failure was that the documents were not secure.
 
The digits at the end of each link could be changed manually by anyone, allowing the possibility of a user to jump to other travelers’ tickets, invoices, routes and credit card numbers.
While other online booking websites use randomly-generated codes that include both digits and letters, that was not the case at Aerticket, the newspaper reported. Aerticket reportedly eliminated the vulnerability within hours of the newspaper report.

Source:https://www.rt.com/n...-security-gaps/

UJE The Ghetto Xmas - Enemy Territory Map

20 December 2016 - 08:32 AM

File Name: UJE The Ghetto Xmas

File Submitter: DFighter

File Submitted: 20 Dec 2016

File Category: Maps


Description
Allied:
"The Axis have launched an attack on the ghetto. Our Ganghouse is comprimised. Hold the line and keep them out of the ghetto. Our fall back position is in the ghetto."
Axis:
"Retake the ghetto and repair the tank awaiting you there. Use it to break into Ganghouse and steal their combat maps. Escape by helicopter."
Neutral:
"The Allies have control of the ghetto and have set up a Ganghouse in the ghetto. The Axis are trying to regain control of the ghetto and get to a broken down tank, break into Ganghouse, and steal theire combat maps." Objectives
Allied objectives

 

1 "Primary Objective:
Defend the Ghetto."
2 "Primary Objective:
Prevent the Axis from repairing the tank."
3 "Primary Objective:
Stop the tank from Getting into the Ganghouse."
4 "Primary Objective:
Don't let them break into Ganghouse."
5 "Primary Objective:
Protect the Combat maps."
6 "Primary Objective:
Do not let the Axis get away with our Combat maps."
7 "Secondary Objective:
Establish a Command Post inside the Ghetto building."
8 "Secondary Objective:
Prevent the Axis from fortifying their position with a Command Post."
Axis objectives

 

1 "Primary Objective:
Take control of the Ghetto."
2 "Primary Objective:
Repair the tank."
3 "Primary Objective:
Escort the tank to the Ganghouse."
4 "Primary Objective:
Break into the Allied Ganghouse."
5 "Primary Objective:
Steal the Combat maps."
6 "Primary Objective:
Escape with the Combat maps."
7 "Secondary Objective:
Prevent the Allies from establishing a Command Post."
8 "Secondary Objective:
Set up a Command Post inside the town h


Click here to download this file