2. yılında Efes Pilsen Blog 2. blog yazarını arıyor!

  • Eğlenceli biri misin?
  • Kısa, net, ilgi çekici yazılar yazabilir misin?
  • Farklı bir bakış açın, kendine has bir üslubun var mı?
  • Bir partiyi, oraya gidenlerden farklı anlatırım mı diyorsun?
  • Türkçe’ye hakimsin, yazım hatası yapmaz, dilbilgisi kurallarına dikkat edersin.
  • Bir blog için neyin ‘haber değeri’ taşıyabileceğine dair hem öngörün hem de içgüdün var mı?

  • ‘Konsere gitmek yetmez, ahh bir de backstage’e girsem’ mi diyorsun?
  • ‘Tanışsaydım, kimsenin aklına gelmeyecek 10 soru sorardım’ dediğin sporcular mı var?
  • Bir fabrikadaki üretim sürecini, tüketici gözünden incelemek seni heyecanlandırıyor mu?
  • ‘Festivalde coşmak yetmez, ışık düzeni kurulurken kablo da taşımak lazım’ mı diyorsun?

O halde, Efes Pilsen Blog’un yazarı olmak için hemen kolları sıva!

Bize son katıldığın parti, konser, spor müsabakası ya da benzeri bir etkinlikle ilgili bir yazı yazıp, hemen gönder.

Yazını blogumuzda, yarışmaya özel kategoride yayınlayalım. En çok okunan 5 yazardan birisi ol, seni One Love Festival’e misafir blog yazarımız olarak götürelim!

One Love Festival sonrası, en şahsına münhasır, markaya yakışır yazıyı yazan yeni Efes Pilsen Blog yazarı oluyor!

http://www.omercakir.com/efes-pilsen-2-blog-yazarini-ariyor.html

The T50 v5.3 includes:

  1. New License: It is, finally, licensed under GPL Version 2.0. Please, refer to LICENSE document for further information.
  2. CIDR Support: Classless Inter-Domain Routing support for destination IP address, using a really tiny Calgorithm. This would allow the T50 v5.3 to simulate DDoS in a laboratory environment.

      001 netmask = ~(all_bits_on>>cidr);
      002 hostid = (int)(pow(2,(32-cidr))-2);
      003 __1st_host = (ntohl(addr)&netmask)+1;
      004 __lst_host = (ntohl(addr)&netmask)+hostid;

  3. ELEVEN NEW Protocols: ELEVEN (11) more protocols supported by T50 v5.3 (IGMPv3, EGP, DCCP, RSVP, RIPv1, RIPv2, GRE, ESP, AH, EIGRP and OSPF).
  4. Exotic Protocols: Advanced options and protocol crafting for RSVP, EIGRP, OSPF and GRE were added, allowing users to make any combination while using those exotic protocols. By the way, EIGRP is a proprietary protocol developed by CISCO Systems, Inc.
  5. TCP Options Support: TCP Options (MSS, NOP, EOL, WSCALE, TSTAMP, T/TCP CC, SACK, MD5 and TCP-AO) are supported to improve the TCP protocol.

download t50 http://www.4shared.com/file/Zja31l82/t50-245r-H2HC.html

[videolog 614528]

http://www.omercakir.com/kaybedenler-kulubu-22-mart-2011-itu-sozluk-radio-yayini.html


İtü Sözlük Radio ‘da 22 Mart 2011 gecesi yapılan yayında, Kaan Çaydamlı/Mete Avunduk ikilisi Kaybedenler Kulübü ‘nün filminde kendilerini canlandıran Nejat İşler/Yiğit Özşener ‘i konuk ettiler viskilerin ve votkaların Read the rest of this entry »

Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend.

In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway.

The goal is to man in the middle traffic for testing purposes. The ideal setup for Mallory is to have a “LAN” or “Victim” network that Mallory acts as the gateway for. This can be configured within a virtal machine environment using host only network interfaces. The victim virtual machines then configures the Mallory machine as the gateway by manually setting its gateway. The gateway machine will have at least one WAN interface that grants Internet access. The victim network then uses the Mallory gateway to route traffic.

Folder Structure

* ca – certificate authority files including Mallory’s private key
* certs – MiTM certs that are created on the fly
* db – directory where mallory stores all database files
* mallory – empty directory
* src – where the code lives
* scripts – scripts used to configure mallory enviorment

You can download Mallory here:

mallory-tip.tar.gz

http://intrepidusgroup.com/insight/mallory/

1. Dont assume anything. Make some time to learn about securing your system.

2. Acquire and use a reliable antivirus program. Select an antivirus that has a consistent track record. Checkmark, AV-Test.org and TuV are among the most respected independent testers of antivirus software.

3. Acquire and use a reliable firewall solution. Again, independent reviewers are your best bet for reasonable choices. Some operating systems come with a firewall which only filters incoming traffic. Use a firewall that can control both incoming and outgoing Internet traffic.

4. Do not open e-mails coming from unknown or distrusted sources. Many viruses spread via e-mail messages so please ask for a confirmation from the sender if you are in any doubt.

5. Do not open the attachments of messages with a suspicious or unexpected subject. If you want to open them, first save them to your hard disk and scan them with an updated antivirus program.

6. Delete any chain e-mails or unwanted messages. Do not forward them or reply to their senders. This kind of messages is considered spam, because it is undesired and unsolicited and it overloads the Internet traffic.

7. Avoid installing services and applications which are not needed in day-by-day operations in a desktop role, such as file transfer and file sharing servers, remote desktop servers and the like. Such programs are potential hazards, and should not be installed if not absolutely necessary.

8. Update your system and applications as often as possible. Some operating systems and applications can be set to update automatically. Make full use of this facility. Failure to patch your system often enough may leave it vulnerable to threats for which fixes already exist.

9. Do not copy any file if you don’t know or don’t trust its source. Check the source (provenance) of files you download and make sure that an antivirus program has already verified the files at their source.

10. Make backups of important personal files (correspondence, documents, pictures and such) on a regular basis. Store these copies on removable media such as CD or DVD. Keep your archive in a different location than the one your computer is in.

İnternet kullanıcılarının bu yıl boyunca Google’da yaptığı milyarlarca aramayı topluca ele alan Zeitgeist, 2010 yılının ruhunu yakalıyor.

http://www.google.com.tr/intl/tr/press/zeitgeist2010/