VST Plugins

Do VST Plugins contain Viruses or Malware?

The .dll file is the VST Plugin I am doing music production using Image-Line’s Fruity Loops Studio. Just like all major digital audio workstations (DAW), it is capable of loading DLL files as plugins called VST plugins (Virtual Studio Technology). We know DLL files generally contain executable code, and executable code may contain viruses and…

The golden age of Zero Day exploits 2015

The golden age of 0day exploits. I feel like back in the 90’s. #tbt — Dan Wendler (@DanFromGermany) February 5, 2015 It’s plain hilarious. Just a smart list of what’s going on at the moment. Adobe Flashplayer (01/2015) Yet another WordPress Plugin (FancyBox, 01 / 2015) As usual: Internet Explorer 11 (01 / 2015) 2…

WebRTC deanonymizing Tor / VPN / Proxy users

  Software engineer Daniel Roesler recently discovered how the WebRTC implementation in Mozilla Firefox and Chrome expose your real WAN IP to the website you visit (deanonymizing). The Tor Browser Bundle does currently block WebRTC by default (or at least the demo doesn’t work). When I use Tor through the normal Firefox / Chrome, my real IP is…

How to enable click2play in Chrome

SECURITY ALERT: There are TWO active 0days against Flash in the wild. The latest Flash update only fixes one of them. Set Flash click2play. — InfoSec Taylor Swift (@SwiftOnSecurity) January 22, 2015   A lot of malware and viruses infect your computer through browser plugins. As of today, there are two critical holes in the…

Download 1800 Minecraft Accounts

I have found the list of leaked Minecraft accounts everybody’s talking about, download the three lists here to see whether your account got hacked: http://bit.ly/1CMA9NP (1.8k) (click the first result of the search in the link) http://bit.ly/1kGCEI9 (9k) http://bit.ly/1CMCgBk (4k)   I am not responsible for the contents of the linked file, nor for what you do with it. As…

Vulnerable, insecure and slyly spying devices and software database

I’ve finally spent some spare time developing a frontend for a database which let’s you search a collection of links and descriptions to devices or software, which turned out to be vulnerable against hacking attacks, hijacking, taking harmful actions without the owner agreeing or allowing surveillance of your local area network. Only a few tweaks…

A message from Edward Snowden

“One year ago, we learned that the internet is under surveillance, and our activities are being monitored to create permanent records of our private lives — no matter how innocent or ordinary those lives might be. Today, we can begin the work of effectively shutting down the collection of our online communications, even if the…

Skype for Android still logged in after logout

Skype for Android did never work very well but recently I discovered a really annoying bug: After logging out of Skype, I closed the App in the Appmanager and still receive push messages sent to my account. Most recent version from 18th of March 2014. Bugs known since summer ’13 are still not fixed.

PHP elephant

Mastering UTF-8 encoding in PHP

Encoding issues can appear in several locations between backend / database and frontend. I’m going to explain each of those locations and how to properly implement a clean encoding throughout your project. What is a multibyte character? A single byte as in its primitive form is a number between 0 and 255, making up a…