Skip to main content

Home/ Indie Nation/ Group items tagged directory

Rss Feed Group items tagged

John Lemke

Beyond The Dawn - 0 views

shared by John Lemke on 09 Aug 11 - No Cached
  • Twitter Directory and Search, Find Twitter Followers : WeFollow wefollow.com - Find Twitter celebrities, actors, TV personalities, or new Twitter friends in your area. WeFollow is a directory of Twitter users organized by interests. Find likeminded friends today! davehennmusic davehennmusic Just added myself to the http://wefollow.com twitter directory under: #chicago_il #music #indie #songwriting #chicago #musician about 2 hours ago Reply Retweet Follow Unfollow Favorite Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
  • Suicide Silence | Indienation.fm indienation.fm - At the RockStar Energy Mayhem Festival it was my great pleasure to sit down with Mark Heylmun the guitarist from Suicide Silence. If you have yet to hear their music, Suicide Silence performs an ex...
John Lemke

Neon Goat MP3 Report Generator - 0 views

  •  
    This command line program will generate an HTML list of directories for mp3.  This is exactly what I was looking for and it also has a windows version
John Lemke

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Ars Technica - 0 views

  • takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.
  • The botnet is designed to conduct distributed denial-of-service attacks on targets of the attackers' choice. Commands issued in the IRC channel allow the attackers to specify the IP address, port number, intensity, and duration of attacks.
1 - 5 of 5
Showing 20 items per page