sqlmap: automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

via sqlmap: automatic SQL injection and database takeover tool.

NL gov wants to revoke NL nationality for expat Dutch people

Aside from the fact that NL is a trading nation and thus has a disproportionate amount of people living and working outside of the Netherlands and thus having multiple nationalities, it makes it seem like having the Dutch nationality is like being a member of some kind of exclusive club. What nonsense! Being a member of a nationality gives you rights and privileges by being born into or having worked your way into a certain way of thinking. Your nation – the one that exists by the grace of your taxes – is indebted to you as an invidual and should protect you and the way of life you represent.

For minister Donner to try to reduce the amount of protection as well as xenophobically pushing away excellent candidates for nationality is a symptom of times where we are pushed to hate each other instead of trying to grow together in humanity. OK, that might sound a bit idealistic, but shouldn’t you be trying to recruit people into your way of thinking, into the nationhood that you want to promote globally, instead of repelling them?

Expat-Nederlander wil twee paspoorten houden – Binnenland – VK.

How to Break Into a Windows PC

Sneaky Command-Line Fu: Reset the Password with the System Rescue CD

If you need access to the operating system itself, the Linux-based System Rescue CD is a good option for breaking in. You’ll need to do a bit of command line work, but as long as you follow the instructions closely you should be fine. Hat tip to our friends at the How-To Geek.

How It Works: Just download the .iso file for the System Rescue Live CD and burn it to disc. Boot from the disc and hit the default option when the blue screen comes up. After everything loads and you’re presented with a command-line interface, type fdisk -l to see the drives and partitions on your computer. Pick the Windows partition (usually the largest NTFS partition) and note the name, e.g. /dev/sda3.

Then, run the following command:

ntfs-3g /dev/sda3 /mnt/windows –o force

Make sure to replace /dev/sda3 with the partition you noted earlier. Next, cd to your Windows/System32/config directory with this command:

cd /mnt/windows/Windows/System32/config

We want to edit the SAM file in this folder, so type the following command to get a list of users:

chntpw –l SAM

Note the username you want to access, and then type the following command, replacing Whitson Gordon with the username in question.

chntpw –u “Whitson Gordon” SAM

At the next screen, choose the first option by typing the number 1 and hitting Enter. This will clear the user password, making it blank. When it asks you to write hive files, hit y and press Enter. It should say OK, and then you can type reboot to reboot the computer. When you boot into Windows, you’ll be able to log in to that user’s account without a password.

How to Beat It: Once again, the weakness of this method is that it still can’t beat encryption. Changing the password will disallow you access to those encrypted files, which, if the user has encrypted their entire OS, makes this method pretty useless. If they’ve only encrypted a few files, though, you’ll still be able to access all the unencrypted stuff without a problem.

How to Break Into a Windows PC (And Prevent It from Happening to You).

Why Economic Models Are Always Wrong

Basically it’s because econonmists allways calibrate the data – ie. change certain parameters to try to represent reality. Carter proved that even small changes to parameters make huge differences in the predictive power of a model. Economists calibrate and recalibrate their models all the time, leading to worse and worse predictions.

Why Economic Models Are Always Wrong: Scientific American.

Plastic surgeon finds the ideal breast shape by examining Page 3 girls | Mail Online

‘We used computer measuring tools to examine the dimensions and proportions of each pair of breasts, identifying four features common to all of them,’ he explains.

The features analysed were the dimensions of the upper and lower pole, medical terms that describe the areas above and below the nipple; plus the angle at which the nipple points and the slope of the upper pole.

‘The study revealed that in all cases the nipple ‘‘meridian’’ – the horizontal line drawn at the level of the nipple – lay at a point where, on average, the proportion of the breast above it represented 45 per cent of overall volume of the breast and below it 55 per cent.

‘In the majority of cases the upper pole was either straight or concave, and the nipple was pointing skywards at an average angle of 20 degrees. In all cases the breasts demonstrated a tight convex lower pole – a neat but voluminous curve.

‘For the second part of the study I analysed images of the breasts of ordinary women pre- and post- implant surgery to establish whether, if a breast deviates from these measurements, it becomes less attractive. And the answer is that it does, regardless of size.’

Plastic surgeon finds the ideal breast shape… by examining Page 3 girls | Mail Online.

Samsung DIVE – track and protect your Samsung Android device

Samsung DIVE.

The Help page tells you how to set up the service. Unfortunately, T-Mobile has fucked up their version of the firmware, making it impossible to add a Samsung Account or register with this service.

See here for UK discussion

Fortunately it’s not too hard to update to the base Samsung firmware without voiding your warranty, as T-Mobile sends the phones directly to Samsung for fixing. T-Mobile Forum + links to instructions

These instructions take 10 minutes to implement

and upgrading to the leaked Gingerbread 2.3.4 also shouldn’t take too long.

These instructions are for the Samsung Galaxy S2