Thursday, May 24, 2007

Free image editor - Paint.net

Check this Out!!!

This (
Paint.Net) open-source photo editing application packs tons of muscle into a measly 1.3MB download that doesn't cost a dime. Impressive!!!

#19 at PC World's Top 20 Products of the Year.

Free image editor includes special effects and layers.
This surprisingly powerful image editing and manipulation tool includes unlimited undos, special effects, and even the ability to work in layers

Download Url: http://www.getpaint.net/download.html
License Type: Free
Price: Free
Operating Systems: Windows XP
File Size: 5357KB
Author: Rick Brewster

SMTP using .NET Classes (Powershell)

A great Powershell code that you can use as a template for SMTP mail with authentication.

Easily extendible for Web development.


Scriptlet:
###############################################
$mail = new-object System.Net.Mail.MailMessage

#set sender email address
$mail.From = new-object System.Net.Mail.MailAddress("mymail@mydomain.com");

#set the recepient email address
$mail.To.Add("touser@domain.com");

#set the email subject
$mail.Subject = "";

#set the content

$mail.Body = "";

#send the message
$smtp = new-object System.Net.Mail.SmtpClient("mydomain.com");

#set the username and password properites on the SmtpClient for authentication
$smtp.Credentials = new-object System.Net.NetworkCredential("username", "password");

#send it
$smtp.Send(mail);


#Voila!
###############################################


Monday, May 21, 2007

Powershell Lynx Project

Those were the days of Lynx when you used to browse the web as text thru the console...

My previous blogs were about scripting with Yahoo api search services. Well, since blogging at work is not really encouraged, I have decided to create my powershell version of Lynx. Since I'm scripting most of the time due to adHoc script requests, my boss won't even realize that I'm actually blogging... hehehe...

For starters, a scriptlet that navigates IE:

$ie = New-Object -com InternetExplorer.Application
$ie.Visible=$true
$ie.MenuBar=$false
$ie.ToolBar=$false
$ie.StatusBar=$false
$ie.Navigate("http://26thgstreet.blogspot.com")


Visibility of IE can be set to false later after I finalized the function to get the HTMLDocument.Innertext and write it to the console.

I will aso have to create a function to accept console arguments to be posted to the HTMLDocument so that I can update my blogs...

Stay tuned for the script updates.



Free PowerShell Book

My msdn feeds shed some light on my powershell addiction after receiving the good news.

It's finally out, thanks to Frank Koch.


The subtitle is "An introduction to scripting technologies for people with no real background knowledge". Read more.

Get it here.


Sunday, May 20, 2007

Free Live Cams (Google Dorks Collection cont'd)

Live webcam views:

  • * inurl:/view.shtml
  • * intitle:”Live View / - AXIS” |
  • * inurl:view/view.shtml^
  • * inurl:ViewerFrame?Mode=
  • * inurl:ViewerFrame?Mode=Refresh
  • * inurl:axis-cgi/jpg
  • * inurl:axis-cgi/mjpg (motion-JPEG)
  • * inurl:view/indexFrame.shtml
  • * inurl:view/index.shtml
  • * inurl:view/view.shtml
  • * liveapplet
  • * intitle:”live view” intitle:axis
  • * intitle:liveapplet
  • * allintitle:”Network Camera NetworkCamera”
  • * intitle:axis intitle:”video server”
  • * intitle:liveapplet inurl:LvAppl
  • * intitle:”EvoCam”
  • * inurl:”webcam.html”
  • * intitle:”Live NetSnap Cam-Server feed”
  • * intitle:”Live View / - AXIS”
  • * intitle:”Live View / - AXIS 206M”
  • * intitle:”Live View / - AXIS 206W”
  • * intitle:”Live View / - AXIS 210″
  • * inurl:indexFrame.shtml Axis
  • * inurl:”MultiCameraFrame?Mode=Motion”
  • * intitle:start inurl:cgistart
  • * intitle:”WJ-NT104 Main Page”
  • * intext:”MOBOTIX M1″
  • * intext:”Open Menu”
  • * intext:”MOBOTIX M10″
  • * intext:”Open Menu”
  • * intext:”MOBOTIX D10″
  • * intext:”Open Menu”
  • * intitle:snc-z20 inurl:home/
  • * intitle:snc-cs3 inurl:home/
  • * intitle:snc-rz30 inurl:home/
  • * intitle:”sony network camera snc-p1″
  • * intitle:”sony network camera snc-m1″
  • * site:.viewnetcam.com -www.viewnetcam.com
  • * intitle:”Toshiba Network Camera” user login
  • * intitle:”netcam live image”
  • * intitle:”i-Catcher Console - Web Monitor”

Saturday, May 19, 2007

Google Dorks Collection

Limited to strings as there are beggars that will try to squeeze you for instructions and such...

No further explanation will be provided

  • robots.txt" "Disallow:" filetype:txt
  • intitle:index.of passwd passwd.bak
  • intitle:index.of haccess.ctl
  • intitle:index.of dead.letter
  • filetype:xls username password email
  • inurl:admin filetype:xls
  • "Thank you for your purchase" +download
  • intitle:"DocuShare"
  • inurl:"docushare/dsweb/" -faq -gov -edu
  • "#mysql dump" filetype:sql
  • "allow_call_time_pass_reference" "PATH_INFO"
  • "Certificate Practice Statement" filetype:PDF | DOC
  • "Generated by phpSystem"
  • "generated by wwwstat"
  • "Host Vulnerability Summary Report"
  • "HTTP_FROM=googlebot" googlebot.com "Server_Software="
  • "Index of" / "chat/logs"
  • "Installed Objects Scanner" inurl:default.asp
  • "Mecury Version" "Infastructure Group"
  • "Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log
  • "Most Submitted Forms and Scripts" "this section"
  • "Network Vulnerability Assessment Report"
  • "not for distribution" confidential
  • "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
  • "phpMyAdmin" "running on" inurl:"main.php"
  • "produced by getstats"
  • "Request Details" "Control Tree" "Server Variables"
  • "robots.txt" "Disallow:" filetype:txt
  • "Running in Child mode"
  • "sets mode: +p"
  • "sets mode: +s"
  • "Thank you for your order" +receipt
  • "This is a Shareaza Node"
  • "This report was generated by WebLog"
  • ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intextassword|subject
  • (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
  • +":8080" +":3128" +":80" filetype:txt
  • +"HSTSNR" -"netop.com"
  • -sitehp.net -"The PHP Group" inurl:source inurl:url extHp
  • 94FBR "ADOBE PHOTOSHOP"
  • AIM buddy lists
  • allinurl:/examples/jsp/snp/snoop.jsp
  • allinurl:servlet/SnoopServlet
  • cgiirc.conf
  • cgiirc.conf
  • data filetype:mdb -site:gov -site:mil
  • exported email addresses
  • ext:asp inurlathto.asp
  • ext:cgi inurl:editcgi.cgi inurl:file=
  • ext:conf inurl:rsyncd.conf -cvs -man
  • ext:conf NoCatAuth -cvs
  • ext:dat bpk.dat
  • ext:gho gho
  • ext:ini intext:env.ini
  • ext:ldif ldif
  • ext:log "Software: Microsoft Internet Information Services *.*"
  • ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
  • ext:nsf nsf -gov -mil
  • extqi pqi -database
  • ext:reg "username=*" putty
  • ext:txt "Final encryption key"
  • ext:txt inurl:dxdiag
  • ext:vmdk vmdk
  • ext:vmx vmx
  • filetype:asp DBQ=" * Server.MapPath("*.mdb")
  • filetype:bkf bkf
  • filetype:blt "buddylist"
  • filetype:blt blt +intext:screenname
  • filetype:cfg auto_inst.cfg
  • filetype:cnf inurl:_vti_pvt access.cnf
  • filetype:conf inurl:firewall -intitle:cvs
  • filetype:config web.config -CVS
  • filetype:ctt Contact
  • filetype:ctt ctt messenger
  • filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
  • filetype:fp3 fp3
  • filetype:fp5 fp5 -site:gov -site:mil -"cvs log"
  • filetype:fp7 fp7
  • filetype:inf inurl:capolicy.inf
  • filetype:lic lic intext:key
  • filetype:log access.log -CVS
  • filetype:mbx mbx intext:Subject
  • filetype:myd myd -CVS
  • filetype:ns1 ns1
  • filetypera ora
  • filetypedb pdb backup (Pilot | Pluckerdb)
  • filetypehp inurl:index inurlhpicalendar -site:sourceforge.net
  • filetypeot inurl:john.pot
  • filetypest inurl:"outlook.pst"
  • filetypest pst -from -to -date
  • filetype:qbb qbb
  • filetype:rdp rdp
  • filetype:reg "Terminal Server Client"
  • filetype:vcs vcs
  • filetype:wab wab
  • filetype:xls -site:gov inurl:contact
  • filetype:xls inurl:"email.xls"
  • Financial spreadsheets: finance.xls
  • Financial spreadsheets: finances.xls
  • Ganglia Cluster Reports
  • haccess.ctl (one way)
  • haccess.ctl (VERY reliable)
  • ICQ chat logs, please...
  • iletype:log cron.log
  • intext:"Session Start * * * *:*:* *" filetype:log
  • intext:"Tobias Oetiker" "traffic analysis"
  • intextpassword | passcode) intextusername | userid | user) filetype:csv
  • intext:gmail invite intext:http://gmail.google.com/gmail/a
  • intext:SQLiteManager inurl:main.php
  • intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
  • intitle:"AppServ Open Project" -site:www.appservnetwork.com
  • intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
  • intitle:"Big Sister" +"OK Attention Trouble"
  • intitle:"edna:streaming mp3 server" -forums
  • intitle:"FTP root at"
  • intitle:"index of" +myd size
  • intitle:"Index Of" -inurl:maillog maillog size
  • intitle:"Index Of" cookies.txt size
  • intitle:"index of" mysql.conf OR mysql_config
  • intitle:"Index of" upload size parent directory
  • intitle:"index.of *" admin news.asp configview.asp
  • intitle:"index.of" .diz .nfo last modified
  • intitle:"Multimon UPS status page"
  • intitle:"PHP Advanced Transfer" (inurl:index.php | inurl:showrecent.php )
  • intitle:"PhpMyExplorer" inurl:"index.php" -cvs
  • intitle:"statistics of" "advanced web statistics"
  • intitle:"System Statistics" +"System and Network Information Center"
  • intitle:"Usage Statistics for" "Generated by Webalizer"
  • intitle:"wbem" compaq login
  • intitle:"Web Server Statistics for ****"
  • intitle:"web server status" SSH Telnet
  • intitle:"welcome.to.squeezebox"
  • intitle:admin intitle:login
  • intitle:index.of "Apache" "server at"
  • intitle:index.of cleanup.log
  • intitle:index.of dead.letter
  • intitle:index.of inbox
  • intitle:index.of inbox dbx
  • intitle:index.of ws_ftp.ini
  • intitle:intranet inurl:intranet +intext:"phone"
  • inurl:"/axs/ax-admin.pl" -script
  • inurl:"/cricket/grapher.cgi"
  • inurl:"bookmark.htm"
  • inurl:"cacti" +inurl:"graph_view.php" +"Settings Tree View" -cvs -RPM
  • inurl:"newsletter/admin/"
  • inurl:"newsletter/admin/" intitle:"newsletter admin"
  • inurl:"putty.reg"
  • inurl:"smb.conf" intext:"workgroup" filetype:conf conf
  • inurl:*db filetype:mdb
  • inurl:/_layouts/settings
  • inurl:admin filetype:xls
  • inurl:admin intitle:login
  • inurl:backup filetype:mdb
  • inurl:cgi-bin/printenv
  • inurl:cgi-bin/testcgi.exe "Please distribute TestCGI"
  • inurl:changepassword.asp
  • inurl:ds.py
  • inurl:email filetype:mdb
  • inurl:fcgi-bin/echo
  • inurl:forum filetype:mdb
  • inurl:forward filetype:forward -cvs
  • inurl:getmsg.html intitle:hotmail
  • inurl:log.nsf -gov
  • inurl:main.php phpMyAdmin
  • inurl:main.php Welcome to phpMyAdmin
  • inurl:netscape.hst
  • inurl:netscape.hst
  • inurl:netscape.ini
  • inurldbc.ini ext:ini -cvs
  • inurlerl/printenv
  • inurlhp.ini filetype:ini
  • inurlreferences.ini "[emule]"
  • inurlrofiles filetype:mdb
  • inurl:report "EVEREST Home Edition "
  • inurl:server-info "Apache Server Information"
  • inurl:server-status "apache"
  • inurl:snitz_forums_2000.mdb
  • inurl:ssl.conf filetype:conf
  • inurl:tdbin
  • inurl:vbstats.php "page generated"
  • ipsec.conf
  • ipsec.secrets
  • ipsec.secrets
  • Lotus Domino address books
  • mail filetype:csv -site:gov intext:name
  • Microsoft Money Data Files
  • mt-db-pass.cgi files
  • MySQL tabledata dumps
  • mystuff.xml - Trillian data files
  • OWA Public Folders (direct view)
  • Peoples MSN contact lists
  • php-addressbook "This is the addressbook for *" -warning
  • phpinfo()
  • phpMyAdmin dumps
  • phpMyAdmin dumps
  • private key files (.csr)
  • private key files (.key)
  • Quicken data files
  • robots.txt
  • site:edu admin grades
  • SQL data dumps
  • Squid cache server reports
  • Unreal IRCd
  • Welcome to ntop!
  • intitlehpinfo "PHP Version"
  • intitle:"DocuShare" inurl:"docushare/dsweb/" -faq
  • "#mysql dump" filetype:sql
  • "allow_call_time_pass_reference" "PATH_INFO"
  • "Certificate Practice Statement" filetype:PDF | DOC
  • "Generated by phpSystem"
  • "This summary was generated by wwwstat"
  • "Host Vulnerability Summary Report"
  • "HTTP_FROM=googlebot" googlebot.com "Server_Software="
  • "Index of" / "chat/logs"
  • "Installed Objects Scanner" inurl:default.asp
  • "Mecury Version" "Infastructure Group"
  • "Microsoft (R) Windows * (TM) Version * DrWtsn32 C
  • "Most Submitted Forms and Scripts" "this section"
  • "Network Vulnerability Assessment Report"
  • +"HSTSNR" -"netop.com"
  • "not for distribution" confidential
  • "phone * * *" "address *" "e-mail" intitle:"curriculum vitae"
  • "phpMyAdmin" "running on" inurl:"main.php"
  • "These statistics were produced by getstats"
  • "Request Details" "Control Tree" "Server Variables"
  • "robots.txt" "Disallow:" filetype:txt
  • "Running in Child mode"
  • "sets mode: +p"
  • "sets mode: +s"
  • "Thank you for your order" +receipt
  • "This is a Shareaza Node"
  • "This report was generated by WebLog"
  • ( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intextassword|subject
  • (inurl:"robot.txt" | inurl:"robots.txt" ) intext:disallow filetype:txt
  • +":8080" +":3128" +":80" filetype:txt
  • buddylist.blt
  • allinurl:/examples/jsp/snp/snoop.jsp
  • allinurl:servlet/SnoopServlet
  • intitle:index.of cgiirc.config
  • data filetype:mdb -site:gov -site:mil
  • e-mail address filetype:csv csv
  • ext:asp inurlathto.asp
  • ext:cgi inurl:editcgi.cgi inurl:file=
  • ext:conf inurl:rsyncd.conf -cvs -man
  • ext:conf NoCatAuth -cvs
  • ext:dat bpk.dat
  • ext:gho gho
  • ext:ini intext:env.ini
  • ext:ldif ldif
  • ext:log "Software: Microsoft Internet Information
  • ext:mdb inurl:*.mdb inurl:fpdb shop.mdb
  • ext:nsf nsf -gov -mil
  • extqi pqi -database
  • ext:reg "username=*" putty
  • ext:txt "Final encryption key"
  • ext:txt inurl:dxdiag
  • ext:vmdk vmdk
  • ext:vmx vmx
  • filetype:bkf bkf
  • filetype:asp DBQ=" * Server.MapPath("*.mdb")
  • filetype:blt "buddylist"
  • filetype:blt blt +intext:screenname
  • filetype:cfg auto_inst.cfg
  • letype:cnf inurl:_vti_pvt access.cnf
  • inurl:*db filetype:mdb
  • inurl:"shopadmin.asp" "Shop Administrators only"
  • inurl:getmsg.html intitle:hotmail
  • inurl:admin intitle:login
  • inurl:backup filetype:mdb
  • inurl:admin filetype:xls
  • intitle:index.of "Apache" "server at"
  • intitle:admin intitle:login
  • intitle:"FTP root at"
  • intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html)
  • intitle:"ASP Stats Generator *.*" "ASP Stats Generator" "2003-2004 weppos"
  • intext:SQLiteManager inurl:main.php
  • intext:gmail invite intext:http://gmail.google.com/gmail/a
  • intextpassword | passcode) intextusername | userid | user) filetype:csv
  • intitlehpinfo "PHP Version"

Friday, May 18, 2007

Google search tips

If you want to search for music downloads effectively, use this query string on your search: intitle:Index.of?mp3 followed by the Song Title or Artist\Band Name.

For example, to search for Korn:

From the address bar:
www.google.com/search?hl=en&q=intitle%3AIndex.Of%3Fmp3+Korn&btnG=Google+Search&meta=

Or

From Google's Search bar, Type:
intitle:Index.of?mp3 Korn






Yahoo Search Script

Something to share...

Using MsXML.DOMDocument, you will be able to query Yahoo! API (
http://api.search.yahoo.com/WebSearchService/V1/webSearch?) .

Query Parameters used:


''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
' Yahoo Search Script
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Const APP_ID = "insert your app ID"

'Grab the incoming search query or ask for one
If WScript.Arguments.Length = 0 Then
strQuery = InputBox("Enter a search Term")
Else
strQuery = WScript.Arguments(0)
End If

'Construct a Yahoo! Search Query
strLanguage = "en"
strReqURL = "http://api.search.yahoo.com/" & _
"WebSearchService/V1/webSearch?" & _
"appid=" & APP_ID & _
"&query=" & strQuery & _
"&language=" & strLanguage

'Start the XML Parser
Set MSXML = CreateObject("MSXML.DOMDocument")

'Set the XML Parser options
MSXML.Async = False

'Make the Request
strResponse = MSXML.Load(strReqURL)

'Make sure the request loaded
If (strResponse) Then

'Load the results
Set Results = MSXML.SelectNodes("//Result")

'Loop through the results
For x = 0 to Results.length - 1
strTitle = Results(x).SelectSingleNode("Title").text
strSummary = Results(x).SelectSingleNode("Summary").text
strURL = Results(x).SelectSingleNode("Url").text
strOut = (x + 1) & ". " & _
strTitle & vbCrLf & _
strSummary & vbCrLf & _
strURL & vbCrLf & vbCrLf
WScript.Echo strOut
Next

'Unload the results
Set Results = Nothing

End If

'Unload the XML Parser
Set MSXML = Nothing
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

Thursday, May 17, 2007

CPU Temp Probes

I have searched the web for a script that performs temperature probes but had no luck in getting the real picture until wbemtest helped me find classes not included in M$oft's Scriptomatic.

Follow the instructions below to test if the script will work on your machine for CPU temperature probe:

1. Launch wbemtest


2. Click connect


3. Change the namespace to "root\WMI" then click Connect


4. Click Query, supply the query "Select * from MSAcpi_ThermalZoneTemperature" , then click Apply


5. Double click on the result to view the class properties:


If you are able to view the results then it's ok to proceed with the scriplet.

Below is the script that probes for CPU temperature via MSAcpi_ThermalZoneTemperature. The initial results are in 10ths of degrees in Kelvin so I had to convert the results to Celcius and Farenheit.

'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
' CPU Temperature Probe
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\WMI")
Set colItems = objWMIService.ExecQuery("Select * from MSAcpi_ThermalZoneTemperature",,48)
For Each objItem in colItems

With objItem
WScript.Echo "Active: " & .Active & vbcrlf

FarTemp = ((9/5)*((.CurrentTemperature - 2732)/10)) + 32
CelTemp = ((FarTemp - 32) * (5/9))
WScript.Echo "Current Temperature: " & vbcrlf & _
FarTemp & " (Degrees Farenheit)" & _
" | " & CelTemp & " (Degrees Celcius)" & vbcrlf

FarTemp=((9/5)*((.CriticalTripPoint - 2732)/10)) + 32
CelTemp = ((FarTemp - 32) * (5/9))
WScript.Echo "Critical Temperature (Temperature at which the OS must shutdown the system): " & vbcrlf & _
FarTemp & " Degrees Farenheit" & _
" | " & CelTemp & " Degrees Celcius" & vbcrlf

If .PassiveTripPoint <> 0 Then
FarTemp=((9/5)*((.PassiveTripPoint - 2732)/10)) + 32
CelTemp = ((FarTemp - 32) * (5/9))
WScript.Echo "Passive Temperature (Temperature at which the OS must activate CPU throttling): " &amp;amp;amp;amp; vbcrlf & _
FarTemp & " Degrees Farenheit" & _
vbcrlf & CelTemp & " Degrees Celcius" & vbcrlf
End If

WScript.Echo "Thermal Stamp: " & .ThermalStamp & vbcrlf
End With
Next
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

CPU Max Temperatures

AMD Althon, Althon Opteron, Duron & Sempron Series:

  • AMD Athlon (socket) upto 1Ghz 90°C
  • AMD Athlon (slot) all speeds 70°C
  • AMD Athlon Thunderbird 1.1Ghz+ 95°C
  • AMD Athlon MP 1.33Ghz+ 95°C
  • AMD Athlon XP 1.33Ghz+ 90°C
  • AMD Athlon XP T-Bred upto 2100+ 90°C
  • AMD Athlon XP T-Bred over 2100+ 85°C
  • AMD Athlon XP Barton 85°C
  • AMD Duron up to 1Ghz 90°C
  • AMD Duron 1Ghz+ 90°C
  • AMD Duron Applebred 85°C
  • AMD Opteron 65 - 71°C
  • AMD Athlon 64 70°C
  • AMD Athlon 64 (Socket 939, 1.4 volts) 65°C
  • AMD Athlon 64 FX 70°C
  • AMD Athlon 64 X2 71°C
  • AMD Sempron (T-bred/Barton core) 90°C
  • AMD Sempron (Paris core) 70°C
  • AMD Mobile Sempron 95°C

AMD K6 Series
  • AMD K6/K6-2/K6-III (All except below) 70°C
  • AMD K6-2/K6-III (model number ending in X) 65°C
  • AMD K6-2+/K6-III+ 85°C

Intel Pentium III Series
  • Pentium III Slot 1 500-866Mhz 80°C
  • Pentium III Slot and socket 933Mhz 75°C
  • Pentium III Slot 1 1Ghz 60 - 70°C
  • Pentium III Slot 1 1.13Ghz 62°C

Intel Celeron Series
  • Intel Celeron 266-433Mhz 85°C
  • Intel Celeron 466-533Mhz 70°C
  • Intel Celeron 566-600Mhz (Coppermine) 90°C
  • Intel Celeron 633-667Mhz 82°C
  • Intel Celeron 700 - 850Mhz 80°C
  • Intel Celeron 900Mhz - 1.6Ghz 69 - 70°C
  • Intel Celeron 1.7Ghz and Higher 67 - 77°C

Intel Pentium II
  • Intel Pentium II (First Generation "Klamath") 72 - 75°C
  • Intel Pentium II (Second Generation, 266-333Mhz) 65°C
  • Intel Pentium II (350 - 400Mhz) 75°C
  • Intel Pentium II (450Mhz) 70°C

Intel Pentium 4, Pentium M (notebooks)
  • Intel Pentium 4 64 - 78°C
There are no specific stats for Pentium 4 CPU’s as P4’s have an ability to slow themselves down when they are getting too hot and thus, in theory they should never be able to burn themselves out. To get specifics consult Intel’s specifications for your particular model.

  • Intel Pentium M (notebooks) 100°C

Intel Pentium D (dual core)
  • Intel Pentium D 820 (2.8Ghz) 63°C
  • Intel Pentium D 830 & 840 (3.0 - 3.2Ghz) 69.8°C

Intel Pentium Pro
  • Intel Pentium Pro. 256 or 512K L2 Cache 85°C
  • Intel Pentium Pro. 1MB L2 Cache 80°C


Wednesday, May 16, 2007

ICE on Your Mobile Phone Address List

A forwarded mail that makes sense...

Isn't it true that we all carry our mobile phones with hundreds of names/numbers stored in its memory but yet nobody, other than ourselves, know which of these numbers belong to our near and dear ones?

Let us for a moment create a scenario wherein we are involved in an accident or had a heart attack and the people attending us get hold of our mobile phone but don't know which number to call to inform our family members. Yes, there are hundreds of numbers stored but which one is the contact person in case of an emergency?

For this reason, we must have one or more telephone numbers stored under the name ICE (In case of Emergency) in our mobile phones.

Recently, the concept of "ICE" is catching up quickly. It is simple, an important method of contact during emergency situations.

As cell phones are carried by majority of the population, all you need to do is store the number of a contact person or person who should be contacted at during emergency as ICE" (meaning In Case of Emergency).

The idea was thought up by a paramedic who found that when they went to the scenes of accidents, there were always mobile phones with patients, but they didn't know which number to call.

He therefore thought that it would be a good idea if there was a nationally recognized name for this purpose.

Following a disaster in London , the East Anglican Ambulance Service has launched a national "In case of Emergency (ICE)" campaign.

In an emergency situation, Emergency Service personnel and hospital staff would then be able to quickly contact your next of kin, by simply dialing the number stored as "ICE".

Spread the word!

It really could save your life, or put a loved one's mind at rest.

For more than one contact name simply enter ICE1, ICE2 and ICE3 etc.

A great idea that will make a difference!

Tuesday, May 15, 2007

XSS vs. Cable Monolith

What can I say, disatisfaction led to curiosity that lead to this vulnerability...

The company's name is not disclosed to avoid any legal issues... and due to laziness of writing my own disclaimer... Well at least I wrote this shit...

One day I received a snail mail from a my Cable TV provider that states a price increase in subscription.

Extra 35 bucks was added to my already unreasonable subscription fee. It's stated in the mail that it was for service upgrades and such. Bullshit!

Thanks to my Groups (Yahoo and Gmail), I received an email from other subscribers about the petition against the cable monolith on PetitionOnline.com (It should still be there as it's on Top 5 of the week). Some comments from the signers are hilarious (but still heartfelt disatisfaction).

Checking out their website to view any acceptable reason for the price hike, I noticed a small vulnerability that could lead to... you know? eherm...

Found a search function in the script that requires the parameters (strText, searchType) which ofcourse, strText is a string and searchType is 0/1.

Anyway I inserted an alert script in the search parameter to test if simple XSS will work... there it is...

XSS starts there... the rest is up to you...

Example: search.asp?strText=<"Your Script Here">&searchType=1

If you are staying where I am now... you probably know who that cable monolith... And you probably know by now how far XSS can penetrate... and it won't be long... till I update my next blog with a new findings...