Jump to content

All Activity

This stream auto-updates     

  1. Yesterday
  2. chain

    Thanks To All

    I like to thank the people for continuing to come to chainscriptz site even tho we haven't done much in the scripting area. but we still keep it going and will continue to do so. Wes and I cannot seem to let it go and continue to work on it as well as my good friend err0r who helps also alot. TG007 is our family and will always remain the guru of scripting website. We are the IRC scripting site in networking irc and different scripts in different languages. But without you continuing to come and add stuff we wouldn't be here. its the people that continue to support us and continue to believe in us that makes this site great. So thank you all as it is greatly appreciated it. Chain & Eyecu
  3. Facebook  has diverted from its policy of not fact-checking politicians in order to prevent the spread of potentially harmful coronavirus misinformation from Brazilian President Jair Bolsonaro. Facebook made the decisive choice to remove a video shared by Bolsonaro on Sunday where he claimed that “hydroxychloroquine is working in all places.” That’s despite the drug still undergoing testing to determine its effectiveness for treating COVID-19, which researchers and health authorities have not confirmed. “We remove content on Facebook and Instagram that violates our Community Standards, which do not allow misinformation that could lead to physical harm” a Facebook spokesperson told TechCrunch. Facebook specifically prohibits false claims regarding cure, treatments, the availability of essential services, and the location or intensity of contagion outbreaks. Read More Here: https://techcrunch.com/2020/03/30/facebook-removes-bolsonaro-video/
  4. Amazon,  the e-commerce giant that has fared well financially amid the COVID-19 pandemic, is facing a bevy of worker strikes. Today, warehouse workers on Staten Island in New York walked off the job in protest of Amazon’s treatment amid the crisis. Read More Here: https://techcrunch.com/2020/03/30/amazon-warehouse-whole-foods-workers-strike/
  5. chain

    joke of the day

    FOR SALE BY OWNER...Complete set of encyclopedia Britannica.45 Volumes. Excellent condition.$100 or best offer.Reason for sale: No longer required.Got married last weekend.Wife knows everything.
  6. Last week
  7. Nintendo will reportedly release most of its Super Mario franchise games on Nintendo Switch this year, according to a new report. British gaming website Video Game Chronicle reported that Nintendo will celebrate Super Mario’s 35th anniversary by releasing updated versions of “most” of its Super Mario games. No specific games were mentioned, but Eurogamer reported that Super Mario Galaxy is among the remastered titles — “alongside a couple of other 3D Mario favourites.” Both reports suggested a new Paper Mario title will also be released this year, as well as “a Deluxe version of Super Mario 3D World” with a bunch of new levels. Video Game Chronicle also reported Nintendo will announce new details regarding its Super Nintendo World theme park and an animated Super Mario movie. The Super Mario series was first introduced in 1985. Nintendo expected to announce its anniversary plans at E3 in June, Video Game Chronicle said. E3 2020 was canceled in March over COVID-19 concerns.
  8. As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices.According to a report published by Check Point and shared with The Hacker News, over 1,700 new "Zoom" domains have been registered since the onset of the pandemic, with 25 percent of the domains registered in the past seven days alone."We see a sharp rise in the number of 'Zoom' domains being registered, especially in the last week," said Omer Dembinsky, Manager of Cyber Research at Check Point."The recent, staggering increase means that hackers have taken notice of the work-from-home paradigm shift that COVID-19 has forced, and they see it as an opportunity to deceive, lure, and exploit. Each time you get a Zoom link or document messaged or forwarded to you, I'd take an extra look to make sure it's not a trap." Read More Here: https://thehackernews.com/2020/03/zoom-video-coronavirus.html
  9. On 10th October 2007, Valve released Half-Life 2: Episode 2, the continuation of Gordon Freeman’s story as he and his friends fought to free the human race from the oppression of the alien Combine. The ending provided very little in the way of closure, setting up a number of plot points for Half-Life 3. But 13 years later a sequel has still never arrived.  2020's Half-Life: Alyx, a prequel exclusively for virtual reality, marked the first kick in the franchise for a long time. But it's not a full sequel in the way that fans were hoping for and we're still waiting for a new Half-Life game with a 3 in the title. Fortunately, in a recent interview, Valve's Robin Walker said that the franchise still has a future, stating: "we absolutely see Half-Life: Alyx as our return to this world, not the end of it." While this isn't a confirmation of definite plans for Half-Life 3, it's enough to give fans renewed hope that this long-dormant series is going to continue in one form or another. Here's everything we know of and hope for in another fully-fledged Half-Life game.  Cut to the chaseWhat is it? The long-awaited, and long-absent, continuation of the Half-Life sagaWhen can I play it? With nothing officially announced it won't be anytime soonHalf-Life 3 or Episode 3? Where has it been?Back when Valve announced Half Life 2 would be getting episodic sequels, it revealed that there were plans to release three of them over the course of the following few years. They would together form what was essentially a third Half Life game. The idea was that development on an episode wouldn’t take as long as a full sequel, so fans could continue Gordon Freeman’s adventure sooner - albeit in smaller quantities.
  10. chain

    Interesting Read

    A WALK DOWN MEMORY LANEAlthough I was too young to read or write at the time it was created, and didn’t encounter it until later in my teenage years, IRC has been a major part of my life, and it most certainly defined who I am today. Once it entered my life, IRC took me far beyond the countryside village I was growing up in, and opened up a whole new world for me. It was in fact mIRC’s built-in scripting language that sparked my very first interest in programming, bots and bouncers that made me enter the realms of Linux, and the Wild West times of internet warfare that got me curious about networking and security. By the time IRC reached its peak in the early 2000’s, my entire social life had practically ceased to exist outside of it, and although other factors played a role in it as well, it is not a coincidence that I eventually ended up living in the very same city where IRC was born. IRC’s Influence On TechnologyWhile those are of course just personal, anecdotal experiences, there’s a far bigger picture to it, and IRC has played an important role in the development of the internet itself. Take IPv6 for example: we’ve heard for decades how the IPv4 address space is soon going to be exhausted, and IPv6 has been around as the promising savior for the majority of that time already. Yet it’s only become relevant to the wider public in the last few years, with ISPs slowly adapting to offer native IPv6 connections. Meanwhile, IRC servers supported IPv6 at the end of the 90’s, providing an actual real-world application for the new protocol, and an incentive for projects like XS26 and SixXS that offered IPv6 access to the general public by tunneling it over IPv4. For normies, IPv6 is about magic. For IRC users, it’s real.For anyone interested in anything related to networks or server administration, this was a wonderfully exciting new playground, and with the incomprehensible vast amount of addresses available within the IPv6 space, you could keep yourself busy for days just thinking of ways to put in perspective the number of IP addresses you had at your own, personal disposal now. But while you could have used a unique IP for each and every website request you ever make, it was in the end IRC that provided the best experimental environment for it, especially as it meant a virtually unlimited amount of possible IRC connections. This made it a lot easier to run several clients at once, even offering it as a service to others, and of course increase the presence of botnets, both for good and for evil. After all, IRC has always been the early internet battle field. Its general structure with interconnected servers, and channels with different privilege levels and authorities easily attracted rivalry and caused power struggles. Taking over channels became a favorite pastime for some people, and entire IRC crews have formed with the sole intention to terrorize and seize power over channels. These were the untamed times of attacking individual network connections to remove the channel operators or protective bots, large-scale DDoS attacks against IRC servers to cause netsplits and gain operator status on an isolated server, compromising other machines to run additional clients or bots for stronger numbers, or to circumvent geographical limitations of servers in other parts of the world. While those attacks weren’t necessarily new, IRC warfare gave somewhat of a wider and seemingly less consequential purpose for them, even if it was just for virtual dominance and the ego. They became common enough to raise awareness of weaknesses and vulnerabilities in networks and operating systems these attacks were exploiting, which over time improved their overall security. IRC’s Influence On SocietyBut the technical aspects aside, IRC has always been social. Of course, communicating with strangers on the internet wasn’t new, UseNet and BBSes had been around for years, but connecting people all over the world with each other in real time offered whole new possibilities. Chances are you would find channels dedicated to your city or area, to your hobbies and other interests, and all kinds of general chitter-chatter. You could get in contact with strangers you probably never would have met otherwise, sharing the same interests and discussions, free from most bias and prejudice. You could get in touch with opinions and life circumstances outside your own bubble, and you could get to know a person without ever seeing them. The world felt never bigger yet so intimate at the same time. IRC formed a life of its own that overlapped with the real world, and sparked new ventures in the online world. Channels formed ecosystems of their own, a unity to identify with. They had their own websites and held semi-regular user meetings where everyone would gather in a pub or a field outside town. Offline relationships started in IRC. The anonymous strangers who you only referred to by their nick suddenly became real persons. Predecessors of social media platforms emerged to follow-up your IRC presence, with Finland’s irc-galleria still alive and kicking to this date. Altogether, it was a wild and oftentimes surreal experience — no doubt nostalgia plays its role here, too. But the internet has simply changed since. IRC servers were predominantly run by volunteers in universities, research institutes, ISPs, and some smaller, pioneering tech companies. It was a free and open space, a place for exploration, with all the pros and cons that comes along with that. It was a landscape of thousands of individual channels, all doing their own thing, having their own rules and customs, and their own set of people in charge to keep things in control. IRC operators kept an eye on the servers and the network itself, but generally didn’t bother much about channel-internal business if they weren’t actively a part of it, as long as everything else was peaceful. It was everyone for themselves, but still together. Sadly, that doesn’t fit too well in today’s surroundings anymore. THE FUTURE OF IRCSo, is Mozilla’s decisions to abandon IRC going to have a larger impact on the remaining networks? Probably not. IRC’s decline isn’t a recent development, and since irc.mozilla.org is a standalone system for development inside Mozilla itself, in the big picture, it’s really more their personal problem. But as mentioned in the beginning, with the right angle, they might contribute a worthy replacement — and that could be a whole different story for IRC itself then. Admittedly, IRC does feel archaic today, and clearly stems from a time where data didn’t just magically appear from a cloud and communication details weren’t abstracted away. And it didn’t have to, it was basically a given to familiarize oneself with enough knowledge up front to be able to navigate about, which also helped filtering out the normies from the real world pestering one’s sanctuary. That gatekeeping attitude doesn’t work anymore though. Once again, the internet has changed; the audience, the content, the majority parties running the show behind the curtain, and the way people communicate with each other online have just changed since “back in the day”. Simple text just won’t do it anymore, people need emojis and memes to express themselves nowadays. While some aspects of this change are of questionable value, others should be appreciated and considered as an achievement. With all the fond memories I have about the golden days of IRC, I very much enjoy the progress we have made since, and the fact how normal and everyday the internet in general has become. Still, none of the modern forms of communication can replace what IRC was, and still is. Sure, the concept of channels also exists in most modern systems, but the large-scale interconnectivity and openness of IRC doesn’t. It’s everyone for themselves more than ever, with commercial entities competing for users in their own, isolated environments. And it makes perfect sense from a professional point of view — you wouldn’t really want to have company-internal communication in a public IRC network. Setting up a private network is of course an option, but if you go that far, you might as well choose Slack or the likes, with all its conveniences and modern feel. But from an open source point of view, it doesn’t sound like a desirable future where every project has its own communication channels in place, separated from all other projects. Any sense of being a community in the bigger picture would simply be lost this way. Well, we will see what Mozilla’s next steps are. The good news is that even if they make the “wrong” decision, it’s unlikely that it will have any lasting effects on IRC itself. But it would be a greatly missed opportunity to create an updated version of IRC that would fit in today’s world. Posted in Featured, Interest, Original Art, SliderTagged cyber warfare, human interaction, internet relay chat, irc, lifestyle, mozilla, remembrance, social network, society
  11. A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices.According to research published by Trend Micro and Kaspersky, the "Operation Poisoned News" attack leverages a remote iOS exploit chain to deploy a feature-rich implant called 'LightSpy' through links to local news websites, which when clicked, executes the malware payload and allows an interloper to exfiltrate sensitive data from the affected device and even take full control.Watering-hole attacks typically let a bad actor compromise a specific group of end-users by infecting websites that they are known to visit, with an intention to gain access to the victim's device and load it with malware. read more here:  https://thehackernews.com/2020/03/iphone-iOS-spyware.html
  12. chain

    ChainScriptz

    So finally ChainScriptz has opened its own room on buzzen.its been long over due. Since i have plenty of time on my hands its time i start scripting again and playing around. this should be fun seeing an old goat like me scripting again lol.Hope to see you all drop in from time to time.
  13. been testing a script from Westor looks very good so far and many added modules. some modules havent been working so ive contacted him to see if hes still doing updates. but its been fun!!
  14. Microsoft today issued a new security advisory warning billions of Windows users of two new critical, unpatched zero-day vulnerabilities that could let hackers remotely take complete control over targeted computers. According to Microsoft, both unpatched flaws are being used in limited, targeted attacks and impact all supported versions of the Windows operating system—including Windows 10, 8.1 and Server 2008, 2012, 2016, and 2019 editions, as well as Windows 7 for which Microsoft ended its support on January 14, 2020. Both vulnerabilities reside in the Windows Adobe Type Manager Library, a font parsing software that not only parses content when open with a 3rd-party software but also used by Windows Explorer to display the content of a file in the 'Preview Pane' or 'Details Pane' without having users to open it. https://thehackernews.com/2020/03/windows-adobe-font-vulnerability.html
  15. Multiple zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots.The findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day vulnerabilities to spread Chalubo, FBot, and Moobot botnets at least since August 30, 2019.Netlab researchers said they reached out to LILIN on January 19, 2020, although it wasn't until a month later the vendor released a firmware update (2.0b60_20200207) addressing the vulnerabilities. https://thehackernews.com/2020/03/ddos-botnets-lilin-dvr.html
  16. Earlier
  17. chain

    Convid-19

    Im so getting fedup of this virus shit going on. Montreal Quebec goverment has now stated that all construction sites must halt for 3 weeks. and that everyone should stay home for 3 weeks also. now thats all good if your employed but being self employed is some what different we make from $1.000.00 to $6.000.00 to much more. ive invested all my money in a new house and im told to stay home? whis going to pay my mortgage ........ its a freaking cold virus and hit kills it. many sciencetists have proven that theory and to be honest for all that are stupid or dum this is a man made virus thanks to your goverment or political people that put it in play in china!! This shit is just for the economey to bring the stock market down and then regroup. yay we all have to suffer and also theres a video off saddum hussin talking about the convid-19 virus which the states was proposing to give him. anyways. once again because another country has the huge market they have to take them down and reassure they get back on top!!!
  18. A new simple but dangerous strain of Android malware has been found in the wild that steals users' authentication cookies from the web browsing and other apps, including Chrome and Facebook, installed on the compromised devices.Dubbed "Cookiethief" by Kaspersky researchers, the Trojan works by acquiring superuser root rights on the target device, and subsequently, transfer stolen cookies to a remote command-and-control (C2) server operated by attackers."This abuse technique is possible not because of a vulnerability in the Facebook app or browser itself," Kaspersky researchers said. "Malware could steal cookie files of any website from other apps in the same way and achieve similar results."Cookiethief: Hijacking Accounts Without Requiring PasswordsCookies are small pieces of information that's often used by websites to differentiate one user from another, offer continuity around the web, track browsing sessions across different websites, serve personalized content, and strings related to targeted advertisements. Given how cookies on a device allow users to stay logged in to a service without having to repeatedly sign in, Cookiethief aims to exploit this very behavior to let attackers gain unauthorized access to the victim accounts without knowing their actual online accounts passwords."This way, a cybercriminal armed with a cookie can pass himself off as the unsuspecting victim and use the latter's account for personal gain," the researchers said.Kaspersky theorizes that there could be a number of ways the Trojan could land up on the device — including planting such malware in the device firmware before purchase, or by exploiting vulnerabilities in the operating system to download malicious applications.Once the device is infected, the malware connects to a backdoor, dubbed 'Bood,' installed on the same smartphone to execute "superuser" commands that facilitate cookie theft.How Do Attackers Bypass Multi-Level Protection Offered by Facebook?Cookiethief malware doesn't have it all easy, though. Facebook has security measures in place to block any suspicious login attempts, such as from IP addresses, devices, and browsers that had never been used for logging into the platform before. But the bad actors have worked around the problem by leveraging the second piece of malware app, named 'Youzicheng,' that creates a proxy server on the infected device to impersonate the account owner's geographic location to make the access requests legitimate."By combining these two attacks, cybercriminals can gain complete control over the victim's account and not raise suspicion from Facebook," the researchers noted.It's not yet clear what the attackers are really after, but the researchers found a page found on the C2 server advertising services for distributing spam on social networks and messengers — leading them to the conclusion that the criminals could leverage Cookiethief to hijack users' social media accounts to spread malicious links or perpetuate phishing attacks.While Kaspersky classified the attack as a new threat — with only about 1,000 individuals targeted in this manner — it warned that this number is "growing" considering the difficulty in detecting such intrusions.To be safe from such attacks, it's recommended that users block third-party cookies on the phone's browser, clear the cookies on a regular basis, and visit websites using private browsing mode.Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
  19. Cybercriminals will stop at nothing to exploit every chance to prey on internet users. Even the disastrous spread of SARS-COV-II (the virus), which causes COVID-19 (the disease), is becoming an opportunity for them to likewise spread malware or launch cyber attacks. Reason Cybersecurity recently released a threat analysis report detailing a new attack that takes advantage of internet users' increased craving for information about the novel coronavirus that is wreaking havoc worldwide. The malware attack specifically aims to target those who are looking for cartographic presentations of the spread of COVID-19 on the Internet, and trickes them to download and run a malicious application that, on its front-end, shows a map loaded from a legit online source but in the background compromises the computer. New Threat With An Old Malware Component The latest threat, designed to steal information from unwitting victims, was first spotted by MalwareHunterTeam last week and has now been analyzed by Shai Alfasi, a cybersecurity researcher at Reason Labs. It involves a malware identified as AZORult, an information-stealing malicious software discovered in 2016. AZORult malware collects information stored in web browsers, particularly cookies, browsing histories, user IDs, passwords, and even cryptocurrency keys. read more here: https://thehackernews.com/2020/03/coronavirus-maps-covid-19.html
  20. It Is Your Choice I love bacon. Sometimes I eat it twice a day. It helps take my mind off the terrible chest pains I keep getting.
  21. Pk_

    The Chat Club

    New Site Update!
  22. My sister is marrying an organ thief. She says she wants a man after her own heart, someone who can de-liver her from her troubles, and who'll take care of her two little kidneys after she's gone.
  23. WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing our app safety discussion, we’re diving into some of the top security hacks and questions many WhatsApp app users and parents may have. But first, what’s a security hack? In short, it’s an attempt to exploit the weaknesses in an app, network, or digital service to gain unauthorized access, usually for some illicit purpose. Here are just some of the concerns WhatsApp users may have and some suggestions on boosting security. WhatsApp Hack FAQAre WhatsApp conversations private? Yes — but there are exceptions. More than any other app, WhatsApp offers greater privacy thanks to end-to-end encryption that scrambles messages to ensure only you and the person you’re communicating with can read your messages or listen to your calls. Here’s the catch: WhatsApp messages (which include videos and photos) are vulnerable before they are encrypted and after they are decrypted if a hacker has managed to drop spyware on the phone. Spyware attacks on WhatsApp have already occurred. Safe Family Tip: No conversation shared between devices is ever 100% private. To increase your WhatsApp security, keep sensitive conversations and content offline, and keep your app updated.  Can anyone read my deleted WhatsApp messages? A WhatsApp user can access his or her own deleted messages via the chat backup function that automatically backs up all of your messages at 2 a.m. every day. WhatsApp users can delete a message by using the Delete for Everyone button within an hour after sending though it’s not foolproof. Here’s the catch: Anyone who receives the message before it’s deleted can take a screenshot of it. So, there’s no way to ensure regrettable content isn’t captured, archived, or shared. There are also third-party apps that will recall deleted messages shared by others. Another possibility is that a hacker can access old chats stored in an app user’s cloud. Safe Family Tip: Think carefully about sharing messages or content you may regret later. Can WhatsApp messages be deleted permanently? Even if a WhatsApp user decides to delete a message, it’s no guarantee of privacy since conversations are two-way, and the person on the receiving end may screenshot or save a copy of a chat, video, or photo. On the security side, you may delete a message and see it disappear, but WhatsApp still retains a “forensic trace of the chat” that can be used by hackers for mining data, according to reports. Safe Family Tip: For extra security, turn off backups in WhatsApp’s Settings. How can I secure my WhatsApp? It’s crucial when using WhatsApp (or any other app) to be aware of common scams, including malware, catfishing, job and money scams, spyware, and file jacking. To amplify security, turn on Security Notifications in Settings, which will send an alert if, for some reason, your security code changes. Other ways to boost security: Use two-step verification, never share your 6-digit SMS verification code, disable cloud back up, and set your profile to private. Safe Family Tip: Install comprehensive family security software and secure physical access to your phone or laptop with a facial, fingerprint, or a passcode ID. Don’t open (block, report) messages from strangers or spammers. Never share personal information with people you don’t know.  How do I delete my WhatsApp account from another phone? To delete a WhatsApp account go to > Settings > Account > Delete My Account. Deleting your account erases message history, removes you from groups, and deletes your backup data. According to WhatsApp, for users moving from one type of phone to another, such as from an iPhone to an Android, and keeping the same phone number, your account information stays intact, but you won’t be able to migrate messages across platforms. If you’re not keeping your number, you should delete WhatsApp from your old phone, download WhatsApp to your new phone, and verify your new phone number. Upgrading the same phone type will likely include options to migrate messages. Safe Family Tip: Before you give away or exchange an old phone, wipe it clean of all your data. How do you know your WhatsApp is scanned? WhatsApp users can easily sync devices by downloading the WhatsApp web app and activating it (Settings > WhatsApp Web/Desktop). Devices sync by scanning a QR code that appears on your laptop screen. You know your device is scanned when you see the green chat screen appear on your desktop. Safe Family Tip: It’s possible for a person with physical access to your desktop to scan your QR code and to gain account access. If you think someone has access to your account log out of all your active web sessions in WhatsApp on your mobile phone. How long are WhatsApp messages stored? According to WhatsApp, once a user’s messages are delivered, they are deleted from WhatsApp servers. This includes chats, photos, videos, voice messages, and files. Messages can still be stored on each individual’s device. Safe Family Tip: The moment you send any content online, it’s out of your control. The person or group on the receiving end can still store it on their device or to their cloud service. Never send risky content.  How secure is WhatsApp? There’s no doubt, end-to-end encryption makes it much more difficult for hackers to read WhatsApp messages. While WhatsApp is more secure than other messaging apps — but not 100% secure. Is it true that WhatsApp has been hacked? Yes. Several times and in various ways. No app, service, or network has proven to be unhackable. Safe Family Tip: Assume that any digital platform is vulnerable. Maximize privacy settings, never share risky content, financial information, or personal data. Is WhatsApp safe to send pictures? Encryption ensures that a transmission is secure, but that doesn’t mean WhatsApp content is safe or that human behavior is predictable. People (even trusted friends) can share private content. People can also illegally attempt to gain access to any content you’ve shared. This makes WhatsApp (along with other digital sharing channels) unsafe for exchanging sensitive information or photos. Safe Family Tip: Nothing on the internet is private. Never send or receive pictures that may jeopardize your privacy, reputation, or digital footprint. WhatsApp isn’t the only popular app with security loopholes hackers exploit. Every app or network connected to the internet is at risk for some type of cyberattack. We hope this post sparks family discussions that help your kids use this and other apps wisely and helps keep your family’s privacy and safety online top of min Source: https://www.mcafee.com/
  1. Load more activity

Copywrite © 2020 ChainScriptz

×
  • Create New...