chain

Administrators
  • Content count

    4,102
  • Joined

  • Last visited

Community Reputation

11 Good

5 Followers

About chain

  • Rank
    Founder Owner Administrator
  • Birthday 01/26/1962

Contact Methods

  • Website URL
    http://chainscriptz.net

Profile Information

  • Gender
    Male
  • Location
    Montreal,Quebec
  • Interests
    scripting and chatting

Recent Profile Visitors

23,142 profile views
  1. I have worked on BackLash V3 for Spcn I had it in dangers room. still a few things to take out and then work in but it works great.
  2. News Snippet

    Instructions: Copy/Paste in remote (ALT+R). News commands; !add-news [Adds a new news.] !del-news [Delete news.] !clear-news [Delete all news / clears the news list.] !news [Shows you the news list.] on *:load:{ set %news.num 0 | set %news.channel $$?="Enter your news channel" } on @*:text:*:%news.channel:{ if ($nick isop #) { if ($1 == !add-news) { if ($2) { inc %news.num | .write news.txt $2- | notice $nick Done, add $2- to news list. } else { notice $nick Syntax error: Usage: !add-news Line. } } if ($1 == !del-news) { if ($2) { if ($2 !isnum) { .notice $nick Syntax error: Usage: !del-news <LINE> } elseif ($2 <= %news.num) { .notice $nick Deleted $read(news.txt,$2) from news list. | .write $+(-,d,l,$2) news.txt | dec %news.num } else { .notice $nick Line $2 dowsnt exist. } } else { .notice $nick Syntax error: Usage: !del-news Line } } if ($1 == !news) { run-news %news.channel } if ($1 == !clear-news) { .write -c news.txt | .notice $nick Done, Remove %news.num lines from news list. | set %news.num 0 } if ($1 == !commands) { .msg %news.channel (- News-Commands: !news , !add-news , !del-news , !clear-news -) } } } alias run-news { if (%news.num != 0) { .mode $1 +m .play -a msg $1 news.txt 1 .timerENEWS $calc(%news.num +2) 1 .mode $1 -m } else { msg $1 There is no news for now. } } xelent
  3. Revised proposals attempt to address worries over Manifest v3 API changes. Google has proposed changes to its Chrome Extension renovation plan that answer some but not all of the concerns its Manifest v3 technical specification. The initial changes, announced in October last year, set off alarm bells last month when a critical mass of Chrome plugin developers finally realized what Google intended. The Manifest v3 changes represent an attempt to address real issues for users of the Chrome browser, specifically the security and performance implications of third-party code that has access to sensitive data. But the fixes Google initially suggested have broad implications. The Manifest v3 specification would break content and ad blockers, privacy extensions, and a host of other browser add-on code that relies on the ability to intercept requested web content before it gets rendered in the browser. Much of the angst arises from planned changes to the webRequest API, through which Chrome extensions handle incoming web content; Google wants to limit the API and replace it with a neutered version, the declarativeNetRequest API. The trouble is that as initially outlined, declarativeNetRequest is far too limited to accommodate current use cases. If implemented, existing extensions like uBlock Origin will have to be rewritten and won't have the same functionality regardless. Other technical changes have been floated that represent potential problems for existing code, like changes to background pages, but declarativeNetRequest represents the major sticking point. On Friday, Google software engineer Devlin Cronin published an update on Google's plans, insisting that there's too much abuse to maintain the status quo. "Users need to have greater control over the data their extensions can access," he wrote in a message posted to the Chromium Extensions discussion group. At the same time, he reiterated Google's interest in input from the developer community and offered evidence that Google is listening by outlining a less awful version of the declarativeNetRequest API. The tweaked spec will include support for dynamic rules – which content blockers formulate based on incoming content rather than declaring them ahead of time. "We agree that this is valuable in creating sophisticated content blocking extensions, and will be adding support for declarative rules that can be added or removed at runtime to the declarativeNetRequest API," Cronin said. The API will also be able to handle more than 30,000 rules, though how many isn't clear. Cronin insists the number cannot be unbounded to ensure adequate performance. And it will include expanded matching capabilities – necessary for effective filtering – and some request modification capabilities, like the ability to strip cookies. "We are also investigating other conditions and actions that may make sense to add, such as matching based on top-level domain," said Cronin. Other potential issues, like the difficulty of using ServiceWorkers as a replacement for persistent background pages to handle resource-intensive background processes like decryption and DOM parsing, are also being evaluated. "We won’t launch Manifest V3 until it is ready, and there will be a migration period in which we can continue to address feedback and issues," said Cronin. "We will not remove support for Manifest V2 until we are confident in the platform.nge By Thomas Claburn in San Francisco 16 Feb 2019 at 01:48
  4. Get an update, or risk giving a dodgy user or malware an upgrade Canonical has issued an update for Ubuntu to address a security vulnerability that can be exploited by malware and rogue users to gain root access. As this bug affects desktop and server editions of the Linux distro, this is an irritating flaw for folks using shared systems, such as labs or offices of workstations. Chris Moberly gets credit for the discovery and reporting of the flaw in question, CVE-2019-7304, which is an elevation-of-privilege vulnerability present in Ubuntu versions prior to 19.04. To reiterate, the flaw is not remotely exploitable, so a miscreant would need to already have a foothold on victim's machine. "Current versions [before 19.04] of Ubuntu Linux are vulnerable to local privilege escalation due to a bug in the snapd API. This local service installs by default on both 'Server' and 'Desktop' versions of Ubuntu and is likely included in many Ubuntu-like Linux distributions," Moberly said in his report. "Any local low privilege user can exploit this vulnerability to obtain immediate root access to the server." The vulnerability is found in Snapd, Canonical's open-source toolkit for packaging and running applications via systemd. Exploiting the flaw would allow an attacker to elevate their access from unprivileged process to that of the root user, essentially allowing a complete takeover of the system. Moberly found that, by abusing the way Snapd's API handles HTTP data requests, the tool could be tricked into believing the user has a uid of 0, aka the root user. This would let an attacker use functions reserved for the superuser, and eventually take over the box. Rather than being a memory corruption bug – the code in question is written in Go, after all – this is a cockup in handling submitted text. For those so inclined, Moberly has developed a proof-of-concept script called "dirty sock" that shows how an exploit would operate in the wild. Canonical has since addressed the flaw, so run your usual package update cycle to get the fix. The snapd tool itself is fixed by updating to version 2.37.1. Ubuntu users who do install the update should also take a moment to make sure they have updated their versions of Flash Player. Yesterday, Adobe posted a fix for an information disclosure bug as part of its Patch Tuesday dump. By Shaun Nichols in San Francisco 14 Feb 2019 at 07:33
  5. Microsoft on Friday took the unprecedented step of skipping one of its Windows 10 feature upgrades when it began distributing a preview of the first 2020 update to the most daring testing volunteers. Usually, as one feature upgrade nears release, Microsoft starts giving some Windows Insider participants - those who opted for the "Skip Ahead" channel - a look at the following feature upgrade. Currently, Microsoft is getting close to wrapping up 2019's first upgrade, which will almost certainly be labeled "Windows 10 April 2019 Update" and carry the numeric tag of 1903. In its now-standard practice, https://www.itworld.com/article/3340825/microsoft-windows/microsoft-shoves-some-windows-10-testers-into-next-year-with-early-look-at-2020-feature-upgrade.html
  6. The White House said Trump intends to redirect money from the military and the Treasury to fund his wall — a plan likely to meet with swift legal challenge. https://www.nbcnews.com/politics/politics-news/trump-declare-national-emergency-obtain-billions-border-wall-n972021
  7. Well its been awhile since I've actually talked about chatrooms & server's I had Finally connected with Multiconn to Sparkpea and entered IRCommunity & the famous MSHS chat rooms. well to my surprised I was greeted with the highest respect in any chat server. I have encountered a lot of the old scripters on this server and redoing scripts plus new scripters working on scripts. I have stepped off that platform years ago when i had left another server to move on and live life. Sparkpea server means a lot to me because thats where most of the old scripters rekindled after MSN chat Closed. I had many fond memories on that chat server. Hizpower,Casa,Tank,Crayton,David, and many more the list can keep going on and on. when i hit sparkpea and hooked up with Hiz we became a huge scripting team. Hiz had showed me so many things and i just took to them and developed a skill i didnt thing i had in me. Now once agin the room is open and yes the memories are there but now theres mixed with some old and new scripters and I like the balance very much. I think they have a done a great job on recovering from all the bad issues from the past and have brought forward a new begining to a very respected chat server. Im proud to be back and sit & watch as scripters play and script in the room. To Paige my lil sister keep going you bring pride in the world of scripting!! Roo as usual love the scripting and the talks of the old days!! Winz you have great skills and never let anyone tell you different its what makes a scripter strong!! Shannons69 Continue scripting as like MSN days!! And to the rest have fun and enjoy chatting!!
  8. Project Sparky

    Project Sparky View File mIRC Version 7.55 Designed by: Paige Coded by: Winz Word Art by: http://cooltext.com 2019 Project Sparky is currently in its BETA Release stage. So please please provide your feedback so we can make Project Sparky better. At some point we would like to release Project Sparky for all chat server types but currently, it is built and tested on SPCN IRCwx Protocol. You can see what is going on in all channels you are in so to talk in a particular channel, be sure to click on the channels name in the Open Channels list box. Submitter chain Submitted 02/14/2019 Category Sparkpea Scripts (ircwx)  
  9. Project Sparky

    I have tested the New script done by paige & Winz called Project Sparky. I tested it today and was such user friendly. The script itself is quite different never seen before, the script is sound!! Im looking forward to seeing this go IRC. Congrads to paige & Winz on a great scripting job.
  10. EggDrop Install irc

    This will show you how to Install an eddDrop Bot on your irc server
  11. Youtube find

    I was looking at stuff on youtube and came across this.
  12. Mozilla's Firefox wrapped up a two-month resurgence this week, clawing back some previously-lost user share to return to a level last seen in the middle of 2018. The open-source browser remains the only major browser committed to using a rendering engine that is not based on Google's Blink or its predecessor, WebKit. According to web analytics vendor Net Applications, Firefox's share rose by three-tenths of a percentage point in January, reaching 9.9%. The increase was the second consecutive month of user share growth and put Firefox back where it was last June. Firefox's gains were important, as the browser flirted with dangerous territory as recently as November, when it slumped to below 9%. The trend at the time looked nasty; if the declines had continued at the 12-month average pace, Firefox would have fallen below 7% by August 2019. The increases of the last two months have altered that forecast. The 12-month average, if continued, would still erode Firefox's user share, but at a much slower tempo: the browser should remain above 9% throughout this year, falling under that bar only in January 2020. If Mozilla maintains the Firefox user share recovery, its efforts to revitalize the browser - starting with the November 2017 debut of Firefox Quantum - will be validated. What's unclear is whether that work will simply let Firefox survive or if it can trigger a return to a time when the browser was in solid second place (then behind IE) with a quarter of the world's share. The browser maker does have a message that may resonate in 2019: On Windows, it will soon be the only major browser running on non-Google technologies. In December, Microsoft announced that it would abandon its home-grown rendering and JavaScript engines for those built by Chromium, the open-source project led by Google. Mozilla has already used that to argue people should download and try Firefox, and certainly will do so again. [ Got a spare hour? Take this online course and learn how to install and configure Windows 10 with the options you need. ]Net Applications calculates user share by detecting the agent strings of the browsers people run to reach the websites of Net Applications' clients. The firm tallies the visitor sessions rather than count users, as it once did. In other words, Net Applications' data best illustrates user activity. https://www.itworld.com/article/3199425/web-browsers/top-web-browsers-2019-firefox-scores-second-straight-month-of-share-growth.html
  13. Update (Feb 6): We have updated the post to clarify a protocol used in the design is centered around private set intersection.Google helps keep your account safe from hijacking with a defense in depth strategy that spans prevention, detection, and mitigation. As part of this, we regularly reset the passwords of Google accounts affected by third-party data breaches in the event of password reuse. This strategy has helped us protect over 110 million users in the last two years alone. Without these safety measures, users would be at ten times the risk of account hijacking.We want to help you stay safe not just on Google, but elsewhere on the web as well. This is where the new Password Checkup Chrome extension can help. Whenever you sign in to a site, Password Checkup will trigger a warning if the username and password you use is one of over 4 billion credentials that Google knows to be unsafe.Password Checkup was designed jointly with cryptography experts at Stanford University to ensure that Google never learns your username or password, and that any breach data stays safe from wider exposure. Since Password Checkup is an early experiment, we’re sharing the technical details behind our privacy preserving protocol to be transparent about how we keep your data secure. https://security.googleblog.com/2019/02/protect-your-accounts-from-data.html
  14. During its incessant web crawling, Google's search engine constantly encounters credentials dumped by hackers or left exposed by the careless. And because it can, the ad confectionery copies and encrypts these spilled usernames and passwords. Armed with this info, the Chocolate Factory directed its software engineers, in conjunction with crypto boffins from Stanford University, to create a Chrome browser extension called Password Checkup that allows Chrome users to check to see whether their passwords can be found online. The hope is that users thus warned will get the hint and change the compromised secret. Mozilla's rival browser Firefox implemented a similar service last year called Firefox Monitor that checks a third-party database of exposed credentials called HaveIBeenPwned.com. Users of password management app 1Password also have access to an extension that checks stored credentials against exposed ones using the same service. Google's Password Checkup extension takes a similar approach with its internal dataset of 4bn identifiers. Your password is safe - trust usMembers of Google's security and anti-abuse research team – Jennifer Pullman, Kurt Thomas, and Elie Bursztein – claim that "Google never learns your username or password" even through it collects the data. "At a high level, Password Checkup needs to query Google about the breach status of a username and password without revealing the information queried," the trio explain in a blog post today. "At the same time, we need to ensure that no information about other unsafe usernames or passwords leaks in the process, and that brute force guessing is not an option." The company's supposed ignorance of these secrets arises from repeated hashing and privacy techniques like single-party private information retrieval (PIR) and 1-out-of-N oblivious transfer. https://www.theregister.co.uk/2019/02/05/google_leaked_passwords_chrome_extension/
  15. Lauri Love Pic: Katherine Da Silva / Shutterstock.comLauri Love, the Brit who beat US attempts to extradite him over accusations of hacking, is suing Blighty's National Crime Agency (NCA) to get back computing gear seized in 2013 as part of the case against him. More than five years ago, Love was indicted across the pond over allegations he hacked thousands of PCs in America and other countries, inserting backdoors into networks with the aim of circling back at a later date to pilfer confidential data. It was alleged Love had breached the security of NASA, the US military, and other government agencies. The following year, 2014, Uncle Sam added the Federal Reserve to that list. https://www.theregister.co.uk/2019/02/06/lauri_love_to_sue_national_crime_agency_uk/