search files, exploits & links sections:


You're not registered and logged, please click here to register.

sms news
Gates addresses spam and security flaws at this years Comdex in Vegas
Nov 18 2003, 00:23 (UTC+0)
From: x :
   Addressing a more buttoned-down crowd than in past years, Microsoft Chairman Bill Gates attempted Sunday to usher in a new era of computing he dubbed "seamless computing." Gates' annual Comdex address, his 20th, was designed to outline the promise of new software as well as the pitfalls of spam and security threats. Despite the challenges, Gates made his case that breakthroughs will make computing a more painless and rewarding experience.

read comments (0)
write comment

Attack code surfaces for latest Windows holes
Nov 17 2003, 19:40 (UTC+0)
From: hx :
   Two examples of "exploit" code for a buffer overrun in the Windows Workstation Service were posted to security-related Internet discussion groups on Friday and Saturday. Both exploits have been tested and work, according to Dan Ingevaldson, director of X-Force at Internet Security Systems Inc. (ISS).
The Workstation Service vulnerability was disclosed by Microsoft Corp. in Security Bulletin MS03-049, which was released on November 11. The service is turned "on" by default in Windows 2000 and Windows XP systems and allows computers on a network to connect to file servers and network printers, Microsoft said.
read more

read comments (0)
write comment

Technology Report: The To-Do List: Keep Hackers Out
Nov 17 2003, 05:04 (UTC+0)
From: x :
   IF THERE IS one organization that would be able to secure a computer database, you'd think it would be the U.S. Navy.

Think again.

In August, the Navy said the numbers of 13,000 purchase cards it issues for work-related purchases were stolen from its electronic files. The purchase cards, up to $2,500 per card holder, were linked to a Navy bank account. The Navy declines to say how the attack took place or whether human error was involved, but it has yet to detect a purchase attempt with any of the numbers.

read comments (1)
write comment

Latest Mimail worm has new trick
Nov 15 2003, 07:44 (UTC+0)
From: hx :
   The latest variant of the computer worm Mimail contains a new trick to harvest credit card details - a fake security program that in fact emails the details off to the virus's creators.
The worm is aimed at users of Paypal, a popular method of internet payment among online shoppers. Infected emails carry the subject line "YOUR PAYPAL.COM ACCOUNT EXPIRES" and pose as a security update. The email threatens to close the recipient's account if they do not obey the update instructions it gives.
Cleverly, the email warns readers not to send their details back by return email. Many users now know this is insecure and that companies never request this.
read more

read comments (0)
write comment

Banking Scam Revealed
Nov 15 2003, 03:05 (UTC+0)
From: x :
   Not all people that send undesirable email (spam) are the same. Their motives differ as greatly as their tools and technical abilities. This document uncovers a spam gang who seeks to acquire your banking information, and the response from one of the targeted victims: Citibank.
This document describes the unique bulk-mailing tool used for recent rash of financial email scams. These scams target financial entities such as Citibank, Wells Fargo, Halifax Bank, eBay, and Yahoo. Only one specific spam gang uses this tool for these financial scams.

read comments (0)
write comment

logged users

active for last 5 minutes

Standard user

registered users:83420

There are currently 11 registered users and 106 guests browsing the website.


SSH Authentication: A Basic Overview
@ Articles     Oct 19 2003, 06:15 (UTC+0)

danielrm26 writes: SSH is one of the premier Security tools in use today. SSH is most commonly used to gain a remote shell, but it can be used for file transfers, to display remote X applications on a local machine, and even to securely connect to services that lack encryption. Unfortunately, many who use it from day to day don’t have a good understanding of how it actually works. Many people know that SSH1 is deprecated, and that SSH2 has taken its place, but how many know how authentication actually works for both? I didn’t, and that bothered me, so I set out to do some research.

read comments (32) / write comment

recent comments:
Nifty Trickmstevens10.Nov:01:52
What is the Shared Value?DarkPheonix208501.Nov:01:12
Fantastic Subjectlover_student30.Oct:15:09
SSH 3digital_abuzer28.Oct:15:24
. . .

views: 8446   printer-friendly version
score: 3.46 \ votes: 26     vote: :

the older posts:

even older posts...

latest vulnerabilities
SAP DB priv. escalation/remote code execution (General) 18 Nov 2003
[SECURITY] [DSA 402-1] New minimalist package fixes remote command execution (Linux)
[SECURITY] [DSA 401-1] New hylafax packages fix remote root exploit (Linux)
pServ 2.0.x:beta webserver remote buffer overflow exploit by jsk (Other) 15 Nov 2003
UnAce 2.20 Exploitable Stack-Based Overflow (exploit code) (Other)
Quagga remote vulnerability (Other) 14 Nov 2003
OpenLinux: unzip directory traversal (Linux)
NSFOCUS SA2003-07: HP-UX Software Distributor Buffer Overflow Vulnerability (Other)
[RHSA-2003:307-01] Updated zebra packages fix security vulnerabilities (Linux)
[RHSA-2003:313-01] Updated PostgreSQL packages fix buffer overflow (Linux)
- more...

file archive & links database

See new additions. Suggest a site to newOrder. There are 4201 link and files in the database. Contact the webmaster.

Anonymity  anonymous remailers, proxies, public services
Archive sites  various file and documantation archives
Books and guides  the literature
CGI/Web security  web based attacks
Code cracking  and reverse engineering
Cryptography  algorithms, resources, software
Culture  What we like and do
Distributed Computing  Put your idle processor power to use
DVD  related stuff
e-mail security & utils  literature and software
Emulation  Various Emulators for your games and apps ...
Exploits  for various operating systems
Free speech and Law  electronic privacy, the law, organizations, free speech related stuff
Hacking Challenges  Harmless Hacking / Educational Hacking / Sites specially made for hacking
Hardware and Electronics  How to alter and modify hardware and electronic devices in the most amazing ways
ICQ  exploits and utils, tools for i.c.q.
IRC  botting, scripting and exploiting Internet Relay Chat
Macintosh security  Prevent your Apple from being hacked
Members Sites  Sites created by users here at Neworder
Novell security  info about Novell
Phreaking  boxes, phone utils, manuals
Satellite pay-tv stuff  sites and utils
Security  security in general, portals, news sites, directories, commercial
Teams and advisories  the scene, groups, own tools production, security research
Unix - Linux  unixes' related information, articles, exploits, tools
Utilities  tools, misc
Virii  sites dedicated to inform about viruses, trojans .. antiviral software
Windows security  who'll hack your windoze?
Wireless  802.11 security
Zines  mags, underground e-zines...


NO image gallery
Nov 14, 2003

click on the picture to enlarge and see description

read comments (43)
write comment

view archive

submit a picture to gallery

If you would like to submit your own photograph for NO image gallery send your photograph with description to


post news


file and links archive

free classifieds

merry pranksters!

recent blog entries
dzt Nov 16, 05:09
SPENEN Nov 13, 18:47
iHGMP Nov 13, 01:56
grinler Nov 10, 20:28
welder_garrido Nov 10, 12:32

view blogs

featured download

GFI LANguard Network Security Scanner:   Scans your entire network, IP by IP, for possible security holes. Free for non commercial use.

download here

select a language


    #10 - Jan 03
    #8/9 - Jun 02
    #7 - Dec 01/Jan 02
    #6 - Nov, 10 2001
    #5 - Oct, 12 2001
    #4 - Sep, 3 2001
    #3 - Aug, 10 2001
    #2 - Jul, 21 2001
    #1 - Jul, 10 2001


New Order FAQ


linking & backends
Information about how to link to NewOrder.

New Order news backend or more advanced version.




Get your very own New Order, Unhackable Tanktop, Cult of the Dead Rabbit, or Astalavista shirts now!

legal & advertising

  • The privacy policy statement for box network

  • Advertise on New Order website

    Best way to get rid of junk e-mail?

     Government regulation6 votes
     "Do not spam" list0 votes
     New e-mail protocols to allow better filtering4 votes
     Filtering on the mail server8 votes
     Rule-based filtering on the client0 votes
     Bayesian filtering on the client3 votes
     Nothing, it's a part of free speech0 votes
     Break the fingers of all spammers41 votes
     Raid Nigeria and find that guy who is heir to the fortume1 votes
    total votes: 63
    read comments (13)
    write comment

    Poll archive

  • powered by

    (c) 1996-2002 Box Network team,
    all the other who helped or will help and the community.