Jump to content

All Activity

This stream auto-updates     

  1. Today
  2. theeternalwanderer

    AJUTOR: Decodare javascript ?

    Trece traficul prin Burp si vezi exact ce requesturi se fac - daca dupa verificarea initiala nu primesti un token unic care trebuie inclus in urmatoarele requesturi atunci exista posibilitatea sa eviti validarea cu totul. In caz contrar ai spus ca requestul initial de verificare nu se schimba deci trebuie doar sa faci acelasi request si sa extragi tokenul unic care sa fie inclus in celelalte requesturi. Solutia ghetoo pentru mine ar fi sa folosesc cURL ca sa produc requesturile necesare, grep/cut/awk/sed ca sa extrag token-ul si cURL din nou ca sa cer datele pe care le vroiam in primul rand. Le bagi intr-un script Bash si ai terminat. Mai detaliat de atat nu pot sa fiu fara sa vad toate requesturile si raspunsurile care vin/pleaca din browserul tau.
  3. Wav3

    Impunere interval minim intre topicuri

    Atunci este ceva setare de activat din admin sa putem da unsubscribe? De regula intru pe forum de pe telefon si dau jos de tot la feed..si de la un capat la altul acelasi user (nu zic neaparat de OKQL). Daca nu e, tabel de relatii cu fk_user, fk_object, object_type (user, category, topic), butoane pentru insert in tabel si subquery pe tabel cand se extrag posturile din newsfeed xD
  4. Nytro

    Impunere interval minim intre topicuri

    Si eu postez la fel uneori. Ideea e ca acele posturi sunt utile. Printre posturile lui @OKQL am gasit lucruri despre care nu stiam, si in general sunt la curent cum cam tot ce apare.
  5. OKQL

    Impunere interval minim intre topicuri

    doua stiri am postat man
  6. salt-scanner Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration Features Slack notification and report upload JIRA integration OpsGenie integration Requirements Salt Open 2016.11.x (salt-master, salt-minion)¹ Python 2.7 salt (you may need to install gcc, gcc-c++, python dev) slackclient jira opsgenie-sdk Note: Salt Master and Minion versions should match. Salt-Scanner supports Salt version 2016.11.x. if you are using version 2017.7.x, replace "expr_form" with "tgt_type" in salt-scanner.py. Usage $ ./salt-scanner.py -h ========================================================== Vulnerability scanner based on Vulners API and Salt Open _____ _ _ _____ / ___| | | | / ___| \ `--. __ _| | |_ \ `--. ___ __ _ _ __ _ __ ___ _ __ `--. \/ _` | | __| `--. \/ __/ _` | '_ \| '_ \ / _ \ '__| /\__/ / (_| | | |_ /\__/ / (_| (_| | | | | | | | __/ | \____/ \__,_|_|\__| \____/ \___\__,_|_| |_|_| |_|\___|_| Salt-Scanner 0.1 / by 0x4D31 ========================================================== usage: salt-scanner.py [-h] [-t TARGET_HOSTS] [-tF {glob,list,grain}] [-oN OS_NAME] [-oV OS_VERSION] optional arguments: -h, --help show this help message and exit -t TARGET_HOSTS, --target-hosts TARGET_HOSTS -tF {glob,list,grain}, --target-form {glob,list,grain} -oN OS_NAME, --os-name OS_NAME -oV OS_VERSION, --os-version OS_VERSION $ sudo SLACK_API_TOKEN="EXAMPLETOKEN" ./salt-scanner.py -t "*" ========================================================== Vulnerability scanner based on Vulners API and Salt Open _____ _ _ _____ / ___| | | | / ___| \ `--. __ _| | |_ \ `--. ___ __ _ _ __ _ __ ___ _ __ `--. \/ _` | | __| `--. \/ __/ _` | '_ \| '_ \ / _ \ '__| /\__/ / (_| | | |_ /\__/ / (_| (_| | | | | | | | __/ | \____/ \__,_|_|\__| \____/ \___\__,_|_| |_|_| |_|\___|_| Salt-Scanner 0.1 / by 0x4D31 ========================================================== + No default OS is configured. Detecting OS... + Detected Operating Systems: - OS Name: centos, OS Version: 7 + Getting the Installed Packages... + Started Scanning '10.10.10.55'... - Total Packages: 357 - 6 Vulnerable Packages Found - Severity: Low + Started Scanning '10.10.10.56'... - Total Packages: 392 - 6 Vulnerable Packages Found - Severity: Critical + Finished scanning 2 host (target hosts: '*'). 2 Hosts are vulnerable! + Output file created: 20170622-093138_232826a7-983f-499b-ad96-7b8f1a75c1d7.txt + Full report uploaded to Slack + JIRA Issue created: VM-16 + OpsGenie alert created$ ./salt-scanner.py -h ========================================================== Vulnerability scanner based on Vulners API and Salt Open _____ _ _ _____ / ___| | | | / ___| \ `--. __ _| | |_ \ `--. ___ __ _ _ __ _ __ ___ _ __ `--. \/ _` | | __| `--. \/ __/ _` | '_ \| '_ \ / _ \ '__| /\__/ / (_| | | |_ /\__/ / (_| (_| | | | | | | | __/ | \____/ \__,_|_|\__| \____/ \___\__,_|_| |_|_| |_|\___|_| Salt-Scanner 0.1 / by 0x4D31 ========================================================== usage: salt-scanner.py [-h] [-t TARGET_HOSTS] [-tF {glob,list,grain}] [-oN OS_NAME] [-oV OS_VERSION] optional arguments: -h, --help show this help message and exit -t TARGET_HOSTS, --target-hosts TARGET_HOSTS -tF {glob,list,grain}, --target-form {glob,list,grain} -oN OS_NAME, --os-name OS_NAME -oV OS_VERSION, --os-version OS_VERSION $ sudo SLACK_API_TOKEN="EXAMPLETOKEN" ./salt-scanner.py -t "*" ========================================================== Vulnerability scanner based on Vulners API and Salt Open _____ _ _ _____ / ___| | | | / ___| \ `--. __ _| | |_ \ `--. ___ __ _ _ __ _ __ ___ _ __ `--. \/ _` | | __| `--. \/ __/ _` | '_ \| '_ \ / _ \ '__| /\__/ / (_| | | |_ /\__/ / (_| (_| | | | | | | | __/ | \____/ \__,_|_|\__| \____/ \___\__,_|_| |_|_| |_|\___|_| Salt-Scanner 0.1 / by 0x4D31 ========================================================== + No default OS is configured. Detecting OS... + Detected Operating Systems: - OS Name: centos, OS Version: 7 + Getting the Installed Packages... + Started Scanning '10.10.10.55'... - Total Packages: 357 - 6 Vulnerable Packages Found - Severity: Low + Started Scanning '10.10.10.56'... - Total Packages: 392 - 6 Vulnerable Packages Found - Severity: Critical + Finished scanning 2 host (target hosts: '*'). 2 Hosts are vulnerable! + Output file created: 20170622-093138_232826a7-983f-499b-ad96-7b8f1a75c1d7.txt + Full report uploaded to Slack + JIRA Issue created: VM-16 + OpsGenie alert created You can also use Salt Grains such as ec2_tags in target_hosts: $ sudo ./salt-scanner.py --target-hosts "ec2_tags:Role:webapp" --target-form grain Slack Alert TODO Clean up the code and add some error handling Use Salt Grains for getting the OS info and installed packages [1] Salt in 10 Minutes: https://docs.saltstack.com/en/latest/topics/tutorials/walkthrough.html Download: salt-scanner-master.zip or: git clone https://github.com/0x4D31/salt-scanner.git Source
  7. axln

    Informatica la academia militara

    Ce am eu a face cu aceste injurii? Mie îmi miroase urât abuzul şi nu mă apropii de ele. Lent dar sigur băncile româneşti au fost nu privatizate, adică trecute în proprietatea cetățenilor, ci cedate către străini, banii obținuți finanțând ceva abstract, "tranziția" ... adică ce? Aderarea la UE? De ce nu facem măcar absorbția de fonduri UE atunci? La NATO? Atunci de ce trage Armata în cetățenii care comentează? România are o criză mai serioasă decât apare în presă.
  8. Nu se poate pune un interval in minute intre crearea de topicuri noi de catre acelasi user? Cand se apuca OKQL sa bage copy-paste in Stiri, se duce pe garla tot news feed-ul, nu mai vezi nimic, stiri de rahat de la um capat la altul.
  9. Yesterday
  10. yoyois

    limita upvote / download pt utilizatori noi

    Personal ma doare-n pula de viata lui @dpul. Daca el e suficient de retard sa-si faca conturi noi si sa piarda timpul cu downvote. Totusi nu at trebui sa-si ia si el un warn/ban/cooldown pentru cat spam a facut? Si el si schizofrenicul de @axln ...
  11. Purpose of this Article This article demonstrates a vulnerability found in the 'Super Router' router provided by the internet service provider TalkTalk to its customers. The vulnerability discovered allows the attacker to discover the Super Router's WiFi Password by attacking the WPS feature in the router which is always switched on, even if the WPS pairing button is not used. The purpose of this article is to encourage TalkTalk to immediately patch this vulnerability in order to protect their customers. Tools Used Windows Based Computer (Other tools on unix platforms may be just as effective, but for the purpose of this article we will focus on one) Wireless Network Adapter TalkTalk Router within Wireless Network Adapter Range Software 'Dumpper' available on Sourceforge (Tested with v.91.2) Steps to Reproduce Step 1: Run Dumpper and navigate to the WPS tab and select the target WiFi BSSID. Step 2: Click 'WpsWin' to begin probing the BSSID for the WPS pin. Step 3: After a couple of seconds, the WiFi access key to this network will be displayed bottom right. Scale of Vulnerability This method has proven successful on multiple TalkTalk Super Routers belonging to consenting parties which is enough to suggest that this vulnerability affects all TalkTalk Super Routers of this particular model/version. TalkTalk have been notified of this vulnerability in the past and have failed to patch it many years later. It is also documented across various community forums. Links: 2014 TalkTalk Forum Post: D-Link RT2860 [Security issue] 2014 BroadbandBanter Forum Post: TalkTalk DSL-3680 WPS security vulnerability 2016 Hashkiller Forum Post: WPA Packet Cracking - TalkTalk Disclosure TalkTalk have been notified of this vulnerability on the day of the article being written (21 May 2018) Typically a 30 day period from discovery to public release would be granted. However, in this case, as TalkTalk were made aware of this exploit back in 2014, public release is immediate. Date Disclosure 21 May 2018 Delivered to TalkTalk. 21 May 2018 Date of public release. Reference: https://securityaffairs.co/wordpress/72805/laws-and-regulations/talktalk-super-routers-flaws.html Source: https://www.indigofuzz.com/article.php?docid=talktalk1430
  12. Sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques. Description Sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques. Key Features simple CLI with the ability to run pure Nmap engine predefined scans included in the modules support Nmap Scripting Engine (NSE) with scripts arguments TOR support (with proxychains) multiple scans at one time at this point: 31 modules with 459 scan profiles How To Use It's simple: # Clone this repository git clone --recursive https://github.com/trimstray/sandmap # Go into the repository cd sandmap # Install ./setup.sh install # Run the app sandmap symlink to bin/sandmap is placed in /usr/local/bin man page is placed in /usr/local/man/man8 Command Line Before using the Sandmap read the Command Line introduction. Configuration The etc/main.cfg configuration file has the following structure: # shellcheck shell=bash # Specifies the default destination. # Examples: # - dest="127.0.0.1,8.8.8.8" dest="127.0.0.1" # Specifies the extended Nmap parameters. # Examples: # - params="--script ssl-ccs-injection -p 443" params="" # Specifies the default output type and path. # Examples: # - report="xml" report="" # Specifies the TOR connection. # Examples: # - tor="true" tor="" # Specifies the terminal type. # Examples: # - terminal="internal" terminal="internal" Requirements Sandmap uses external utilities to be installed before running: nmap xterm proxychains This tool working with: GNU/Linux or BSD (testing on Debian, CentOS and FreeBSD) Bash (testing on 4.4.19) Nmap (testing on 7.70) Also you will need root access. Other Modules Available modules: 31 Available scan profiles: 459 Contributing See this. Download: sandmap-master.zip or: git clone https://github.com/trimstray/sandmap.git Source
  13. The majority of the modern economy's logistics is implemented via shipping vessels controlled through systems that embody a combination of the worst parts of a corporate network, ICS, and embedded systems. These systems were largely designed decades ago and are rarely, if ever, updated - yet are exposed to a large number of attack surfaces on the internet and via radio-frequency attacks. This talk will cover the protocols used by the commonly implemented systems found in both commercial and private maritime vessels - including large capacity tankers and container ships - and the shoreside infrastructure used to communicate with, and issue commands to, the shipboard systems. We will see how this infrastructure can be attacked, and how it in turn can be used to carry out significant attacks that could cause major disruption to the world's economy. Recorded at NolaCon 2018
  14. salut, puteti limita cumva? i-am dat downvote faggotului de @dpul pt ca facea spam pt postari sa ajunga la market si a inceput sa isi faca conturi sa imi dea la toate postarile. alte exemple de utilizatori "atacati" cu downvote : https://rstforums.com/forum/profile/60415-yoyois/ https://rstforums.com/forum/profile/222485-kronzy94/
  15. DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense. https://darksurgeon.io Darksurgeon is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense. Darksurgeon has three stated goals: Accelerate incident response, digital forensics, malware analysis, and network defense with a preconfigured Windows 10 environment complete with tools, scripts, and utilities. Provide a framework for defenders to customize and deploy their own programmatically-built Windows images using Packer and Vagrant. Reduce the amount of latent telemetry collection, minimize error reporting, and provide reasonable privacy and hardening standards for Windows 10. If you haven’t worked with packer before, this project has a simple premise: Provide all the tools you need to have a productive, secure, and private Windows virtual machine so you can spend less time tweaking your environment and more time fighting bad guys. Please note this is an alpha project and it will be subject to continual development, updates, and package breakage. Development Principles Darksurgeon is based on a few key development principles: Modularity is key. Each component of the installation and configuration process should be modular. This allows for individuals to tailor their packer image in the most flexible way. Builds must be atomic. A packer build should either complete all configuration and installation tasks without errors, or it should fail. A packer image with missing tools is a failure scenario. Hardened out of the box. To the extent that it will not interfere with investigative workflows, all settings related to proactive hardening and security controls should be enabled. Further information on Darksurgeon security can be found later in this post. Instrumented out of the box. To the extent that it will not interfere with investigative workflows, Microsoft Sysmon, Windows Event Logging, and osquery will provide detailed telemetry on host behavior without further configuration. Private out of the box. To the extent that it will not interfere with investigative workflows, all settings related to privacy, Windows telemetry, and error reporting should minimize collection. Building Darksurgeon Build Process Darksurgeon is built using the HashiCorp application packer. The total build time for a new instance of Darksurgeon is around 2–3 hours. Packer creates a new virtual machine using theDarksurgeon JSON file and your hypervisor of choice (e.g. Hyper-V, Virtualbox, VMWare). The answers.iso file is mounted inside theDarksurgeon VM along with the Windows ISO. The answers.iso file contains the unattend.xml needed for a touchless installation of windows, as well as a powershell script to configure Windows Remote Management (winrm). Packer connects to the Darksurgeon VM using WinRM and copies over all files in the helper-scripts and configuration-files directory to the host. Packer performs serial installations of each of the configured powershell scripts, performing occasional reboots as needed. When complete, packer performs a sysprep, shuts down the virtual machine, and creates a vagrant box file. Additional outputs may be specified in the post-processors section of the JSON file. Setup Note: Hyper-V is currently the only supported hypervisor in this alpha release. VirtualBox and VMWare support are forthcoming. Install packer, vagrant, and your preferred hypervisor on your host. Download the repository contents to your host. Download a Windows 10 Enterprise Evaluation ISO (1803). Move the ISO file to your local Darksurgeon repository. Update Darksurgeon.json with the ISO SHA1 hash and file name. (Optional) Execute the powershell script New-Darksurgeon.ps1 to generate a new answers.iso file. There is an answers ISO file included in the repository but you may re-build this if you don’t trust it, or you would like to modify the unattend files: powershell.exe New-DARKSURGEONISO.ps1 Build the recipe using packer: packer build -only=[hyperv-iso|vmware|virtualbox] .\DARKSURGEON.json Using Darksurgeon Note: Hyper-V is currently the only supported hypervisor in this alpha release. VirtualBox and VMWare support are forthcoming. Once Darksurgeon has successfully built, you’ll receive an output vagrant box file. The box file contains the virtual machine image and vagrant metadata, allowing you to quickly spin up a virtual machine as needed. Install vagrant and your preferred hypervisor on your host. Navigate to the Darksurgeon repository (or the location where you’ve saved the Darksurgeon box file). Perform a vagrant up: vagrant up Vagrant will now extract the virtual machine image from the box file, read the metadata, and create a new VM for you. Want to kill this VM and get a new one? Easy, just perform the following: vagrant destroy && vagrant up Once the Darksurgeon virtual machine is running, you can login using one of the two local accounts: Note: These are default accounts with default credentials. You may want to consider changing the credentials in your packer build. Administrator Account: Username: Darksurgeon Password: darksurgeon Local User Account: Username: Unprivileged Password: unprivileged If you’d rather not use vagrant, you can either import the VM image manually, or look at one of the many other post-processor options provided by packer. Download: DARKSURGEON-master.zip Sources: https://github.com/cryps1s/DARKSURGEON https://darksurgeon.io
  16. Noul Regulament UE privind prelucrarea datelor cu caracter personal și libera circulație a acestor date a intrat în vigoare de vineri în toate statele Uniunii Europene, inclusiv în România. Noul regulament obligă companiile care îşi desfăşoară activitatea în Uniunea Europeană să ceară și să primească acordul utilizatorilor pentru a le colecta și prelucra datele. În cazul unei scurgeri de informaţii, companiile sunt obligate să îşi anunţe utilizatorii/ clienţii afectaţi şi autorităţile în maxim 72 de ore. Nerespectarea lui poate duce la amendarea unei companii cu până la 20 de milioane de euro sau 4% din cifra de afaceri. În România, însă, legislația necesară a fost adoptată abia săptămâna aceasta de Parlament și se află la promulgare. Proiectul a stat și două zile la secretariatele generale ale celor două camere parlamentare, în vederea unei eventuale exercitări a dreptului de sesizare a Curții Constituționale. Prin urmare, cel mai probabil, chiar în ziua intrării în vigoare a GDPR, legea poate fi trimisă spre promulgare președintelui. Dacă va fi promulgată de Klaus Iohannis, legea va intra în vigoare la 3 zile de la publicarea în Monitorul Oficial. Via b1.ro
  17. PornHub wants you to keep your porn viewing activities private, and it is ready to help you out with its all-new VPN service. Yes, you heard that right. Adult entertainment giant PornHub has launched its very own VPN service today with "free and unlimited bandwidth" to help you keep prying eyes away from your browsing activity. Dubbed VPNhub, the VPN service by PornHub is available for both mobile as well as desktop platform, including Android, iOS, MacOS, and Windows. VPN, or Virtual Private Network, allows users to transmit data anonymously, avoids ISP-level website blocking or tracking and keeps your browsing activity private by encrypting your data, even when you are on public Wi-Fi connections. VPNhub promises never to store, collect, sell, or share your personal information with any third parties for their marketing, advertising or research purposes. However, in its privacy policy under the heading, "How We Use Your Information," the company says it can sell "aggregate or non-personally identifiable information with non-affiliated third parties for advertising, marketing or research purposes." Since some government, including that of United Kingdom, are regulating adult content online, launching a VPN service by Pornhub makes sense. VPNhub is available in countries across the globe except for Burma/Myanmar, Cuba, Iran, North Korea, Sudan, and Syria, due to the ban imposed by the U.S. government. While mobile users (both iOS and Android) can download and use the VPNhub app for free, desktop users (MacOS and Windows) have to purchase a premium account. You can also upgrade your free account to a premium subscription for $13 a month or $90 for a full year, which eliminates ads, provides faster connection speeds, and opens up "servers from a wide range of countries." You can give premium VPNhub a try by using its use 7-day free trial. Via thehackernews.com
  18. QuoVadis

    Informatica la academia militara

    Proaste puli nemasonice o fost la curu' lui ma-ta... ce trist ca din 300 mil spermatozoizi tu ai fost cel mai rapid
  19. axln

    Informatica la academia militara

    CEC este proprietatea Statului, al cărui buget are tradiția, după 89, să fie jefuit: toate vânzările de întreprinderi româneşti au adus nişte bani la buget, dar unde sunt? Capitalul românesc este una, bugetul de stat este alta. Privatizarea ar fi însemnat împărțirea băncii în mod egal între toți cetățenii români - astfel ei înşişi controlau consiliul de administrație şi ce anume proiecte româneşti (sau chiar străine) finanțează banca. Ei hotărau completarea bugetelor pentru proiectele lor cu cofinanțare europeană şi tot ei se bucurau de profitul adus de investițiile băncii. Nu că sună chiar mai bine o bancă a românilor decât un buget de stat? Dar, NU E. Nimic din ce s-a dorit la Revoluție nu s-a realizat. Am ajuns să cred că este periculos să devii prizonierul "patriei". Nu este ce pare, ci a făcut loc unei masonerii. Îmi pare riscant să te angajezi față de o instituție militară care ar putea fi coruptă. Vorbesc din experiența de civil: situația în Ro îmi pare scăpată scăpată de sub control. Un război civil ascuns şi penibil. Oare are ca obiective să îndeplinească o cotă de morți, de speriați, de alienați, sau să îngroape adevărul despre ce s-a întâmplat... în straturi groase de radiații şi sub multe cruci de lemn sau de piatră? Parcă ar fi o grupare de complici la o crimă, care vor să se ascundă şi să trimită toți martorii "sub acoperire"... sau mai degrabă la moarte, după câte se arată. Masoneria română este o structură cu care n-am vrut niciodată să am de a face, socotind-o o structură concurentă Statului Român, plus că se scrie că ar fi obediență străină, cu mai mulți stăpâni chiar. Oare nu aceştia umblă acum peste tot după mine cu maşinile de vârât BCI-ul "în cur" şi se prefac că mă instruiesc în păstrat secrete? Care, când n-am secrete? Împreună cu durerile provocate de masere, mai toarnă peste mine şi mesaje care îmi sunt inutile, care sunt nesolicitate şi neacceptate. Le-aş numi bombăneli sau "jew-isme" în stil "ameromân". Toată cheltuiala asta pentru ce, oare aşa îşi fabrică nația elita? Oare ei au socotit că, dacă au așezat decesele alor mei la distanțe asiguratoare în timp unele de altele, nu se mai vede că sunt executate cu aceeași mână, "finuță", care se vrea a părea divină? Va, se vede chiar că persecuția lor începuse încă din 1990. Dar de ce după '90 toți ai mei erau "condamnabili" de masonerie? De ce eu trebuia după decesele lor să împart rodul muncii lor cu ucigaşii? ca răsplată pentru epurare? sau ca ispăşire pentru păcatele tuturor? Asta este "țara" ce o "aveți". În opinia mea este dispărută ca stat încă din anii 80 şi câțiva circari batjocoresc ce populație a mai rămas. Dar de ce, în fond, îşi bate nația română joc de ea însăşi într-un mod atât de exagerat, de a ajuns vizibil şi pe forumuri? Recomand oricărui român să se salveze din lagăr şi să adere la nații în care să fi rămas un filon de normalitate cât de cât dătător de speranță. Ce salvator era pentru mine dacă ştiam mai de mult! Preşedintele Macron a spus franc: "unele națiuni vor dispărea în următorii 50 de ani". Primul obiectiv al masoneriei îmi pare a fi a împărți oamenii în bufoni creştini şi bufoni satanişti, pe care să îi bată cap în cap, făcând pe arbitrul şi culegând taxe şi prăzi de război. Iar cetățenii normali trebuie toți "posedați". Toată "magia" şi "harul" sunt tehnică militară.
  20. The detection of faked identities is a major problem in security. Current memory-detection techniques cannot be used as they require prior knowledge of the respondent’s true identity. Here, we report a novel technique for detecting faked identities based on the use of unexpected questions that may be used to check the respondent identity without any prior autobiographical information. While truth-tellers respond automatically to unexpected questions, liars have to “build” and verify their responses. This lack of automaticity is reflected in the mouse movements used to record the responses as well as in the number of errors. Responses to unexpected questions are compared to responses to expected and control questions (i.e., questions to which a liar also must respond truthfully). Parameters that encode mouse movement were analyzed using machine learning classifiers and the results indicate that the mouse trajectories and errors on unexpected questions efficiently distinguish liars from truth-tellers. Furthermore, we showed that liars may be identified also when they are responding truthfully. Unexpected questions combined with the analysis of mouse movement may efficiently spot participants with faked identities without the need for any prior information on the examinee. O mica parte. Restul cititi aici.
  21. lzomedia

    Cumpar pagina sau grup de facebook. Ofer pret corect.

    @24Ghz. Offer 100 de euro
  22. Che

    AJUTOR: Decodare javascript ?

    Cum ai facut de ai ajuns la codul pus de tine ?
  23. 24Ghz.

    Cumpar pagina sau grup de facebook. Ofer pret corect.

    Salut. cati bani oferi pe aceasta pagina? https://www.facebook.com/forever.a.gentleman/?hc_ref=ARS8wcjo8_OCZG0QDA7sBe4KeRLQL0pXsyVZHCl9LldyWUE2MNvX35S5eLLVYfH91sE&fref=nf Nu te uita la aprecieri ci la distribuiri si like-uri!
  24. Salut! Sunt la fac iar unul din modulele pe care le urmez este TCPIP ( desi sunt putin paralel cu ceea ce inseamna programarea ) . Ideea este ca pentru a intra in examen trebuie sa fac un server in C in UNIX . In documentul pe care profu ni l-a dat este inceputul codului, iar mai apoi urmeaza 3 exercitii care trebuie integrate in cod, iar aici apar problemele . Nu reusesc nici de cum sa le rezolv si nici nu mai postam aici daca nu aveam nevoie neaparata de numarul de credite.. stiu ca nimeni nu e obligat sa faca ceva in privinta asta, dar cei care au cunostinte si pot sa ofere o mana de ajutor, as aprecia enorm . Daca este necesar, pot sa platesc si "ajutorul" .. PDF OFERIT DE PROFESOR CODUL OFERIT Cerinte : https://ufile.io/i2xuf aici este modelul unui coleg dar in momentul in care compilez, are diferite erori
  25. foloseste si tu un wallet cu segwit ca ma dor ochii
  1. Load more activity
×