Jump to content

All Activity

This stream auto-updates     

  1. Today
  2. Scuze frate, de abea am venit de pe baltă. Ca sa compensez pentru intarziere, al doilea cod e din partea casei.
  3. Zatarra

    Fun stuff

    Cam liniste pe aici
  4. Omu vrea un cod, nu-i da nimeni?
  5. O sa ajungi la viteze de genul numai daca descarci pe SSD sa stii, pe HDD nici pomeneala.
  6. OKQL

    Invitatie FileList

    La vetize de peste 100 MB/s, nu este posibil Cu stimă: Gheorghe de la coada vacìi /si doo
  7. Buna, am nevoie de un cod de invitatie pentru FileList. Am auzit ca vitezele de download sunt geniale folosind acest tracker roman. Am vazut pe net la altii vetize de peste 100 MB/s cu abonamentul de la RDS de 1000. Cine ar putea sa ma ajute cu un cod ii multumesc din toata inima. Doua coduri ar fi genial dar daca se poate unu ar fi perfect si asa. Va multumesc mult, Alex
  8. Yesterday
  9. Since 2007, hackers have provided virtual services to criminals. July 16, 2019 | 17:15 0 123 The SBU operatives with partners from the United States stopped the activities of a powerful hacker group. This was reported by the. Head of the Security Service of Ukraine Ivan Bakanov. Since 2007, hackers have provided virtual services to criminals, creating conditions for them to freely carry out illegal activities. The attackers used Dark Net - a part of the Internet that was hidden from ordinary users, where it is possible to anonymously purchase weapons, drugs and the like. Law enforcement officers could not identify the participants, because hosting did not respond to requests. Intelligence officers have established that the organizer of the group is a citizen of Ukraine, who received his first hacker experience in Moscow in the mid-2000s. Already in 2007, he began to provide his services to hackers around the world through Ukrainian networks, carefully concealing the actual location of his equipment from law enforcement officers and special services of any country. The equipment was periodically found by Ukrainian, Russian, and American law enforcement officers, confiscated it, temporarily ceased operations, but the hacker group continued to operate. The group has about ten main participants and dozens of accomplices in several countries, as well as thousands of customers. They are concerned that hundreds of terabytes of data are in the hands of the special services, which can be evidence in hundreds of criminal cases around the world. According to our estimates, we can talk about 40% of the Russian-language segment of Dark Net, ”said the acting minister. head of the SBU. In the United States alone, an average of fifty years in prison was brought against the organizer. He is accused of fraud, unauthorized interference, theft of personal data and a number of other crimes under US criminal law. In Ukraine, the organizer and another member of the group declared suspicion of committing criminal offenses under Part 2 of Art. 361 and Part 3 of Art. 301 of the Criminal Code. They are under house arrest. During the authorized investigative actions on the territory of a private house near Odessa, we found a real data center with a backup autonomous power source, security, powerful Internet access channels, which was carefully hidden. A preliminary study of network equipment and an assessment of the ranges of IP addresses used by the grouping indicates at least three autonomous systems reserved for enterprises of the Russian Federation. Given the counter-intelligence regime that exists in the Russian Federation, as well as the technological features of the organization and construction of SORM-3, possession and control of this numbering resource by the group could not take place without control and cover of Russian special services. This information allows the SBU to get a clearer picture of the cyber attacks on Ukrainian critical infrastructure facilities, and the role of the Russian special services in cyber attacks on other countries. Partea cu liftul.. chiar interesanta . Source : https://368.media/2019/07/16/sbu-razoblachila-krupnuyu-hakerskuyu-set-v-odesse/
  10. jreister

    Help

    Vezi pe chatul forumului, au băieții de acolo Koailii, e fix ce îți trebuie ție.
  11. Ai dreptate. Este vorba despre un autoposting. pentru o aplicatie care ruleaza doar pe ios/android . Am deja unul . doar ca nu mai ruleaza cum trebuie. si vreau sa fie facut altcumva .
  12. Link to PDF : https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-rdp-exposed-the-threats-thats-already-at-your-door-wp.pdf?fbclid=IwAR1Gj_oOa-2uuqEjqQCsO2l5nug2_LMPicIk-k3OQ1CDshpMThzQSmJTt18
  13. .Breacker

    Help

    Nytro said: Inainte de a posta: - verifica data ultimului post, nu redeschide un topic fara un motiv serios - daca e cazul vezi mai intai ce zice prietenul Google - gandeste-te daca postul tau e util sau postezi doar ca sa te afli in treaba - asigura-te ca nu incalci regulile - fii atent la limbajul folosit, vorbeste frumos si cat mai corect gramatical - pentru orice problema legata de forum, contacteaza-ma
  14. Duminica, 21 Iulie - ora 10:00 AM, lansam un challenge pe grupul nostru de Slack. Intra in discutie cu ceilalti membrii si afla de la ei cum a fost challenge-ul anterior, schimba idei cu ei sau poti sa iti faci un plan cu ei! Cine rezolva acest challenge primeste o invitatie gratuita la conferinta noastra, din data de 17-18 Oct, si totodata poate participa la challenge-urile noastre oficiale. Oferim 3 invitatii, mai exact o sa oferim invitatie la conferinta celor mai buni si mai rapizi dintre voi! Timpul decide cine castiga invitatia O sa postam un mic regulament despre cum se va desfasura acest challenge, de aceea zic... Hai pe Slack! - www.hackthezone.com/slack Happy Ethical Hacking, AlexHTZ
  15. Altair is a Python tool that can be used to scan for web related vulnerabilities, some of which include database vulnerabilities (SQL), Cross Site Scripting (XSS), Local File Inclusion (LFI), Remote File Inclusion (RFI), potential sensitive files, and directories containing sensitive information. The tool scans files and directories of the target host to find potential vulnerabilities. Altair can also make use of SQLMAP and Lfier tools to exploit the said vulnerabilities. SQLMAP is a handy tool that exploits database vulnerabilities. Lfier tool is capable of exploiting the LFI vulnerabilities. https://latesthackingnews.com/2019/03/03/altair-an-open-source-modular-web-vulnerability-scanner/
  16. Plin de frilensari. Sa moara jana bine-am ras. Bwahahahahahahaahahah
  17. Software Engineer in Cluj. Mid / Senior. Python sau confortabil sa cross-training. Ping me cu CV-uri/linkedin/github/stackoverflow whateva.
  18. gigiRoman

    Help

    Google are androidul.
  19. Poti spune si aici despre ce e vorba. Cand postezi ceva, asigura-te ca lasi detalii pentru toti utilizatorii, de aceea s-a facut categoria locuri de munca. Nu exista proiecte private, doar tepari. De fiecare data apare unul pe aici care face pe programatorul si unul care cauta. Lasati aici sa vedem si noi despre ce e vorba.
  20. Te invităm în perioada 06 iulie și 15 octombrie la Romexpo, la cea mai mare aventură spațială a vieții tale în cadrul expoziției Space Adventure, care a cucerit cinci țări deja. Expoziția vine în România cu multe jocuri interactive si simulatoare. Bucură-te de istoria uluitoare a călătoriilor spațiale și de experiența sentimentului de a fi un astronaut! Link : https://www.expozitiespatiala.ro/?utm_source=ads&utm_medium=page&utm_campaign=0045&fbclid=IwAR25GuUCkipvD262ZBP-znuZu6AuLsdfUoGYA0MjTA7chEMFdwF5OF8RSIE
  1. Load more activity
×
×
  • Create New...