Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. Daca ti-ai cumparat si camera buna te poti apuca de videochat.
  3. Da' o muie, nu vrea el? La munca nu la cersit.
  4. Today
  5. Mi-am cumparat un calculator la sfarsit de aprilie, si am ramas fara bani de jocuri, are cineva un cod pentru cont de filelist? 😬
  6. Scuze frate, de abea am venit de pe baltă. Ca sa compensez pentru intarziere, al doilea cod e din partea casei.
  7. Zatarra

    Fun stuff

    Cam liniste pe aici
  8. O sa ajungi la viteze de genul numai daca descarci pe SSD sa stii, pe HDD nici pomeneala.
  9. OKQL

    Invitatie FileList

    La vetize de peste 100 MB/s, nu este posibil Cu stimă: Gheorghe de la coada vacìi /si doo
  10. Buna, am nevoie de un cod de invitatie pentru FileList. Am auzit ca vitezele de download sunt geniale folosind acest tracker roman. Am vazut pe net la altii vetize de peste 100 MB/s cu abonamentul de la RDS de 1000. Cine ar putea sa ma ajute cu un cod ii multumesc din toata inima. Doua coduri ar fi genial dar daca se poate unu ar fi perfect si asa. Va multumesc mult, Alex
  11. Yesterday
  12. Since 2007, hackers have provided virtual services to criminals. July 16, 2019 | 17:15 0 123 The SBU operatives with partners from the United States stopped the activities of a powerful hacker group. This was reported by the. Head of the Security Service of Ukraine Ivan Bakanov. Since 2007, hackers have provided virtual services to criminals, creating conditions for them to freely carry out illegal activities. The attackers used Dark Net - a part of the Internet that was hidden from ordinary users, where it is possible to anonymously purchase weapons, drugs and the like. Law enforcement officers could not identify the participants, because hosting did not respond to requests. Intelligence officers have established that the organizer of the group is a citizen of Ukraine, who received his first hacker experience in Moscow in the mid-2000s. Already in 2007, he began to provide his services to hackers around the world through Ukrainian networks, carefully concealing the actual location of his equipment from law enforcement officers and special services of any country. The equipment was periodically found by Ukrainian, Russian, and American law enforcement officers, confiscated it, temporarily ceased operations, but the hacker group continued to operate. The group has about ten main participants and dozens of accomplices in several countries, as well as thousands of customers. They are concerned that hundreds of terabytes of data are in the hands of the special services, which can be evidence in hundreds of criminal cases around the world. According to our estimates, we can talk about 40% of the Russian-language segment of Dark Net, ”said the acting minister. head of the SBU. In the United States alone, an average of fifty years in prison was brought against the organizer. He is accused of fraud, unauthorized interference, theft of personal data and a number of other crimes under US criminal law. In Ukraine, the organizer and another member of the group declared suspicion of committing criminal offenses under Part 2 of Art. 361 and Part 3 of Art. 301 of the Criminal Code. They are under house arrest. During the authorized investigative actions on the territory of a private house near Odessa, we found a real data center with a backup autonomous power source, security, powerful Internet access channels, which was carefully hidden. A preliminary study of network equipment and an assessment of the ranges of IP addresses used by the grouping indicates at least three autonomous systems reserved for enterprises of the Russian Federation. Given the counter-intelligence regime that exists in the Russian Federation, as well as the technological features of the organization and construction of SORM-3, possession and control of this numbering resource by the group could not take place without control and cover of Russian special services. This information allows the SBU to get a clearer picture of the cyber attacks on Ukrainian critical infrastructure facilities, and the role of the Russian special services in cyber attacks on other countries. Partea cu liftul.. chiar interesanta . Source : https://368.media/2019/07/16/sbu-razoblachila-krupnuyu-hakerskuyu-set-v-odesse/
  13. jreister

    Help

    Vezi pe chatul forumului, au băieții de acolo Koailii, e fix ce îți trebuie ție.
  14. Ai dreptate. Este vorba despre un autoposting. pentru o aplicatie care ruleaza doar pe ios/android . Am deja unul . doar ca nu mai ruleaza cum trebuie. si vreau sa fie facut altcumva .
  15. Link to PDF : https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-rdp-exposed-the-threats-thats-already-at-your-door-wp.pdf?fbclid=IwAR1Gj_oOa-2uuqEjqQCsO2l5nug2_LMPicIk-k3OQ1CDshpMThzQSmJTt18
  16. .Breacker

    Help

    Nytro said: Inainte de a posta: - verifica data ultimului post, nu redeschide un topic fara un motiv serios - daca e cazul vezi mai intai ce zice prietenul Google - gandeste-te daca postul tau e util sau postezi doar ca sa te afli in treaba - asigura-te ca nu incalci regulile - fii atent la limbajul folosit, vorbeste frumos si cat mai corect gramatical - pentru orice problema legata de forum, contacteaza-ma
  17. Duminica, 21 Iulie - ora 10:00 AM, lansam un challenge pe grupul nostru de Slack. Intra in discutie cu ceilalti membrii si afla de la ei cum a fost challenge-ul anterior, schimba idei cu ei sau poti sa iti faci un plan cu ei! Cine rezolva acest challenge primeste o invitatie gratuita la conferinta noastra, din data de 17-18 Oct, si totodata poate participa la challenge-urile noastre oficiale. Oferim 3 invitatii, mai exact o sa oferim invitatie la conferinta celor mai buni si mai rapizi dintre voi! Timpul decide cine castiga invitatia O sa postam un mic regulament despre cum se va desfasura acest challenge, de aceea zic... Hai pe Slack! - www.hackthezone.com/slack Happy Ethical Hacking, AlexHTZ
  18. Altair is a Python tool that can be used to scan for web related vulnerabilities, some of which include database vulnerabilities (SQL), Cross Site Scripting (XSS), Local File Inclusion (LFI), Remote File Inclusion (RFI), potential sensitive files, and directories containing sensitive information. The tool scans files and directories of the target host to find potential vulnerabilities. Altair can also make use of SQLMAP and Lfier tools to exploit the said vulnerabilities. SQLMAP is a handy tool that exploits database vulnerabilities. Lfier tool is capable of exploiting the LFI vulnerabilities. https://latesthackingnews.com/2019/03/03/altair-an-open-source-modular-web-vulnerability-scanner/
  19. Plin de frilensari. Sa moara jana bine-am ras. Bwahahahahahahaahahah
  20. Software Engineer in Cluj. Mid / Senior. Python sau confortabil sa cross-training. Ping me cu CV-uri/linkedin/github/stackoverflow whateva.
  21. gigiRoman

    Help

    Google are androidul.
  1. Load more activity
×
×
  • Create New...