Leaderboard
Popular Content
Showing content with the highest reputation on 12/02/11 in all areas
-
Am "rostuit" de proiectul care contine facilitatile de pe siteul ymland (ala la care au copii orgasm). Partea buna e ca fisierele au potential. Ofer pass la arhiva doar vip-urilor, celor din cult si celor cu peste 450 de posturi. http://localhostr.com/file/pwzzieU/Scripturi Yahoo.rar Facilitati: Login/Logout Authentification Fallback ports Login timeouts HTML/SOCKS proxy HTTP authentication Configurable Foreign chat Instant messages Conferences Chatrooms File transfer Identities Status Groups and Friends list Adding and removing friends Identities Ignore New mail update Typing notification Connection pinging Support Package Separate support package Decoding messages Encoding messages Colour fade and alt text Emoticons (smileys) Anti-Spam - Overriding styles Swing models Emote manage2 points
-
Ankit Fadia Certifed Ethical Hacking Courses 2011 - AFCEH 5.0 Genre: Video Training | Size: 1.38 GB The Ankit Fadia Certified Ethical Hacker (AFCEH) course is a world class certification program in Ethical Hacking that aims at training and certifying a whole new generation of ethical hackers in the field of computer security. More than 20,000 ethical hackers globally have undergone the AFCEH training, hence creating the next generation army of ethical hackers. The live interactive sessions, video lectures, bestselling text books, question bank, practical lab sessions and real life examples will take participants inside the minds of an ethical hacker and teach them how to fight the cyber criminals on the Internet. Program Contents 1. Planning an Attack IP Addresses Enumerating Remote Systems Hiding Your IP Address Tracing an IP Address 2. Preparing an Attack Network Reconnaissance Port Scanning Daemon Banner Grabbing and Port Enumeration ICMP Scanning Firewall Enumeration OS Detection Sniffing 3. Hacking Windows Introduction Passwords The Look and Feel Security Checklists 4. Network Hacking 5. Email Hacking Introduction Tracing Emails Email Forging The Post Office Protocol (POP) Mailbombing Cracking Email Accounts Securing Email 6. Instant Messenger Hacking 7. Web Hacking 8. Input Validation Attacks 9. Buffer Overflows 10. Intellectual Property Thefts Introduction & Case Studies Trojans Sniffers Keyloggers Spyware Software Traditional Data Hiding Techniques 11. Social Engineering Attacks 12. Password Cracking Decrypted 13. TCP/IP: A Mammoth Description 14. Identity Attacks Introduction Proxy Servers IP Spoofing Onion Routing 15. Computer Forensics 16. DOS Attacks 17. Cryptography, Firewalls and Error Messages 18. Batch File Programming 19. Viruses Torn Apart 20. Wireless Hacking 21 .Windows Vista Security Analysis 22. USB Hacking 23. System Hacking 24. UNIX Security Loopholes 25. Investigating Cyber Crimes 26. Intrusion Detection Systems 27. Browser Security 28. Windows 7 Security Loopholes 29. Wireless Security 30. Bluetooth Security: Hacking Mobile Phones 31. Latest Information Gathering Techniques 32. Latest Security Vulnerabilities 33. 2010 Security Updates 34. Intrusion Detection Systems 35. Intrusion Prevention Systems 36. Software Hacking 37. Protecting CDs and DVDs AFCEH 5.0 also contains new secrets, tips and tricks on all the above mentioned topics like scanning, network reconnaissance, windows hacking, password cracking, email hacking, DOS attacks, social engineering and many others. Download: Download 1l.DIVFA1202.rar for free on Filesonic.com or FilePost.com: Download DIVFA1202.part1.rar - fast & secure! FilePost.com: Download DIVFA1202.part2.rar - fast & secure! FilePost.com: Download DIVFA1202.part3.rar - fast & secure! FilePost.com: Download DIVFA1202.part4.rar - fast & secure! FilePost.com: Download DIVFA1202.part5.rar - fast & secure! FilePost.com: Download DIVFA1202.part6.rar - fast & secure! sursa +linkuri suplimentare download1 point
-
User : paul-wiederkehr@sunrise.ch Pass : depot2 Premium Membership Valid Until: 2012-06-12 13:04:45 User: caseya21@yahoo.com Pass: garnett21 Premium Membership Valid Until: 2011-12-08 15:39:24 User : Konciak.i11+fr@gmail.com pass : kuponiczeks user: contact@bandkmanagement.com pass: Viper1 user: jmgabo@orange.fr pass: 98529852 user: gynochou@hotmail.com pass: linalina user: Ken.Colvin90@gmail.com pass: deanna user: homer_leong@yahoo.com.au pass: ewirawan User : jonnydeep1970@virgilio.it Pass : 4d835917a4592 User : lavhack@gmail.com Pass : 4d2a2262950a31 point
-
Writing Your Own Shell By Hiran Ramankutty Introduction This is not another programming language tutorial. Surprise! A few days ago, I was trying to explain one of my friends about the implementation of the 'ls' command, though I had never thought of going beyond the fact that 'ls' simply lists all files and directories. But my friend happened to make me think about everything that happens from typing 'ls' to the point when we see the output of the 'ls' command. As a result, I came up with the idea of putting the stuff into some piece of code that will work similarly. Finally, I ended up in trying to write my own shell which allows my program to run in a way similar to the Linux shell. Shells On system boot up, one can see the login screen. We log in to the system using our user name, followed by our password. The login name is looked up in the system password file (usually /etc/passwd). If the login name is found, the password is verified. The encrypted password for a user can be seen in the file /etc/shadow, immediately preceded by the user name and a colon. Once the password is verified, we are logged into the system. Once we log in, we can see the command shell where we usually enter our commands to execute. The shell, as described by Richard Stevens in his book Advanced Programming in the Unix Environment, is a command-line interpreter that reads user input and execute commands. This was the entry point for me. One program (our shell) executing another program (what the user types at the prompt). I knew that execve and its family of functions could do this, but never thought about its practical use. A note on execve() Briefly, execve and its family of functions helps to initiate new programs. The family consists of the functions: execl execv execle execve execlp execvp int execve(const char *filename, char *const argv[], char *const envp[]); is the prototype as given in the man page for execve. The filename is the complete path of the executable, argv and envp are the array of strings containing argument variables and environment variables respectively. In fact, the actual system call is sys_execve (for execve function) and other functions in this family are just C wrapper functions around execve. Now, let us write a small program using execve. See listing below: #include <stdio.h> #include <stdlib.h> #include <unistd.h> int main(int argc, char **argv, char **envp) { execve("/bin/ls", argv, envp); return 0; } Compiling and running the a.out for the above program gives the output of /bin/ls command. Now try this. Put a printf statement soon after the execve call and run the code. I will not go in to the details of wrappers of execve. There are good books, one of which I have already mentioned (from Richard Stevens), which explains the execve family in detail. Some basics Before we start writing our shell, we shall look at the sequence of events that occur, from the point when user types something at the shell to the point when he sees the output of the command that he typed. One would have never guessed that so much processing happens even for listing of files. When the user hits the 'Enter' key after typing "/bin/ls", the program which runs the command (the shell) forks a new process. This process invokes the execve system call for running "/bin/ls". The complete path, "/bin/ls" is passed as a parameter to execve along with the command line argument (argv) and environment variables (envp). The system call handler sys_execve checks for existence of the file. If the file exists, then it checks whether it is in the executable file format. Guess why? If the file is in executable file format, the execution context of the current process is altered. Finally, when the system call sys_execve terminates, "/bin/ls" is executed and the user sees the directory listing. Ooh! Let's Start Had enough of theories? Let us start with some basic features of the command shell. The listing below tries to interpret the 'Enter' key being pressed by the user at the command prompt. #include <stdio.h> #include <stdlib.h> #include <unistd.h> int main(int argc, char *argv[], char *envp[]) { char c = '\0'; printf("\n[MY_SHELL ] "); while(c != EOF) { c = getchar(); if(c == '\n') printf("[MY_SHELL ] "); } printf("\n"); return 0; } This is simple. Something like the mandatory "hello world" program that a programmer writes while learning a new programming language. Whenever user hits the 'Enter' key, the command shell appears again. On running this code, if user hits Ctrl+D, the program terminates. This is similar to your default shell. When you hit Ctrl+D, you will log out of the system. Let us add another feature to interpret a Ctrl+C input also. It can be done simply by registering the signal handler for SIGINT. And what should the signal handler do? Let us see the code in listing 3. #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <signal.h> typedef void (*sighandler_t)(int); char c = '\0'; void handle_signal(int signo) { printf("\n[MY_SHELL ] "); fflush(stdout); } int main(int argc, char *argv[], char *envp[]) { signal(SIGINT, SIG_IGN); signal(SIGINT, handle_signal); printf("[MY_SHELL ] "); while(c != EOF) { c = getchar(); if(c == '\n') printf("[MY_SHELL ] "); } printf("\n"); return 0; } Run the program and hit Ctrl+C. What happens? You will see the command prompt again. Something that we see when we hit Ctrl+C in the shell that we use. Now try this. Remove the statement fflush(stdout) and run the program. For those who cannot predict the output, the hint is fflush forces the execution of underlying write function for the standard output. Command Execution Let us expand the features of our shell to execute some basic commands. Primarily we will read user inputs, check if such a command exists, and execute it. I am reading the user inputs using getchar(). Every character read is placed in a temporary array. The temporary array will be parsed later to frame the complete command, along with its command line options. Reading characters should go on until the user hits the 'Enter' key. This is shown in listing 4. int main(int argc, char *argv[], char *envp[]) { /* do some initializations. */ while(c != EOF) { c = getchar(); switch(c) { case '\n': /* parse and execute. */ bzero(tmp, sizeof(tmp)); break; default: strncat(tmp, &c, 1); break; } } /* some processing before terminating. */ return 0; } Now we have the string which consists of characters that the user has typed at our command prompt. Now we have to parse it, to separate the command and the command options. To make it more clear, let us assume that the user types the command gcc -o hello hello.c We will then have the command line arguments as argv[0] = "gcc" argv[1] = "-o" argv[2] = "hello" argv[3] = "hello.c" Instead of using argv, we will create our own data structure (array of strings) to store command line arguments. The listing below defines the function fill_argv. It takes the user input string as a parameter and parses it to fill my_argv data structure. We distinguish the command and the command line options with intermediate blank spaces (' '). void fill_argv(char *tmp_argv) { char *foo = tmp_argv; int index = 0; char ret[100]; bzero(ret, 100); while(*foo != '\0') { if(index == 10) break; if(*foo == ' ') { if(my_argv[index] == NULL) my_argv[index] = (char *)malloc(sizeof(char) * strlen(ret) + 1); else { bzero(my_argv[index], strlen(my_argv[index])); } strncpy(my_argv[index], ret, strlen(ret)); strncat(my_argv[index], "\0", 1); bzero(ret, 100); index++; } else { strncat(ret, foo, 1); } foo++; } if(ret[0] != '\0') { my_argv[index] = (char *)malloc(sizeof(char) * strlen(ret) + 1); strncpy(my_argv[index], ret, strlen(ret)); strncat(my_argv[index], "\0", 1); } } The user input string is scanned one character at a time. Characters between the blanks are copied into my_argv data structure. I have limited the number of arguments to 10, an arbitrary decision: we can have more that 10. Finally we will have the whole user input string in my_argv[0] to my_argv[9]. The command will be my_argv[0] and the command options (if any) will be from my_argv[1] to my_argv[k] where k<9. What next? After parsing, we have to find out if the command exists. Calls to execve will fail if the command does not exist. Note that the command passed should be the complete path. The environment variable PATH stores the different paths where the binaries could be present. The paths (one or more) are stored in PATH and are separated by a colon. These paths has to be searched for the command. The search can be avoided by use of execlp or execvp which I am trying to purposely avoid. execlp and execvp do this search automatically. The listing below defines a function that checks for the existence of the command. int attach_path(char *cmd) { char ret[100]; int index; int fd; bzero(ret, 100); for(index=0;search_path[index]!=NULL;index++) { strcpy(ret, search_path[index]); strncat(ret, cmd, strlen(cmd)); if((fd = open(ret, O_RDONLY)) > 0) { strncpy(cmd, ret, strlen(ret)); close(fd); return 0; } } return 0; } attach_path function in the listing 6 will be called if its parameter cmd does not have a '/' character. When the command has a '/', it means that the user is specifying a path for the command. So, we have: if(index(cmd, '/') == NULL) { attach_path(cmd); ..... } The function attach_path uses an array of strings, which is initialized with the paths defined by the environment variable PATH. This initialization is given in the listing below: void get_path_string(char **tmp_envp, char *bin_path) { int count = 0; char *tmp; while(1) { tmp = strstr(tmp_envp[count], "PATH"); if(tmp == NULL) { count++; } else { break; } } strncpy(bin_path, tmp, strlen(tmp)); } void insert_path_str_to_search(char *path_str) { int index=0; char *tmp = path_str; char ret[100]; while(*tmp != '=') tmp++; tmp++; while(*tmp != '\0') { if(*tmp == ':') { strncat(ret, "/", 1); search_path[index] = (char *) malloc(sizeof(char) * (strlen(ret) + 1)); strncat(search_path[index], ret, strlen(ret)); strncat(search_path[index], "\0", 1); index++; bzero(ret, 100); } else { strncat(ret, tmp, 1); } tmp++; } } The above listing shows two functions. The function get_path_string takes the environment variable as a parameter and reads the value for the entry PATH. For example, we have PATH=/usr/kerberos/bin:/usr/local/bin:/bin:/usr/bin:/usr/X11R6/bin:/home/hiran/bin The the function uses strstr from the standard library to get the pointer to the beginning of the complete string. This is used by the function insert_path_str_to_search in listing 7 to parse different paths and store them in a variable which is used to determine existence of paths. There are other, more efficient methods for parsing, but for now I could only think of this. After the function attach_path determines the command's existence, it invokes execve for executing the command. Note that attach_path copies the complete path with the command. For example, if the user inputs 'ls', then attach_path modifies it to '/bin/ls'. This string is then passed while calling execve along with the command line arguments (if any) and the environment variables. The listing below shows this: void call_execve(char *cmd) { int i; if(fork() == 0) { i = execlp(cmd, my_argv, my_envp); if(i < 0) { printf("%s: %s\n", cmd, "command not found"); exit(1); } } else { wait(NULL); } } Here, execve is called in the child process, so that the context of the parent process is retained. Complete Code and Incompleteness The listing below is the complete code which I have (inefficiently) written. #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <signal.h> #include <string.h> #include <sys/wait.h> #include <sys/types.h> #include <ctype.h> #include <errno.h> #include <sys/stat.h> #include <fcntl.h> extern int errno; typedef void (*sighandler_t)(int); static char *my_argv[100], *my_envp[100]; static char *search_path[10]; void handle_signal(int signo) { printf("\n[MY_SHELL ] "); fflush(stdout); } void fill_argv(char *tmp_argv) { char *foo = tmp_argv; int index = 0; char ret[100]; bzero(ret, 100); while(*foo != '\0') { if(index == 10) break; if(*foo == ' ') { if(my_argv[index] == NULL) my_argv[index] = (char *)malloc(sizeof(char) * strlen(ret) + 1); else { bzero(my_argv[index], strlen(my_argv[index])); } strncpy(my_argv[index], ret, strlen(ret)); strncat(my_argv[index], "\0", 1); bzero(ret, 100); index++; } else { strncat(ret, foo, 1); } foo++; /*printf("foo is %c\n", *foo);*/ } my_argv[index] = (char *)malloc(sizeof(char) * strlen(ret) + 1); strncpy(my_argv[index], ret, strlen(ret)); strncat(my_argv[index], "\0", 1); } void copy_envp(char **envp) { int index = 0; for(;envp[index] != NULL; index++) { my_envp[index] = (char *)malloc(sizeof(char) * (strlen(envp[index]) + 1)); memcpy(my_envp[index], envp[index], strlen(envp[index])); } } void get_path_string(char **tmp_envp, char *bin_path) { int count = 0; char *tmp; while(1) { tmp = strstr(tmp_envp[count], "PATH"); if(tmp == NULL) { count++; } else { break; } } strncpy(bin_path, tmp, strlen(tmp)); } void insert_path_str_to_search(char *path_str) { int index=0; char *tmp = path_str; char ret[100]; while(*tmp != '=') tmp++; tmp++; while(*tmp != '\0') { if(*tmp == ':') { strncat(ret, "/", 1); search_path[index] = (char *) malloc(sizeof(char) * (strlen(ret) + 1)); strncat(search_path[index], ret, strlen(ret)); strncat(search_path[index], "\0", 1); index++; bzero(ret, 100); } else { strncat(ret, tmp, 1); } tmp++; } } int attach_path(char *cmd) { char ret[100]; int index; int fd; bzero(ret, 100); for(index=0;search_path[index]!=NULL;index++) { strcpy(ret, search_path[index]); strncat(ret, cmd, strlen(cmd)); if((fd = open(ret, O_RDONLY)) > 0) { strncpy(cmd, ret, strlen(ret)); close(fd); return 0; } } return 0; } void call_execve(char *cmd) { int i; printf("cmd is %s\n", cmd); if(fork() == 0) { i = execve(cmd, my_argv, my_envp); printf("errno is %d\n", errno); if(i < 0) { printf("%s: %s\n", cmd, "command not found"); exit(1); } } else { wait(NULL); } } void free_argv() { int index; for(index=0;my_argv[index]!=NULL;index++) { bzero(my_argv[index], strlen(my_argv[index])+1); my_argv[index] = NULL; free(my_argv[index]); } } int main(int argc, char *argv[], char *envp[]) { char c; int i, fd; char *tmp = (char *)malloc(sizeof(char) * 100); char *path_str = (char *)malloc(sizeof(char) * 256); char *cmd = (char *)malloc(sizeof(char) * 100); signal(SIGINT, SIG_IGN); signal(SIGINT, handle_signal); copy_envp(envp); get_path_string(my_envp, path_str); insert_path_str_to_search(path_str); if(fork() == 0) { execve("/usr/bin/clear", argv, my_envp); exit(1); } else { wait(NULL); } printf("[MY_SHELL ] "); fflush(stdout); while(c != EOF) { c = getchar(); switch(c) { case '\n': if(tmp[0] == '\0') { printf("[MY_SHELL ] "); } else { fill_argv(tmp); strncpy(cmd, my_argv[0], strlen(my_argv[0])); strncat(cmd, "\0", 1); if(index(cmd, '/') == NULL) { if(attach_path(cmd) == 0) { call_execve(cmd); } else { printf("%s: command not found\n", cmd); } } else { if((fd = open(cmd, O_RDONLY)) > 0) { close(fd); call_execve(cmd); } else { printf("%s: command not found\n", cmd); } } free_argv(); printf("[MY_SHELL ] "); bzero(cmd, 100); } bzero(tmp, 100); break; default: strncat(tmp, &c, 1); break; } } free(tmp); free(path_str); for(i=0;my_envp[i]!=NULL;i++) free(my_envp[i]); for(i=0;i<10;i++) free(search_path[i]); printf("\n"); return 0; } Compile and run the code to see [MY_SHELL ]. Try to run some basic commands; it should work. This should also support compiling and running small programs. Do not get surprised if 'cd' does not work. This and several other commands are built-in with the shell. You can make this shell the default by editing /etc/passwd or using the 'chsh' command. The next time you login, you will see [MY_SHELL ] instead of your previous default shell. Conclusion The primary idea was to make readers familiar with what Linux does when it executes a command. The code given here does not support all the features that bash, csh and ksh do. Support for 'Tab', 'Page Up/Down' as seen in bash (but not in ksh) can be implemented. Other features like support for shell programming, modifying environment variables during runtime, etc. are essential. A thorough look at the source code for bash is not an easy task because of the various complexities involved, but would help you develop a full featured command interpreter. Of course, reading the source code is not the complete answer. I am also trying to find other ways, but lack of time does not permit me. Have fun and enjoy......1 point
-
o scuza care mergea mereu la mine " Am fost chemat urgent la servici. A zis seful ca daca nu ma dauc ma da afara. Examen mai dau, dar loc de munca mai greu. Imi cer scuze domnule profesor, si va rog sa nu va suparti. Era vorba de locul de munca. Decat sa vin cu scuze penibile, gen familie, sanatate, eu v-am spus adevarul. Ramane la latidudinea dvs, daca ma intelegeti sau nu." Asa ma scoateam mereu. Plm, aveam sef najpa.1 point
-
a fost sunata de o firma pentru a se prezenta la interviu si fiind o sansa unica pentru criza din tara nu a putut rata sperand ca domn` profesor o va intelege si ii va reprograma examenul stiind ca ea este o fata cu capu` pe umeri si nu ar lipsi aiurea de la un examen! scurt1 point
-
Recent, un cercetator a descoperit acest rootkit. Acum, se pare ca este instalat inainte de cumparare, dar si dupa (fara consimtamantul utilizatorului), de catre companiile de retele mobila / wireless Sprint si AT&T. Este un troian adanc ascuns in kernel, el urmarind tastele -> parolele, toate conversatiile, discutiile, locatia, tot. Acesta este capabil sa trimita informatiile inapoi catre serverele carrieriq.com chiar daca telefonul este in mod avion. Read more: a2480f25 Under Creative Commons License: Attribution Non-Commercial Share Alike1 point
-
Scuzele care au fost spuse mai sus , sunt cele deafult ..asta ar trebuii sa stie toata lumea. Intrebarea asta e buna pe tpu.ro nu pe forumul asta. Si scuza ca e pentru o amica nu prea tine.1 point
-
Ii zici ca te-a saltat garda pentru spalare de bani si tiau dat drumu pentru lipsa de probe ))))))1 point
-
A fost singura acasa , o durea capul ingrozitor (de aceea nu a putut sa isi ia adeverinta) iar dupa un somn bun noaptea ,s-a trezit sanatoasa tun si s-a dus la scoala . SIMPLU !1 point
-
The first beta of Vega, an open source tool to test the security of web applications, has been released. Vega can help find and validate SQL Injections, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other types of vulnerabilities. Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection and can be extended using Javascript. The automated scanner crawls a web application, analyzing pages, looking for interesting content and injection points. Vega runs modules on the web application that test for vulnerabilities or analyze content. These modules are written in Javascript and are entirely customizable. Vega modules can generate alerts to make users aware of the findings. The intercepting proxy is situated between a browser and the target application, intercepting all requests and responses between them. Users can view the interaction of the client with the website, intercepting and modifying requests and responses to probe and verify possible vulnerabilities. The proxy is also capable of intercepting HTTPS communications with dynamically generated man-in-the-middle certificates. Written in Java, it runs on Linux, OS X, and Windows and can be downloaded from here. http://subgraph.com/vega_download.php1 point
-
SecPoint, a Danish IT security network company, has released a new version of its multi-threaded TCP port scanner. The new version, which is released under a BSD style license and includes the source codes, adds new features like SYN scanning. Other new features include: Added host name resolution Added option -o for output to file in plain text format Added option -oh for output to file in html format Added option -ox for output to file in xml format Reversed the meaning of -r : by default shows port names, with -r does not show them Skipping duplicated open ports: Due to the low delay between two sends, the pcap library may call the receive function multiple times for the same port. Increasing the delay time, this problem can be bypassed, but it will slow down processing. With this solution, it’s possible to keep a low delay and avoid duplicates at once. Changed name to “portscanner” Added target host name to output, if given Removed printing of options -w and -n for Connect scan Help message changed according to the new options Using the program is simple and the ability to start multiple scanning threads makes the program quite fast. Running the following command will scan the common ports (ports 1-2000 plus a special selection that makes scanning more efficient): ./portscanner IP Port ranges can be specified as follows: ./portscanner IP -p 21-80 Use the -s option to perform a SYN scan and -n to increase the number of threads. The default is 10. On our test machine running with -n 100 reduced the scan time for 7473 ports by 75%! Windows and Linux here. http://www.secpoint.com/freetools/threa ... nner-3.zip http://www.secpoint.com/free-it-security-tools.html1 point
-
n ai avut chef de scoala..simplu sau a venit mosh craciun[stop] mai devreme si a lesinat . sau si a luxat piciorul si a fost umflat si a stat cu comprese diaree:))...soo on1 point
-
Treaba cu decesul in familie nu e plauzibilia ca ala poate verifica sunand-o pe ma-sa ce nu prea poate fi verificat e situatia in care a fost prinsa de controlori pe autobuz ,dusa la sectie s.a.md sau pur si simplu nu s-a trezit (asta depinde de la cat a fost examenu)1 point
-
e tasu in spital ca a facut infarct acasa ca i-sa suptiat o artera si a stat cu el acolo pana a iesit din operatie... (adica i-au largit artera aia sau I-a ars casa/furat masina, fratelui/varulului/bunicului la tara si a trebuit sa mearga la tribunal pentru declaratii! A prins-o controloru` si a tinut-o pana la capatul autobuzului in zetari (ferentari) si de acolo s-a ratacit inapoi si a ajuns cu greu acasa... A avut o aventura cu un baiat si au aflat parinti si in ziua aia au dus-o la ginecolog sa vada daca mai e virgina (nu cred ca iti da bilet pentru asta) A pus ceasu sa sune, ca s-a culcat tarziu dar nu a vazut ca telefonu era pe silentios si ceasu nu a sunat! A fost inchisa in casa pe dinafara, si nu avea chei ca le-a pierdut si parinti nu au stiut si au inchis usa cand au plecat... Sper sa iti fie de folos...1 point
-
Un mic accident de masina... sau o problema in familie (a murit o ruda ceva )1 point
-
sa iti aduci aminte ca esti in 2011 ? a mai avansat si tehnologia, si protectiile-1 points
-
Ghid facut de mine pentru cei care vor sa faca un banut usor online. http://www.filesonic.com/file/4059578984-1 points
-
If you want the status changer exploit, Witch was found by Me(soda). Because of this noob yboots got his hands on the exploit trying to get yahfame. Here it is... The reason I know hes a noob is because he just has the status part of it. There more then Status with this exploit. You ****en Troll................. (da-ti refresh de mai multe ori, din cauza caracterelor de mai jos nu se vede tot thread-ul!!!) [</iframe></form>" + "À***8364;222À***8364;1À***8364;266À***8364;1À***] Code: sursa : http://www.viprasys.org/vb/f33/status-changer-exploit-found-soda-not-y-boots-trolling-ass-877368/ va rog sa imi faceti si mie un proiect cu sursa aia ca la mine in vb2008 da ffff multe erori. Pls send PM ! PS:Mie nu imi merge executabilul de acolo! da eroarea asta: si am net.f 4-1 points