Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 09/25/12 in all areas

  1. La o conferin?? de securitate a fost? demonstrat? o metod? cu ajutorul c?reia, folosind doar o singur? linie de cod HTML, pot fi executate comenzi de la distan?? pentru smartphone-urile Samung ce folosesc TouchWiz. De exemplu, pentru a efectua o resetare la configur?rile din fabric?, e suficient? vizualizarea unei pagini ce con?ine urm?torul cod HTML: <iframe src="tel:*2767*3855#" /> De men?ionat, c? acest exploit poate fi executat ?i printr-un cod QR sau tehnologia NFC. Mai multe detalii: One line of HTML can wipe or reset Samsung smartphones
    2 points
  2. S? zicem c? se încadreaz? la Programare. Foarte mul?i au nevoie de expresii regulate ?i nu se descurc? foarte bine cu ele. Mai ales c? ne salveaz? de o mul?ime de cod inutil. RegExr
    1 point
  3. De aceea l-am si facut ,si pt ca a fost moka:)) , dar nu am banii necesari sa incep un site porn,si nici timp Singur e greu
    1 point
  4. Security researchers have discovered security shortcomings in Windows 8 that create a means to infect the upcoming operating system with rootkit-style malware. Italian security consultants ITSEC discovered the security hole following an analysis of the Unified Extensible Firmware Interface (UEFI), a successor to the legacy BIOS firmware interface, that Microsoft began fully supporting with 64-bit versions of Windows 7. ITSEC analysed the UEFI platform now that Microsoft has ported old BIOS and MBR's boot loader to the new UEFI technology in Windows 8. Andrea Allievi, a senior security researcher at ITSEC, was able to use the research to cook up what's billed as the first ever UEFI bootkit designed to hit Windows 8. The proof-of-concept malware is able to defeat Windows 8's Kernel Patch Protection and Driver Signature Enforcement policy. The UEFI boot loader developed by Allievi overwrites the legitimate Windows 8 UEFI bootloader, bypassing security defences in the process. "Our bootloader hooked the UEFI disk I/O routines and it intercepted the loading of the Windows 8 kernel, thus our bootkit tampered the kernel by disabling the security features used by Windows to prevent the loading of unsigned drivers," explains Marco Giuliani, a director of ITSEC. The bootkit developed by ITSEC is comparable to forms of older MBR (Master Boot Record) rootkits that overwrite system files of older version of Windows. Bootkits capable of taking over Windows 8 machines have been around since last November but these earlier proof-of-concept nasties didn't circumvent UEFI, unlike the latest research. Previously boot loaders and rootkits had to be developed in assembly language. But UEFI creates a means to develop system loaders much more straightforwardly using the easier C programming language, making thing easier for both legitimate developers and VXers. "Our research attempts to show the industry that the new UEFI platform is still as insecure as the old BIOS technology, it's still vulnerable to the old attacks if the SecureBoot technology is not turned on by default," Giuliani told El Reg. "Writing a bootkit couldn't be an easier task for virus writers with the UEFI framework available, much easier than before when they needed to code in pure assembly. "The UEFI platform will soon become the new field of war between malware writers and the security industry unless SecureBoot is used to ensure that only digitally signed UEFI bootloaders can be executed at the system bootup." Giuliani also said that - although it's desirable from a security perspective - enabling SecureBoot by default effectively limits user choice. ITSEC's detailed technical analysis of the Windows 8 implementation of UEFI, and its potential security shortcomings, can be found here. The research by ITSEC follows the creation of a UEFI bootkit able to infect Mac's OS X operating systems, which was unveiled at this year's edition of the BlackHat Conference in Las Vegas by Australian security researchers Assurance. ® http://www.youtube.com/watch?v=xKgz4Y_sNjo via New vicious UEFI bootkit vuln found for Windows 8 • The Register
    1 point
  5. Salutare baieti. Din dorinta de a ma familiariza cu un mediu de programare, am facut o mica aplicatie: Aplicatia cauta pe net mailuri @yahoo. Aproximativ 90% sunt mailuri romanesti. In teorie, toate ar trebui sa fie valide, dar probabil exista 1-2% mailuri invalide. - gaseste aproximativ 400 mailuri/10 minute, cu variatii destul de mari in functie de ora din zi in care se face scanarea; - nu adauga mailuri duplicate; - lasat in bara, nu forjeaza procesorul peste 5% (testat pe un core2duo @2.4Ghz), deci merge lasat sa scaneze cand voi va faceti alte treburi; - are buton de ordonare alfabetica a listei de mailuri - buton de salvare a listei intr-un fisier text, cate un mail pe linie (da append) Zilele urmatoare voi mai imbogati aplicatia si cu alte functionalitati, dar am nevoie de ceva feedback de la voi. Orice bug descoperit, va rog sa-l raportati. Voi mari signifiant viteza de scanare, dar e destul de bine si asa pentru o aplicatie free. Chestii tehnice: - realizat in VS 2010, framework 4 - C#, WPF - testat cu succes pe un win7 x86; - aero activat ofera un mic avantaj la rulare; Link de download: d3d3Lkx4NjNMaVhhbm1iVm54d2FmakJMU0prR2JmQVVndDZxS0gwelQ1M3NwSUJEK0hCcUtnSFFueGhvZnhrZlN5WGFIeDZKVGhUUGZ5aFlINUxMS3hyNUFoaG1RZlRHUWZURw== Hint: Base e atomputernic! oarecum Parola: TheTime4RST Voi reveni zilele astea cu versiuni imbogatite. Daca vi se pare util, se poate pune o sigla a RST-ului si mutat la RST Power. Rep, Like daca va este de folos, injurati-ma de pisica si de bunica daca v-am irosit timpul sau daca ati avut o zi proasta.
    -1 points
×
×
  • Create New...