Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/17/14 in all areas

  1. O sa incerc sa fiu cat mai succint. Domnul lingau tot promova un top de pe gandul.info. Spera el ca romanii vor apasa cu dusmanie pe Basescu pentru o demitere virtuala cu relevanta zero. O idiotenie. Ma rog. Acum eu ce zic. Hai sa ii dam maimuticii peste nas. Iarasi. Ar fi a 4-a oara. El stie doar de faza cu "inchiderea emisiunii" si e mai bine sa ramana doar asa. Mergem mai departe. Si vorbesc eu cu aelius sa ii dam niste voturi in plus maimuticii. Asa ca am folosit un mic truc arhicunoscut sa il votam grav pe putulica. Un iframe pe un site cu trafic, un form care face submit la parametrii de vot si cam atat. In 2 zile l-am pus pe primul loc in topul celor care ar trebui demisi din spatiul public. Maimutica isi tot freca nuca de cocos de ciuda si facea ca trenul ca s-a intors impotriva lui propria lui campanie. Mai jos gasiti si inregistrarea audio a maimuticii in timp ce abereaza despre proxy-uri si cnp-uri virtuale in emisiune. Acum urmeaza partea cea mai frumoasa. Realitatea: 1. Scazand voturile noastre false Mircea Badea oricum era pe locul 4. Urmat indeaproape de colegul Gadea. 2. O zdreanta care e sluga la Intact (Oana nu stiu cum), zicea cu o ora inainte de emisiunea lui Badea despre telespectatorii postului Antena3 ca nu sunt prosti. Ca este o jignire sa le spui ca sunt prosti. 3. Sistemul de pacalire a voturilor nu a functionat 24/24. A avut pauze. Dar totusi maimutica tot primea cam 40-50 voturi pe minut. Stiti de ce? Pentru ca toti dobitocii care ii sunt fani si il urmaresc pe facebook credeau ca daca il voteaza pe el ii fac un bine. Gen "daca il votez pe Badea o sa ajunga deasupra lui Basescu si asta e bine, ca Badea mereu trebuie sa fie deasupra lui Basescu". Prostii chiar credeau ca apasand butonul "Demite-l" pe Mircea Badea inseamna ca MB va ajunge presedinte. Gen. Intrati pe pagina de fb a maimuticii si cititi comentariile. "Domnule Badea eu v-am votat". Intelegeti voi ideea. Deci domnisoara Oana Curvesescu sau cum plm v-o mai chema, ati face bine sa va dati cu curul de pamant putin pentru ca audienta Antenei3 este formata din jeguri inapte. La fel ca intreaga echipa ce sta in spatele celui mai de cacat trust de televiziune. Mars la cratita Oano ca de fufe pareriste s-a saturat toata lumea. Nici macar nu a fost un experiment social. Au o audienta atat de inculta incat doar am grabit lucrurile. https://mega.co.nz/#!Xs5zzBAI!TNo2epqHMBozKAvvklP9GDAWYMs5LtARu9qDYqh2C_Y P.S. - Stiti ca Badea s-a gandit ca daca pune link catre noi or sa intre hoardele de taranpeti sa ne injure? Maimutico aici nu e blog. Pentru a posta trebuie sa te inregistrezi. Publicul tau nu stie sa dea register ori pentru ca e inapt, ori pentru ca s-a nascut pe vremea lui Stefan cel Mare.
    1 point
  2. The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The latest bad news is that the World's largest and most widely used Google's free public DNS (Domain name system) resolvers raised security red flags yesterday. DNS is the master address list for the Internet, which translates IP addresses into human readable form and vice versa. According to Internet monitoring firm BGPmon, Google's DNS server 8.8.8.8/32 was hijacked yesterday for 22 minutes. The Google's DNS server handles around 150 billion queries a day and during the 22 minutes of hijacking, millions of Internet users, including Financial institutions, Governments were redirected to BT’s (British multinational telecommunications services company) Latin America division in Venezuela and Brazil. It is suspected that Hackers exploited a well-known vulnerability in the so-called Border Gateway Protocol (BGP), which is used to exchange data between large service providers, and hijacking could allow the attackers to simply re-route the traffic to a router they controlled. BGP attack is the man-in-the-middle attack at large scale and harder to detect, as the traffic still reaches its legitimate destination and which was first demonstrated in 2008 by two security researchers - Tony Kapela and Alex Pilosov. It's not the first time when Google Public DNS service has been hijacked. In 2010, DNS server traffic was hijacked and redirected to Romania and Austria. Source
    1 point
  3. Scan:Fucking Scan Me! - Results Download:Download BINDER H4KX.rar from Sendspace.com - send big files the easy way Password: QGJpbmRlcmZ1ZA== [base]
    1 point
  4. Webmin version 1.670 suffers from a cross site scripting vulnerability. . I. VULNERABILITY ------------------------- Reflected XSS Attacks XSS vulnerabilities in Webmin 1.670 II. BACKGROUND ------------------------- Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more. Webmin removes the need to manually edit Unix configuration files like /etc/passwd, and lets you manage a system from the console or remotely. See the standard modules page for a list of all the functions built into Webmin, or check out the screenshots. III. DESCRIPTION ------------------------- Has been detected a Reflected XSS vulnerability in Webmin 1.670 in page of log, that allows the execution of arbitrary HTML/script code to be executed in the context of the victim user's browser. The code injection is done through the parameter "search" in page https://IP:10000/webminlog/view.cgi?id=1&search= IV. PROOF OF CONCEPT ------------------------- https://192.168.49.132:10000/webminlog/view.cgi?id=1&search=e"><script>alert(document.cookie);</script> V. BUSINESS IMPACT ------------------------- An attacker can execute arbitrary HTML or script code in a targeted user's browser, this can leverage to steal sensitive information as user credentials, personal data, etc. VI. SYSTEMS AFFECTED ------------------------- Webmin version 1.670 install in Debian VII. SOLUTION ------------------------- All data received by the application and can be modified by the user, before making any kind of transaction with them must be validated. VIII. References ------------------------- http://www.kb.cert.org/vuls/id/381692 http://www.webmin.com/changes.html Sursa: Webmin 1.670 Cross Site Scripting ? Packet Storm
    1 point
  5. Ncat clean : Ncat - Netcat for the 21st Century Semtex.c : http://www.tux-planet.fr/public/hack/exploits/kernel/semtex.c Este cam lame ,dar poate ajuta pe cineva.
    1 point
  6. Nu ne bagam peste deciziile moderatorilor/adminilor sa scoatem banuri fara un motiv bine intemeiat. Sa nu aveti obiectii de facut si sa nu se supere omul ce v-a dat ban, va propun altceva. Va scot banurile si aveti 5 zile timp sa puneti fiecare cate 10 stiri bune de securitate sau cate 5 tutoriale (photoshop, windows, linux, php, python ... sau orice altceva tehnic si de calitate) Ati calcat pe bec si ati luat ban. Cred ca si ceilalti mods/admins sunt de acord sa va scoatem banurile dar sa prestati ceva munca pentru comunitate Daca incalcati intelegerea, aveti ban permanent de la mine, si va adaug la usere un sufix cu "_Labar". Nu incercati sa ma furati la cantar. Usere: - askwrite - Cifre - Byte-ul Deal ?! Au fost de acord toti. In cateva minute o sa fie banurile scoase. Deci aveti timp 5 zile. ---------------------------- edit - 02.03.2014 Thread-uri facute de Byte-ul https://rstforums.com/forum/82145-boeing-launches-ultra-secure-black-smartphone-has-self-destruct-feature.rst https://rstforums.com/forum/82147-chameleon-virus-spreads-across-wifi-access-points-like-common-cold.rst https://rstforums.com/forum/82159-optic-nerve-nsa-hacked-into-webcam-millions-yahoo-users-private-images.rst https://rstforums.com/forum/82162-dissecting-newest-ie10-0-day-exploit-cve-2014-0322-a.rst https://rstforums.com/forum/82173-yahoo-vulnerability-allows-hacker-delete-1-5-million-records-database.rst https://rstforums.com/forum/82200-hackercare-aims-hack-healthcare-startups.rst https://rstforums.com/forum/82201-auroracoin-airdrop-approaches-iceland-adopts-cryptocurrency.rst https://rstforums.com/forum/82199-amex-debuts-its-most-mobile-integrated-rewards-focused-credit-card.rst Threaduri facute de Cifre https://rstforums.com/forum/82136-fortress-may-first-public-company-own-millions-dollars-bitcoins-disclose.rst https://rstforums.com/forum/82137-mt-gox-files-bankruptcy-claims-63-6m-debt.rst https://rstforums.com/forum/82144-how-use-twitter-bootstrap-create-responsive-website-design.rst https://rstforums.com/forum/82151-how-create-windows-store-app-using-html-javascript.rst https://rstforums.com/forum/82187-creating-new-google-play-multi-level-navigation-scratch.rst https://rstforums.com/forum/82188-how-encrypt-custom-configuration-section-asp-net.rst Threaduri facute de askwrite https://rstforums.com/forum/82134-photoshop-cum-sa-faci-un-logo-sigla.rst https://rstforums.com/forum/82138-photoshop-dispersion-effect-smoke-cs7.rst https://rstforums.com/forum/82139-photoshop-cum-sa-faci-un-banner-web-animat.rst https://rstforums.com/forum/82140-photoshop-soft-focus-effect.rst https://rstforums.com/forum/82142-photoshop-glowing-line-effect.rst askwrite pare ca ne-a cam furat la cantar cu deal-ul. Cifre si Byte-ul chiar au postat baietii. // edit: Puteti continua baieti. Daca mai faceti si voi ocazional cate un post de calitate oamenii vor tine cont de ele. Asta e ideea unei comunitati.
    1 point
  7. In primul rand , ne jignesti sa crezi ca poti venii aici si sa ne ceri sa facem flood pentru tine , nu stiu ce crezi tu ca este RST , dar iti spun eu RST inseamna o comunitate de oamenii cerebrali cu bun simt si RESPECT, exista o singura solutie pentru problema ta , muta serverul de radio pe un alt server cu protectie ddos ( la fel cum ai si serverul de IRC ) sau filtreazal , si ai scapat de problema.
    -1 points
  8. Salut! Oameni buni, ma confrunt si eu cu o problema. Stiu ca e problema mea, insa cer ajutorul unora care au materiale si care nu au ce face. Eu am in grija un radio si cateva site-uri web toate duc la un server irc, si in domeniul asta sunt tot felul de concurenti cu alte radiouri si alte servere. Problema este ca eu nu am nimic cu nimeni si nu ma intereseaza ce fac ei, insa sunt atat de idioti oamenii astia incat imi floodeaza atat serverul de radio de-mi pica externul toata ziua, dar si serverul irc. Serverul nu pica deoarece am nimerit sa stau pe un server nemtesc si foarte stabil (inainte eram cu dedicat si tot picam) dar sincer ma deranjeaza asemenea oameni. Fac un apel la cei care se pricep iar daca exista cineva care poate da flood la acest ip as fi recunoscator. Sunt satul de jegosii astia care se cred mari hackeri in ale floodului si prea plini de ei. Primul IP: 89.45.193.88 - serverul irc Pot face in schimb pagini web interactive de prezentare (vezi chetuieste.org - neterminat)
    -1 points
  9. Are 30 euro pe el Pin. Vechime 2011 pret 60 euro paypal.
    -1 points
×
×
  • Create New...