Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/03/14 in all areas

  1. Am vazut ca este la moda sa vindeti like-uri pai... Like-urile provin 100% din Romania Pot targeta doar de pe varsta Capacitate zilnica aproximativ 75k Detin un numar de 86 de pagini de facebook ( ceea ce imi este destul de usor sa colectez like-urile ) Like-urile provin din sistem Like a box ( varianta clickjacking evoaluata ) Preturi.... 1000 like-uri - 5 euro 10.000 Like-uri - 50 euro 100.000 Like-uri - 500 euro Nu stiu daca preturile sunt mari sau mici , dar daca sunt mari nici o problema mai scad Pentru a valida oferta mea ofer cate ... 300 de like-uri de test celor ce doresc ( Postati pagina sa le pot vedea nu imi bombardati PM decat pentru comenzi )
    1 point
  2. Microsoft atac? Google cu propria arm?: Windows gratis pentru gadgeturi cu ecrane sub 9 inchi. Butonul "Start" revine Dup? ani de zile în care a f?cut pu?ine progrese pe pia?a smartphone-urilor ?i tabletelor, Microsoft a anun?at ieri în cadrul unui eveniment dedicat dezvoltatorilor care are loc în San Francisco (SUA) c? va oferi gratuit licen?ele pentru sistemul de operare Windows pentru companiile care produc echipamente cu ecrane cu dimensiuni mai mici de 9 inchi, o mi?care ?oc pentru gigantul american, copiat? dup? rivalii de la Google, ?i în urma c?reia produc?torul de soft se a?teapt? s?-?i îmbun?t??easc? pozi?ia în industrie. Sursa: Microsoft atac? Google cu propria arm?: Windows gratis pentru gadgeturi cu ecrane sub 9 inchi. Butonul "Start" revine | Ziarul Financiar Se pare ca in curand vom avea tablete ieftine cu Windows pe ele
    1 point
  3. Imagine, You Open a Winrar archive of MP3 files, but what if it will install a malware into your system when you play anyone of them. WinRAR, a widely used file archiver and data compression utility helps hackers to distribute malicious code. Israeli security researcher Danor Cohen (An7i) discovered the WinRAR file extension spoofing vulnerability. WinRAR file extension spoofing vulnerability allows hackers to modify the filename and extension inside the traditional file archive, that helps them to hide binary malicious code inside an archive, pretending itself as '.jpg' , '.txt' or any other format. Using a Hex editor tool, he analysed a ZIP file and noticed that winrar tool also adds some custom properties to an archive, including two names - First name is the original filename (FAX.png) and second name is the filename (FAX.png) that will appear at the WINRAR GUI window. Danor manipulated the second filename and extension to prepare a special ZIP archive, that actually include a malware file "FAX.exe", but displaying itself as "FAX.png" to the user. Cyber intelligence company, IntelCrawler also published a report, which revealed that cybercriminals specialized in cyber espionage attacks are using this zero-day vulnerability in the wild to target several aerospace corporations, military subcontractors, embassies, as well as Fortune Global 500 companies. Using this technique, an attacker can drop any malware in very convincing manner to the victim's system. "Using this method the bad actors bypass some specific security measures including e-mail server’s antivirus systems" IntelCrawler said. Danor successfully exploited winrar version 4.20, and IntelCrawler confirmed that the vulnerability also works on all WinRar versions including v.5.1. HOW TO CREATE EXPLOITABLE ZIP FILE? A video demonstration has been prepared by Indian Security Researcher Ajin Abraham, shown below: "One of the chosen tactics includes malicious fake CV distribution and FOUO (For Official Use Only)-like documents, including fax scanned messages" Using social engineering techniques, attacker are targeting high profile victims with spear phishing mails, "Most of sent malicious attachments are hidden as graphical files, but password protected in order to avoid antivirus or IDS/IPS detection." IntelCrawler reported. In above example, the Malware archive file was password protected to avoid antivirus detection, used in an ongoing targeted cyber espionage campaign. Researchers found Zeus-like Trojan as an attachment, which has ability to establish remote administration channel with the infected victim, gather passwords and system information, then send the collected and stolen data to the Command & Control server hosted in Turkey (IP 185.9.159.211, Salay Telekomünikasyon). Users are advised to use an alternative archiving software and avoid opening archives with passwords even if it has legitimate files. Source
    1 point
  4. Sigur de la mine ai cumparat, ca numai eu am oferta asta acolo. Y!M: rowxx daca esti interesat.
    -1 points
  5. Bah Vb frumos zdreanto Uite link de pe youtube Nu am observat ca a postat,si ii multumesc pt sfat runtime error 9 subscript out of range Acum trag visual studio sa vad ce eroare mai da Am fost penalizat din cauza lui Heaton,mare destept
    -1 points
  6. In arhiva sunt 4 programe : a.exe (eMail Extractor) - extrage mail-uri/sterge duplicate/ fee.exe (Fast Email Extractor) - extrage mail-uri de pe website-uri email-extractor-14-setup.exe - extrage mail-uri de pe website-uri Seven.exe - splitter fee era preferatul meu, email-extractor-14 este fostul Email Spider (care nu era asa bun) serialul pentru email-extractor-14-setup.exe este xCnPgABJ3o0j4Q6PrWAD Link download : https://www.dropbox.com/s/rkqakknjf4zv9o6/e-tools.rar Pass : f9df2 +rep daca va sunt folositoare
    -1 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...