Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/01/16 in all areas

  1. £1,300 pentru un laptop de plastic, cel mai probabil reciclat din capacul de WC aruncat de Gecko anul trecut? Hahahaha Serios man, nu merita banii..
    4 points
  2. The Romanian Teen Hacker Who Hunts Bugs to Resist the Dark Side IT’S 3 AM, and his eyes are almost closed. The pack of gummy bears on his desk is empty. So’s the Chinese takeout box. Romanian white hat hacker Alex Coltuneac has had three hours of sleep tonight. And last night. And the night before that. He’s busy trying to find a vulnerability in YouTube live chat, which he plans to report to the company and hopefully get some money in return. None of the bugs he has discovered in the past few days electrifies him, so he keeps digging. In the past four years, Coltuneac has gotten bug bounty payments from Google, Facebook, Microsoft, Adobe, Yahoo, eBay, and PayPal for flaws he reported. Such bounty programs are a chance for Eastern European hackers like him to pursue a legitimate career in cybersecurity. And he’s only 19 years old. In a country better known for cybercrime, the teenager is part of small but growing cohort of hackers who are deciding to play it nice. This is a departure for the hacking community of Romania, known for such hits as the hackers Hackerville and Guccifer, and fraudsters who steal money from American bank accounts, perpetrate eBay frauds, and land themselves on the FBI’s most wanted list. Coltuneac is a freshman at the Babes-Bolyai University in Cluj-Napoca, where he learns Computer Science taught in English. Raised by a family who emphasized honest values, he started using a computer when his was 6. First, he taught himself how to play games, but as he got older he began to see the computer’s potential as a tool to make money. He spent his early teenage years watching fellow Romanian hackers make astounding sums of money selling exploits on the black market. They were able to rake in thousands of US dollars with just a few clicks, far more than Coltuneac’s parents made in a month. He was a good kid, from a good family. He didn’t want to join them. But he did want to pay for college. The allure of that life was powerful. Which is why he was so grateful to find out about bug bounty programs when he was 15. They pay enough to keep his conscience clear and his bank account full. Bounties cover the cost his education and living expenses, so “there’s no excuse to break the law,” he said. Coltuneac won’t say how much he earns as a vulnerability hunter, yet gifted white hat hackers doing the same kind of job brag about making in a lucky month about $6,000. That’s how much an ordinary Romanian earns in a year. The average take home pay in the country was about $520 a month this March, one of the lowest in the European Union. On the white market, a flaw found and reported legitimately is priced at a few hundred dollars, enough for Coltuneac to pay his rent this month. Sensitive ones are often rewarded with several thousand dollars. In very few cases, the bounty exceeds $100,000. He’s constantly hoping to find one of those. And that sum is still far less than what he would get if he sold the same vulnerabilities on the gray or black markets. (Gray markets sell exploits to nations and corporations to use against their foe; black markets sell to the highest bidder, often criminals.) Zerodium, a gray hat vulnerability broker working with law enforcement and intelligence agencies, awards a hacker up to $500,000 for a high-risk bug with fully functional exploit. Patching Giants Coltuneac started hunting vulnerabilities when he was 15, after visiting a Romanian cybersecurity forum, in his free time after school. Like most Romanian hackers, the teen is self taught. Soon, he got his first few hundred dollars from Google, and used them to buy himself a brand new computer. His desktop was dead slow. “I got lucky. I found a sensitive file. I used brute force,” he said. The tech giant is among the companies he closely monitors for bug bounty programs. He has recently found an LFI vulnerability and several XSS flaws in Google FeedBurner. Last year alone, Google awarded over $2 million to security researchers globally, and since 2010, when it began its bug bounty program, it has paid a total of $6 million. For 2015, Google highlighted Romania as among the top countries bug bounties were paid out to. Coltuneac has also made it to Microsoft’s Bounty Hunters: The Honor Roll. This spring he found an XSS vuln in their OAuth interface. Microsoft is constantly improving its bounty program, and last year, the company included rewards for flaws found in Azure, ASP.NET, .NET Core runtime and the Edge browser. Articol complet: https://www.wired.com/2016/05/romanian-teen-hacker-hunts-bugs-resist-dark-side/
    2 points
  3. Ia-ti mac-ul.... Orice laptop de gaming este relativ nasol, se incalzeste, este destul de incomod de jucat (tastatura ingramadita, etc), te tine bateria putin, nu-i poti fute un pumn la tastatura cand te enervezi, nu-l poti upgrada, nu poti schimba placa video, in timp se fut balamalele, flendure ecranul, se vede uzura pe tastatura, pe touchpad, bani stricati aiurea.
    1 point
  4. Referitor la gaming, asta inseamna doar o ora doua la cateva zile, nu mai am timp cum aveam acum cativa ani. Ceea ce joc eu este pe Steam deci merge si pe MacBook. Tocmai de aia am venit aici, am spus sa mai cer o parere inainte sa dau o galagie de bani pe ceva... De asta ce ziceti? Aici se mai poate negocia un pic cu omul https://www.gumtree.com/p/macs/-amazing-gaming-beast-msi-i7-980m-32gb-1.5tb-hdd/1171810289
    1 point
  5. @Ganjaa, eu imi cumpar de la mine din oras de obicei, caut pe "oleix", ma intalnesc cu vanzatorul, probez, il verific, banii jos si am plecat. Am si un baiat care imi aduce constant. Un display original are pe una din benzile flexibile logo-ul apple (marul muscat, nu intotdeauna!!!), Cum ti display-ul cu benzile flexibile spre tine, in coltul din stanga sus peste codul acela QR are lipita o folie, pe fiecare dintre benzile felx are buretei si la camera si senzorul de proximitate are locasurile acelea de plastic transparente. Cel din stanga este copie, cel din dreapta este original.
    1 point
  6. Merita investit in ethereum datorita volumului si fluctuatiei sale. Astept cateva zile sa cumperi la 10$ si apoi cateva zile sa vinzi la 12$. Eu fac asta de cateva saptamani si nu mi-e rau.
    1 point
  7. @albastrel, eu imi cumpar display-uri la 190-250 RON de iPhone 5 si 5S. @Xenon123, iti gasesti display original de pe iphone-uri cu icloud, la 190-250 maxim, aici in tara.
    1 point
  8. Inca nu, am facut putin research sa vad daca e viabila investitia in circumstantele mele si am decis sa mai astept sa vad daca va creste in pret peste un anumit prag. De minat cu CPU-ul este mai degeaba, trebuie sa minezi cu GPU (placa video). Gasisem niste servere GPU de inchiriat pe net cu preturi bune care au mai multe Nvidia Titan-x la 6144 cores insa momentan inca nu as face break-even oricat le-as trage de par, si daca as lua SH si face colocare so mai astept Insa daca i-a luat mami si tati cuiva recent o placa video puternica si nu el plateste curentul ci parintii, poate ca se merita sa o bage la minat. Vezi aici de software si alte detalii: https://ethereum.gitbooks.io/frontier-guide/content/gpu.html
    1 point
  9. Ok, sigur. Imi cer scuze ca nu m-am gandit la asta dinainte. Aici este codul. err(E,V1) :- pair(E, _), E = 'if' ,V1 = 0,!. err(E,V1) :- pair(E, _), E = 'then' ,V1 = 0,!. err(E,V1) :- pair(E, _), E = 'else' ,V1 = 0,!. err(E,V1) :- pair(E, _), E = 'while' ,V1 = 0,!. err(E,V1) :- pair(E, _), E = 'return' ,V1 = 0,!. err(E,V1) :- atom_chars(E,Res), errAux(Res, V1). /* *facem verificarea ca nu cumva variabila sa fie unul din cuvintele if, then, else, while, return *iar daca nu este, atunci vom sparge variabila intr-o lista de char-uri, pe care le vom verifica cu *functia auxiliara errAux */ errAux([], R) :- R is 1,!. errAux([H|T], R) :- char_code(H, Asc), Asc > 47, Asc < 58, R is 0,!. errAux([H|T], R) :- char_code(H,Asc), errAux(T,R). /* *Ok, acum avem lista, de exemplu pentru "ana2" vom avea [a, n, a, '2']. *Avand in vedere ca 2 este tratat ca si string (daca am inteles eu bine) *Vom verifica codul ascii pt fiecare, iar daca se afla intre 47 si 58 atunci vom intoarce 0 *apoi verificam urmatorul element si asa mai departe */ err([H|T],V1) :- V1 = 1,!. //daca nu a fost gasita o cifra, vom intoarce 1 In prima parte am verificat daca este cumva unul din cuvintele care nu trebuie, iar in Aux am verificat chestia cu codul ASCII. Practic, primind o lista, exact cum am spus mai sus, am verificat fiecare element sa fie litera, iar daca nu este (linia 2 din errAux), atunci vom intoarcea valoarea 0 (incorect). Altfel, vom parcurge pana la finalul listei si daca nu vom gasi, vom intoarce 1 (corect), adica ultima linie. Nu stiu cat de explicit am fost, dar sper sa ajute.
    1 point
  10. 1 point
  11. Android-Security-Reference This is a reference guide for all things Android Security. I'm slowly moving my private notes over to this repo as It may help others Others may help me (by correcting / adding to the ref) Feel free to contribute! Tools Nav helper OctoTree TOC gen DocToc Sursa: https://github.com/doridori/Android-Security-Reference
    1 point
  12. vand pagina facebook cu 2050 like-uri . Am sters absolut toate postarile de pe ea nu mai ramane decat sa schimbati numele si sa va apucati de treaba. Pret 5 $ paypal
    1 point
  13. Decat sa vorbesti aiurea mai bine te abtii. Site-ul acela de filme este al meu dar l-am vandut si am ramas cu aceasta pagina. Like-urile sunt reale si nu sunt facute cu addmefast , lumea a dat dislike pentru ca am schimbat eu numele in Gowatch.. iar pagina era pentru nisa de amuzament. Pe mine ma interesa atunci doar numarul de like.uri la pagina ca sa dea bine site-ului.Acum nu mai am ce face cu ea pentru ca am vandut site-ul. Cel care o cumpara ii schimba numele si isi face treaba cu ea. Dupa cum am zis fanii au impact la nisa funny
    1 point
  14. Sal,ma intereseaza pe mine daca e din Romania.De asemenea,daca are cineva cont de fb cu multi prieteni,sau pagina,de preferat pe nisa divertisment,va rog sa ma contactati.
    1 point
  15. Imi cer scuze ca ma bag, o fac foarte rar, insa din moment ce tu nu stai pe chat si nu stii ce se intampla pe-acolo, cum vorbim si ce glume avem, nu cred ca ai dreptul sa scoti in evidenta ce / cum si cui vorbeste. Daca @aa7670 rade cu @SilenTx0 este pentru ca se cunosc (si oricum nu e treaba ta si nu ar trebui sa-ti pese daca Ina i-o freaca lu' @hades sau daca @urs_02918473 si-o freaca in momentul in care @aelius trimite poze cu shemale). Faptul ca @Gecko se injura cu Worm e strict problema lor. (toata lumea se injura cu Worm, si da, ne place) Termina cu frustarile astea si incearca sa faci ceva folositor pentru comunitatea asta. Nu-ti convine ceva ? Taci si treci peste. E doar un forum. Scopul acestei comunitati este de a ajuta membrii sa-si dezvolte abilitatile in IT & Sec si pe cat posibil, sa le ofere posibilitatea de a se relaxa (chat). Incearca sa intelegi asta sau evita sa mai faci din nimic, ceva. Peace
    1 point
  16. 364 361 369 344 363 366 362 344 364 360 360 344 363 369 363 344 364 362 362 344 363 366 362 344 363 366 369 344 363 366 364 344 364 361 363 344 363 365 365 344 364 360 360 344 364 361 362 344 364 362 362 344 364 361 363 344 364 362 361 344 363 366 367 344 364 362 360 344 363 368 368 344 364 362 362 344 363 369 363 344 363 369 364 344 363 368 368 344 364 362 366 344 363 369 360 344 364 362 363 344 363 366 361 344 363 366 360 344 363 366 368 344 364 362 362 344 364 363 362 344 364 361 363 344 364 362 366 344 364 361 363 344 363 365 365 344 364 361 364 344 363 369 363 344 364 362 361 344 364 361 365 344 364 362 366 344 363 369 364 344 364 361 368 344 363 366 361 344 364 361 368 344 363 366 367 344 364 361 369 344 363 368 364 344 364 361 363 344 364 362 368 344 363 367 363 344 363 368 369 344 364 361 368 344 363 366 366 344 364 361 362 344 363 368 368 344 364 361 363 344 364 363 360
    1 point
  17. The Art of Assembly Language The Art of Assembly Language ................................................................. 1 Volume One: .............................................................................................. 1 Data Representation ................................................................................... 1 Chapter One Foreward ................................................................................ 3 Chapter Two Hello, World of Assembly Language ................................... 11 Chapter Three Data Representation ............................................................ 43 Chapter Four More Data Representation .................................................... 77 Chapter Five ............................................................................................... 109 Chapter Five Questions, Projects, and Lab Exercises ................................. 109 Volume Two: ............................................................................................. 129 Machine Architecture ................................................................................. 129 Chapter One System Organization .............................................................. 131 Chapter Two Memory Access and Organization ........................................ 151 Chapter Three Introduction to Digital Design ............................................ 195 Chapter Four CPU Architecture .................................................................. 225 Chapter Five Instruction Set Architecture .................................................. 261 Chapter Six Memory Architecture .............................................................. 293 Chapter Seven The I/O Subsystem ............................................................. 315 Chapter Eight Questions, Projects, and Labs .............................................. 341 Volume Three: ........................................................................................... 375 Basic Assembly Language ......................................................................... 375 Chapter One Constants, Variables, and Data Types .................................. 377 Chapter Two Introduction to Character Strings .......................................... 401 Chapter Three Characters and Character Sets ............................................ 421 Chapter Four Arrays ................................................................................... 445 Chapter Five Records, Unions, and Name Spaces ...................................... 465 Chapter Six Dates and Times ...................................................................... 481 Chapter Seven Files .................................................................................... 497 Chapter Eight Introduction to Procedures ................................................... 521 Chapter Nine Managing Large Programs ................................................... 549 Chapter Ten Integer Arithmetic .................................................................. 567 Chapter Eleven Real Arithmetic ................................................................. 591 Chapter Twelve Calculation Via Table Lookups ........................................ 625 Chapter Thirteen Questions, Projects, and Labs ......................................... 641 Volume Four: ............................................................................................. 703 Intermediate Assembly Language .............................................................. 703 Chapter One Advanced High Level Control Structures ............................. 705 Chapter Two Low-Level Control Structures .............................................. 729 Chapter Three Intermediate Procedures ...................................................... 781 Chapter Four Advanced Arithmetic ............................................................ 827 Chapter Five Bit Manipulation ................................................................... 881 Chapter Six The String Instructions ........................................................... 907 Chapter Seven The HLA Compile-Time Language ................................... 921 Chapter Eight Macros ................................................................................. 941 Chapter Nine Domain Specific Embedded Languages ............................... 975 Chapter Ten Classes and Objects ................................................................ 1029 Chapter Eleven The MMX Instruction Set ................................................. 1083 Chapter Twelve Mixed Language Programming ........................................ 1119 Chapter Thirteen Questions, Projects, and Labs ......................................... 1163 Section Five ............................................................................................... 1245 Section Five Advanced Assembly Language Programming ...................... 1245 Chapter One Thunks ................................................................................... 1247 Chapter Two Iterators ................................................................................. 1271 Chapter Three Coroutines and Generators .................................................. 1293 Chapter Four Low-level Parameter Implementation .................................. 1305 Chapter Five Lexical Nesting ..................................................................... 1337 Chapter Six Questions, Projects, and Labs ................................................. 1359 Appendix A Answers to Selected Exercises ............................................... 1365 Appendix B Console Graphic Characters ................................................... 1367 Appendix D The 80x86 Instruction Set ...................................................... 1409 Appendix E The HLA Language Reference ............................................... 1437 Appendix F The HLA Standard Library Reference .................................... 1439 Appendix G HLA Exceptions ..................................................................... 1441 Appendix H HLA Compile-Time Functions .............................................. 1447 Appendix I Installing HLA on Your System .............................................. 1477 Appendix J Debugging HLA Programs ...................................................... 1501 Appendix K Comparing HLA and MASM ................................................. 1505 Appendix L HLA Code Generation for HLL Statements ........................... 1507 Download: http://portal.aauj.edu/portal_resources/downloads/programming/assembly_language32bit_edition.pdf
    1 point
  18. Pentru ca-s in toane bune, urmatorii care posteaza cacaturi aici isi iau ban. V-am pupat pe portofel.
    -1 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...