Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 07/14/16 in all areas

  1. Vand 150 backlink-uri dofollow. Backlink-urile vin de pe site-uri care au pr cuprins intre 2-6 (backlink-urile sunt permanente). Pret 15$ plata pp / btc, iar backlink-urile le pun in maxim 2 zile.
    2 points
  2. Scuze ca ma bag, nu stiu despre facultatea respectiva, am intrat doar acum de curiozitate sa ma uit pe oferta lor. Cred ca e inacceptabil ca o universitate de genul, in 2016, sa aiba un site execrabil cum il au ei (prezentarea ofertelor de studiu e jalnica, enorm de multe pagini "in lucru", fonturi comic sans, 10 mii de culori, etc.). Tinand cont de context (Rromanika, pedagogie, etc.) poate ca as inchide un ochi si chiar daca nu e bine sa judeci marfa dupa ambalaj, parca ma zgarie pe creier modul in care se prezinta. Insa hei, au programa de licenta RST https://www.upit.ro/ro/academia/facultatea-de-electronica-comunicatii-si-calculatoare/departamentul-electronica-calculatoare-i-inginerie-electrica/licente-electronica-calculatoare-si-inginerie-electrica/retele-si-software-de-telecomunicatii
    2 points
  3. Here it is : https://mab.to/lEfEkAufW And Have Funk!
    1 point
  4. Salut, ma numesc Mihai Ionut si in ultimele luni am lucrat la doua aplicatii de securitate - WaveCrypt si CyberFROST. WaveCrypt este o aplicatie de criptare (AES) si autentificare pe baza de sunet ce iti permite sa criptezi fisiere folosind un input audio (poti inregistra chiar direct din aplicatie), un cantec stocat pe CD etc sau un clip de pe YouTube (pur si simplu selectezi o secventa de timp, momentan este setata la 5 sec, apoi formatul este convertit in wave, apoi se prelucreaza pentru a obtine cheia) . Ideea centrala este sa poti avea o cheie de criptare de care nu trebuie sa ai grija, avand posibilitatea de a o obtine cand ai nevoie de ea. Evident, sunt constient de bresele mare de securitate ce apar (de ex: studierea traficului web in momentul in care utilizatorul acceseaza yt pentru a-si obtine cheia)chiar daca aceasta este setata la 5 secunde, este destul de usor spargerea acesteia folosind brute force. In urma unui audit de securitate, aplicatia a fost calificata ca "Security by obscurity" - e sigur atat timp cat nu divulgi detalii ale algoritmului. Am creat-o mai mut din curiozitate, plus ca am invatat destul de mult, nu doar partea de criptografie dar si elementele de editare si sintetizare a sunetelor (formatul wave nu este comprimat etc). Aplicatia am scris-o in Java iar modulul online in Python. CyberFROST este o aplicatie de securitate a registrului Windows OS, in cloud. Ideea centrala este ca atat timp cat esti connectat la aplicatie, poti oricand descarca o copie sigura, functionala, curata, de la ceilalti utilizatori. Deasemenea, se pot crea setari personalizate astfel incat sa ajute utilizatorii in a scapa de virusi (de ex dezactivarea driverelor de internet sau modificari asupra UAC etc). Aplicatia am scris-o in Python si in principiu accesez intrarile din registru direct - am facut o lista cu intrarile cel mai des afectate si, la modificarea neautorizata, ai posibilitatea de a reveni la una din configuratiile puse la dispozitie de comunitate. E un fel de System Restore online, cu avantajul comunicarii directe si cooperarii intre utilizatori. Am lucrat doar la componenta offline CyberFROST, trebuie sa mai acumulez cunostinte pentru a putea conecta efectiv utilizatorii intre ei. M-am uitat putin pe forum si mi-a placut mult initiativa voastra, felicitari. Daca aveti sugestii sau pareri legate de proiectele pe care vi le-am prezentat, puteti lasa un comentariu la acest post. Multumesc.
    1 point
  5. Daca platesti avem.Mortii tai de sarac.
    1 point
  6. trusted user ! am mai facut deal-uri cu el.
    1 point
  7. 1 point
  8. Microsoft's July Patch Tuesday offers 11 security bulletins with six rated critical resolving almost 50 security holes in its software. The company has patched a security flaw in the Windows Print Spooler service that affects all supported versions of Windows ever released, which if exploited could allow an attacker to take over a device via a simple mechanism. The "critical" flaw (CVE-2016-3238) actually resides in the way Windows handles printer driver installations as well as the way end users connect to printers. The flaw could allow an attacker to install malware remotely on victim machine that can be used to view, modify or delete data, or create new accounts with full user rights; Microsoft said in MS16-087 bulletin posted Tuesday. Users who are logged in with fewer user rights on the system are less impacted than users who operate with administrative user rights, such as some home accounts and server users. Microsoft said the critical flaw could be exploited to allow remote code execution if an attacker can conduct a man-in-the-middle (MiTM) attack on a system or print server or set up a rogue print server on a target network. The critical flaw was discovered and reported by the researchers at security firm Vectra Networks, who disclosed some details on the vulnerability, but didn't publish their proof-of-concept (POC) code. You can watch the video that shows the hack in action: In corporate networks, by default network administrators allow printers to deliver the necessary drivers to workstations or systems connected to the network. These drivers are silently installed without user interaction and run with full privileges under the SYSTEM user. According to researchers, attackers can replace these drivers on the printer with malicious files that could allow them to execute code of their choice. More worrisome: If the printer is behind a firewall, attackers can even hack other device or computer on that particular network, and then use it to host their malicious files. Watering Hole Attacks via Printers Like servers, multiple computers are also connected to printers in an effort to print documents as well as download drivers. So, this flaw allows a hacker to execute watering hole attacks technically using printers. Watering hole attacks, or drive-by downloads, are used to target businesses and organizations by infecting them with malware to gain access to the network. "Rather than infecting users individually, an attacker can effectively turn one printer into a watering hole that will infect every Windows device that touches it," said Vectra chief security officer Gunter Ollmann. "Anyone connecting to the printer share will download the malicious driver. This moves the attack vector from physical devices to any device on the network capable of hosting a virtual printer image." This flaw (CVE-2016-3238) is by far the most dangerous vulnerability of the year, which is easy to execute, provides different ways of launch attacks, and affects a huge number of users. A second related vulnerability, CVE-2016-3239, in MS16-087 bulletin is a privilege escalation flaw that could allow attackers to write to the file system. A security bulletin for Microsoft Office, MS16-088, includes patches for seven remote code execution (RCE) vulnerabilities, 6 of them are memory corruption flaws, which affects Microsoft Office, SharePoint Server as well as Office Web Apps. The flaws can be exploited by specially crafted Office files, allowing attackers to run arbitrary code with same privileges as the logged in user. Bulletin MS16-084 addresses flaws in Internet Explorer and MS16-085 in Microsoft Edge. The IE flaws include RCE, privilege escalation, information disclosure and security bypass bugs. Edge flaws include a handful of RCE and memory corruption flaws in the Chakra JavaScript engine, as well as an ASLR bypass, information disclosure, browser memory corruption, and spoofing bugs. Bulletin MS16-086 addresses a vulnerability in the JScript and VBScript engines in Windows, which could allow an attacker to execute remote code execution flaw, affecting VBScript 5.7 and JScript 5.8. Rest five bulletins rated as important address flaws in Windows Secure Kernel Mode, Windows Kernel-Mode Drivers, the .NET framework, the Windows Kernel, and Secure Boot process. Users are advised to patch their system and software as soon as possible. sursa http://thehackernews.com/2016/07/printer-security-update.html
    1 point
  9. MultiThread RDP Cracker + Scanner Fast and Compatible With Most Windowses Download and More Info
    1 point
  10. Avand in vedere ca se vinde pe piata neagra..o fi probabil un SCAM bine elaborat. Nu poti sparge VK.com sau Facebook asa simplu. Sunt si serverele alea securizate. Este doar o parere.
    -1 points
  11. Daca vorbesti si tu frumos si daca te face un rdp/vnc imi dau seama cat de sarac esti daca ceri bani pentru asa ceva. n-am specificat ca platesc.
    -2 points
×
×
  • Create New...