Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/31/17 in all areas

  1. In Romania si aia care violeaza babe, tot hackeri sunt. (IN caz ca au smartphone la ei) :))))
    3 points
  2. Salut ! Am postat acum ceva timp ca lucrez la un proiect si aveam nevoie de testeri pentru aplicatie. Cred ca am ajuns la o versiune momentan stabila. (mereu se poate mai bine...) Ce face aplicatia? - Deschide link-uri in Google Chrome ( Simplu nu ? practic e mai greu ) Cum ? - Cu referrer customizabil (de la facebook,google,youtube la ce vrei tu) - Cu User-Agent random (Firefox,Chrome,Opera,Safari si dispozitive mobile) - Dimensiunea ferestrei (random) - Mouse Scroll pe pagina - Click pe un element ales din pagina - Timp la alegere intre (10 si 600 secunde) - Cautare pe Google / Youtube si Click ( Promovare Keywords & SEO ) - Click pe Youtube Play si Skip Ad (automat) Ip-uri unice din Romania ? - Da , fiecare utilizator din Romania va vizualiza un link doar 1 data la 24 de ore . Cat costa ? - E gratis (este o comunitate , ne ajutam unii pe altii) Necesita : -Java -Google Chrome (versiune recente) Am facut un tutorial (sper sa fie de ajutor) : Pentru membrii RST ofer suport si bonusuri. Daca sunteti interesati va rog sa ma contactati. Rog un administrator sa verifice si sa confirme daca este ok. Link : https://video-seo.ro/
    2 points
  3. Nu rezolvi nimic prin asta. Va sfatuiesc sa nu recurgeti la chestii de genul. Singurul lucru care o sa rezolve ceva acolo este sangele. Sa curga mult pe strazi. Sunt granitele libere, orientati-va si plecati in alta parte unde munca este apreciata, unde exista protectie sociala, unde copii vostri nu vor creste intre tigani, manelari, ticalosi si alte subspecii. Feriti-va de romani, oriunde ati umbla in lume.
    2 points
  4. Era satira bre, nu am eu treaba ce faceti voi cu labara voastra =)))) doar ma amuzam de naivitatea-ti. 1440 x 0.07 - vine £100 gbp in 24 ore. Iei la oferta 10 x sim only cu £9 cu apeluri nelimitate si bagi in 10 telefoane, faci £1000 pe zi, nu? Morala ar fi: nu tot ce zboara se mananca
    2 points
  5. Features: Anti-RunPE Anti-webcam Anti-keylogger Anti-screenshot Anti-extension spoofing Effective network monitor Full drive and MFT eraser System recycle bin cleaner Anonym live online panel Real-time packer information Secure file and folder shredder Block unwanted or all USB volumes Unlock blocked/ used files with ease System requirements: Windows Vista or newer .Net Framework 4 Windows Aero enabled 1GB Ram Dual core CPU Up to six webcams Up to six monitors Download License: HFL
    1 point
  6. Au adoptat sclavii ordonantele de urgenta privind amnistitia
    1 point
  7. http://adevarul.ro/news/politica/adevarul-detine-noua-versiune-ordonantei-urgenta-privind-codul-penal-e-catastrofa-guvernul-asigura-nu-inculpat-abuz-1_5890f0d45ab6550cb8fbbbcf/index.html
    1 point
  8. E exact ce meritam, suntem natia aia care povesteste cu mandrie cum ne-a prins politia la volan fara permis si cum am dat spaga ca sa scapam, si toti radem si zicem "ba ce tare esti!", sau care e suparata pe primarie ca i-a darmat magazinul pentru ca nu avea autorizatie de constructie, sau care se plange ca nu are locuri de parcare dar care parcheaza pe 2 locuri. Inchidem ochii la orice ilegalitate si imoralitate, si ni se pare ceva normal sa nu luam nicio masura, mai bine nu ne bagam. PS: Are cineva documentul original OUG sa ma uit si eu pe el? Stiu ca trebuie sa fie publicat pe site-ul Guvernului Romaniei, dar nu-l gasesc. Si va recomand sa va uitati si voi pe el ca sa nu fiti dezinformati de mass-media.
    1 point
  9. Pai asta a fost "dezbaterea" si "consultarea" cu publicul: https://www.facebook.com/Adevarul/videos/10154373184556243/ De cata vreme va tot repetam sa plecati din Babuinland oricand puteti dar voi batman, batman P.S. - voi i-ati votat / nu ati iesit la vot (dupa caz), acum ciocu' mic si luati de la Dragnea:
    1 point
  10. " Se pare ca hackerii si-au falsificat identitatea si s-au dat drept manager al firmei din Germania si i-au pretins directorului financiar din Bistrita sa transfere suma de 40 de milioane de euro intr-un cont ca urmare a unei plati. " - ce usor se transfera 40 de milioane, numai asa la cererea unui manager. Nu stiu ce cititori cred ziarele astea ca au, sau poate stiu chiar foarte bine, dar sa transferi sume asa de mari, trebuie aprobari dupa aprobari, decizii de luat, intrebari de raspuns, etc, si multe persoane sunt implicate numai asa sa transferi bani de 100 de mii, da 40 de milioane. Asta ii curat "spalare de bani" sa nu plateasca impozite catre statul roman. Ce dreq face statu' roman, si institutiile astea de stat, pline de experti cu facultati si masterate, care-s platite din banii contribuabililor, nu stiu. Pai daca ii vorba de cyber crime, atunci unde-s investigatiile? Banii aia nu se pot urmari? Cand am facut transfer bancar catre Romania, le-o trebuit la banci 7 zile, ca sa caute conturile, sa verifice, ca banii is virati, si alte abureli, dar cand ii vorba de 40 de milioane, se face totul in 1-2 zile. Sa mearga SRIu si organizatiile de combatere a crimei virtuale din Romania, dracului! Toti is criminali si implicati!
    1 point
  11. Cei din staff sunt fortati sa foloseasca 2FA. Puteti totusi sa ne furati cookie-urile. Asta nu inseamna ca veti avea acces la AdminCP. Avem 3FA
    1 point
  12. Acum va putati seta Two-Factor autehntication si folosind tema default (neagra).
    1 point
  13. L5ZIHGAN5 - luat. Mulțumesc NEW: MK24SZYNC DOVRLABQ7 S8FL9M47 XQPLKGH56 OKH8G0E5J LM9DKIERD YDV6KCQRG
    1 point
  14. Am facut update la IP Board: https://invisionpower.com/release-notes/ Ce e nou: Two factor authentication. Insa deocamdata se poate seta doar folosind template-ul Default.
    1 point
  15. Ati luat server nou sau utilizat?
    1 point
  16. E hacker, culege date, social engineering Am auzit ca tinta lui este sa puna shemale pe index
    1 point
  17. Nota 10 pentru Alezu2000. Are experienta cu suita Adobe si lucreaza si rapid. Poti comunica cu el pe Skype sau Email. Il recomand pe Alezu2000 la prieteni si clientii mei tot timpul. -Gonzalez
    1 point
  18. ha ha ha va credeti cine stie ce da defapt nu sunteti nimic. . .
    -1 points
  19. Buna, Poate cineva, va rog,sa ma ajute cu o invitatie pt scenefz? Eventual pot sa o si platesc. Multumesc mult
    -1 points
  20. Pentru cei carora le place sa citeasca, si se descurca cu engleza, ofer gratuit capitole sau urmatoarele (255) carti intregi in format PDF de pe CRCnetBASE, majoritatea nu pot fi gasite pe torrente sau site-uri de ebooks grauite. Din anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane. Tinand cont ca e un proces manual si trebuie sa imi iau niste masuri de siguranta, e posibil sa dureze ceva daca doriti multe carti sau am un backlog de cereri. Pentru a vedea un rezumat/abstract al cartii inainte sa o cereti, si pentru a salva timpul meu si al vostru, recomand mai intai sa dati un search pe pagina aceasta la titlul cartii in acest field si in dreapta va aparea un pdf gratuit cu rezumatul/abstractul/contents: Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx. UPDATE: Va rog pentru inceput sa cereti doar cate putin, cat cititi odata, nu la gramada tot ce pare fain, ca sa pot servi pe toata lumea. Cand terminati mai trimit - nu plec niciunde. Thx. Lista completa a cartilor: 802.1X Port-Based Authentication A Practical Guide to Security Assessments A Practical Guide to Security Engineering and Information Assurance A Technical Guide to IPSec Virtual Private Networks Adaptive Security Management Architecture Advances in Biometrics for Secure Human Authentication and Recognition Algebraic and Stochastic Coding Theory Algebraic Curves in Cryptography Algorithmic Cryptanalysis An Introduction to Cryptography, Second Edition Android Malware and Analysis Android Security, Attacks and Defenses Anonymous Communication Networks, Protecting Privacy on the Web Architecting Secure Software Systems Assessing and Managing Security Risk in IT Systems, A Structured Methodology Asset Protection and Security Management Handbook Asset Protection through Security Awareness Audit and Trace Log Management, Consolidation and Analysis Authentication Codes and Combinatorial Designs Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Building A Global Information Assurance Program Building an Effective Information Security Policy Architecture Building an Information Security Awareness Program Building and Implementing a Security Certification and Accreditation Program, OFFICIAL (ISC)2 GUIDE to the CAPcm CBK Business Resumption Planning Call Center Continuity Planning Case Studies in Intelligent Computing, Achievements and Trends Case Studies in Secure Computing, Achievements and Trends CISO Soft Skills, Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives CISO's Guide to Penetration Testing, A Framework to Plan, Manage, and Maximize Benefits Complete Book of Remote Access, Connectivity and Security Complete Guide to CISM Certification Complete Guide to Security and Privacy Metrics, Measuring Regulatory Compliance, Operational Resilience, and ROI Computer Security Literacy, Staying Safe in a Digital World Conducting Network Penetration and Espionage in a Global Environment Conflict and Cooperation in Cyberspace, The Challenge to National Security Core Software Security, Security at the Source Critical Incident Management Critical Infrastructure System Security and Resiliency Critical Infrastructure, Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies Cryptanalysis of RSA and Its Variants Cultural Property Security, Protecting Museums, Historic Sites, Archives, and Libraries Curing the Patch Management Headache Cyber Crime Investigator's Field Guide, Second Edition Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition Cyber Fraud, Tactics, Techniques and Procedures Cyber Power, Crime, Conflict and Security in Cyberspace Cyber Security Essentials Cybersecurity for Industrial Control Systems, SCADA, DCS, PLC, HMI, and SIS Cybersecurity, Public Sector Threats and Responses Cybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition Data Governance, Creating Value from Information Assets Data Mining and Machine Learning in Cybersecurity Data Mining Tools for Malware Detection Data Privacy for the Smart Grid Data Protection, Governance, Risk Management, and Compliance Database and Applications Security, Integrating Information Security and Data Management Data-driven Block Ciphers for Fast Telecommunication Systems Defense against the Black Arts, How Hackers Do What They Do and How to Protect against It Developing and Securing the Cloud Digital Forensics for Handheld Devices Digital Privacy, Theory, Technologies, and Practices Discrete Dynamical Systems and Chaotic Machines, Theory and Applications Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks Distributed Networks, Intelligence, Security, and Applications Effective Surveillance for Homeland Security, Balancing Technology and Social Issues Effective Use of Teams for IT Audits Elliptic Curves, Number Theory and Cryptography, Second Edition Group Theoretic Cryptography Handbook of Applied Cryptography Handbook of Elliptic and Hyperelliptic Curve Cryptography Handbook of Financial Cryptography and Security Handbook of Finite Fields Handbook of Surveillance Technologies, Third Edition Hardware Security, Design, Threats, and Safeguards Homeland Security and Private Sector Business, Corporations' Role in Critical Infrastructure Protection Homeland Security Handbook How to Develop and Implement a Security Master Plan Industrial Espionage, Developing a Counterespionage Program Information Assurance Architecture Information Security Architecture, An Integrated Approach to Security in the Organization Information Security Architecture, An Integrated Approach to Security in the Organization, Second Edition Information Security Cost Management Information Security Fundamentals, Second Edition Information Security Governance Simplified, From the Boardroom to the Keyboard Information Security Management Handbook on CD-ROM, 2006 Edition Information Security Management Handbook, Fifth Edition, Volume 3 Information Security Management Handbook, Four Volume Set Information Security Management Handbook, Fourth Edition, Volume 4 Information Security Management Handbook, Sixth Edition Information Security Management Handbook, Sixth Edition, Volume 2 Information Security Management Handbook, Sixth Edition, Volume 3 Information Security Management Handbook, Sixth Edition, Volume 4 Information Security Management Handbook, Sixth Edition, Volume 5 Information Security Management Handbook, Sixth Edition, Volume 6 Information Security Management Handbook, Volume 2 Insider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT Attacks Intelligent Network Video, Understanding Modern Video Surveillance Systems Intelligent Video Surveillance, Systems and Technology Investigations in the Workplace, Second Edition Investigator's Guide to Steganography Iris Biometric Model for Secured Network Access IT Auditing and Sarbanes-Oxley Compliance, Key Strategies for Business Improvement IT Security Governance Guidebook with Security Program Metrics on CD-ROM Lattice Basis Reduction, An Introduction to the LLL Algorithm and Its Applications Machine Learning Forensics for Law Enforcement, Security, and Intelligence Malicious Bots, An Inside Look into the Cyber-Criminal Underground of the Internet Managing A Network Vulnerability Assessment Managing an Information Security and Privacy Awareness and Training Program Managing an Information Security and Privacy Awareness and Training Program, Second Edition Managing Risk and Security in Outsourcing IT Services, Onshore, Offshore and the Cloud Managing the Insider Threat, No Dark Corners Managing Trust in Cyberspace Mechanics of User Identification and Authentication, Fundamentals of Identity Management Multilevel Modeling of Secure Systems in QoP-ML Multilevel Security for Relational Databases Multimedia Content Encryption, Techniques and Applications Multimedia Encryption and Authentication Techniques and Applications Multimedia Security Handbook Multimedia Security, Watermarking, Steganography, and Forensics Multimedia Watermarking Techniques and Applications Multiple-Base Number System, Theory and Applications Network and Application Security, Fundamentals and Practices Network Anomaly Detection, A Machine Learning Perspective Network Attacks and Defenses, A Hands-on Approach Network Perimeter Security, Building Defense In-Depth Network Security Technologies New Directions of Modern Cryptography Noiseless Steganography, The Key to Covert Communications Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK, Second Edition Official (ISC)2 Guide to the CISSP CBK, Third Edition Official (ISC)2 Guide to the CISSP Exam Official (ISC)2 Guide to the CSSLP Official (ISC)2 Guide to the CSSLP CBK, Second Edition Official (ISC)2 Guide to the HCISPP CBK Official (ISC)2 Guide to the SSCP CBK Official (ISC)2 Guide to the SSCP CBK, Second Edition Official (ISC)2® Guide to the CAP® CBK®, Second Edition Official (ISC)2® Guide to the CCFP CBK Official (ISC)2® Guide to the ISSAP® CBK Official (ISC)2® Guide to the ISSAP® CBK, Second Edition Official (ISC)2® Guide to the ISSEP® CBK®, Second Edition Official (ISC)2® Guide to the ISSMP® CBK® Optical Coding Theory with Prime Oracle Identity Management, Governance, Risk, and Compliance Architecture, Third Edition PCI Compliance, The Definitive Guide Pearls of Discrete Mathematics Physical Security and Safety, A Field Guide for the Practitioner Practical Cryptography, Algorithms and Implementations Using C++ Practical Hacking Techniques and Countermeasures Practical Risk Management for the CIO PRAGMATIC Security Metrics, Applying Metametrics to Information Security Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques Profiling Hackers, The Science of Criminal Profiling as Applied to the World of Hacking Protocols for Secure Electronic Commerce, Second Edition Public Key Infrastructure, Building Trusted Applications and Web Services Quantum Communications and Cryptography RC4 Stream Cipher and Its Variants Responsive Security, Be Ready to Be Secure RSA and Public-Key Cryptography Secure and Resilient Software Development Secure and Resilient Software, Requirements, Test Cases, and Testing Methods Secure Computers and Networks, Analysis, Design, and Implementation Secure Data Provenance and Inference Control with Semantic Web Secure Internet Practices, Best Practices for Securing Systems in the Internet and e-Business Age Secure Java, For Web Application Development Secure Semantic Service-Oriented Systems Securing and Controlling Cisco Routers Securing Cloud and Mobility, A Practitioner's Guide Securing Converged IP Networks Securing E-Business Applications and Communications Securing Systems, Applied Security Architecture and Threat Models Securing Windows NT/2000, From Policies to Firewalls Security and Policy Driven Computing Security and Privacy in Smart Grids Security De-Engineering, Solving the Problems in Information Risk Management Security for Service Oriented Architectures Security for Wireless Sensor Networks using Identity-Based Cryptography Security in an IPv6 Environment Security in Distributed, Grid, Mobile, and Pervasive Computing Security in RFID and Sensor Networks Security Management, A Critical Thinking Approach Security of Mobile Communications Security Patch Management Security Software Development, Assessing and Managing Security Risks Security Strategy, From Requirements to Reality Security without Obscurity, A Guide to Confidentiality, Authentication, and Integrity Smart Grid Security, An End-to-End View of Security in the New Electrical Grid Software Deployment, Updating, and Patching Software Test Attacks to Break Mobile and Embedded Devices Standard for Auditing Computer Applications, Second Edition Statistical Methods in Computer Security Strategic Information Security Surviving Security, How to Integrate People, Process, and Technology Testing Code Security The ABCs of LDAP, How to Install, Run, and Administer LDAP Services The CISO Handbook, A PRACTICAL GUIDE TO SECURING YOUR COMPANY The Complete Book of Data Anonymization, From Planning to Implementation The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules The Ethical Hack, A Framework for Business Value Penetration Testing The Hacker's Handbook, The Strategy Behind Breaking into and Defending Networks The Laws of Software Process, A New Model for the Production and Management of Software The Practical Guide to HIPAA Privacy and Security Compliance The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition The Privacy Papers, Managing Technology, Consumer, Employee and Legislative Actions The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments, Second Edition The State of the Art in Intrusion Prevention and Detection The Total CISSP Exam Prep Book, Practice Questions, Answers, and Test Taking Tips and Techniques Trade Secret Theft, Industrial Espionage, and the China Threat Unauthorized Access, The Crisis in Online Privacy and Security Understanding Surveillance Technologies, Spy Devices, Privacy, History & Applications, Second Edition Understanding Surveillance Technologies, Spy Devices, Their Origins & Applications UNIX Administration, A Comprehensive Sourcebook for Effective Systems & Network Management Using the Common Criteria for IT Security Evaluation Vein Pattern Recognition, A Privacy-Enhancing Biometric Verification of Computer Codes in Computational Science and Engineering Visual Cryptography and Secret Image Sharing Vulnerability Management Watermarking Systems Engineering, Enabling Digital Assets Security and Other Applications Web Security, A WhiteHat Perspective What Every Engineer Should Know About Cyber Security and Digital Forensics Windows Networking Tools, The Complete Guide to Management, Troubleshooting, and Security Wireless Crime and Forensic Investigation Wireless Multimedia Communication Systems, Design, Analysis, and Implementation Wireless Security
    -1 points
×
×
  • Create New...