Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/06/20 in all areas

  1. Facem sa fie bine ca sa nu fie rau
    2 points
  2. Pe mine chiar m-au ajutat sfaturile / posturile tale de pe forum. Cu acest prilej vreau sa iti si multumesc .
    1 point
  3. Imi curge sange din ochi pentru ca imi sangereaza creierul doar cand citesc ce puteti debita cate unii.
    1 point
  4. Salut cine imi poate da si mie o invitatie pentru forum ul (Filelist ) as aprecia foarte mult. , - Email : biancaiulia8@yahoo.com
    1 point
  5. Salut cine imi poate da si mie o invitatie Filelist. As aprecia foarte mult.
    1 point
  6. https://larics.ro/stop-fals-coronavirus-cei-12-apostoli-ai-dezinformarii-despre-coronavirus-au-ajuns-si-in-romania/
    1 point
  7. Iti spun eu de ce, pentru ca am medic in familie. Daca un medic apare la tv si spune ca medicamentul X grabeste vindecarea sau amelioreaza simptomele, toti vor da navala in farmacii sa il cumpere si pe de o parte se va epuiza stocul iar pe de alta, cati dintre voi stiti sa administrati un medicament si cati dintre voi stiti efectele adverse? Un medicament nu se cumpara ca hartia igienica. Si daca tot am pornit discutia. Aveti grija cu ajunsul in spital. Dupa ce veti sta 20 de zile in spital, covid va fi ultima voastra grija pe langa multe alte bacterii si ciuperci ce puteti sa luati din spitalele din Romania.
    1 point
  8. Dar despre 5G care a fost implementat la scala larga in Wuhan incepand cu Octombrie 31, 2019 ce parere aveti? Simptomele sunt aceleasi ca si cand ai fi iradiat.
    1 point
  9. In a notification to customers, Clearview said an intruder gained “unauthorized access” to the list. Facial recognition company Clearview AI notified customers that an intruder had gained "unauthorized access" to its entire list of customers, The Daily Beast reports. Clearview gained widespread attention in recent weeks after a wave of media coverage, starting with The New York Times in January. The company stands out from others due to its use of a database of over 3 billion photos the firm constructed by scraping images from Facebook, Twitter, Instagram, and other social networks and websites. Clearview sells its product to law enforcement clients particularly in the U.S. The company's app allows a customer to point their phone's camera at a subject, or upload a photo into the system. Then, the system provides links to other photos and related social media profiles of the suspected person online. "Security is Clearview’s top priority. Unfortunately, data breaches are part of life in the 21st century. Our servers were never accessed. We patched the flaw, and continue to work to strengthen our security," Tor Ekeland, an attorney working for Clearview, said in a statement to Motherboard. The New York Times reported that law enforcement has used Clearview to identify child abuse victims. Buzzfeed News found that Clearview wants to sell its tool to authoritarian regimes. Since the New York Times uncovered Clearview, New Jersey has banned police from using the tool, and various social networks have told Clearview to stop scraping their platforms. Update: This piece has been updated to include a statement from Ekeland sent to Motherboard. Via https://www.vice.com/
    1 point
  10. A cybersecurity researcher today disclosed technical details of multiple high severity vulnerabilities he discovered in WhatsApp, which, if exploited, could have allowed remote attackers to compromise the security of billions of users in different ways. When combined together, the reported issues could have even enabled hackers to remotely steal files from the Windows or Mac computer of a victim using the WhatsApp desktop app by merely sending a specially crafted message. Discovered by PerimeterX researcher Gal Weizman and tracked as CVE-2019-18426, the flaws specifically resided in WhatsApp Web, a browser version of the world's most popular messaging application that also powers its Electron-based cross-platform apps for desktop operating systems. In a blog post published today, Weizman revealed that WhatsApp Web was vulnerable to a potentially dangerous open-redirect flaw that led to persistent cross-site scripting attacks, which could have been triggered by sending a specially crafted message to the targeted WhatsApp users. In the case when an unsuspecting victim views the malicious message over the browser, the flaw could have allowed attackers to execute arbitrary code in the context of WhatsApp's web domain. Whereas, when viewed through the vulnerable desktop application, the malicious code runs on the recipients' systems in the context of the vulnerable application. Moreover, the misconfigured content security policy on the WhatsApp web domain also allowed the researcher to load XSS payloads of any length using an iframe from a separate attacker-controlled website on the Internet. "If the CSP rules were well configured, the power gained by this XSS would have been much smaller. Being able to bypass the CSP configuration allows an attacker to steal valuable information from the victim, load external payloads easily, and much more," the researcher said. As shown in the screenshot above, Weizman demonstrated the remote file read attack over WhatsApp by accessing the content of the hosts file from a victim's computer. Besides this, the open-redirect flaw could have had also been used to manipulate URL banners, a preview of the domain WhatsApp displays to the recipients when they receive a message containing links, and trick users into falling for phishing attacks. Weizman responsibly reported these issues to the Facebook security team last year, who then patched the flaws, released an updated version of its desktop application, and also rewarded Weizman with $12,500 under the company's bug bounty program. Source: https://thehackernews.com/2020/02/hack-whatsapp-web.html
    1 point
  11. Uitati o sa sterg topicul in semn de respect si daca va vrea cineva sa-mi trimita o invitatie o sa fiu recunoscator , o sa continui sa contribui la forum , cum scrie in regulament si daca nu voi primi o cerere , voi mai cere cand imi voi face o reputati e buna pe forum. Multumesc frumos!
    0 points
  12. Salut! Imi puteti da si mie va rog frumos o invitatie pentru filelist? Adresa email: mihai_gheorghe69@yahoo.com ,Va multumesc!
    0 points
×
×
  • Create New...