Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/19/22 in all areas

  1. 3 points
  2. Iar te prajisi in zori de ziua? :)))
    3 points
  3. Fratii Karamazov (vol 2) de Feodor Mihailovici Dostoievski
    2 points
  4. Incearca la cei care le fac: https://www.m-force.ro/uniforme-reprezentare/uniforme-reprezentare-politie.html INVICTUS FORCE & SAFE S.A. ECHIPAMENTE MILITARE - Invictus M-FORCE marcă înregistrată ADINA S.R.L. Compania este unul din principalii furnizori de echipamente militare individuale destinate instituțiilor de apărare și securitate națională, logistica derulării contractelor cu aceste instituții ducând în timp la optimizarea management-ului și eficientizarea proceselor interne în beneficiul clienților noștri.Vă invităm să vizualizați toată gama noastră de produse, pentru Armată, Pompieri. Jandarmerie, Poliție, Poliție de Frontieră, Poliție Locală, ANP, SPP, SRI, ANV pe www.m-force.ro Adina SRL e furnizor vechi. Aveau magazin pe langa Gara de Nord din Bucuresti la un moment dat.
    2 points
  5. Si Idiotul e tot de Dostoievski :))))) Acum e fun, ca e topicul inchis. In linistea noptii le poti auzi brainurile cum isi iau restart
    1 point
  6. Kamarazi, poti da T/C, merći
    1 point
  7. Personally I wouldn't take the chance to recover suspected compromised documents...what's done it's done...
    1 point
  8. Furnizorii de găzduire și de comunicații electronice vor trebui "să acorde, la solicitarea organelor autorizate, în condițiile prezentei legi, conținutul decriptat al comunicațiilor tranzitate în rețele proprii" (n.m – în textul original era „accesul (...) la conținutul criptat”) Acest termen „conținut decriptat” (în loc de, probabil, conținut necriptat) schimbă cu totul datele problemei și pe acest subiect, transformând obligația furnizorilor privați într-una de identificare a ce conținut este criptat sau nu (apropo, termenul criptare nu e în Dex) și a apoi de decriptare (descifrare) a acestuia. Mult succes, furnizori! O astfel de operațiune nu doar că ar putea să coste milioane de euro într-un singur caz specific (sau, în funcție de tăria criptării, să nu se poată deloc), dar l-ar transforma pe furnizor într-un veritabil hacker, întrunind aproape toate elementele constitutive ale infracțiunii de interceptare a unei transmisii de date informatice (art 361 Cod penal) – evident, mai puțin elementul de ilegalitate. Doar că și mai interesant este că această teză – în care furnizorul însuși devine interceptorul traficului – ar fi în mod deschis ilegală contrazicând art 4 legea 506/2004, legea prevăzând în excepții că doar autoritățile sau una din părți pot face "ascultarea, înregistrarea, stocarea și orice altă formă de interceptare ori supraveghere" comunicărilor legal. În condițiile în care aprox 80-90% din traficul web este criptat astăzi (iar furnizorii din tranzit nu au cheia de decriptare, evident!), acest text de lege propus primește cu brio premiul de Inepția tehnico-legală a anului 2022. sursa: https://apti.ro/decriptarea-face-furnizorul-hacker-codul-comunicatiilor https://apti.ro/furnizori-gazduire-calul-troian
    1 point
  9. @m3gatr0n multumesc, astea sunt: Tutorials 2005\Hakin9 (01_2005) - Cisco IOS Insecurity.pdf 2005\Hakin9 (02_2005) - Vulnerable Mobiles.pdf 2005\Hakin9 (03_2005) - Snooping On Monitor Displays.pdf 2005\Hakin9 (04_2005) - Hacking BlueTooth.pdf 2005\Hakin9 (05_2005) - Anatomy of Pharming.pdf 2006\Hakin9 (01_2006) - Rootkits Under Windows.pdf 2006\Hakin9 (02_2006) - Fighting Malicious Code.pdf 2007\Hakin9 (01_2007) - Taking Control of a Running Process.pdf 2007\Hakin9 (02_2007) - Timing Attacks.pdf 2007\Hakin9 (03_2007) - Haking Oracle.pdf 2007\Hakin9 (04_2007) - Haking Microsoft's .Net.pdf 2007\Hakin9 (05_2007) - Online Fraud Danger.pdf 2007\Hakin9 (06_2007) - Rootkits For Windows.pdf 2007\Hakin9 STARTER_KIT (01_2007) - Searching For Google's Secrets.pdf 2007\Hakin9 STARTER_KIT (02_2007) - Knock Knock Knocking.pdf 2007\Hakin9 STARTER_KIT (03_2007) - Exploiting Software.pdf 2008\Hakin9 (01_2008) - No Backdoor Try Opening The Windows.pdf 2008\Hakin9 (02_2008) - VOIP Abuse.pdf 2008\Hakin9 (03_2008) - LDAP Cracking.pdf 2008\Hakin9 (04_2008) - File Inclusion Attacks.pdf 2008\Hakin9 (05_2008) - Kernal Hacking.pdf 2008\Hakin9 (06_2008) - Hacking WiFi.pdf 2009\Hakin9 (01_2009) - Haking Instant Messenger.pdf 2009\Hakin9 (02_2009) - The Real World Click Jacking.pdf 2009\Hakin9 (03_2009) - Breaking Client-Side Certificate Protection.pdf 2009\Hakin9 (04_2009) - My ERP Got Hacked.pdf 2009\Hakin9 (05_2009) - 21st Century Hacking Techniques.pdf 2009\Hakin9 (06_2009) - Windows FE.pdf 2009\Hakin9 TBO (01_2009).pdf 2010\Hakin9 (10_2010) - Spyware.pdf 2010\Hakin9 (11_2010) - Botnets, Malware, Spyware How to Fight Back.pdf 2010\Hakin9 (1_2010) -Hardware Keylogger A Serious Threat.pdf 2010\Hakin9 (2_2010) - Mobile Exploitation.pdf 2010\Hakin9 (3_2010) - Analyzing Malware and Malicious Content.pdf 2010\Hakin9 (4_2010) - Flash Memory Mobile Forensic.pdf 2010\Hakin9 (5_2010) - Is DDOS Still A Threat.pdf 2010\Hakin9 (6_2010) - Securing VOIP.pdf 2010\Hakin9 (7_2010) - Securing The Cloud.pdf 2010\Hakin9 (8_2010) - Mobile Malware The New Cyber Threat.pdf 2010\Hakin9 (9_2010) - Email Security.pdf 2010\Hakin9 STARTER_KIT (01_2010) - Snort Exposed.pdf 2010\Hakin9 TBO (01_2010).pdf 2011\Hakin 9 2011\Hakin9 Exploiting Software 2011\Hakin9 Extra 2011\Hakin9 Mobile Security 2011\Hakin9 Starter Kit 2011\Hakin 9\Hakin9 (01_2011) - Cybercrime and Cyber War Predictions for 2011.pdf 2011\Hakin 9\Hakin9 (02_2011) - Network Security.pdf 2011\Hakin 9\Hakin9 (03_2011) - ID Theft.pdf 2011\Hakin 9\Hakin9 (04_2011) - Mobile Security.pdf 2011\Hakin 9\Hakin9 (05_2011) - Cloud Security.pdf 2011\Hakin 9\Hakin9 (06_2011) - Insecure Access Control.pdf 2011\Hakin 9\Hakin9 (07_2011) - Web App Security.pdf 2011\Hakin 9\Hakin9 (08_2011) - Hackin RFID.pdf 2011\Hakin 9\Hakin9 (09_2011) - Secure Coding.pdf 2011\Hakin 9\Hakin9 (10_2011) - Hack Apple.pdf 2011\Hakin 9\Hakin9 (11_2011) - Hacking Data.pdf 2011\Hakin 9\Hakin9 (12_2011) - TOR Project.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2011) - Smashing The Stack.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (02_2011) - Exploit Format Strings With Python.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (03_2011) - Password What Password.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (04_2011) - ShellCode.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (01_2011) - Exploiting Software.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (02_2011) - ID Thefts.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (03_2011) - Forensics.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (04_2011) - Android Security.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (04_2011) - Wireless Security.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (05_2011) - Haking Botnet.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (06_2011) - Rootkit.pdf 2011\Hakin9 Mobile Security\Hakin9 MOBILE SECURITY (01_2011) - IOS Vulnerability.pdf 2011\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2011) - Paypal Is A Scam.pdf 2011\Hakin9 Starter Kit\Hakin9 STARTER_KIT (02_2011) - Termination The Internet.pdf 2012\Hakin 9 2012\Hakin9 BIBLE (01_2012).pdf 2012\Hakin9 Exploiting Software 2012\Hakin9 Extra 2012\Hakin9 FOR_FREE (01_2012).pdf 2012\Hakin9 Mobile Security 2012\Hakin9 On Demand 2012\TBO 2012\Hakin 9\Hakin9 (01_2012) - SQL Injection.pdf 2012\Hakin 9\Hakin9 (02_2012) - When I'm X64.pdf 2012\Hakin 9\Hakin9 (03_2012) - DNS Cache Poisoning.pdf 2012\Hakin 9\Hakin9 (04_2012) - Cyber Warfare.pdf 2012\Hakin 9\Hakin9 (05_2012) - Cloud Computing.pdf 2012\Hakin 9\Hakin9 (06_2012) - Biometrics.pdf 2012\Hakin 9\Hakin9 (07_2012) - GreenSQL.pdf 2012\Hakin 9\Hakin9 (08_2012) - Malware.pdf 2012\Hakin 9\Hakin9 (09_2012) - Network Security.pdf 2012\Hakin 9\Hakin9 (10_2012) - Hacking Oracle.epub 2012\Hakin 9\Hakin9 (10_2012) - Hacking Oracle.pdf 2012\Hakin 9\Hakin9 (11_2012) - Mobile Security.epub 2012\Hakin 9\Hakin9 (11_2012) - Mobile Security.pdf 2012\Hakin 9\Hakin9 (12_2012) - Enterprise Network Security.epub 2012\Hakin 9\Hakin9 (12_2012) - Enterprise Network Security.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2012) - Blackhole Exploint Kit.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (02_2012) - Hardening of Java Applications Against AOP.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (03_2012) - Security Onion.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (04_2012) - Cisco IOS Rootkits and Malware.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (05_2012) - Buffer Overflow.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (06_2012) - Pentesting With Android.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (07_2012) - SamuraiWTF Toolkit.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (08_2012) - Raspberry Pi Hacking.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (09_2012) - Metasploit In A Nutshell.epub 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (09_2012) - Metasploit In A Nutshell.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE - Bible.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\crackme1.zip_ 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\crackme2.zip_ 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer.epub 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\odbg201f.zip_ 2012\Hakin9 Extra\Hakin9 EXTRA (01_2012) - Cryptography.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (02_2012) - Honeypots.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (03_2012) - Hacking Hardware.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (04_2012) - Forensics In The Cloud.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (05_2012) - Adobe Security.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (06_2012) - Timing Attacks.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (07_2012) - Quantum Computing.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (08_2012) - Helix.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (09_2012) - Webserver Security.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (10_2012) - How To Boost Your Cloud.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (11_2012) - Biometrics Security.epub 2012\Hakin9 Extra\Hakin9 EXTRA (11_2012) - Biometrics Security.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (01_2012) - Tag You're Infected.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (02_2012) - Data Handling On IOS Devices.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (03_2012) - Mobile Device Security.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2012) - SQL Injection.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2012) - Torjan-izing USB Stics.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (03_2012) - The Guide to Backtrack.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2012) - Network Security.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (05_2012) - Connection Overload.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2012) - Ultimate Nessus 5 Tutorial.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2012) - Wireshark Sharks On The Wire.epub 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2012) - Wireshark Sharks On The Wire.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (08_2012) - Exploiting Linux Kernal.epub 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (08_2012) - Exploiting Linux Kernal.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (09_2012) - Wireshark Sharks On The Wire 2.pdf 2012\TBO\Hakin9 TBO (01_2012) - The Ultimate Guide To Mobile Security.pdf 2012\TBO\Hakin9 TBO (03_2012) - Best of Network Scanning.pdf 2013\Hakin 9 2013\Hakin9 Exploiting Software 2013\Hakin9 Extra 2013\Hakin9 On Demand 2013\Hakin9 Open 2013\Hakin9 Starter Kit 2013\Hakin9 TBO 2013\Python Triple Pack 2013\Hakin 9\Hakin9 (01_2013) - Fight The Spyware.epub 2013\Hakin 9\Hakin9 (01_2013) - Fight The Spyware.pdf 2013\Hakin 9\Hakin9 (02_2013) - DDOS Tutorials.pdf 2013\Hakin 9\Hakin9 (03_2013) - Hacking Android.epub 2013\Hakin 9\Hakin9 (03_2013) - Hacking Android.pdf 2013\Hakin 9\Hakin9 (04_2013) - A Guide To NMAP The Second Encounter.epub 2013\Hakin 9\Hakin9 (04_2013) - A Guide To NMAP The Second Encounter.pdf 2013\Hakin 9\Hakin9 (05_2013) - Offensive Programming.epub 2013\Hakin 9\Hakin9 (05_2013) - Offensive Programming.pdf 2013\Hakin 9\Hakin9 (06_2013) - Advanced Malware Analysis.epub 2013\Hakin 9\Hakin9 (06_2013) - Advanced Malware Analysis.pdf 2013\Hakin 9\Hakin9 (07_2013) - QR Code Haking.epub 2013\Hakin 9\Hakin9 (07_2013) - QR Code Haking.pdf 2013\Hakin 9\Hakin9 (08_2013) - C++ Vs Python.epub 2013\Hakin 9\Hakin9 (08_2013) - C++ Vs Python.pdf 2013\Hakin 9\Hakin9 (09_2013) - Network Security & SQL Injection.pdf 2013\Hakin 9\Hakin9_20_12_2013.pdf 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2013) - Exploiting SAP.epub 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2013) - Exploiting SAP.pdf 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE TBO (01_2013) - Metasploit Tutorials.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (01_2013) - Backtrack 5 R3.epub 2013\Hakin9 Extra\Hakin9 EXTRA (01_2013) - Backtrack 5 R3.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (02_2013) - Mobile Hacking.epub 2013\Hakin9 Extra\Hakin9 EXTRA (02_2013) - Mobile Hacking.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (03_2013) - Guide To Kali Linux.epub 2013\Hakin9 Extra\Hakin9 EXTRA (03_2013) - Guide To Kali Linux.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2013) - CyberSecurity.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2013) - CyberSecurity.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2013) - Internet Based World Security.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2013) - Internet Based World Security.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (03_2013) - Reverse Engineering Tutorials.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2013) - Advanced Web Attacks and Exploitations.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2013) - Advanced Web Attacks and Exploitations.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (05_2013) - Advanced Windows Exploitations.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2013) - BIOS Security.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2013) - BIOS Security.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2013) - Exploitation Compendium.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2013) - Exploitation Compendium.pdf 2013\Hakin9 Open\Hakin9 OPEN (01_2013) - How To Use Metasploit For Security Defense.epub 2013\Hakin9 Open\Hakin9 OPEN (01_2013) - How To Use Metasploit For Security Defense.pdf 2013\Hakin9 Open\Hakin9 OPEN (02_2013) - How To Brute Force Drupal 6 Login Pages.epub 2013\Hakin9 Open\Hakin9 OPEN (02_2013) - How To Brute Force Drupal 6 Login Pages.pdf 2013\Hakin9 Open\Hakin9 OPEN (03_2013) - How To Detect System Intrusion.pdf 2013\Hakin9 Open\Hakin9 OPEN (04_2013) - Cyber Threats Solutions.epub 2013\Hakin9 Open\Hakin9 OPEN (04_2013) - Cyber Threats Solutions.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (02_2013) - A Beginners Guide To Software Exploitation.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (03_2013) - How To Pentest With BackTrack.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking\helloworld.exe 2013\Hakin9 TBO\Hakin9 TBO (01_2013) - Wifi Hacking.pdf 2013\Hakin9 TBO\Hakin9 TBO (02_2013) - Exploiting Software.pdf 2013\Hakin9 TBO\Hakin9 TBO (03_2013) - Advanced Backtrack Set.pdf 2013\Python Triple Pack\Software Developer Journal - Python Programming (12_2013).pdf 2013\Python Triple Pack\Software Developer Journal - Python Starter Kit (13_2013).pdf Hakin9 Ebooks\Defend Yourself Hakin9 Ebooks\Don't Be Mocked Secure Your System.pdf Hakin9 Ebooks\Low Tech Hacking.pdf Hakin9 Ebooks\Malware - From Basic Cleaning To Anaylsing.pdf Hakin9 Ebooks\Nmap Guide Hakin9 Ebooks\Public Key Cryptostructure Hakin9 Ebooks\Defend Yourself\Defend Yourself.epub Hakin9 Ebooks\Defend Yourself\Defend Yourself.pdf Hakin9 Ebooks\Nmap Guide\Nmap Guide.epub Hakin9 Ebooks\Nmap Guide\Nmap Guide.pdf Hakin9 Ebooks\Public Key Cryptostructure\Public Key Cryptostructure.epub Hakin9 Ebooks\Public Key Cryptostructure\Public Key Cryptostructure.pdf Tutorials\CEHv7 - Study Guide 1.pdf Tutorials\CEHv7 - Study Guide 2.pdf Tutorials\CEHv7 - Study Guide 3.pdf Tutorials\Crypto Tutorial 1.pdf Tutorials\Crypto Tutorial 2.pdf Tutorials\Crypto Tutorial 3.pdf Tutorials\Crypto Tutorial 4.pdf Tutorials\Metasploit and SET Install on Apple iDevice.pdf
    1 point
  10. Salut, stie cineva cum se numeste sau unde pot gasi detergent pentru uniformele de politie? PS: nu miros a Ariel.
    0 points
×
×
  • Create New...