Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/25/13 in all areas

  1. Probabil unii dintre voi nu au bani sau au ramas pur si simplu fara credit si au nevoie de mesaje. Probabil majoritatea stiti de site-ul sms-gratuite.ro. Acolo aveti un numar de x sms-uri, dupa care trebuie sa le cumparati. Am facut o mica aplicatie care va incarca contul gratuit, dar va rog sa nu abuzati de ea. Aici se afla: Sms-Gratuite.ro Free Charger -caramea@RST .Trebuie sa introduceti datele de logare ale contului de pe sms-gratuite.ro, iar apoi apasati butonul "Incarca-mi contul". O alerta va va aparea cand contul a fost incarcat. Enjoy!
    1 point
  2. Imports System.Management Public Class Resources Public Shared Function WMI(ByVal location As String, ByVal query_term As String, ByVal value As String) As String Dim Result = String.Empty Try Dim WmiSelect As New ManagementObjectSearcher(location, query_term) For Each WmiResults As ManagementObject In WmiSelect.Get() Result = WmiResults.GetPropertyValue(value).ToString If (Not String.IsNullOrEmpty(Result)) Then Exit For End If Next Catch err As ManagementException MessageBox.Show(err.Message) End Try Return Result End Function End Class Exemplu: Label1.Text = "Video Card: " & Resources.WMI("root\CIMV2", "SELECT * FROM Win32_VideoController", "Name") Label2.Text = "Processor: " & Resources.WMI("root\CIMV2", "SELECT * FROM Win32_Processor", "Name") Trebuie sa adaugati System.Management ca referinta inainte de a putea accesa datele.
    1 point
  3. Beginner Classes: •Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review •Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration •Introduction to ARM •The Life of Binaries •Introduction to Network Forensics •Introduction to Vulnerability Assessment •Introduction to Trusted Computing •Offensive, Defensive, and Forensic Techniques for Determining Web User Identity •Android Forensics & Security Testing Intermediate Classes: •Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration •Introduction to Software Exploits •Exploits 2: Exploitation in the Windows Environment Advanced Classes: •Rootkits: What they are, and how to find them •Introduction to Reverse Engineering Software •Reverse Engineering Malware •Advanced x86: Virtualization with Intel VT-x Training
    1 point
  4. Cum am vazut in ultima vreme , mai toata lumea face " Harlem Shake " asa ca m-am gandit sa fac si eu cu 3 colegi de ai mei ceva pareri ?
    -1 points
×
×
  • Create New...