Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 10/08/14 in all areas

  1. Avand in vedere ca postul este de undeva de la jumatea lunii august iar noi acum suntem aproape de jumatatea lui octombrie nu pot decat sa constat ca afirmatia ta este una pertinenta; si uite asa am mai facut un post!
    2 points
  2. "The real challenge and the great mystery in the field was: Can you actually take a piece of software and encrypt it but still have it be runnable, executable and fully functional," Sahai said. "It's a question that a lot of companies have been interested in for a long time." Mai multe : Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software Practic la ce ajuta asta : Alice vrea sa faca adunarea 5 + 4, trece 5 prin functia f, rezultand f(5) = 21; trece si 4 prin acceasi functie f si are f(4) = 41; Alice apoi ii trimite 21 si 41 lui Bob si ii spune sa le adune. Bob le aduna, rezultand 62, iar rezultatul il trimite inapoi lui Alice. Apoi alice aplica functia inversa f^(-1) (62) = 9, care este rezultatul asteptat. Practic Bob nu stie nimic despre functia f, doar Alice stie, tot ce face Bob e sa aplice adunarea. Functia f se numeste "Fully homomorphic function". Alt exemplu real life ar fi urmatorul : Alice are doua documente pdf confidentiale pe care vrea sa le alipeasca. Nu are software-ul necesar pentru asta si nici nu are timp sa faca rost de unul. Bob in schimb are un serviciu web care permite uploadarea pdf-urilor in cloud. Encriptia se face local, in browser, prin javascript spre exemplu, apoi serverul lui bob alipeste cele doua pdf-uri primite, in mod criptat, trimite rezultatul (tot criptat) lui Alice, care mai apoi decripteaza pdf-ul si il stocheaza pe computer. De asta m-am apucat. Edit : @H3xoR nu destui.
    2 points
  3. Hai ca te ajut eu pe gratis. Pentru imaginile deja existente, ruleaza acest query UPDATE `wp_posts` SET `post_title` = REPLACE('-', ' ', `post_title`) WHERE `post_type` = 'attachment' AND SUBSTR(`post_mime_type`, 1, 5) = 'image'; Iar pentru urmatorele, e suficient sa pui codul de mai jos, in functions.php add_action('add_attachment', 'change_title', 25 ); function change_title($post_id) { $attach = get_post($post_id); $title = str_replace(array('-', '_'), ' ', $attach->post_title); wp_update_post(array('ID' => $post_id, 'post_title' => $title)); }
    1 point
  4. Certified APT Defender APT attack, analysis and defence ,DDOS, Exploitkit analysis & defence, Shellshock vulnerability & exploitation demo This course is about all the latest cyber security threats. This courses is useful from corporate users to college students who want to understand apt attack, analyse and learn how to defend. This course is unique it covers ddos attack, analysis, defense, Exploitkits, android exploitation used by hackers, shellshock vulnerability attack and analysis and Live APT Analysis & Defence. SECTION 1: Advanced Persistent Threat(Attack, Analysis & Defence) SECTION 2: Distributed Denial of Service Attack SECTION 3: ExploitPacks - Cyber Criminals Kits SECTION 4: Point of Sale(POS) Attack, Analysis & Defence SECTION 5: ShellShock Vulnerability(bash) on Servers SECTION 6: Android Exploitation Exploitation SECTION 7: Certified APT Defender Quiz https://www.udemy.com/certified-apt-defender/?couponCode=csibangalore
    -1 points
  5. Eu vad si partea plina a paharului...te-ai ales si tu cu un post. Fa-ti treaba in continuare de "supervisor" si poate o sa fii acceptat in staff?
    -1 points
×
×
  • Create New...