Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/10/15 in all areas

  1. Salut , sunt mai vechi pe rst si pana acum nu m-am prezentat , si am zis sa o faca si pe asta : Ma numesc Razvan , am 25 de ani si sunt iubitor de IT Sa trecem la cunostinte : C/C++,java,php,linux,mysql,js(stadiu de incepator) Cam asta sunt eu , sper sa ne intelegem O zi buna.
    12 points
  2. Pana in prezent stie sa tipareasca: Nr. caractere in text: Nr. propozitii in text: Nr. cuvinte in text: Nr. randuri in text: MD5 text: Nr. caractere pe fiecare rand: Dec to str/reversed: Prima/ultima litera din fiecare rand/reversed: Primul/ultimul cuvant din fiecare rand/reversed: Prima/ultima litera din fiecare cuvant/reversed: Prima/ultima litera din fiecare propozitie/reversed: Primul/ultimul cuvant din fiecare propozitie/reversed: Fibonacci litere/cuvinte /reversed Nr prime litere/cuvinte /reversed Diagonala litere/cuvinte /reversed Step -custom /reversed Coloana -custom
    7 points
  3. Hai salut! A incercat/reusit cineva sa instaleze modemul de la Digi Net Mobil pe BackTrack 5?
    5 points
  4. Lectures Introduction and Course Overview Analysis of Classical Algorithms Analysis of Some Sorting Algorithms Order of Growth Asymptotic Analysis: Part I Asymptotic Analysis: Part II Algorithmic Analysis Worst and Average Case Analysis Amortized Analysis Mathematical Preliminaries Summations Recurrence Relations Data Structures: Linked Lists and Graphs Data Structures: Trees Data Structures: Heaps Data Structures: Disjoint Sets and Union/Find Algorithms Data Structures: Complexity Analysis of Union/Find Algorithms Induction: General Introduction Induction: Integer Exponentiation and Polynomi
    3 points
  5. Salut baieti, Fiind pasionat de haine, moda, trend, stil ma tot gandesc sa imi deschid un blog in acest domeniu. As vrea sa vad si parearea voastra, ce parere aveti despre un asemenea blog ? As incerca sa creez un blog ce sa fie atat pentru femei cat si pentru barbati si mi-ar place sa merg mult pe inspiratie, pe multe poze, multe sfaturi dar in acelasi timp si diferite tutoriale. Ma gandeam ca blogul sa fie in limba engleza pentru a aduce cat mai multe vizite si sa il populez prin pagina de facebook, instagram, tumblr pentru inceput. Neavand la dispozitie un buget, deocamdata, eu tind sa cred
    3 points
  6. Care are un link cu variantele din 2014 la informatica? Am cautat pe google cateva pagini din rezultate si toate sunt cu subiectul dat. Eu le vreau pe toate 100, am anul asta bac si vreau sa le scot si sa ma pun pe treaba. Mersi. // Edit: Subiecte Bacalaureat Informatica
    3 points
  7. 1.Ia fiecare postare de pe prima pagina si da like la ultimele 3 postari ale autorului. (Fara follow- pt ca bubblews cateaodata iti interzice sa mai dai follow) par1 - Pastebin.com 2.Tot ca prima dar da si follow (daca ai dat odata follow nu mai da unfollow) par2 - Pastebin.com Aveti peste 2500 lini la fiecare pt ca nu merge sa repet niste pasi in imacros (doar daca folosesc js si eu nu stiu ). Dupa ce mai adauga astia inca 500k posturi va trebui sa modificati linia TAG POS=1 TYPE=A ATTR=HREF:*/news/6* EXTRACT=HREF cu TAG POS=1 TYPE=A ATTR=HREF:*/news/7* EXTRACT=HREF
    3 points
  8. WikiLeaks founder Julian Assange addressed a major gathering of computer experts Monday at the Chaos Communication Congress in Hamburg, Germany, calling on them to join forces in resisting government intrusions on Internet freedom and privacy. We play highlights from Assange’s speech, as well as the one given by Sarah Harrison, the WikiLeaks member who accompanied Edward Snowden to Russia. We also hear from independent journalist and security expert Jacob Appelbaum, who reveals a spying tool used by the National Security Agency known as a "portable continuous wave generator." The remote-contro
    3 points
  9. HSTS Super Cookies 2 January 2015 Websites could use a security feature of your iPad to track your browsing even if you clear the browser history. Demonstration Your tracking id was read. dbgies This is a unique value that was generated by JavaScript in this page. The page attempts to store this value in your web browser and read it again when you visit the page in the future.
    2 points
  10. Site-ul Poli?iei Române, spart de hackeri
    2 points
  11. \_ ___ \ ____ _____ ______ __ ___/ |_ ___________ | |/ _|___________ ____ ___________ / \ \/ / _ \ / \\____ \| | \ __\/ __ \_ __ \ | < / _ \_ __ \/ \_/ __ \_ __ \ \ \___( <_> ) Y Y \ |_> > | /| | \ ___/| | \/ | | ( <_> ) | \/ | \ ___/| | \/ \______ /\____/|__|_| / __/|____/ |__| \___ >__| |____|__ \____/|__| |___| /\___ >__| \/ \/|__| \/ \/ \/ \/ Download link aHR0cCUzQS8vd3d3Lm1lZGlhZmlyZS5jb20vJTNGYXV4MG
    2 points
  12. The official website of the Nationalist Movement, a white supremacist organization based in Mississippi, was defaced by “Anonymous” hackers on Friday afternoon. The home page of the website, nationalist.org, was replaced with a message condemning facism and white power groups. The rest of the website appeared to be functioning normally. “Greetings, fellow Anons and Citizens of the world. It has come to our attention that Fascists and white power groups across the world are causing the spread of hate and ignorance,” the message read. “A spectre is haunting the Earth, the spectre of Facism [sic]
    2 points
  13. Webinspect 10.20: download the application from official site itself. Nu l-am incercat, nu stiu daca e infectat, executati pe proprie raspundere. Download: https://download.hpsmartupdate.com/webinspect/ and crack here: Crack: hp webinspect crack.rar — RGhost — file sharing to crack copy WI8.exe and HPLicense.xml in installation folder double click WI8.exe first click on license and browse HPLicense.xml Then click on patch. Enjoy will be valid till 2020. Sursa: https://www.opensc.ws/off-topic/19840-ibm-appscan-9-hp-webinspect-10-20-acunetix-9-5-a.html#post177138
    1 point
  14. "Cautatoru de chilipiruri" tine evidenta preturilor scazute de pe Produse Resigilate Pret asc - eMAG.ro si in cazul in care apare vreun produs sub pretul specificat de tine in setari (Default: 25 RON), iti va trimite un email pentru a te atentiona de aparitia acelui produs: Scriptul a fost testat folosind serverul smtp oferit de inbox.com (moka), default cauta din 10 in 10 minute #!/usr/bin/env python import smtplib import urllib2 import random import re import time #panou de configurare email = "" #unde vrei sa primesti ofertele smtp = "my.inbox.com" loginuser = "@inbox.com" loginpass =
    1 point
  15. Salutare, pentru cei care sunteti faliliarizati cu youtube si adsense, se poate sa imi explicati de ce ii diferenta asa mare intre venituri? Img:
    1 point
  16. http://members2.publicpickups.com/postlogin freeporn
    1 point
  17. Reported by ianb.. @google.com, Oct 7, 2014 tested on OS X 10.9.5 - uses some hard-coded offsets which will have to be fixed-up for other versions! this poc uses liblorgnette to resolve some private symbols; grab the code from github: git clone https://github.com/rodionovd/liblorgnette.git build this PoC with: clang -o sysmond_exploit_writeup sysmond_exploit_writeup.c liblorgnette/lorgnette.c -framework CoreFoundation sysmond is a daemon running as root. You can interact with sysmond via XPC ("com.apple.sysmond".) sub_100001AAF calls sub_100003120 passing the xpc diction
    1 point
  18. Darren Pauli o sa scrie maine sa blocam si twitter ca sunt ceva malware care il folosesc drept C&C. Si poate si imgur.com, ca sunt ceva variante de zeus de comunica prin poze )) @Aerosol sa imi zici maine sa iti scriu un rss aggregator pt rst, sa nu iti mai bati capul sa dai copy/paste
    1 point
  19. Securing Microsoft Windows 8: AppContainers Posted by Andrea Allievi On luglio 5, 2013 Recently, we have been conducting an analysis concerning the new Windows 8 security features. There are few documents available in Internet about this topic and no one of them explains the entire implementations in detail. The paper has been divided in two parts because of the complexity of the topic. Microsoft engineers have done an impressive job by improving their Operating System security. They implemented the so called “mitigations”. The term is used
    1 point
  20. [h=1]Inline Hooking for Programmers (Part 1: Introduction)[/h] A lot of my articles have been aimed at giving a high-level insight into malware for beginners, or those unfamiliar with specific concepts. Today I've decided to start a new series designed to familiarize people with malware internals on a programming level. This will not be a tutorial aimed towards people creating sophisticated malware, but security enthusiasts looking to better understand it. [h=2]Inline Hooking[/h] What is it Inline hooking is a method of intercepting calls to target functions,which is mainly used by
    1 point
  21. UNVEILING THE KERNEL: ROOTKIT DISCOVERY USING SELECTIVE AUTOMATED KERNEL MEMORY DIFFERENCING Ahmed Zaki & Benjamin Humphrey Sophos, UK Email {ahmed.zaki, benjamin.humphrey}@ sophos.com ABSTRACT As an increasing number of automated malware analysis systems become mainstream, the emphasis on the relevance of the data extracted from the analysis task increases. Conceptually, automated malware analysis systems provide information about a sample and also identify modifi cations to a computer system induced by the sample. Traditionally, the focus of such analysis systems has primarily been on mo
    1 point
  22. AV Evading Meterpreter Shell from a .NET Service Update: I tried this in April 2013, and it still works quite well if you obfuscate the .net (e.g. using dotfuscator or there are plenty of free ones). I still use the generic idea for SMB type things, like NTLM relaying. That said, for simply evading AV, I highly recommend going the powershell route instead. Powersploit has meterpreter connectback built in, so you don’t even need to do anything. It’s awesome https://github.com/mattifestation/PowerSploit Quite a few successful attacks rely on creating a malicious service at some point in t
    1 point
  23. A few Metasploit Post Exploit Resource Scripts Some of this code is fairly ugly and copy/pasted between files. It is meant for one-offs within a pentest, not necessarily extended and built on. Still, it’s been useful and it might be helpful for those wanting to automate similar things. Plus it was built for real, not just in a lab, so at least it works sometimes Spooler Migrate [code] This was inspired (and some bits copied) from the smart_migrate module. smart_migrate migrates to explorer.exe or starts an instance. Sometimes this isn’t what you want to do. Say you’re running as syst
    1 point
  24. The Double-Edged Sword of HSTS Persistence and Privacy HTTP Strict Transport Security or more commonly known as HSTS is a draft policy by the IETF WebSec working group currently proposed that would extend the standard list of HTTP response headers to allow domain owners to enroll complying browsers into exclusively secure communications with the web server for an asserted period of time. This is accomplished by rewriting all HTTP requests to that particular domain regardless of entry (be it via link, image or manually typed in the address bar) over HTTPS and va
    1 point
  25. [h=1]Bypassing the IE XSS filter[/h] Wednesday, 7 January 2015 Mario noticed that the new version of the IE filter blocks anchors in attempt to prevent the same origin bypass where you double encode the vector and post a link to itself. I had to take a look and see if I could break it and…of course I did. The regex is very generic:- <a.*?hr{e}f This could cause problems with information disclosure if you can put something in between the “a” and “href” and detect if the filter is active which I’ll admit is pretty tricky now with the new protection against such attacks. Any
    1 point
  26. [h=2]Hackers Steal $5 Million From Bitcoin Exchange[/h] Victor Luckerson @VLuck Jan. 6, 2015 [h=2]Breach follows massive hack of Mt. Gox in 2014[/h] A European Bitcoin exchange had about $5 million worth of the cryptocurrency stolen by hackers over the weekend. The Slovenia-based Bitstamp announced the breach on its website Monday and shut down services temporarily Tuesday in order to investigate the hack. The theft totaled about 19,000 Bitcoin, but hackers were only able to access a small portion of the exchange’s total assets. While som
    1 point
  27. Amante de intretinut.... On: Mane, eu nu te cunosc asa bine dar vizitez forumu de 1-2 ani ca guest si am vazut ca esti activ ai posturi utile, esti un membru de baza pe aici..Sper ca poate o sa revii vreodata..
    1 point
  28. http://dl.packetstormsecurity.net/papers/virus/BypassAVDynamics.pdf "In this first example, we just allocate and fill 100 Mega Bytes of memory. This is enough to discourage any emulation AV out there." "Attempt to access Web domains which does not exist. In the real world, it fails. In an AV, it will work since the AV will use its own simulated page." etc. merita citit, 21 pagini.
    1 point
  29. The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we’re going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs. Warning: Advanced Geeks Only If you’re sitting there thinking “What the heck is rsync?” or “I only use rsync for really simple tasks,” you may want to check out our previous article on how to use rsync to backup your data on Linux, which gives an introduction to rsync, gu
    1 point
  30. Daca saptamana trecuta ziceam de Intel Haswell, acum tin sa anunt ca si AMD vine cu forte noi pe piata. Au trecut aproape trei luni de cand AMD a lansat familia de procesoare Fusion – Richland in lumea notebook. Si acum, asteptand probabil Computex-ul, au fost introduse si modelele desktop, sase la numar. Nimic cu adevarat nou sub soare, doar o evolutie a procesoarelor Trinity de anul trecut, cu frecvente ceva mai mari. Deci arhitectura a ramas aceeasi: Piledriver (K11.5) la CPU si VLIW4 la GPU. Si acelasi proces tehnologic de 32 nm SOI la GlobalFoundries. Dar ne este promis ca Richland isi at
    1 point
  31. O metoda eleganta de a trece peste codul de securitate al nokia 1208(posibil sa mearga si pe alte telefoane de astea mai vechi). Telefonul este blocat. Simplu, luam un telefon cu minute si dam un apel catre cartela de pe nokia 1208. Raspundem la apel si apoi dam options. Derulam in jos pana la menu si de acolo avem acces la tot telefonul fara sa fi introdus nici o parola.
    1 point
  32. Am si eu urmatoarea situatie: Am un desktop pe care am Ubuntu 11.10 si un laptop cu Windows 7 (pe care eu folosesc BackTrack5, dar laptopul il foloseste si tata-miu si lui ii trebe win). Intrebare: cum sa fac sa am acces la folderele sheruite de windows din ubuntu (tinand cont de faptul ca userul din windows nu are parola)? Am instalat samba si functioneaza ok daca pun parola la userul de windows dar eu vreau fara parola! Am tot cautat, dar nu gasesc rezolvare decat pt varianta in care userul din windows e setat cu parola si mie nu-mi trebuie asa. Dar nici unde nu se spune ca daca nu are paro
    1 point
  33. Am si eu o intrebare! La ce poate fi folosit un slot ethernet pe un televizor? Ma uitam pe net dupa LED TV si am vazut ca unele au mufa ethernet. Nu-i vad rostul intr-un tv. Aveti vreo idee la ce e folosita? Uite aici exemplu: SAMSUNG UE32C6000 televizor led Full HD Diagonala 32 inch 81cm Rezolutie 1920 x 1080
    1 point
  34. Am si eu urmatoarea problema: - sistem de operare XP SP2 - drive C: de 20 GB - folderele si fisierele de pe C: adunate (inclusiv cele hidden si cele system) ocupa in total 8 GB si totusi imi arata ca C: este plin. Am eliberat 1 GB din fisiere temp si altele useless, dar acum vad cum la fiecare ora imi scade spatiul ramas liber (din acel 1GB) Cam ce poate sa aibe? Cine imi papa spatiul liber? Am verificat cu Avira, Malwarebytes si Microsoft Malicious Software Removal Tool si nu a gasit nimic. System Restore l-am oprit de cand am instalat windowsul.
    1 point
  35. Baieti, ideea e buna, daca tot ati inceput va sugerez sa lucrati cat puteti la proiect pentru ca poate iesi frumos.
    0 points
×
×
  • Create New...