Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/28/16 in Posts

  1. Descarcati: https://github.com/nishad/udemy-dl-windows/releases Creati un cont nou pe udemy, nu conteaza ce email folositi pentru ca nu trebuie verificat Deschideti cursul dorit si apasati pe Start Free Preview (apare sub Take This Course) Rulati programul astfel: udemy-dl.exe -u email -p pass <link catre curs> Screenshots pentru cei batuti in cap: Spor la invatat
    2 points
  2. @aa7670 ii dai tu link pls?
    1 point
  3. la inceput aveam impresia ca este un film groaza Asa ceva chiar mi se parea imposibil, dar ma gandesc ca daca ar fi conectat la net doar printr-un ppoe care cere conectare sau sa nu fie conectat la net nu mai au ce sa faca
    1 point
  4. Salutari! Iti pot oferi niste exemple de metode pe care eu le-am folosit si am fost acceptat de Google AdSense in 80% din cazuri: 1. Continut unic (se aud zvonuri ca unii au fost acceptati si cu articole copiate, insa nu-ti recomand) 2. Nisa buna (cauta folosind keyword planner ce nise au cel mai mare cpc) 3. Nu posta videoclipuri YouTube pe website 4. Nu include in postari vreun logo care apartine de compania Google 5. Incearca sa scrii articole de peste 300 caractere 6. Include o pagina de Contact pe website, daca ai wordpress recomand "Contact Form 7" 7. Iti recomand sa nu dai cerere adsense pana nu ai macar 20 articole unice 8. Adauga cod Google Analytics pe website 9. Bazeaza-te pe o tema simpla si profesionala, usor de navigat pe ea printre pagini 10. Adauga website-ul in Google Webmasters si trimite sitemap, iar mai apoi seteaza Romania ca tara preferata 11. Incearca sa creezi pagini precum: Privacy Policy / Disclaimer Policy + o pagina "Despre mine/Despre noi" care sa includa mai multe detalii despre echipa website-ului, iar daca doresti poti include si orasul in care locuiesti + tara (Romania) deoarece asta va spori increderea sistemului AdSense 12. Vechimea cel mai ok de la care se poate da cerere AdSense este de doua saptamani, cel putin la mine asa s-a aratat a fi ok 13. Adaugare bara pentru informare a vizitatorilor despre utilizarea cookies, pentru Wordpress poti folosi plugin-ul "Cookie Law Info" 14. Sterge orice alta retea de advertising de pe website 15. Nu adauga trafic cumparat pe website crezand ca va accelera acceptarea AdSense, dimpotriva, este un motiv bun pentru a fi respins 16. Nu posta continut protejat prin drepturi de autor, descarcare de jocuri/muzica etc, continut pornografic sau despre droguri 17. Imbina foarte bine pozele cu textul in postari, conteaza foarte mult aspectul acestor lucruri Cam atat mi-a venit in acest moment in cap..daca mai ai intrebari nu ezita sa le lasi aici!
    1 point
  5. 2.4GHz 9dBi Indoor Omni-directional Antenna ,,,pentru ce te intereseaza pe tine cred ca cel mai potrivit ar fi asta...https://apollo.open-resource.org/mission:log:2012:08:02:active-wideband-receiver-antenna-for-sdr
    1 point
  6. [h=1]Microsoft Word Local Machine Zone Remote Code Execution Vulnerability[/h] Exploit Title: Microsoft Word Local Machine Zone Remote Code Execution Vulnerability Date: July 15th, 2015 Exploit Author: Eduardo Braun Prado Vendor Homepage : Microsoft – Pagina de pornire oficial? Version: 2007 Tested on: Microsoft Windows XP, 2003, Vista, 2008, 7, 8, 8.1 CVE: CVE-2015-0097 Original Advisory: https://technet.microsoft.com/library/security/ms15-022 Microsoft Word, Excel and Powerpoint 2007 contains a remote code execution vulnerability because it is possible to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context of the local machine zone of Internet Explorer which leads to arbitrary code execution. By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end) it is possible to triggerthe vulnerability and run arbitrary code in the context of the logged on Windows user. Exploit code here : https://onedrive.live.com/embed?cid=412A36B6D0A9436A&resid=412A36B6D0A9436A%21156&authkey=AA_JVoZcoM5kvOc https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37657.zip Sursa: https://www.exploit-db.com/exploits/37657/
    1 point
  7. this poc has some problems,i have changed it and put it on my blog. Microsoft Word??????CVE-2015-0097POC??? you can follow my wechat.
    1 point
  8. You have to blow one of the admins in order to get rid of ban. In general it's a permanent ban, given on a legit reason.
    0 points
  9. The URL you are attempting to log in to has been blocked by our moderators and staff. This site may be engaged in phishing, scamming, spamming, or delivering malware. Mai bine nu .
    -1 points
  10. Salut. Stie cineva daca se poate sparge un cont de Gmail ? Exista hack/program ceva de spart? Mersi..
    -1 points
×
×
  • Create New...