Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/17/19 in Posts

  1. Fii #sustinătorul nostru! Dacă îti place ceea ce facem, ne poti ajuta în mai multe moduri. Îti poti oferi ajutorul astfel: redirectionând 2% din impozitul pe venit sau 20% din impozitul pe profit, donând online o sumă modică, oferind o sumă de bani prin contract de donatie. În cazul în care vrei să te implici si fizic, ai posibilitatea de a #voluntaria în cadrul proiectelor noastre. Mai multe detalii poti gasi pe site-ul nostru -> https://www.taxigratis.ro/donatii Iti stam la dispozitie pentru orice nelamurire.
    5 points
  2. Cei care lucreaza in R&D in tehnologie poate au mai vazut graful asta. Pe scurt poti vedea diferenta dintre opinia publicului si timpul in care o tehnologie devine matura/productiva (aka da niste rezultate). PS: Blockchain, Quantum, Fusion, AI sunt toate la varful hype-ului si minimul productivitatii...
    2 points
  3. puterea de calcul este enorma pt. acest modest QC. nu este limitat in timp ca cel clasic al carui "stare" poate fi 0 sau 1, nu ambele simultan....dar QC (qubit ) poate avea si 0 si 1 in acelasi timp, dar pot fi simultan mult mai multe stari... https://en.wikipedia.org/wiki/Quantum_computing sunt multe diferente f greu de inteles de omul comun, pt. ca tin de domeniul complex al MQ greu de inteles de mintea noastra care gandeste liniar si pe principiul cauza urmata de efect... dar in lumea Q toate acestea sunt expirate....☺️ QC + Blockchain + FR ( fusion reactor ) sunt viitor
    2 points
  4. Exploit Development Table of Contents General Stuff/Techniques General Stuff I can't figure where else to put Acquiring Old/Vulnerable Software Practice Exploit Dev/Structured Learning Exploit Dev Papers bof ROP BlindROP SignalROP JumpROP Heap Format String Integer Overflows Null Ptr Dereference JIT-Spray ASLR Kernel Exploitation Use After
    2 points
  5. IBM has built the first standalone quantum computer, packing some of the world’s most advanced science into a 9ft glass cube. But so far there is only one — and while IBM does not rule out one day selling such systems, its business plan calls for renting access to the hardware over the internet rather than shipping it to customers. Until now, quantum computers, which harness the power of quantum mechanics to handle calculations that could eventually leave today’s machines in the dust, have existed only in disassembled form in research labs. They are made up of a number of elements:
    1 point
  6. Code practice and mentorship for everyone. https://exercism.io/ Improve your skills by training with others on real code challenges. https://www.codewars.com LeetCode is the best platform to help you enhance your skills, expand your knowledge and prepare for technical interviews. https://leetcode.com/ Solutions to LeetCode problems (Python 3) https://github.com/delirious-lettuce/LeetCode Project Euler is a series of challenging mathematical/computer programming problems that will require more than just mathematical insights to solve.
    1 point
  7. + https://www.hackerrank.com/ https://www.hackerearth.com/
    1 point
  8. MoleBox lets you convert your application into an all-sufficient stand-alone executable, containing everything needed: components, media assets, registry entries. More info: https://sudachen.github.io/Molebox/ Git: https://github.com/sudachen/Molebox
    1 point
  9. ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Post::Linux::Priv include Msf::Post::Linux::System include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info(info, 'Name' => 'blueman set_dhcp_handler D-Bus Privilege Escalation', 'Description' => %q{ This module attempts to gain root privilege
    1 point
  10. github: https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit_Dev.md
    1 point
  11. Pentru cei ce doresc sa invete Linux: https://www.edx.org/course/introduction-to-linux https://linuxjourney.com/ Linux under the hood - videos ~35GB: magnet:?xt=urn:btih:3AA135DAAE789A7DE2FF957E08263C556B90616A
    1 point
  12. https://www.jollyfrogs.com/osee-awestralia-2018-preparations/ OSEE - AWEstralia 2018 preparations Living in Australia, the total cost of attending the AWE training in Vegas, including flights and hotel would exceed AUD 10,000$. So instead I decided to ask the Offensive Security trainers if they wanted to come and deliver the AWE training in my home town of Brisbane, Australia. I was able to rally together a few large companies interested in participating in the training. We now have over 25 interested people - enough for Offensive Security to come to Brisbane and host the training right here
    1 point
  13. Experimenteaza! Programare/development/webdesign (front-end, back-end, full stack), securitate Tu ai scris HTML, CSS, JS adica front-end La back-end ar intra Python, Java, PHP, baze de date Full stack le include pe ambele. E ca la medicina, nu poti sa fii si medic ortoped si chirurg si oftalmolog si hematolog. Poate sunt subiectiv, dar asta e o boala romaneasca, incercam sa fim buni la toate si tocmai d-asta avem din ce in ce mai putini specialisti. Chestia asta cu "trebuie sa te descurci, trebuie sa stii sa faci de toate" e inteleasa gresit si de mul
    1 point
  14. https://www.coursera.org/learn/system-administration-it-infrastructure-services By the end of this course you’ll be able to: - utilize best practices for choosing hardware, vendors, and services for your organization. - understand how the most common infrastructure services that keep an organization running work and how to manage infrastructure servers. - manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP. - choose and manage the tools that your organization will use. - backup your organization’s data and be able to r
    1 point
  15. This is without a doubt most thorough guide to detecting hidden cameras and covert spy gear that is online. The simple strategies that we are going to show you will effectively clear most rooms for hidden cameras and bugs without having to use super expensive countersurveillance gear or an outside company. Most of the processes and steps that we are going to show you are adopted from some of our best government agencies, where countersurveillance is of a grave concern to them, so these techniques have been tried and tested And the best part about this guide? Articol
    -1 points
×
×
  • Create New...