Jump to content

Byte-ul

Active Members
  • Posts

    2175
  • Joined

  • Last visited

  • Days Won

    30

Everything posted by Byte-ul

  1. "Bachelor’s degree in an IT related field"
  2. "M? ofer s-o fut pe Oana Stancu ?i s?-l bat pe Mircea Bade" )))))
  3. Spre deosebire te tine, unora le pasa ce se intampla cu tara asta.
  4. Se numeste cont fake, nu stealth sau w/e. Il faci ca deobicei doar ca pui date false.
  5. ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))) nu creeeeeeeeeeeeeeeeeeeeeed ))))))))))))))))))))))))))))
  6. Ah da, ca si idee am uitat sa precizez, ce ar fi sa facem un internet puzzle pentru membrii RST?
  7. Si eu mi-am spus doar parerea. Sa revenim la subiectul principal, aici se posteaza bloguri, nu forumuri de cacat.
  8. De ce se numeste acest sub-forum "Bloguri si bloggeri" ? Ca sa faci reclama jafului tau de forum? Nu cred.
  9. Scanat pe jotti, o sa fie detectat in maxim 3 zile. bravo.
  10. Pai daca nu stii nici macar in ce limbaj de programare se face asa ceva, cum o sa stii sa faci asa ceva? lol
  11. Sa fie ceva de genul Feisbuci, sa vezi versiunile anterioare.
  12. Probabil nu a fost inca arestat la cum se misca lucrurile in Romania. Off: Chestia asta nu are niciun sens: "Intrebarea mea este sa votati daca a fost sau nu arestat." Off2: Vezi sa nu ajungi ca el, ca nu mai e mult. //EDIT: Off3: Se scrie "sau", nu "s-au".
  13. Daca aveti un form grabber in PC, degeaba folositi LastPass. Tot o sa va afle parolele.
  14. O sa caut si un sample imediat. Aici este analiza celor de la GData: https://public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/GData_Uroburos_RedPaper_EN_v1.pdf //EDIT: Nu am gasit sample pe net, le-am trimis mail celor de la GData pentru a primi un sample. Sa vedem daca raspund.
  15. The Continuous Growth of spyware, their existence, and the criminals who produce & spread them are increasing tremendously. It’s difficult to recognize spyware as it is becoming more complex and sophisticated with time, so is spreading most rapidly as an Internet threat. Recently, The security researchers have unearthed a very complex and sophisticated piece of malware that was designed to steal confidential data and has ability able to capture network traffic. The Researchers at the German security company G Data Software, refer the malware as Uroburos, named after an ancient symbol depicting a serpent or dragon eating its own tail, and in correspondence with a string (Ur0bUr()sGotyOu#) lurking deep in the malware's code. The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers. Uroburos is a rootkit designed to steal data from secure facilities, has ability to take control of an infected machine, execute arbitrary commands and hide system activities, communicating primarily using peer-to-peer connections in a network it has penetrated to infect new machines within the network, manages to pass back the exfiltrated information back to attackers from infected machines and network data, the researchers explained. The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify. The malware uses two virtual file systems, one NTFS file system and one FAT file system, and both are stored locally on the infected system and are used as a "workspace" by the attackers, providing a storage space for third-party tools, post-exploitation tools, temporary files and binary output. The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF. The driver is needed to decrypt the virtual file systems, to create several hooks to hide its activities, to inject libraries in the users land and to establish and manage some communication channels. “The development of a framework like Uroburos is a huge investment. The development team behind this malware obviously comprises highly skilled computer experts, as you can infer from the structure and the advanced design of the rootkit. We believe that the team behind Uroburos has continued working on even more advanced variants, which are still to be discovered.” WITH LOVE From RUSSIA: Technical Similarities with the previous malware Agent.BTZ and that the malware Uroburos checks the presence of Agent.BTZ in the system and remains inactive if Agent.BTZ is present, makes the researchers believe that it was designed by the same by the Russian intelligence services, according to G Data analysis. In 2008, USB and Removable storage drives placed on hold in the U.S. Army facilities after the spread of Agent.BTZ worm. The USB stick contained malicious code was trying to keep on multiplying further and infected the military’s network. The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected. The team behind the development of the malware Uroburos has developed an even more sophisticated framework, which still remains undiscovered, the researchers believe. Many infection vectors are conceivable. E.g. Spear phishing, drive-by-infections, USB sticks, or social engineering attacks. Sursa: http://thehackernews.com/2014/03/uroburos-rootkit-most-sophisticated-3.html
  16. Mie imi scrie mereu Ungültige Seite >< Google translate zice ca inseamna Pagina invalida... ?
  17. Last month Apple disclosed and fixed a massive bug in its operating system that left users’ information exposed to theft; faith in the cryptocurrency Bitcoin is eroding; and revenues at the retailing giant Target fell 46% on a quarterly basis over the Christmas season last year, all because of security breaches. There is no doubt that the profusion of technology designed to make personal and professional lives easier has left people around the world personally and professionally more exposed to potential threats like identity theft, unwanted surveillance, and corporate espionage. To combat these growing threats the entrepreneurs and investors that helped to seed this technology revolution are going back to the well to finance a new generation of security startup. Since 2009 investors have spent at least $2.9 billion on security technologies, according to data from CrunchBase. And so far this year investors have spent at least $150 million in 26 new investments in security technology companies. Investors are also valuing these companies more highly now. In the first quarter of 2013 investors made 44 investments with roughly the same amount of capital, the CrunchBase data shows. The need for new security technology is also driving up company valuations at the earliest stages of their development, the CrunchBase data shows. In the first quarter of 2013 16 seed stage companies raised $4.9 million. For 2014, less than half the number of companies raised roughly the same amount. “This has always been an interesting area and there have been hundreds of security companies being funded,” said John Walecka, a founding partner at Redpoint Ventures. What’s new now, according to Walecka, is the fundamental change in the nature of security threats. “In the past there were really only a couple of entry points that you needed to guard,” Walecka said. “But the current enterprise has thousands of applications that they’re running that are connected up to the Internet.” Investors group the types of security challenges companies and individuals face in three main categories: securing data, securing the software applications that businesses use to manipulate, store, and manage that data, and finally securing the perimeter, or the networks through which all of this information flows. Companies like CloudPassage, which raised $25.5 million in a Series C round of funding in February, tackle the network problem from a cloud computing perspective, according to company co-founder and chief executive, Carson Sweet. As more businesses move to providing their software as a hosted service, a lot of the technology tools corporations use no longer run on servers behind the company’s firewall. The idea for companies like CloudPassage or the seed stage Forty Cloud, is to provide corporate IT departments with the ability to manage, monitor and control their hosted networks. Meanwhile, startups like the Redpoint-backed Lastline are developing new ways to detect and prevent malware from entering enterprise networks. Meanwhile San Francisco-based Bluebox Security, which raised $18 million in financing from Andreessen Horowitz in January and launched its first product earlier in February has its sights set on securing applications. “There are two problems that need to be solved,” said Caleb Sima, Bluebox co-founder and chief executive. “With all the mobile devices data goes everywhere. When it goes on [personal] devices that data goes everywhere and the enterprise has no idea where it goes, they have no control over it and they have no security for it.” Bluebox solves the problem by providing a data security management tool around the enterprise or consumer apps that employees might use on their mobile devices to get work done. Basically, an employee can download an app through Bluebox which gives the security company provisional control over how it’s used. For employees, the benefit is they get to keep their own device and not have to worry about securing their personal data from their employer, Sima said. “As we move forward and this market continues to grow, you’re going to see that the enterprise no longer controls the device and the enterprise no longer controls the app,” Sima said. What enterprises may be left with controlling, according to Ionic Security chief technology officer Adam Ghetti, is just the data. “The existing models that you’re seeing thrown out there for mobile security or cloud application security all center around a constant premise: there’s a flow of data out heading out and we need to put a gateway up,” Ghetti said. “The whole flow of data is the wrong place to control everything.” Instead, his company is developing an encryption-based technology that works around the data itself, Ghetti said. He declined to comment further on the company’s still-stealthy security technology. Whatever they’re doing, Ionic Security’s technology was persuasive enough to have Kleiner Perkins Caufield & Byers invest. By far the leader in investments in the security market, KPCB has invested in startups that have raised $405 million over 17 rounds of funding. Sequoia Capital and Andreessen Horowitz have both backed 11 security companies since 2009, according to the CrunchBase data, and Accel and Intel Capital have backed 10 security startups over the 2009 to 2014 period. Although much of the investment activity in security has been focused on business customers, venture investors are looking out for consumers as well. Wickr, which has developed encryption technologies as it built out a Snapchat like service, just raised $9 million from investors - including Alsop Louie Partners - the firm co-founded by the former head of the CIA’s venture capital shop. Sursa: The New Age Of The Security Startup | TechCrunch
  18. Sursa este inca de vanzare!!! Un scan la zi: RazorScanner - Scan Result Nu am modificat absolut nimic la crypter de cand am postat acest thread. O simpla dovada ca nu folosesc chestii publice.
  19. e server de darkcomet Poti sa ii dai ban de acum.
  20. Iceland has its own Satoshi. A programmer called Baldur Friggjar Odinsson has created an alternative to bitcoin that he is calling AuroraCoin and in twenty-three days he will “airdrop” 31.8 coins to every citizen of Iceland – all 330,000 of them. It is, in short, a pretty ballsy move. Aurouracoin (AUR) will work just like bitcoin and it’s already surprisingly popular. It’s worth $15 per coin and at launch 21 million AUR will be made available to all of Iceland’s citizens. They will use their private ID numbers to check in and receive their coins. Mining is performed through proof-of-work operations, just like bitcoin. To be clear there is no telling how popular Odinsson’s idea will be and who or when the citizens of Iceland will start using their currency. In his manifesto, he blames the Icelandic government for “bleeding” the country. “The people of Iceland are being sacrificed at the altar of a flawed financial system, controlled by an elite that made astronomical bets supported by the government on behalf of the people and ultimately at the expense of the people,” he wrote. “The power must be taken away from the politicians and given back to the people.” Auroracoin is, in short, worthless at the outset. The goal, however, is to allow Icelandic citizens to once again trade outside of the country. I spoke with Odinsson about his idea and he was very forthcoming. First question? Why not just give everyone a bitcoin? “I wish I could. Alas, it is all but impossible for Icelanders to buy bitcoins for themselves, let alone for a giveaway. Since the banking collapse in 2008, Icelanders have been subject to strict capital controls,” he said. “This means people are not allowed too freely exchange the national currency, króna, for foreign exchange such as dollars or euros. So people can’t buy bitcoins, unless someone is simple enough to exchange bitcoins for króna. “Giving people Auroracoin is a way of introducing the nation to cryptocurrencies, currencies that can’t be controlled by politicians and central bankers. This is an attempt too bootstrap a network effect. The government will not be able to control how people use their money if the people choose to use Auroracoin rather than the króna. The currency would allow Icelanders to begin taking part in a global cryptocurrency movement without investing actual cash. The goal, then, is for Auroracoin to become a catalyst for bitcoin trading, a sort of Trojan horse that will inject crypto into an economy shackled by post-crash fear. He’s expecting great things on the first day. “I expect those that are knowledgeable and enthusiastic to start claiming the coins. People will experiment. Speculators will speculate. The rate of adoption will pick up. Hopefully we will be able to keep things running smoothly.” Sadly, Icelandic banks and politicians are calling this a sham. “An influential government MP has called Auroracoin illegal and a ‘monetary scam.’ The Central Bank of Iceland has said that Auroracoin and cryptocurrencies are a ‘fringe activity’ and trade is possibly a violation of the capital controls,” he said. “The most read media outlet in Iceland, mbl.is, has done a fair deal of reporting on it. Other outlets have not done in-depth analysis, although they have mentioned it. It was discussed in a tech show in Channel 2 (Stöð 2) a couple of days ago.” While the brave notion that a single actor can move markets, a la Satoshi, has been proven, it’s one thing to get a bunch of nerds excited about frictionless wealth transfer and its entirely another to convince a country to the same. Odinsson is definitely aware of these limitations. If his idea fails – and odds are it probably will – no one loses a thing. If it takes off – and that’s a big if – it would create a new paradigm for a more nation-oriented idea of crypto currency. Auroracoin is ostensibly free, Iceland is already a haven for crypto currency mining thanks to its cheap electricity, and it’s an amazing idea to think that a single BTC fork can change an economy. It’s a brave new world, that hath such digital currencies in it, etc. Odinsson is optimistic. “I want to break the nationalistic currency shackles of Iceland’s monetary policy,” he said. “Auroracoins can be traded all over the world, no one can dictate to the people how they can use their coins.
×
×
  • Create New...