Jump to content

Byte-ul

Active Members
  • Posts

    2175
  • Joined

  • Last visited

  • Days Won

    30

Everything posted by Byte-ul

  1. "M? ofer s-o fut pe Oana Stancu ?i s?-l bat pe Mircea Bade" )))))
  2. Spre deosebire te tine, unora le pasa ce se intampla cu tara asta.
  3. Se numeste cont fake, nu stealth sau w/e. Il faci ca deobicei doar ca pui date false.
  4. ma cac pe mine de ras ba )))))))))))))))))
  5. ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))) nu creeeeeeeeeeeeeeeeeeeeeed ))))))))))))))))))))))))))))
  6. care-i treaba? ce capcana
  7. Ah da, ca si idee am uitat sa precizez, ce ar fi sa facem un internet puzzle pentru membrii RST?
  8. Mata-i grasa, 5 secunde
  9. Si eu mi-am spus doar parerea. Sa revenim la subiectul principal, aici se posteaza bloguri, nu forumuri de cacat.
  10. De ce se numeste acest sub-forum "Bloguri si bloggeri" ? Ca sa faci reclama jafului tau de forum? Nu cred.
  11. Care este bugetul?
  12. Scanat pe jotti, o sa fie detectat in maxim 3 zile. bravo.
  13. Pai daca nu stii nici macar in ce limbaj de programare se face asa ceva, cum o sa stii sa faci asa ceva? lol
  14. Sa fie ceva de genul Feisbuci, sa vezi versiunile anterioare.
  15. Probabil nu a fost inca arestat la cum se misca lucrurile in Romania. Off: Chestia asta nu are niciun sens: "Intrebarea mea este sa votati daca a fost sau nu arestat." Off2: Vezi sa nu ajungi ca el, ca nu mai e mult. //EDIT: Off3: Se scrie "sau", nu "s-au".
  16. Daca aveti un form grabber in PC, degeaba folositi LastPass. Tot o sa va afle parolele.
  17. O sa caut si un sample imediat. Aici este analiza celor de la GData: https://public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/GData_Uroburos_RedPaper_EN_v1.pdf //EDIT: Nu am gasit sample pe net, le-am trimis mail celor de la GData pentru a primi un sample. Sa vedem daca raspund.
  18. The Continuous Growth of spyware, their existence, and the criminals who produce & spread them are increasing tremendously. It’s difficult to recognize spyware as it is becoming more complex and sophisticated with time, so is spreading most rapidly as an Internet threat. Recently, The security researchers have unearthed a very complex and sophisticated piece of malware that was designed to steal confidential data and has ability able to capture network traffic. The Researchers at the German security company G Data Software, refer the malware as Uroburos, named after an ancient symbol depicting a serpent or dragon eating its own tail, and in correspondence with a string (Ur0bUr()sGotyOu#) lurking deep in the malware's code. The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers. Uroburos is a rootkit designed to steal data from secure facilities, has ability to take control of an infected machine, execute arbitrary commands and hide system activities, communicating primarily using peer-to-peer connections in a network it has penetrated to infect new machines within the network, manages to pass back the exfiltrated information back to attackers from infected machines and network data, the researchers explained. The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify. The malware uses two virtual file systems, one NTFS file system and one FAT file system, and both are stored locally on the infected system and are used as a "workspace" by the attackers, providing a storage space for third-party tools, post-exploitation tools, temporary files and binary output. The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF. The driver is needed to decrypt the virtual file systems, to create several hooks to hide its activities, to inject libraries in the users land and to establish and manage some communication channels. “The development of a framework like Uroburos is a huge investment. The development team behind this malware obviously comprises highly skilled computer experts, as you can infer from the structure and the advanced design of the rootkit. We believe that the team behind Uroburos has continued working on even more advanced variants, which are still to be discovered.” WITH LOVE From RUSSIA: Technical Similarities with the previous malware Agent.BTZ and that the malware Uroburos checks the presence of Agent.BTZ in the system and remains inactive if Agent.BTZ is present, makes the researchers believe that it was designed by the same by the Russian intelligence services, according to G Data analysis. In 2008, USB and Removable storage drives placed on hold in the U.S. Army facilities after the spread of Agent.BTZ worm. The USB stick contained malicious code was trying to keep on multiplying further and infected the military’s network. The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected. The team behind the development of the malware Uroburos has developed an even more sophisticated framework, which still remains undiscovered, the researchers believe. Many infection vectors are conceivable. E.g. Spear phishing, drive-by-infections, USB sticks, or social engineering attacks. Sursa: http://thehackernews.com/2014/03/uroburos-rootkit-most-sophisticated-3.html
  19. Mie imi scrie mereu Ungültige Seite >< Google translate zice ca inseamna Pagina invalida... ?
  20. Last month Apple disclosed and fixed a massive bug in its operating system that left users’ information exposed to theft; faith in the cryptocurrency Bitcoin is eroding; and revenues at the retailing giant Target fell 46% on a quarterly basis over the Christmas season last year, all because of security breaches. There is no doubt that the profusion of technology designed to make personal and professional lives easier has left people around the world personally and professionally more exposed to potential threats like identity theft, unwanted surveillance, and corporate espionage. To combat these growing threats the entrepreneurs and investors that helped to seed this technology revolution are going back to the well to finance a new generation of security startup. Since 2009 investors have spent at least $2.9 billion on security technologies, according to data from CrunchBase. And so far this year investors have spent at least $150 million in 26 new investments in security technology companies. Investors are also valuing these companies more highly now. In the first quarter of 2013 investors made 44 investments with roughly the same amount of capital, the CrunchBase data shows. The need for new security technology is also driving up company valuations at the earliest stages of their development, the CrunchBase data shows. In the first quarter of 2013 16 seed stage companies raised $4.9 million. For 2014, less than half the number of companies raised roughly the same amount. “This has always been an interesting area and there have been hundreds of security companies being funded,” said John Walecka, a founding partner at Redpoint Ventures. What’s new now, according to Walecka, is the fundamental change in the nature of security threats. “In the past there were really only a couple of entry points that you needed to guard,” Walecka said. “But the current enterprise has thousands of applications that they’re running that are connected up to the Internet.” Investors group the types of security challenges companies and individuals face in three main categories: securing data, securing the software applications that businesses use to manipulate, store, and manage that data, and finally securing the perimeter, or the networks through which all of this information flows. Companies like CloudPassage, which raised $25.5 million in a Series C round of funding in February, tackle the network problem from a cloud computing perspective, according to company co-founder and chief executive, Carson Sweet. As more businesses move to providing their software as a hosted service, a lot of the technology tools corporations use no longer run on servers behind the company’s firewall. The idea for companies like CloudPassage or the seed stage Forty Cloud, is to provide corporate IT departments with the ability to manage, monitor and control their hosted networks. Meanwhile, startups like the Redpoint-backed Lastline are developing new ways to detect and prevent malware from entering enterprise networks. Meanwhile San Francisco-based Bluebox Security, which raised $18 million in financing from Andreessen Horowitz in January and launched its first product earlier in February has its sights set on securing applications. “There are two problems that need to be solved,” said Caleb Sima, Bluebox co-founder and chief executive. “With all the mobile devices data goes everywhere. When it goes on [personal] devices that data goes everywhere and the enterprise has no idea where it goes, they have no control over it and they have no security for it.” Bluebox solves the problem by providing a data security management tool around the enterprise or consumer apps that employees might use on their mobile devices to get work done. Basically, an employee can download an app through Bluebox which gives the security company provisional control over how it’s used. For employees, the benefit is they get to keep their own device and not have to worry about securing their personal data from their employer, Sima said. “As we move forward and this market continues to grow, you’re going to see that the enterprise no longer controls the device and the enterprise no longer controls the app,” Sima said. What enterprises may be left with controlling, according to Ionic Security chief technology officer Adam Ghetti, is just the data. “The existing models that you’re seeing thrown out there for mobile security or cloud application security all center around a constant premise: there’s a flow of data out heading out and we need to put a gateway up,” Ghetti said. “The whole flow of data is the wrong place to control everything.” Instead, his company is developing an encryption-based technology that works around the data itself, Ghetti said. He declined to comment further on the company’s still-stealthy security technology. Whatever they’re doing, Ionic Security’s technology was persuasive enough to have Kleiner Perkins Caufield & Byers invest. By far the leader in investments in the security market, KPCB has invested in startups that have raised $405 million over 17 rounds of funding. Sequoia Capital and Andreessen Horowitz have both backed 11 security companies since 2009, according to the CrunchBase data, and Accel and Intel Capital have backed 10 security startups over the 2009 to 2014 period. Although much of the investment activity in security has been focused on business customers, venture investors are looking out for consumers as well. Wickr, which has developed encryption technologies as it built out a Snapchat like service, just raised $9 million from investors - including Alsop Louie Partners - the firm co-founded by the former head of the CIA’s venture capital shop. Sursa: The New Age Of The Security Startup | TechCrunch
  21. Sursa este inca de vanzare!!! Un scan la zi: RazorScanner - Scan Result Nu am modificat absolut nimic la crypter de cand am postat acest thread. O simpla dovada ca nu folosesc chestii publice.
  22. e server de darkcomet Poti sa ii dai ban de acum.
  23. Link de download?
  24. Iceland has its own Satoshi. A programmer called Baldur Friggjar Odinsson has created an alternative to bitcoin that he is calling AuroraCoin and in twenty-three days he will “airdrop” 31.8 coins to every citizen of Iceland – all 330,000 of them. It is, in short, a pretty ballsy move. Aurouracoin (AUR) will work just like bitcoin and it’s already surprisingly popular. It’s worth $15 per coin and at launch 21 million AUR will be made available to all of Iceland’s citizens. They will use their private ID numbers to check in and receive their coins. Mining is performed through proof-of-work operations, just like bitcoin. To be clear there is no telling how popular Odinsson’s idea will be and who or when the citizens of Iceland will start using their currency. In his manifesto, he blames the Icelandic government for “bleeding” the country. “The people of Iceland are being sacrificed at the altar of a flawed financial system, controlled by an elite that made astronomical bets supported by the government on behalf of the people and ultimately at the expense of the people,” he wrote. “The power must be taken away from the politicians and given back to the people.” Auroracoin is, in short, worthless at the outset. The goal, however, is to allow Icelandic citizens to once again trade outside of the country. I spoke with Odinsson about his idea and he was very forthcoming. First question? Why not just give everyone a bitcoin? “I wish I could. Alas, it is all but impossible for Icelanders to buy bitcoins for themselves, let alone for a giveaway. Since the banking collapse in 2008, Icelanders have been subject to strict capital controls,” he said. “This means people are not allowed too freely exchange the national currency, króna, for foreign exchange such as dollars or euros. So people can’t buy bitcoins, unless someone is simple enough to exchange bitcoins for króna. “Giving people Auroracoin is a way of introducing the nation to cryptocurrencies, currencies that can’t be controlled by politicians and central bankers. This is an attempt too bootstrap a network effect. The government will not be able to control how people use their money if the people choose to use Auroracoin rather than the króna. The currency would allow Icelanders to begin taking part in a global cryptocurrency movement without investing actual cash. The goal, then, is for Auroracoin to become a catalyst for bitcoin trading, a sort of Trojan horse that will inject crypto into an economy shackled by post-crash fear. He’s expecting great things on the first day. “I expect those that are knowledgeable and enthusiastic to start claiming the coins. People will experiment. Speculators will speculate. The rate of adoption will pick up. Hopefully we will be able to keep things running smoothly.” Sadly, Icelandic banks and politicians are calling this a sham. “An influential government MP has called Auroracoin illegal and a ‘monetary scam.’ The Central Bank of Iceland has said that Auroracoin and cryptocurrencies are a ‘fringe activity’ and trade is possibly a violation of the capital controls,” he said. “The most read media outlet in Iceland, mbl.is, has done a fair deal of reporting on it. Other outlets have not done in-depth analysis, although they have mentioned it. It was discussed in a tech show in Channel 2 (Stöð 2) a couple of days ago.” While the brave notion that a single actor can move markets, a la Satoshi, has been proven, it’s one thing to get a bunch of nerds excited about frictionless wealth transfer and its entirely another to convince a country to the same. Odinsson is definitely aware of these limitations. If his idea fails – and odds are it probably will – no one loses a thing. If it takes off – and that’s a big if – it would create a new paradigm for a more nation-oriented idea of crypto currency. Auroracoin is ostensibly free, Iceland is already a haven for crypto currency mining thanks to its cheap electricity, and it’s an amazing idea to think that a single BTC fork can change an economy. It’s a brave new world, that hath such digital currencies in it, etc. Odinsson is optimistic. “I want to break the nationalistic currency shackles of Iceland’s monetary policy,” he said. “Auroracoins can be traded all over the world, no one can dictate to the people how they can use their coins.
  25. In four years David Varvel went from no health insurance, to full coverage via the Japanese government, to purchasing a high deductible plan, and then full coverage through an employer. He said having to switch insurance that often was “painful.” But now the founder of Tiny Cat Loans, a community lending platform, said he and his family have settled on HackerCare: a healthcare startup for startups that is working to hack healthcare. HackerCare launched in beta in early February, and counts about a dozen members. The company signs up members for a health plan with the help of an insurance broker, and for an additional $50 a year, provides other services from health startups to supplement insurance with the aim of lowering costs. “HackerCare is for entrepreneurs, by entrepreneurs. Also, it’s a lot easier to communicate with a smaller more agile company like HackerCare than a massive hulk like Kaiser or Blue Cross,” Varvel told TechCrunch. “It’s a great way for me to get coverage while getting my startup off the ground.” Based in Sacramento, HackerCare is focusing on signing up people in Silicon Valley — although later this year the plan is to expand coast-to-coast, said CEO Gina Lujan. The bootstrapped company is partnering with health startups to offer additional services for members, allowing them to launch in beta with a real customer pool, and giving HackerCare members services that save them money. “We want to hack that health plan with additional services,” Lujan said. Thus far, 1.6 million Californians have either signed up for a plan or enrolled in state Medi-Cal through Covered California; of those, 728,410 signed up for their own plans. Covered California, the state’s insurance exchange, allows users to search for plans, depending on their ZIP code and income. There are plans available for less than $200, as well as others that are double or triple that price. Spokeswoman Sarah Sol told TechCrunch that Covered California is the best place to get information about receiving federal assistance, counseling or any official insurance information. Some of the services HackerCare is set to provide members includes TelaDoc, allowing members to skip on a deductible to see a doctor and Skype with one, and vision services with The Shop @ VSP Global. In the future Lujan said child services, help with medical bills, wellness, and pharmacy benefits may also be included. These services come from medtech startups, which can float new products to HackerCare members in beta in order to innovate more quickly, she said. “HackerCare members may prove to be the perfect test bed to try and fail fast with some new services and delivery methods that VSP is developing through our innovation lab, The Shop,” said Jay Sales, innovation strategist at VSP Global, a HackerCare sponsor. “By working with them, hopefully we can come up with some interesting experiences that can transfer to all our members.” Sales noted that a large wave of health innovation is happening in the startup world now, and HackerCare is poised to help those startups take their work to the next level. In the coming months Lujan said HackerCare plans to create a deductible pool that will allow members to receive up to 80 percent deductible coverage in the case of a catastrophic event. Even further down the line, in a few years, Lujan said the plan is that HackerCare has several thousand members and can write its own insurance plan that better caters to members both health-wise, and cost-wise. For a budding entrepreneur like Varvel, being on the cutting edge of health technology is a great way to keep his family healthy. He said he is now less worried about the future of his healthcare, and can focus more on the future of his startup — something he said will help HackerCare become a big hit. “If HackerCare can make healthcare 10 percent less painful for entrepreneurs, they’ll do great,” Varvel said. Sursa: HackerCare Aims To “Hack” Healthcare For Startups | TechCrunch
×
×
  • Create New...