Jump to content

iulik

Active Members
  • Posts

    702
  • Joined

  • Last visited

  • Days Won

    18

Everything posted by iulik

  1. Pai nu vrei tu sa faci bani de pe pielea noastra? Gen noi sa iti spunem cum sa-ti faci combinatia si tu sa te alegi cu $$? Pe deasupra mai esti si arogant...
  2. iulik

    Ce OS folosiți?

    Debian / Centos pentru server, depinde de ce am nevoie, in general oscilez intre cele doua cand aleg distributia pentru server. In rest folosesc macos, pe langa ce a spus gecko, mac mi se pare cu mult mai simplu de utilizat fata de windows si se misca cu mult mai rapid fata de windows. In alta dezordine de idei "People who are really serious about software should make their own hardware".
  3. La multi ani rRomania!
  4. Am inteles prima data cand ai postat pe forum, cat saracie mai postezi acelasi cacat?
  5. Nu vorbii prostii, i-ai spus sa divorteze de nevasta-sa, nu ai spus inainte "eu as divorta", I-ai dat like lui QuoVadis cand a spus de "rromani sunt buni la toate" dar totusi tot ai postat un jeg de raspuns in topicu asta. in plus, daca esti sigur pe tine ca nu trebuie sa iti asculte sfaturile atunci de ce le mai postezi? Topicul ar trebui sa fie inchis cu: Iar daca @deauxefeforsaken mai are nevoie de ajutor sa deschida altul, ca asta a luat-o razna in toate directiile.
  6. Nu cred ca esti in masura sa dai asemenea sfaturi, cius!
  7. http://www.letmegooglethat.com/?q=tersrdd.review+scam
  8. Tu traiesti intr-o bula a ta si ai impresia ca lucrurile se intampla exact cum ai citit de pe site-ul unui vecin de-al tau.
  9. Cat de sarac esti?
  10. Poti sa pui imei-ul sa vedem daca putem sa il deblocam? Scrie pe spate la telefon care e.
  11. E simplu, te minte si ai 0 cunostinte.
  12. Poti sa spui aici unde ai nevoie de ajutor, iar daca cineva stie te ajuta. Poate are si altcineva acceasi problema ca si tine si ar fi ok sa fie postata pe forum, mai ales daca ii gasim si o rezolvare .
  13. iulik

    Salut

    Salut, invata programare, securitatea vine o data cu ea.
  14. Lasa-o aici sa o aiba toata lumea. Ti-ai facut site de filme si ai nevoie de backlink-uri a?
  15. iulik

    Site

    In primul rand am nevoie de cineva care se pricepe SEO si pe langa asta persoane care sa dea upload la filme si seriale pe diverse platforme iar apoi sa le indexeze
  16. iulik

    Site

    Cat platesti?
  17. Romania, tara lucrului bine facut.
  18. ubuntu si linuxmint sunt cele mai user-friendly distributii, alegere oricare din cele doua si gata.
  19. Nici viitorul nu mai e ce-o fost
  20. Fete/Baieti, tari?
  21. Do you believe that just because you have downloaded an app from the official app store, you're safe from malware? Think twice before believing it. A team of security researchers from several security firms have uncovered a new, widespread botnet that consists of tens of thousands of hacked Android smartphones. Dubbed WireX, detected as "Android Clicker," the botnet network primarily includes infected Android devices running one of the hundreds of malicious apps installed from Google Play Store and is designed to conduct massive application layer DDoS attacks. Researchers from different Internet technology and security companies—which includes Akamai, CloudFlare, Flashpoint, Google, Oracle Dyn, RiskIQ, Team Cymru—spotted a series of cyber attacks earlier this month, and they collaborated to combat it. Although Android malware campaigns are quite common these days and this newly discovered campaign is also not that much sophisticated, I am quite impressed with the way multiple security firms—where half of them are competitors—came together and shared information to take down a botnet. WireX botnet was used to launch minor DDoS attacks earlier this month, but after mid-August, the attacks began to escalate. The "WireX" botnet had already infected over 120,000 Android smartphones at its peak earlier this month, and on 17th August, researchers noticed a massive DDoS attack (primarily HTTP GET requests) originated from more than 70,000 infected mobile devices from over 100 countries. If your website has been DDoSed, look for the following pattern of User-Agent strings to check if it was WireX botnet: After further investigation, security researchers identified more than 300 malicious apps on Google’s official Play Store, many of which purported to be media, video players, ringtones, or tools for storage managers and app stores, which include the malicious WireX code. Just like many malicious apps, WireX apps do not act maliciously immediately after the installation in order to evade detection and make their ways to Google Play Store. Instead, WireX apps wait patiently for commands from its command and control servers located at multiple subdomains of "axclick.store." Google has identified and already blocked most of 300 WireX apps, which were mostly downloaded by users in Russia, China, and other Asian countries, although the WireX botnet is still active on a small scale. If your device is running a newer version of the Android operating system that includes Google's Play Protect feature, the company will automatically remove WireX apps from your device, if you have one installed. Play Protect is Google's newly launched security feature that uses machine learning and app usage analysis to remove (uninstall) malicious apps from users Android smartphones to prevent further harm. Also, it is highly recommended to install apps from reputed and verified developers, even when downloading from Google official Play Store and avoid installing unnecessary apps. Additionally, you are strongly advised to always keep a good antivirus app on your mobile device that can detect and block malicious apps before they can infect your device, and always keep your device and apps up-to-date. Android malware continues to evolve with more sophisticated and never-seen-before attack vectors and capabilities with every passing day. Just at the beginning of this week, Google removed over 500 Android apps utilising the rogue SDK—that secretly distribute spyware to users—from its Play Store marketplace. Last month, we also saw first Android malware with code injecting capabilities making rounds on Google Play Store. A few days after that, researchers discovered another malicious Android SDK ads library, dubbed "Xavier," found installed on more than 800 different apps that had been downloaded millions of times from Google Play Store.
      • 2
      • Upvote
  22. Pune mai multe informatii pe site, ce tip de reclame vinzi popup, bannere (+dimensiuni), de ce ar trebui sa folosim site-ul tau (gen: platim foarte rapid, modalitatile de plata), privacy policy pe prima pagina in footer ( vezi internal links), spune pe prima pagina ca revshare-ul e de 90%. + textul pe care il ai acum pare copiat. Parerea mea: esti retea care vinde reclame dar care nu stie sa se vanda
  23. https://myadultads.com/js/sendmail.php?email=dasdas@gamca.com&last=&message=test&name=test s You filled in the honeypot! If you're human, try again!
  24. De ce am folosi site-ul tau? Ce aduci tu in plus fata de concurenta? Mi se pare ca esti doar un alt reseller
×
×
  • Create New...