Jump to content

MrGrj

Active Members
  • Posts

    1416
  • Joined

  • Last visited

  • Days Won

    44

Everything posted by MrGrj

  1. Mi-am pus de cateva ori intrebarea asta. Ia sa vedem: via. Puteti gasi alte solutii in link-ul alaturat PS: si Python care vine tare din urma: import __hello__
  2. Nu l-ai fi postat cand mi-am scris licenta Misto anyway.
  3. Momentan o sa va loviti de multe astfel de erori intrucat se lucreaza din greu la noua versiune.
  4. @rfvzlz Daca imi scrii flow-ul detaliat pe PM, cu linkuri si ce ai de facut pentru task-urile astea automate iti fac eu in Python.
  5. Short Bytes: If you are among the ones who consider malware, worms, viruses to be the same thing then you’re on the wrong track. Read further, and improve your knowledge about these terms. If you’re a regular or even an occasional computer user, then you might’ve heard the terms like Viruses, Worms, Trojans, Bots, Malware, Spyware, etc. But honestly speaking, we consider all these to be a Virus, no matter, whatever be their type. But have you ever tried to acknowledge, what is the difference between these terms, although they are meant to harm your device, steal your data or spy on you, have you ever thought why they are named so differently. Basically, terms like Viruses, Trojans are all types of malicious software or simply ‘Malware’. Now, the first and foremost question arises, where did these terms came from? Clearly, they are not some out of the world aliens, in fact the real truth is that they were not even created with an intention to harm someone. The history of malware attacks goes back to 1949, when John von Neumann, first developed the theoretical base for self-duplicating automation programs, but the technical implementation was not feasible at that time. The term ‘Computer Virus’ was first used by Professor Leonard M. Adleman in 1981, while in conversation with Fred Cohen. The first computer virus named ‘Brain’ was coded by two brothers Basit Farooq Alvi and Amjad Farooq Alvi, who were from Lahore, Pakistan. Brain was meant to infect storage media based on MS-DOS FAT file systems. It was originally designed to infect the IBM PC, it replaced the boot sector of its floppy disk with the virus. The virus program changed the disk label to ©Brain and the defected boot sectors displayed this message: Welcome to the Dungeon © 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today – Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages….$#@%$@!! However, as you may presume, there was no evil intention behind this. Alvi brothers said in their interview with TIME magazine, they created the virus only to protect their medical software from piracy, aimed at copyright infringement acts. Coming back to Malware, these are malicious software designed to harm a computer which may or may not be connected to a network. Malware only get in to action when there is a computer involved in the game otherwise the term Malware is of no use. Malware are of the following types: Worms: These programs have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computers via the internet or through storage media, all the work is done like a top secret mission hiding their movement from the user. They don’t cause any harm to the computer, their replicating nature consumes hard drive space, thus slow down the machine. Some of the notable worms are, SQL Blaster which slowed the internet for a small period of time, Code Red took down almost 359,000 websites. Viruses: They also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact, they can get into action only if they have the support of a host program, otherwise they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32.Sfc!mod, ABAP.Rivpas.A, Accept.3773 are some of the examples of Virus programs. The Virus Gang: File Viruses Macro Viruses Master Boot Record Viruses Boot sector Viruses Multi-Partite Viruses Polymorphic Viruses Stealth Viruses Feel free to Google anyone of them if you like. Trojans: Basically, Trojans are no Viruses, and are not meant to damage or delete files on your system. Their sole task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan. They are named after the ‘Trojan Horse’ tale, in which Greeks entered the city of Troy with the help of a wooden horse which was meant to be a gift, but turned out to be a sweet poison, as depicted in the movie Troy. The Trojan Gang: Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-Of-Service Attack Trojans Feel free to Google anyone of them if you like. Adware: Adware are used to display advertisements in the programs. They generally come attached with software programs that are free to use as they are the only source of revenue for the developers of those software programs. Adware can’t be completely called as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in, so as to display the relevant advertisements on your screens. Spyware: These programs also come attached with other freeware software, track your browsing and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently. Spam: You get very irritated when you receive unwanted emails from unknown senders, these are called Spams or junk mails. And the process of flooding the internet with the same message is called Spamming, is done for the purpose of commercial advertising. These junk mails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail. Bots: Bots or Robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the infected hosts attached to that network, called Botnet. Their skills include stealing passwords, logging keystrokes, analyzing network traffic, relay spam, launch DoS (Denial of Service) attacks and open back doors on infected hosts. These Bots can be seen as the advanced form of Worms, their infection rate and tactic is more effective than those of Worms. These malicious Bots are created after a lot of hard work done by their malignant creators. Ransomware: These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition. Also Read: Here’s the Best Antivirus Software for Windows PCs, According to New Tests After reading all this, you might be thinking why people create Malware. Here are some reasons which may compel a coder to write malware codes: Take control of a person’s computer for personal or professional reasons. To get financial benefits. To steel confidential data. To prove their point regarding a security breach can be done on a system. To take down an individual computer or a complete network. and many more…. Read More: 5 Best Free Android Antivirus Apps of 2015 How can you protect your Computer : Keep your system up to date. Use genuine software. Install an antivirus software and update it regularly. Set-up a firewall, may it be custom as provided by antivirus software. Windows has an in-built firewall option in case you don’t want to use a custom firewall. Never open unknown emails that generally reside in your Spam folder. Never open unknown links, use online website safety checker tools if you’re not sure to open a website. By taking these simple measures, you can effectively keep your machine free from Malware and other potential threats. zurza
  6. Nu exist? ceea ce vrei pentru ceea ce cauti. Cele trei mentionate mai sus m?nânc? multe resurse ( in special VS si autocad) In plus, nu cred c? vei g?si Autocad pt Linux. Posibil sa m? însel. Iar VS poti s? iei doar 2015 din cate stiu. Asta dac? nu folose?ti ceva gen wine. Îns? nu recomand sub nici o form?. Mai ales pt Autocad) @Ganav ce recomanzi pt Debian ( imi iau laptop mâine poimâine si mnah. Da-mi PM ca s? nu spamam threadul omului)
  7. MrGrj

    Salutare!

    Eram ca tine. Programez de 4 ani. Nu-mi pare r?u. E o comunitate genial? dac? stii s? înveti de unde trebuie. Stai pe aproape c? ai ce înv?ta. Sfaturi: - invata engleza. - tine pasul cu orele de la liceu, dar invata singur ceea ce iti place. (C++) - iesi afar?, bea, fute, programeaz?, r?mâi totu?i cu capul pe umeri. In rest, toate cele bune S? nu ne entuziasmam prea tare ca viata ti-o mai ?i trage
  8. Normal ca te ajuta cineva. Da' mai intai pune si tu ce ai facut so far + ce nu ti-a iesit ( erorile pe care le primesti ). Daca esti anul 1 nu inseamna ca ai vreun handicap si nu poti incerca sa faci cate ceva.
  9. Las? claritatea. Pe mobile nu ai meniul ok. E putin iesit din peisaj. Cât despre cel care a început threadul, e ok siteul
  10. Am decis ca in fiecare luni si vineri sa postez aici intrebari pe care le gasesc interesante (legate de programare, desigur), si cateva raspunsuri pertinente. Do most programmers really enjoy programming? HA-ha. The next one is so damn cute: zurza
  11. How do programming experts learn deep details in programming languages and architectures that you can't find in books and online tutorials? Genial raspuns: Sursa pt dl. @fallen_angel aka ingeru' cazator in cap
  12. Ce-ai ma ? Eu nu te-am ajutat niciodata sa convertesti un string iar in string: AKA: m = [B]raw_input[/B]("Do you wish to save the password?(y/n)") # asta e deja string (ti-am explicat de 10 ori cel putin, mi-e martor tot chatu') Si acum pui conditite (ca sa fii tu sigur ca e string): if [B]str[/B](m) == 'y' or [B]str[/B](m) == 'Y' Spor la invatat in continuare though PS: In python 3.x raw_input() devine input() iar input()-ul din 2.x a fost removed.
  13. Ce pula mea ? Hai ca aia cu paru' la cur o mai inteleg, da' serios dude ? Esti pizda, te epilezi ca sa nu-ti dea cretinu' smocu' la o parte cand linge gogosica. Esti barbat, dai o lama acolo la coaili, ca sa nu se inece pretendenta. So easy. // careva sa mute gunoiu' asta undeva, ca ne facem de ras.
  14. MrGrj

    Ajutor

    Meam, S6 Edge. S5. Avem bani. Nu cred ca poti face ce vrei tu [sARCASTIC] Poti da un mail celor de la Facebook / Google. Aia sigur stiu si cand t* caci. [/sARCASTIC]
  15. Cateva raspunsuri interesante, numa' bune pentru lectura de dimineata: Mai multe puteti citi aici.
  16. Merita citit
      • 1
      • Upvote
  17. Daca ti se pare greu, inseamna ca nu ai o baza. Incepi structurat si progresezi in timp, asa se face treaba. - inveti sa gandesti logic / structurat / algoritmic. - usor usor incepi sa implementezi ceva algoritmi basic (iti vor fi de ajutor) in pseudo cod. - iti alegi un limbaj cu care vrei sa mergi inainte, si ii dai bataie. (aici recomand Python pentru ca iti ofera deschidere catre orice: Networking & Scripts / Automation / Web / Software chiar si Machine Learning + Artificial Intelligence) Spor la invatat.
  18. Exista py2exe cu care poti face executabile. In fine, ceea ce vrei tu nu exist?. F?r? munc? nu vei ajunge nic?ieri. Vrei si usor si pentru "publicul larg". Încearc? la KFC.
  19. MrGrj

    Flare-on

    Foarte misto de citit asa, ca lectura de seara. Ca idee, daca sunteti pasionati de RE, incercati sa refaceti exact chall-urile, pe baza raspunsurilor / rezolvarilor din postul de mai sus.
  20. Ceva putin mai lizibil fata de cele 100 de for-uri ale "colegului": import random def function(x): for i in range(x): nr1 = 720000000 nr2 = 799999999 a = random.randint(nr1, nr2) b = '0' + str(a) print b function(10) # introduceti cate numere vreti (acum se genereaza 10 numere de telefon)
  21. @Ganav, ma refer la proiectele uzuale / clasice Evident ca in ceea ce priveste proiecte de anvergura, exista alte metodologii mult mai bune decat ceea ce am prezentat eu. Nu poti cere unui beginner sa invete despre smart pointers daca el habar nu are care e diferenta dintre calloc() si malloc()
×
×
  • Create New...