Jump to content

MrGrj

Active Members
  • Posts

    1419
  • Joined

  • Last visited

  • Days Won

    45

Everything posted by MrGrj

  1. Recomand cu caldura celor care se cred 'hecari' atunci cand dau DDoS sau gasesc un XSS care nici macar nu e XSS in http://www.noname.plm To accompany the technological advancements of the computer world and the constant changing definition of a hacker, we thought it was time to look back at ten of the most notorious black hat hackers and the legendary hacks that earned them such a title. First, it should be known that a black hat hacker is computing slang for a person who engages in illegal or malicious hacking. A white hat hacker is a computer hacker who intends to improve internet security. It is note-worthy that many white hat hackers, such as Steve Jobs of apple, Mark Zuckerberg of Facebook, and even many hackers listed below, were once black hat hackers. After reading these all tell us in comment who inspired you and who is now your favourite. 10. Kevin Poulsen (Dark Dante) Kevin Poulsen (Dark Dante) The notorious ’80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured. He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles. 9. Albert Gonzalez Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison. 8. Vladimir Levin Vladimir Levin It’s almost like the opening of a James Bond movie: in 1994, while working from his laptop from his Russian apartment in St. Petersburg, Vladimir Levin transferred $10 million from the accounts of Citibank clients to his own accounts around the world.However, Levin’s career as a hacker was only short lived, with a capture, imprisonment and recovery of all but $400,000 of the original $10 million. During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid. The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers. 7. Robert Tappan Morris On November 2, 1988, Robert Morris released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down. Due in part to the need for social acceptance that seems to be common amongst many young hackers, Morris made the fault of chatting about his worm for months before its release on the Internet. Morris claimed it was just a stunt, and added that he truly regretted causing $15 million worth of damage: the estimated amount of carnage his worm left behind. Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act but only had community service and a fine as his penalty. The defense for such a light sentence was that Morris’ worm didn’t destroy the actual contents of affected computers. Morris now works in the department of Electrical Engineering and Computer Science at Massachusetts Institute of Technology (MIT). 6. Michael Calce (MafiaBoy) Michael Calce (MafiaBoy) In February of 2000, Michael Calce launched a series of widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup, TNT. In 2001, the Montreal Youth Court sentenced Calce to eight months of open custody, one year of probation, restricted use of the Internet, and a minimal fine. 5. David Smith David Smith Smith’s fame is due to being the author of the infamous e-mail virus, Melissa. Smith claims that the Melissa virus was never intended to cause harm, but its simple means of propagation (each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world. Smith’s virus takes an unusual turn in that it was originally hidden in a file that contained passwords to 80 well-known pornography websites. The name Melissa was derived from a lap dancer Smith met while on a trip in Florida. Even though over 60,000 email viruses have been discovered, Smith is the only person to go to federal prison in the United States for sending one. 4. Adrian Lamo Nicknamed “the homeless hacker,” Adrian Lamo used coffee shops, libraries and internet cafés as his locations for hacking. Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo’s arrest was issued, followed by a 15-month investigation by federal prosecutors in New York. After several days in hiding, he finally surrendered to the US Marshals, and then to the FBI. Lamo was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization. 3.George Hotz George Hotz The name of the acclaimed jailbreak artist, George Hotz, will forever be associated with the April 2011 PlayStation breach. Being one of the first hackers ever to jailbreak the Sony PlayStation 3, Hotz found himself in the midst of a very relentless, public and messy court battle with Sony – perhaps worsened by Hotz’s public release of his jail breaking methods. In a stated retaliation to Sony’s gap of the unstated rules of jail breaking – never prosecute – the hacker group Anonymous attacked Sony in what would be the dubbed as the most costly security break of all time to date. Hackers broke into the PlayStation Network and stole personal information of some 77 million users. However, Hotz denied any responsibility for the attack, and added “Running homebrew and exploring security on your devices is cool; hacking into someone else’s server and stealing databases of user info. is not cool.” 2. Jonathan James (c0mrade) Jonathan James (c0mrade) Jonathan James, 16-year-old black hat hacker, became the first juvenile imprisoned for cybercrime in the United States. James gained his notoriety by implementing a series of successful intrusions into various systems. At an amazingly young age of 15, James specialized in hacking high-profile government systems such as NASA and the Department of Defense. He was reported to have stolen software worth over $1.7 million. He also hacked into the Defense Threat Reduction Agency and intercepted over 3,000 highly secretive messages passing to and from the DTRA employees, while collecting many usernames and passwords. On May 18, 2008, at the age of 25, James committed suicide using a gun. The words in his suicide note provide some insight into this obviously brilliant but troubled youth who thought he would be a scapegoat and blamed for cyber crimes he did not commit: “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.” 1. Gary McKinnon Gary McKinnon In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon. McKinnon suffers from Asperger’s syndrome, which is the least severe form of autism. The symptoms of Asperger’s syndrome certainly match Gary’s actions: that is, highly intelligent with an exceptional understanding of complex systems. Though sufferers often have difficulty reading social cues and acknowledging the impact of their often-obsessive behavior, they tend to be geniuses in one particular subject. For Gary, it was computers. Gary has been accused of executing the largest ever hack of United States government computer networks — including Army, Air Force, Navy and NASA systems. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers. + Kevin Mitnick Kevin mitnick Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Sursa
  2. Hai sa o luam treptat: 1. Mai crezi in Mos Craciun ? 2. In iepurele de Paste ? Sa fim seriosi, astfel de subiecte fac forumu' sa para unu' de retardati. Gandeste inainte sa crezi toate cacaturile. E ca faza aia de pe 11 Septembrie: "O doamneee,dar oare au fost Irakienii, Rusii ?" Nu coaie, au fost Americanii in pula mea ! Cum zicea si Rene Descarte: "Gandesc, deci exist" . Hai sa gandim putin !
  3. Felicitari. Am cautat si eu ceva timp insa nu am gasit nimic. Asteptam sa vedem cum iti vor zice ca e duplicate. Am vazut ca se poarta tot mai des din pacate... Iti doresc un reward cat mai mare.
  4. MrGrj

    Opinie design site

    Asa mi se pare. Ca sa faci toate alea random, pui cate un div(atribui cate un id) fiecarei imagine in parte si apoi faci un Javascript care sa ti le puna random acolo.
  5. Hai ma @Gecko, lasa-l. Omu' doar a vrut sa isi ofere din cunostinte si timp. Nu e o crima. Daca cineva nu vrea, nu ii cere. Da-i pace. Am vazut la ceva useri semnaturi cu RST si probabil s-a gandit ca mai e lume care isi doreste ceva custom. Nu va mai certati
  6. Daca ma duc la aia de la MAI / SRI / STS / PLM, care sunt sansele de a gasi Havij pe calculrile celor de la securitate ? Cred ca undeva la 90%.
  7. @SynTAX , cand ziceai ca plecam in SUA ?
  8. Ca si chestie,cel mai probabil, @blech , la varsta pe care o ai tu, a facut mai multe decat vei face tu in mare parte din viata ta. Probabil ca e o metoda de a face bani, insa aici nu sunt incurajate astfel de metode. Cel mai bine inveti ceva practic si util, nu cacaturi. E doar o parere deci trateaz-o ca atare.
  9. [iRONIC] Da ? Si parolele alea de unde le ia mai exact (alea pe care le incearca el timp de 5/10minute ? Sunt acolo in airmonu' ala ?[/iRONIC]
  10. Genial.Made my day. Eu unul am facebook pentru a tine legatura cu noutatile de la facultate si altele. Esti oarecum constrans sa ai un cont pentru ca exista atat de multa lume care il foloseste incat ... Dar tot ce spune maimuta asta e corect si are un punct de vedere destul de bine pus la punct. Mu*e facebook
  11. O sa va rog sa imi dati PM, nu stau mereu sa verific thread-ul Solutia lui @Silviu este oricum cea mai usoara si cel mai usor de inteles.
  12. Amin
  13. Si nici unul nu merge.
  14. Bine-ai venit. Calm down.
  15. So, after a very long break, I’m back here to provide some chills going on in the smartphone market. The smartphone world today, is some or the other way completely mixed up, ALL OF THE SMARTPHONES (in their respective price ranges) ARE SAME! People can see a wide range of same phones having same processors, screen size, resolutions, camera quality, etc etc…Though their manufacturers are quite different. People who can’t afford a SNAPDRAGON loaded device prefer to buy MEDIATEK ones, which provide nonetheless same experience with their Octa-Core or Quad-Core processors. But, now there has aroused need to change this preceding tradition. And so is the answer to this question; SMART HOLOGRAPHIC PHONES! What is a SMART HOLOGRAPHIC PHONE? Well, before going in more brief, I would first give you a quick flash of the topic. At present, you can see a wide variety of Smartphones giving TOUCH SCREEN features, in two classes: a) Resistive Touch Screen Display (the first touch screen technology to manufacture TOUCH SCREEN PHONES). Capacitive Touch Screen Display (introduced by APPLE, more advanced than the former one + most widely used today).These have succeeded to provide masses a new change in their phones. HOLOGRAPHIC DISPLAY: the new type of DISPLAY TECHNOLOGY that can track the position of Human Eyes, which in turn creates the illusion that the viewer is looking at the real person/object. As mentioned above, this technology is fully based upon the position of Human Eye; it is currently unable to provide a consecutive view from different directions at the same time. That is, the illusion field generated is limited to the eyes of a single person and provides the best experiencing only to a SINGLE PERSON. So, we’ll call it as SMART HOLOGRAPHIC or PERSONAL HOLOGRAPHIC DISPLAY.Let’s get more aware and included. The Holographic display can be classified in further three types: Physical Holography (holographic film, laser holographic printing). Digital Holography (projected laser holographic imaging). Computing Holography (eyeball tracking holographic imaging, scenario tracking holographic imaging). Laser holography is the method to record the amplitude as well as the phase information in the light wave that reaches the film. There are quite a lot of variations in the basic method, but ALL HOLOGRAPHY REQUIRE LASER LIGHT, i.e. light that is coherent over the object to be imaged. This is a must to construct a hologram. While in normal photography light, film can only record the intensity of light. Along with all the phase information contained in the original light, the time it reaches the film it is lost, and there is no 3D effect of the film. Where can Smart Holographic Phone be used? The first thing which will be attracting your mind after reading the above news will be the scene of a Science Fiction Movie, where a crazy scientist controls all his work by working on an invisible screen in the air, or, a conference of high authorities which appears holograph generators, etc . So the question is: “What is the exact and most valuable use of this technology?” Here’s a queue which might enlarge the limited view of its use: 1. HOLOGRAPHIC NAVIGATION: While 2D display is unable to show the complex road system, this will improve the location and complexity precision by employing 3D images. 2. COMMODITY VIEW in ONLINE SHOPPING: Earlier and now, e-commerce sites show the image of the good in only a few views, which sometimes disappoint the buyers after receiving their product. This will enhance the more detailed and specific view of the products available at online stores. 3. IMPROVED and THRILLING GAMING EXPERIENCE: Yes, for hectic gamers, this will be a new surprise regarding their real-life experience with the gaming world. 4. OMG! MYTHICAL and FUTURISTIC MOVIES: Who does not desired to be in the world of THE LORD OF THE RINGS, STAR WARS or any other such movie? Well, this might fulfil the wish to some extent. 5. VIDEO CALLING-MEETING THE CALLER IN PERSON: This will make the caller and attendant feel as if the person they are talking to is sitting or walking along with them while on the call. Any revolution in APP DEVELOPMENT to go with SMART HOLOGRAPHIC PHONE? What about App development? The success of Android & iPhones literally lies in thousands of amazing apps that provides the users the all new experience. Same in this case, users are still in confusion whether there may be apps for this technology or they have to wait. According to sources, Eastar has set up an OPEN PLATFORM FOR HOLOGRAPHIC APPS DEVELOPERS to invite them from all over the globe! However, there is no record of any active partners or achievements. Difference between HOLOGRAPHIC DISPLAY and 3D NAKED EYE: Will the use of this technology be real? Or is this just a Stunt Trick Hoax played by phone developers? Holographic display relies on light intervene and diffraction to reproduce 3D image of a projection; while Naked Eye 3D uses the principle of grating, requiring video source to be processed. The video source of Naked Eye 3D can be converted from 2D videos, but it requires viewers to be at a specific angle and distance in order to experience 3D effect. Even though, the technology of Naked Eye 3D has passed over a lot of improvements over past years, reports still includes dizziness and vomitive experience of users. These negative feedbacks impacted user experience. As a result, this became more of a stunt than of real-practical-use. How this technology works? As Smartphone display reached the resolution of 1080P along with the advanced hardware configurations, there REMAINS NO SPACE FOR FURTHER DEVELOPMENT. Still, manufactures are trying to find a way to differentiate them using the HOLOGRAPHIC DISPLAY. As this tech can produce a virtual image of a 3D object when its images from different angles are projected from the screen, it is widely believed that this will achieve a better response than that of Naked Eye 3D. Competitor in the HOLOGRAPHIC SMARTPHONE WORLD: AMAZON FIRE PHONE! Before the actual launch of devices featuring this technology, there already is a competitor present for it. Around 3 weeks earlier, Amazon unveiled its FIRE PHONE. Except from its amazing service, its BIGGEST SELLING POINT is the DYNAMIC PERSPECTIVE. It constructs 3D images at 60 frames per second, and together with the help of several infrared sensors display the image in 3D. Compared to Naked Eye 3D technology, the Dynamic Perspective of Fire Phone can change a picture’s view as users move and tilt the phone around. Still, it is not related to Holograph technology and is limited within the category of 2D display. This phone is configured with a 4.7-inch HDS LCD display, supported with a 2.2GHz Quad-Core Snapdragon 800 CPU and Adreno 300 GPU, with 2 GB of RAM. It has a 13MP rear camera with Optical Image Sensor and a powerful f/2.0 lens and also a 2.1MP front facing camera. Well, it is certainly for sure that the evolution in field of Smartphone Display will possibly undergo many revolutions, providing an excellent user-experience and a well brand new perspective. Source
  16. Fii atent. @Aerosol. Ai intentii bune, insa in momentul in care faci un tutorial incearca in primul rand sa il intelegi. 1. Fa-l in romana. (nu e obligatoriu dar pentru multi e mai usor de urmarit - avand in vedere ca proportia de analfabeti de pe forum e in crestere) 2. Testeaza-l si invata-i pe altii din propriile tale greseli. (putina vorbaraie + mult cod + explicatii = tutorial reusit) 3. Fa-l astfel incat sa il intelegi tu. 4. Gandeste-te daca tutorialul tau chiar va ajuta pe cineva sau daca intereseaza pe cineva. 5. Ai grija ca titlul sa fie in concordanta cu tema. Peace
  17. MrGrj

    10 posturi

    De acord cu @SynTAX. Intr-adevar, e enervant sa vezi posturi de genul: Insa, de multe ori, sunt useri care cer chestii / informatii pertinente.
  18. E down site-ul ?
  19. Vin si eu, insa de la 21:00. @Nytro , vreau si eu tricou. Da-mi un PM. PS: daca aveti prieteni care nu mai pot veni, anuntati-ma si pe mine. As vrea sa vad toate prezentarile.
  20. Nu conteaza pentru ce le vrei. Important e ca iti sunt tie benefice si ca iti aduc ceva: publicitate / bani / femei etc. Nu e greu sa cauti pe net sa stii. Daca folosesti BT5 sau Kali: incearca Vega. Ai grija CE si CUM FOLOSESTI, ca poate iti faci publicitate si emiti in acelasi timp de la Jilava.
  21. Vrei sa vinzi mail-uri de Italia si nu stii cum sa faci ? Cauta, documenteaza-te - vezi cum descoperi / exploatezi o vulnerabilitate. Lasa lenea si nu ii mai pune pe altii sa caute in locul tau.
  22. MrGrj

    Salut !

    Bine ai venit. Nu am inteles ce stii sa faci mai exact. Sa copiezi un vector de pe net si sa il introduci intr-un site random ? Am vaga impresie ca te numeri printre cei din prima categorie. Termina cu aroganta ( e doar un sfat ) si acele multe emoticoane. Ca un intro: Ce e un limbaj de programare ? XSS MySQL Injection Imi pare rau, dar ultimele doua linkuri sunt in engleza. Tinand cont de limba romana pe care o stii, mi-e teama sa ma gandesc la engleza ta. Dar asta e, daca vrei sa fi "hacer"... te sacrifici. Peace
  23. Multumim @spider
  24. @Silviu
×
×
  • Create New...