-
Posts
3972 -
Joined
-
Last visited
-
Days Won
22
Everything posted by begood
-
Mai era o andreea...dar se ascunde Multi ani !
-
un san in mijloc, "sa iasa" din logo
-
Poate l-a facut pentru placere personala, nu pentru a atrage utilizatori n shit ?
-
noroc ! sa traiesti !
-
ce epic fail visezi ?
-
Rar ma implic in discutii politice, dar video-ul acesta pute a .
-
Update: In an e-mail to Softpedia, Symantec has confirmed the existence of a vulnerabiliy in the pcd.symantec.com. Here is the full statement we received: "A SQL injection vulnerability has been identified at pcd.symantec.com. The Web site facilitates customer support for users of Symantec's Norton-branded products in Japan and South Korea only. This incident does not affect Symantec customers anywhere else in the world. "This incident impacts customer support in Japan and South Korea but does not affect the safety and usage of Symantec's Norton-branded consumer products. Symantec is currently in the process of updating the Web site with appropriate security measures and will bring it back online as soon as possible. Symantec is still investigating the incident has no further details to share at this time."
-
Stringuri primite de la userul Andreea: "v 4.0 FINAL" "sa intrii sa imi zici ce parere ai ca sigur recunosti personaju ;)" "alle28alle" "o cunosti? " "virus intra ca nu e nici un virus esti uita-te si vrb dupa merge trebuie sa instalezi programu ca sa mearga asta vezi daca o cunosti frica nu are de ce sa iti fie frica <ding> "http://relay.msg.yahoo.com/relay?token=" "Insupported HTTP version"
-
second mirror http://www.2shared.com/file/9439172/bfc49064/divix3_virus.html hahah si kenny il are =)
-
http://rstcenter.com/forum/bloguri-si-bloggeri/17053-blogul-lui-unu-2.html#post116697 lol.
-
Virustotal. MD5: 975b3b8757223713adf2872481dbb291 Heuristic.Malware HEUR/Malware W32/Banload.E.gen!Eldorado revin cu mai multe detalii mai tarziu ThreatExpert Report: Possible_Virus Rezumat : Din cate observ, cauta valoarea ETS din registrii => iti fura tokenul de autentificare pentru a se putea loga pe contul tau yahoo.com. * The following files were created in the system: # Filename(s) File Size File Hash Alias 1 %System%\libeay32.dll 1,028,096 bytes MD5: 0xDB003F88A9A7498DD0999214CA4304EB SHA-1: 0x28660092D1D8B9DCC288DF2EEA1CD437D2307E2E (not available) 2 [file and pathname of the sample #1] 2,910,208 bytes MD5: 0x975B3B8757223713ADF2872481DBB291 SHA-1: 0x9B2462D23E007DD301A7B8D2373583FED9BF6004 (not available) 3 %System%\ssleay32.dll 200,704 bytes MD5: 0x1D77A023F3EA2B9442D2C34B8B607E37 SHA-1: 0x9E41DCF7F8E42FF146ABE5BC614BFF9129C70229 (not available) 4 %System%\YahooAuth2.dll 551,424 bytes MD5: 0xBE6E3784CEE3F7DECE23ED9D4DE5B4A2 SHA-1: 0xCD5BB8DC1736564F4D799D30766E9EA1284892B8 (not available) 5 %System%\yahooui.exe 644,608 bytes MD5: 0x7DA80FF7E6FA6824C10A0052C5FFFB20 SHA-1: 0xA916FA03A6D0A7B6BF489A81088262BDEF780EDC Possible_Virus [Trend Micro] Vreti sa-l analizati ? http://romanisme2009.blogspot.com/ Iti cere sa instalezi un addon pentru browser (divix.exe) "cica" pentru a vedea un filmulet. Iar asa te duce pe filebox, (nu mai stiu exact locatia, n-am timp acum de analiza). LE: discutie cica: prieten (infectat): o cunosti? hxxp://romanisme2009.blogspot.com/ ) eu: hopa prieten (infectat): brb eu: sau un idiot care s-a logat pe idul asta Hide Recent Messages (F3) prieten (infectat): sa intrii sa imi zici ce parere ai ca sigur recunosti personaju LE2 : cred ca sunt primul care a prins (aceasta(?)) versiune de trojan in libertate. (nu era analizat pe virustotal nici pe threatexpert) LE3 : doar pentru SEO. libeay32.dll 1,028,096 bytes MD5: DB003F88A9A7498DD0999214CA4304EB SHA-1: 28660092D1D8B9DCC288DF2EEA1CD437D2307E2E libeay32.dll 2,910,208 bytes MD5: 975B3B8757223713ADF2872481DBB291 SHA-1: 9B2462D23E007DD301A7B8D2373583FED9BF6004 ssleay32.dll 200,704 bytes MD5: 1D77A023F3EA2B9442D2C34B8B607E37 SHA-1: 9E41DCF7F8E42FF146ABE5BC614BFF9129C70229 (not available) YahooAuth2.dll 551,424 bytes MD5: BE6E3784CEE3F7DECE23ED9D4DE5B4A2 SHA-1: CD5BB8DC1736564F4D799D30766E9EA1284892B8 yahooui.exe 644,608 bytes MD5: 7DA80FF7E6FA6824C10A0052C5FFFB20 SHA-1: A916FA03A6D0A7B6BF489A81088262BDEF780EDC Possible_Virus [Trend Micro]
-
Unu is back ! Si are delicatese : Symantec Unu's blog
-
Sa fie clar : 21.6Mb/s = 2.7 MB/s 128Kbps (download) = 16 KB/s 64Kbps (upload) = 8KB/s Mb - megabit, MB- megabyte, Kbps - kilobiti pe secunda, KB/s - kilobytes pe secunda Practic ai viteza maxima (2.7MB/s download si 0.7125 MB/s (712.5KB/s) upload) timp de 100 minute, iar apoi ai 16KB/s la download si 8KB/s upload, iar daca vrei sa continui sa ai viteza maxima, platesti 3euro/GB trafic. Ah si sa nu uit, ai 100 min in fiecare luna la viteza asta ! ))))))))))))))))) Mars ce PORCI SUNT CEI DE LA VODAFONE !
-
ce inseamna trafic initial ? ) cand treci de acea limita cat costa ? 100E/Mb ? atentie mare, ca multi fac magarii de genul, impun o limita, iar daca treci de acea limita iti taxeaza cum le place lor mai bine. btw, limita aia o treci in ~100 min de transfer la banda maxima. (16*1000/(21.6/8)/60)
-
Hack4Life Registered user Registered Users Join Date: Nov 2009 Posts: 1 atentie, am mai avut de-a face cu specimene de genul.
-
(AP) -- Computer hackers have broken into a server at a well-respected climate change research center in Britain and posted hundreds of private e-mails and documents online - stoking debate over whether some scientists have overstated the case for man-made climate change. The University of East Anglia, in eastern England, said in a statement Saturday that the hackers had entered the server and stolen data at its Climatic Research Unit, a leading global research center on climate change. The university said police are investigating the theft of the information, but could not confirm if all the materials posted online are genuine. More than a decade of correspondence between leading British and U.S. scientists is included in about 1,000 e-mails and 3,000 documents posted on Web sites following the security breach last week. Some climate change skeptics and bloggers claim the information shows scientists have overstated the case for global warming, and allege the documents contain proof that some researchers have attempted to manipulate data. The furor over the leaked data comes weeks before the U.N. climate conference in Copenhagen, when 192 nations will seek to reach a binding treaty to reduce emissions of carbon dioxide and other heat-trapping greenhouse gases worldwide. Many officials - including U.N. Secretary-General Ban Ki-moon - regard the prospects of a pact being sealed at the meeting as bleak. In one leaked e-mail, the research center's director, Phil Jones, writes to colleagues about graphs showing climate statistics over the last millennium. He alludes to a technique used by a fellow scientist to "hide the decline" in recent global temperatures. Some evidence appears to show a halt in a rise of global temperatures from about 1960, but is contradicted by other evidence which appears to show a rise in temperatures is continuing. Jones wrote that, in compiling new data, he had "just completed Mike's Nature trick of adding in the real temps to each series for the last 20 years (i.e., from 1981 onwards) and from 1961 for Keith's to hide the decline," according to a leaked e-mail, which the author confirmed was genuine. One of the colleague referred to by Jones - Michael Mann, a professor of meteorology at Pennsylvania State University - did not immediately respond to requests for comment via telephone and e-mail. The use of the word "trick" by Jones has been seized on by skeptics - who say his e-mail offers proof of collusion between scientists to distort evidence to support their assertion that human activity is influencing climate change. "Words fail me," Stephen McIntyre - a blogger whose climateaudit.org Web site challenges popular thinking on climate change - wrote on the site following the leak of the messages. However, Jones denied manipulating evidence and insisted his comment had been taken out of context. "The word 'trick' was used here colloquially, as in a clever thing to do. It is ludicrous to suggest that it refers to anything untoward," he said in a statement Saturday. Jones did not indicate who "Keith" was in his e-mail. Two other American scientists named in leaked e-mails - Gavin Schmidt of NASA's Goddard Institute for Space Studies in New York, and Kevin Trenberth, of the U.S. National Center for Atmospheric Research, in Colorado - did not immediately return requests for comment. The University of East Anglica said that information published on the Internet had been selected deliberately to undermine "the strong consensus that human activity is affecting the world's climate in ways that are potentially dangerous." "The selective publication of some stolen e-mails and other papers taken out of context is mischievous and cannot be considered a genuine attempt to engage with this issue in a responsible way," the university said in a statement. Hackers leak e-mails, stoke climate debate
-
flotari fac de mic, pot si 300 daca imi pun capul. LE: da, intr-o serie. pot si intr-o mana, vreau sa ajung sa pot face macar 20 verticale, deocamdata pot doar 4. nu pot. Nici eu nu am mai fost la sala de 2 sapt, ma dureau toate tendoanele si incheieturile. Acum m-au mai lasat, dar cand alerg, tibia simt ca mi se rupe. cam asa le fac si eu, desi nu-s chiar corecte... o variate de "planche push ups" asta da !
-
Vizionati online : Muscle & Fitness Arm Training MEGAVIDEO - I'm watching it MEGAUPLOAD - The leading online storage and file delivery service Muscle And Fitness ABS Training MEGAVIDEO - I'm watching it MEGAUPLOAD - The leading online storage and file delivery service Muscle.And.Fitness Back & Legs MEGAVIDEO - I'm watching it MEGAUPLOAD - The leading online storage and file delivery service Muscle Fitness Chest & Shoulders Training MEGAVIDEO - I'm watching it MEGAUPLOAD - The leading online storage and file delivery service pack torrent http://www.mininova.org/tor/3173444 Enjoy !
-
So a pretty serious remote vulnerability has been discovered in Windows 7, as usual Microsoft is downplaying the problem asking you to block the ports on your firewall rather than fixing the issue. I’d imagine the problem would only really be a big issue inside networks as who exposes SMB ports to the outside world anyway (TCP ports 139 and 445). But as we all know, the biggest threat to corporate network security ALWAYS comes from the inside. At the time, Microsoft only said it was investigating Gaffie’s reports. And well let’s face is, this is not the first time that a serious flaw that can be remotely exploited has been discovered in SMB. It doesn’t seem like the most secure of protocols, I really doubt Microsoft developed it using SDL (Security Development Lifecycle). It seems in this case though it’s limited to a DoS attack, perhaps due to all the fancy security controls Microsoft has implemented in the Windows 7 kernel. Even so, I’m sure a skilled attacker could probably work out a way to drop some malicious code into the OS using this PoC and well if I know the underground they probably already are. This vulnerability is the first official zero-day reported and confirmed by Microsoft in Windows 7 since the new operating system went on sale October 22nd. I’m sure there will be many more. Darknet – The Darkside | Ethical Hacking, Penetration Testing & Computer Security
-
Si ce faci daca efectele apar abia peste un deceniu ? sau la viitorii copii ai celor vaccinati ? CE faci ?
-
Nu iau medicamente. Niciun fel, decat in cazuri extreme, acesta nu fiind unul.
-
invata romaneasca asta frumoasa...spunem.
-
personalitate dubla si mi-o dezvolt pe a treia ho cu certurile, probabil ca va veni un admin si va schimba nick-ul.
-
criza de identitate ? @ .epic Welcome.