Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. outsourcing freelancing - C?utare Google
  2. begood

    Helloo!

    pa .
  3. Hire Great People Post Your Job For only $10, get unlimited job postings. Review Proposals Candidates start submitting proposals within hours, telling you what they can do and how much it will cost. Hire the Best Compare profiles, experience, ratings, credentials and portfolios to select the best fit. Work Together Choose How You Want to Work You can hire by the hour or by the project. Track Progress in Your Workroom View and manage work-in-progress online instead of on-site. Messages, screenshots, files and completed work are automatically saved here. Share With Your Team Invite co-workers to join your Workroom as needed. Pay for Results Review and Approve the Work Approve milestones or Work View™ timesheets prior to making payment. Pay Only for Productive Time Leverage your online team only when needed. Work safely online backed by the Elance Guarantee. No Added Paperwork or Overhead Elance helps you manage your team in the "cloud" and safely facilitate payments worldwide. We even handle 1099 tax filings for you. Hire Great People Post Your Job For only $10, get unlimited job postings. Review Proposals Candidates start submitting proposals within hours, telling you what they can do and how much it will cost. Hire the Best Compare profiles, experience, ratings, credentials and portfolios to select the best fit. Work Together Choose How You Want to Work You can hire by the hour or by the project. Track Progress in Your Workroom View and manage work-in-progress online instead of on-site. Messages, screenshots, files and completed work are automatically saved here. Share With Your Team Invite co-workers to join your Workroom as needed. Pay for Results Review and Approve the Work Approve milestones or Work View™ timesheets prior to making payment. Pay Only for Productive Time Leverage your online team only when needed. Work safely online backed by the Elance Guarantee. No Added Paperwork or Overhead Elance helps you manage your team in the "cloud" and safely facilitate payments worldwide. We even handle 1099 tax filings for you. Elance | Find jobs. Deliver great work. Get paid for results.
  4. unele celulare au optiunea asta in meniu. altele nu o au => mergi la un reprezentant si ii explici situatia (de ce vrei sa blochezi acel numar), am ajutat o prietena sa faca asta, a rezolvat in 20 min, gratuit la vodafone. apropo unde este notat pin2 ? ce cod e default ? la pin e sau 1234 sau 0000.
  5. xkcd: Password Reuse m-am tot gandit in ce subforum sa-l postez. cred ca aveti ce invata din chestia asta relativ simpla.
  6. atunci pentru ce ai pus conditia "daca aveti windows mobile" ?
  7. pin2 mi-a dat batai de cap de multe ori, acum il schimb rapid cu **052*PUK2*Noul PIN2*Noul PIN2# Observatie: La CONNEX PUK=PUK2 , deci se foloseste formula a doua! nu inteleg ceva : de unde pin2 ? nu am gasit niciun fel de informatii de la provider.
  8. begood

    Cerere!

    http://rstcenter.com/forum/25487-cq-killer-v3-0-a.rst#post171234 ai acolo, pe multiupload.com o lista cu foarte intrebari si raspunsul corect. vreo 65k linii daca-mi amintesc bine.
  9. In my travels, it has come to my attention that some folks have not taken or had the time to document a checklist or bullet list of actions to perform during an infection or an outbreak. In response I’ve created a decision tree to help as a guide for following a step by step process for malware analysis. The site is response.ortizonline.com . The site basically contains a mindmap created using freeplane that steps the users through the process of analyzing a machine for malware. It provides links to both Symantec , 3rd party, fee and open source tools. The majority of the information has been mostly compiled from NIST SP800-83 , and public symantec KB articles. I hope this is something that community members find useful and can provide feedback to improve. Please provide any feedback and I'll be happy to update the decision tree. Below is a sample of the decision tree. Cheers, Netrunner 1. Suspect Worm 1.1. Manual Analysis and Remediation Steps 1.1.0. Run Full System AntiVirus Scan 1.1.0.1. Did it find and Eliminate Threat? 1.1.0.1.1. IF Yes, ensure all other computers are up to date and get a scan performed. 1.1.0.1.2. IF No Then GOTO 1.1.1 [*] 1.1.1. Symantec SEP Support Tool Power Eraser Option? http://www.symantec.com/techsupp/home_homeoffice/products/sep/Sep_SupportTool.exe 1.1.1.1. LINK http://www.symantec.com/techsupp/home_homeoffice/products/sep/Sep_SupportTool.exe 1.1.1.2. Did it find a possible Threat? 1.1.1.2.1. IF Yes, consider acquiring binary for online analysis at step 1.1.3 to ensure it is not a false positive. 1.1.1.2.1.1. IF 1.1.3 does not identify as a known file and you can validate its an unknown internal application, then proceed to FIX. [*] 1.1.1.2.2. IF No Then GOTO 1.1.2 [*] 1.1.1.2.3. Did SEP_Support_Tool identify any negative reputation files? 1.1.1.2.3.1. If negative reputation files are identified, acquire for further analysis.GOTO step 1.1.3. [*] 1.1.2. Symantec Endpoint Recovery Tool CD-ROM Boot Disk 1.1.2.1. LINK http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2010041515464348 1.1.2.2. Did it find and Eliminate Threat? 1.1.2.2.1. IF Yes, consider acquiring binary for online analysis at step 1.1.3. 1.1.2.2.2. IF No Then consider 1.1.6 for memory analysis of possible zero day threat. [*] 1.1.3. Web Analysis? 1.1.3.1. Use www.threatexpert.com to get High Level overview of the threat. Analysis 1.1.3.1.1. LINK http://www.threatexpert.com 1.1.3.1.2. If binary was uploaded for analysis, what were the results? 1.1.3.3.1. Does threatexpert.com identify the binary as a virus by any other AV vendor? 1.1.3.3.2. Does threatexpert.com NSRL listing identify the binary as known good? 1.1.3.3.3. Does threatexpert.com Symantec Reputation identify the threat as "suspicious"? [*] 1.1.3.2. Use Anubis.iseclab.org to obtain highly detailed program analysis and pcap file for analysis. 1.1.3.2.1. LINK http://anubis.iseclab.org [*] 1.1.3.3. Use VirusTotal - Free Online Virus, Malware and URL Scanner 1.1.3.3.1. Does virustotal.com identify the binary as a virus by any other AV vendor? 1.1.3.3.2. Does virustotal.com NSRL listing identify the binary as known good? 1.1.3.3.3. Does virustotal.com Symantec Reputation identify the threat as "suspicious"? [*] 1.1.4. Network Traffic Analysis WireShark | Analyzing Wireless Solutions that work 1.1.4.1. If Anubis provides a pcap file for analysis, is any content able to be leveraged in order to create a SEP IPS Custom Signature 1.1.4.2. SEP Firewall Rule with specific port activity and associated application with Packet capture enabled. [*] 1.1.5. Clean Boot Disk Analysis and Extraction with Helix https://www.e-fense.com/store/index.php?_a=viewProd&productId=11 Malware Analysis and Response Step by Step Decision Tree | Symantec Connect
  10. sau schimbi useragent-ul la browserul de pe pc-ul tau.
  11. Following a call to arms yesterday, the masses inhabiting the anonymous 4chan boards have carried out a huge assault on a pair of anti-piracy enemies. The website of Aiplex Software, the anti-piracy outfit which has been DDoSing torrent sites recently, is currently down having been DDoS’d. They are joined in the Internet wasteland by the MPAA’s website, also currently under huge and sustained attack. Don’t mess with the Internet they say. Well, actually stronger terms than that are often used, but the end result is the same. When people get organized on the Internet, very strange and powerful things can happen and in few places can this be more true than on the 4chan message boards. Sometimes things need sorting out, and what better way than getting hundreds of thousands of anonymous users of this notorious message board to work together to achieve it. If they’re not trying to bring down Scientology, they’re teaching foul-mouthed pre-teen girls a lesson or using their combined forces to destroy the lives of stupid bankers who think it’s ‘funny’ to . Yesterday two new targets hit the radars of ‘Anonymous’, the faceless and powerful hoards who carry out 4chan attacks. The beauty is that anyone can join in the action, 4chan ‘membership’ is not even required. People wishing to participate can simply load up their Low Orbit Ion Cannon (LOIC) and enter the IP address they want to attack. The resulting assaults are massively distributed making defending against them almost impossible. Yesterday’s target one was everyone’s favorite Indian anti-piracy company, AiPlex Software. A completely unknown entity until a couple of weeks ago when they stupidly admitted to DDoSing uncooperative torrent sites (then unsuccessfully trying to backtrack), it seems their rise to fame came at a price. Following claims that AiPlex had DDoS’d The Pirate Bay, a few hours ago their website was taken down and remains that way at the time of writing. Along with the downtime came this message (pic): How fast you are in such a short time! Aiplex, the bastard hired gun that DDoS’d TPB (The Pirate Bay), is already down! Rejoice, /b/rothers, even if it was at the hands of a single anon that it was done, even if ahead of schedule. now we have our lasers primed, but what do we target now? We target the bastard group that has thus far led this charge against our websites, like The Pirate Bay. We target MPAA.ORG! The IP is designated at “216.20.162.10?, and our firing time remains THE SAME. All details are just as before, but we have reaimed our crosshairs on this much larger target. We have the manpower, we have the botnets, it’s time we do to them what they keep doing to us. REPEAT: AIPLEX IS ALREADY DOWN THANKS TO A SINGLE ANON. WE ARE MIGRATING TARGETS. While it’s claimed that AiPlex was taken down by a single attacker, the ongoing assault on the MPAA.org website is definitely a group effort. The site was attacked on schedule (9pm eastern time yesterday) and taken down in minutes. It remains down at the time of writing. 4chan DDoS Takes Down MPAA and Anti-Piracy Websites | TorrentFreak
  12. oDesk is the marketplace for online workteams, with the best business model for both employers and contractors. Our unique approach guarantees to employers that an hour billed is an hour worked, while guaranteeing to contractors that an hour worked is an hour paid. This win-win approach attracts more work to oDesk than to any other online work marketplace. Each month, thousands of companies of all sizes post jobs on oDesk, representing more than $65,000,000. At the same time, hundreds of thousands of top-notch professionals, including web developers, software programmers, graphic designers, writers, customer service representatives and virtual assistants, offer their services through oDesk. With an average job size of $5,000, oDesk is the best place to find meaningful work and top-flight talent. More than doubling in size each year since 2004, oDesk is where companies are building their entire organizations online and is the primary source of income for thousands of contractors. oDesk is truly changing how the world works. Outsource to Freelancers, IT Companies, Programmers, Web Designers from India, Russia, USA, and more
  13. VB.net 2010 : Imports System.Security.Cryptography Imports System.Text.ASCIIEncoding Imports System.IO ... Public Function makeByteArray(ByVal ParamArray arr() As Byte) As Byte() Return arr End Function Public Function makeIntArray(ByVal ParamArray arr() As Integer) As Integer() Return arr End Function Public Function lmConvert(ByRef pw As String) As Byte() Dim a As Integer, b As Integer, ch As Integer Dim ret(13) As Byte, aPw() As Char Static map(0) As Integer, mapMap2() As Integer, map2() As Byte If map.Length = 1 Then map = makeIntArray(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 123, 124, 125, 126, 127, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 255, 173, 155, 156, 15, 157, 221, 21, 34, 67, 166, 174, 170, 45, 82, 95, 248, 241, 253, 51, 39, 230, 20, 250, 44, 49, 167, 175, 172, 171, 95, 168, 65, 65, 65, 65, 142, 143, 146, 128, 69, 144, 69, 69, 73, 73, 73, 73, 68, 165, 79, 79, 79, 79, 153, 88, 79, 85, 85, 85, 154, 89, 95, 225, 65, 65, 65, 65, 142, 143, 146, 128, 69, 144, 69, 69, 73, 73, 73, 73, 68, 165, 79, 79, 79, 79, 153, 246, 79, 85, 85, 85, 154, 89, 95, 89) map2 = makeByteArray(44, 159, 44, 46, 43, 216, 94, 37, 83, 60, 79, 90, 96, 39, 34, 34, 7, 45, 45, 126, 84, 83, 62, 79, 90, 89) mapMap2 = makeIntArray(&H201A, &H192, &H201E, &H2026, &H2020, &H2021, &H2C6, &H2030, &H160, &H2039, &H152, &H17D, &H2018, &H2019, &H201C, &H201D, &H2022, &H2013, &H2014, &H2DC, &H2122, &H161, &H203A, &H153, &H17E, &H178) End If If pw.Length = 0 Or pw.Length > 14 Then ReDim ret(0) Return ret End If aPw = pw.ToCharArray() For a = 0 To UBound(aPw) ch = AscW(aPw(a)) If ch < 256 Then If map(ch) = -1 Then ReDim ret(0) Return ret End If ret(a) = CByte(map(ch)) Else For b = 0 To UBound(mapMap2) If mapMap2( = ch Then ret(a) = map2( Exit For End If Next If b > UBound(mapMap2) Then ReDim ret(0) Return ret End If End If Next Return ret End Function Public Function lmPasswordToDesKey(ByRef pw() As Byte, ByVal offset As Integer) As Byte() Dim key(7) As Byte key(0) = pw(offset) key(1) = CByte(((CInt(pw(offset)) * 128) Or (CInt(pw(offset + 1)) \ 2)) And &HFF) key(2) = CByte(((CInt(pw(offset + 1)) * 64) Or (CInt(pw(offset + 2)) \ 4)) And &HFF) key(3) = CByte(((CInt(pw(offset + 2)) * 32) Or (CInt(pw(offset + 3)) \ 8)) And &HFF) key(4) = CByte(((CInt(pw(offset + 3)) * 16) Or (CInt(pw(offset + 4)) \ 16)) And &HFF) key(5) = CByte(((CInt(pw(offset + 4)) * 8) Or (CInt(pw(offset + 5)) \ 32)) And &HFF) key(6) = CByte(((CInt(pw(offset + 5)) * 4) Or (CInt(pw(offset + 6)) \ 64)) And &HFF) key(7) = CByte((CInt(pw(offset + 6)) * 2) And &HFF) Return key End Function Public Function lmHash(ByRef pw As String) As String Dim a As Integer Dim hash As String = "", tmp As String Dim aPw() As Byte, aHash() As Byte Dim des As New DESCryptoServiceProvider() aPw = lmConvert(pw) If aPw.Length <> 14 Then 'System.Security.Cryptography doesn't encrypt with a key of all zeros hash = "AAD3B435B51404EEAAD3B435B51404EE" Else des.Mode = CipherMode.ECB des.Padding = PaddingMode.None des.Key = lmPasswordToDesKey(aPw, 0) aHash = des.CreateEncryptor().TransformFinalBlock(ASCII.GetBytes("KGS!@#$%"), 0, 8) For a = 0 To aHash.GetUpperBound(0) tmp = "0" + Hex(aHash(a)) hash += tmp.Substring(tmp.Length - 2) Next If pw.Length <= 7 Then 'System.Security.Cryptography doesn't encrypt with a key of all zeros hash += "AAD3B435B51404EE" Else des.Key = lmPasswordToDesKey(aPw, 7) aHash = des.CreateEncryptor().TransformFinalBlock(ASCII.GetBytes("KGS!@#$%"), 0, 8) For a = 0 To aHash.GetUpperBound(0) tmp = "0" + Hex(aHash(a)) hash += tmp.Substring(tmp.Length - 2) Next End If End If Return hash End Function VB 6.0 : Multiupload.com - upload your files to multiple file hosting sites! credits and coding : Sc00bz Free Rainbow Tables | Forum • View topic - vbLM
  14. The security firm Damballa is warning of a large and fast growing botnet created specifically to deliver distributed denial of service (DDoS) attacks on demand for anyone willing to pay for the service. The IMDDOS botnet is operated out of China and has been growing at the rate of about 10,000 infected machines every day for the past several months, to become one of the largest active botnets currently, Damballa says. Gunter Ollman, vice president of research at Damballa, said that what makes IMDDOS significant is its openly commercial nature. The botnet's operators have set up a public Web site potential attackers can use to subscribe for the DDoS service, and to launch attacks against targets. The site offers various subscription plans and attack options, and provides tips on how the service can be used to launch effective DDoS attacks. It even provides customers with contact information for support and customer service. Anyone with knowledge of Chinese can essentially subscribe to the service and use it to initiate DDoS attacks against targets of their choice, anywhere around the globe and with next to no effort, Ollman said. Paid subscribers are provided with a unique alias and a secure access application which they download on to their systems. Users wishing to launch an attack use the application to log into a secure area on the Web site where they can list the hosts and servers they want to attack and submit their request. The command and control-server behind the botent receives the target list and instructs the infected host machines, or botnet agents, to starting launching DDoS attacks against the target site. "Depending on your level of subscription you will be provided a commensurate number of DDoS agents to use," in launching at attack, he said. A vast majority of the infected machines that are part of the IMDDOS botnet are based on China, however, a significant number of infected machines in the U.S are part of it as well, Ollman said. Law enforcement authorities in the US have been notified of the problem, he added. The IMDDOS botnet provides another example of what many analysts say is the open and easy availability of sophisticated malware tools and services in China these days. Increasingly, writers of malicious software are openly hawking their wares on public Websites that are easy to find and are accessible by anyone. Many of the hacking tools and services sold on such sites are inexpensive, highly customizable and designed to be used by novices. Prices for malware tools often start at just $20. As in the case of the IMDDOS botnet, such sites often offer support services, formal product upgrades, end-user license agreements and tools that let customers verify how effective their attacks really are. Damballa warns of fast growing botnet - Techworld.com
  15. e trist ca ai intrat pe stealer, e si mai trist ca nu esti singurul, dar cel mai trist e ca cel care a facut stealerul a folosit username admin pass admin )))))))))))))))))) la loguri chiar nu inteleg, e chiar asa greu sa pui master password la firefox ?
  16. e stealer, fura tot ce prinde din opera/ie/windows (licenta)/messenger (ETS)/etc http://img178.imageshack.us/img178/8317/trist.jpg credits usr6
  17. avem si victime prin userii de pe rst, destul de trist... dra3q Firefox http://rstcenter.com slardar ----GILGAMESH-PC 2010-09-17 20:35:06 Firefox http://rstcenter.com emyy11 ----HOME-2D033A8F49 2010-07-26 17:32 hackeri de carton ? parca asa era expresia ... ma lasa memoria
  18. usr6 posteaza ce mi-ai trimis, just fur fun @primu ratat ban apropo ratatu asta s-ar putea sa fie yceman_yceman
  19. rahat, trashed.
  20. Cauta si extrage informatii sensitive de pe computer. Find Sensitive Information On Your Computer - Tekzilla Daily Tip indentityfinder.com
  21. begood

    Salutare

    welcome . bookmark us
  22. Vrei sa spui cu experienta de viata == 0. Sau pur si simplu putzalai la 12-13 ani. Sau pur si simplu ratati fara personalitate care se invart prin cercuri cu pitzi. Sau cu prea multa experienta de viata, dupa parerea lor. Incredere deplina nu am in nimeni. "Incredere deplina in femei" - In toate ? In anumite ? Am trecut de multe limite cu una...hai sa zic doua femei in viata mea, atat.
  23. threadul tine sau nu de securitatea nationala / internationala / personala ? da. deci nu mai mutati topicul la offtopic.
  24. Daca speram sa avem parte de o iarna blanda, o avertizare a meteorologilor polonezi ne da fiori. Ei cred ca ne asteapta cele mai cumplite geruri din ultimii 1.000 de ani. Specialistii Institutului de Meteorologie din Polonia ne avertizeaza ca in iarna 2010-2011 am putea tremura mai rau ca niciodata. Totul din cauza schimbarii curentului oceanic Gulfstream, care pastreaza echilibrul climatic pe Terra. In curand, apele mai calde transportate de acesta nu vor mai putea contracara aerul rece format in Oceanul Arctic. Primele semne ale fenomenului se vad deja in Peninsula Scandinava, cred specialistii polonezi. Gulfstream sau Curentul Golfului actioneaza ca un "radiator" pentru partea nordica a continentului european, iar disparitia sau chiar diminuarea acestuia poate duce la o noua era glaciara, dupa cum avertizeaza expertii. Asemenea catstrofa ar putea fi grabita si de explozia de la platforma petroliera a companiei British Petroleum, din Golful Mexic, chiar locul unde se formeaza Gulfstream. Atunci s-au deversat in ocean peste 700.000 de tone de titei. Situatia s-ar putea schimba dramatic. O parte din petrol a trecut din Marea Caraibelor in Oceanul Atlantic, contribuind la diminuarea vitezei Curentului Golfului, care astfel transforma tot mai putina apa calda. http://stirileprotv.ro/static/ro/shared/app/MediaCenter_Embed.swf?media_id=60445282&section_id=3&section=EMBED_PLAY&ad_file=noad&autostart=true&bit=1284467850_10386212172&userad_id=2981b2915efec2a85d6d360ee26c945d
  25. btw. click play PwNV8J7RUZ / Latest text of Note PwNV8J7RUZ
×
×
  • Create New...