Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. Dailymotion - [ALEV-FULL] Freedom of Expression in Europe - a News & Politics video just watch.
  2. Twitter user 0wn3d_5ys has demonstrated a persistent cross site scripting (XSS) vulnerability on Twitter he found on June 21st using his own Twitter account (visit at your own risk) that appears to be due to a lack of input validation of the application name field when accepting new requests for Twitter applications. Visiting his account on Twitter results in a pair of classic cross site scripting alert boxes, then your browser is manipulated, finally you enter the matrix (see below), and get messages from the researcher who found the vulnerability. read more : Praetorian Prefect | Persistent XSS on Twitter.com
  3. editeaza postul acum si sigur va merge.
  4. aranjeaza putin postul, pune niste spatii / rand nou sa poata fi citit evident alternativa virustotal : http://scanner.novirusthanks.org/ cu "Do not distribute the sample" bifat.
  5. cartonas galben amandoi. aveti butonul de report post.
  6. cred ca dau la cativa acces "permanent" si la altii pe baza cotizatiei (sau conturi sau alte chestii interesante) cei care au statut "temporar" va trebui sa aduca informatii noi pentru a-si mentine accesul.
  7. am vorbit cu nytro quote : nytro (6/23/2010 2:29:03 PM): Ok, mie imi place ideea sa vedem cu kw3.
  8. SirGod, da-i de stire lu nytro sa faca o sectiune speciala in care sa admitem doar userii de incredere.
  9. Tetris on a PIC Microcontroller
  10. begood

    Click!

    click.pa .
  11. Nu postati vulnerabilitati ce pot duce la extragerea datelor de pe servere in cazul site-urilor ce au legatura cu: Bancile
  12. http://i46.tinypic.com/xfpwcz.jpg
  13. chior. @gamer ai pm
  14. vreau un mirror de la cei care l-au luat
  15. aveti rep+ de la mine + 5 puncte (care vor conta la urmatoarele concursuri organizate de RST ) daca aflati pe ce adresa mail / ftp trimite datele stealerul
  16. ElcomSoft updated their iPhone Password Breaker with iOS4 Software support. Apple has changed the algorithm protecting encrypted backups for its iOS devices, making the backup process faster while strengthening the protection even further compared to prior releases. In addition, the encryption is now moved into the kernel of the new iOS. All of these made recovery attacks even harder. iPhone Password Breaker released earlier this year is a GPU-accelerated password recovery tool to get access to encrypted backups of iPhone, iPod Touch and iPad. This product is designed for cyber forensics experts who need to gather evidenced from locked mobile devices. iPhone Password Breaker updated with iOS4 Software support
  17. The use of social media can increase consumer vulnerability to identity theft because of the amount and type of personal information people share on these networks. However, consumers do little or nothing to protect themselves, according to a recent study by the Ponemon Institute. Although more than 80 percent of study respondents expressed concern about their security while using social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves. This data clearly demonstrates that while people may acknowledge that security is important, many do nothing to protect their information online. Other key findings from the survey include the following: Approximately 65 percent of users do not set high privacy or security settings in their social media sites. More than 90 percent of users do not review a given Website’s privacy policy before engaging in use. Approximately 40 percent of all respondents share their physical home address through social media applications. Surprisingly, people who have been victims of identity theft are just as likely to be lax in securing their personal information online. Study results from identity theft victims and non-victims are virtually identical. Even though most respondents expressed concern about online security and privacy, nearly 90 percent did not feel that identity theft is a likely risk from using social media sites. Accordingly, individuals continue to use social media despite acknowledged potential dangers. More than 60 percent of users are either not confident or unsure of their social media provider’s ability to protect their identity Approximately 44 percent of individuals said if they discovered that a social media provider did not adequately protect their privacy or security, they would continue to use the site Nearly 60 percent of respondents are either not confident or unsure that their network of social media friends only includes people they know and can trust. The truth about social media identity theft
  18. wtf ?
  19. vrei sa-mi demonstrezi ceva ? nu-mi zi ca ii admiri f??oiu
  20. A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. News and Changelog Please note that public versions do not include all tools available! Those who send in patches, tools and give good feedback get private versions which are released more often, include unreleased tools and more! CHANGELOG since 0.8 to 1.1 (no public version in between): v1.1 - June 2010 - PUBLIC * dnsdict6: big wordlist update * upgraded thc-ipv6 license to GPLv3 Download: http://freeworld.thc.org
  21. RapidShare will no longer offer incentives to users who share popular content. After having stopped cash payouts for their rewards program some time ago, RapidShare has now decided to discontinue the entire program. The file-hosting service cites complaints by copyright holders that the rewards were facilitating piracy as the reason for this move. RapidShare and other file-hosting services have been growing at a steady pace over the last years. This growth has not gone unnoticed by the entertainment industry and several rights holders have started legal action against the company behind RapidShare. Unlike most torrent sites, RapidShare has done well in court. Last month a United States District Court of California ruled that RapidShare is not guilty of copyright infringement. A few weeks earlier a German court ruled that the file-hoster is not liable for acts of copyright infringement committed by its users. Outside of court RapidShare has sought contact with several major players in the entertainment industries, hoping to start a collaboration by converting copyright infringers into paying consumers. In addition, the company has taken several steps to ensure that they cannot be seen as piracy facilitators. RapidShare has gone after sites that abuse their trademark to promote piracy, and they have now discontinued the rewards program for its users for the same reason. “This decision by the company is a reaction to claims that the reward programme rewards the uploading of contents that are protected by copyright. We feel it is necessary to undertake this step as we do not wish RapidShare’s users to be exposed to such an unjustified general suspicion,” RapidShare explained. The reward programs of RapidShare and other file-hosting services allowed users to earn cash or other gifts if they uploaded popular content. The entertainment industry sees these programs as incentives to upload copyrighted music and movies and possibly urged RapidShare to shut it down. Previously, a leaked email from former RapidShare boss Bobby Chang to several entertainment industry representatives already revealed that RapidShare was not planning to compete with file-hosting services that were trying to gain the favor of ‘criminals’ (copyright infringers). “RapidShare has decided not to participate in this battle and not to fight for the favor of criminals. Instead we would rather like to agitate against these activities and – if possible – to institute proceedings against those competitors of ours, who are intentionally supporting criminal activities,” Chang wrote in an email a few months ago. Whether RapidShare’s most recent move to shut down the reward program will cause it to lose users is yet to be seen. If anything, it may have avoided yet another expensive legal battle while ensuring the site can continue to operate its business. RapidShare Kills Reward Program Over Piracy Concerns | TorrentFreak
  22. Most people are used to seeing normal web pages when they surf the web. These pages are usually pages that are coded in HTML which controls the presentation on how the page actually looks but sometimes the HTML equivalent of a page is not going to be enough to make the page look like the person wants it to. Sometimes that person wants a page that is going to have a magazine look to it so, to get this type of look, they use a PDF format to present it on the web. PDF files are heavier and slower than normal web pages but they also allow you to present your information in a more elegant and detailed look. Confidentials PDFs You can also download a PDF file to your computer so that you can read it later but, for some people, they may want to keep confidential information inside of a PDF file. No matter the reason, they want to be able to only allow access to this information to people who have a password code. PDF files will give you the option to do this but does it really help? The protection that surrounds your PDF is not really that great. If you use the default protection that the PDF creator supplies then people will be able to open your PDF with the right program. Also, your message may not be delivered with a protected PDF file since most people tend to be distrustful of PDF files presented in that format. There are a lot of PDF exploits that are in the wild, so whenever people come across a PDF file that does not look or work as normal then they will erase it. But that is a worst case scenario. Problems With PDF Password Encryption The main problem with password encrypting your PDF file is that it doesn’t work at all well. So if you want to protect your file then you might want to place it under several layers of protection. You can use a third party encryption service and use their software to encrypt the file or you can avoid making the link publicly available and just send it to the person directly by email. A watermark on the file will help you know whose copy it was if the file is ever released to the public. There are several options that you can use to make your PDF more secured; the default way is just not enough. If you are a person that must protect the PDF file that they are sending out, then you should think of an out of the box way of protecting them, rather than just using the software that the PDF creation tool offers. The default protection on a PDF is easily bypassable and will not secure your file. Does Password Protecting A PDF File Really Make It Secure?
  23. If you are tired of receiving junk mail, spam and annoying telemarketing phone calls, then this list is for you. If you desire to take steps to stop the snooping from the government, hackers and marketing agencies, then this list will show you the way to privacy freedom. People probably don’t realize, just how often and in how many ways that total strangers are snooping in their lives. Whether the snooping means are video cameras, cell phones or through the Internet there are thousands of businesses, people and governments all up our personal business and lives. Every time a person fills out a contest entry, sweepstakes form, survey application or joins an online community, then chances are the personal information that is used to complete these things are sold, rented or shared with second and third parties without our knowledge. Most reputable companies or websites will have a privacy statement that explains clearly how they will use the personal information that they collect from their members or customers. Not all websites or companies are reputable, so it is extremely wise to read their privacy statements before handing over any revealing or personal information about you to strangers. The following websites are extremely useful to help stop big brother from snooping into your personal business and private lives. PGP PGP provides cryptographic privacy and authentication that is designed to protect email sent and received between two or more parties from being compromised by outside sources. This is an awesome email encryption program that really works great and is especially useful for sending and receiving important business email. GuerrillaMail An excellent way to stop potentially a bunch of unwanted spam from clogging up your inbox is to use GuerrillaMail, so to get a disposable email address to use anytime your personal email address in required. The email expires in 15 minutes, just long enough to send or receive whatever is desired. PookMail Read more in Security « Which Online Anti-virus Scanner is Best? Pop-Up Advertising » Stop sharing your real email address with every website that ask for it, but instead make up an imaginary email address using this website. Using this service for a while I have noticed a noticeable difference in the amount of spam that I have been receiving…considerably less. The email associated with your account is cleared every 24 hours allowing you to remain anonymous and still have fun. Anonymous Speech Every time you send or receive a traditional email there are companies, governments and private individuals tracking your every move and storing these emails on both public and private servers. Anonymous Speech has an extremely secure email service that continues to provide outstanding email protection long after the email has been sent or received. This company does not share their client’s personal information or email access with anyone and that does include government agencies and corporate entities. This program will not disappoint anyone who wants to remain anonymous when surfing the web. Obviously This is an outstanding Do-It-Yourself website that shows you how to stop those pesky telemarketing phone calls and how to remove your personal information from marketing mailing lists, so to stop junk mail. Double Click This company is the nerve center of digital marketing as the company self describes its self, but in reality, Double Click has probably collected some personal information about every person using the Internet at some point and time. They sell personal information collected to third parties for marketing purposes and the company will share the information that they collect on you with judicial or other government subpoenas, warrants or orders. Have your name and information removed from Double Click servers using the link above. The Cloak Hide your web surfing activities from prying eyes and snoops while using this website to surf the net anonymously. The encrypted connection hides your identity from the sites that you are visiting using an http and https anonymous proxy. Your privacy is personal – get it. BeHidden Here is another anonymous web surfing search engine that protects the surfer’s person identity and web activities from being compromised by nosy webmasters, corporations, and governments. Also, BeHidden can be used to send anonymous email, so to further protect your identity. Awesome site! Government Public Records Database Access the same databases as law enforcement and government officials do, so to request a copy of your FBI file. Yes it is true, the FBI compiles records concerning private citizens within the United States and you may be one of the people that the FBI has been watching. Excellent website tool for business operators, too. Snarfed This is an outstanding blog about protecting your privacy when shopping on the Internet and what type of disposable credit or debit cards to use and how they work. Not all-disposable credit cards are made equally as some card programs will protect you better than others will. There is a lot of information here on this blog about privacy issues and there is a little something on here for everyone. Remember, every time that you fill-out a contest or sweepstakes entry form or complete a survey your personal information is being collected and stored in some stranger’s computer server somewhere. Each time a person joins another social network ( MySpace, Facebook ) or signs up to participate in an online forum; your personal information is being collected. What or how these companies use your personal and private information depends on the company doing the collecting. Before doing business with or disclosing your personal information to, be sure to read the company’s or website’s privacy statement carefully, before disclosing anything to them. If the company or website does not have a privacy statement or the privacy statement looks suspicious, then avoid disclosing anything about you or anyone else to these types of companies and/or websites. Read more: 10 Extremely Useful Websites to Stop Big Brother From Snooping on You | Webupon
  24. Millions of web users rely on PDF files every day to consume a wide variety of text and media content. To enable this, a number of plug-ins exist today which allow users to open PDF files inside their browsers. As we’ve previously mentioned, the traditional browser plug-in model, though powerful, presents challenges in compatibility, performance, and security. To overcome this, we’ve been working with the web community to help define a next generation browser plug-in API. We have begun using this API to improve the experience of viewing and interacting with PDF files in Google Chrome. This mirrors our efforts to optimize the Adobe Flash Player experience in Chrome. Today, we are making available an integrated PDF viewing experience in the Chrome developer channel for Windows and Mac, which can be enabled by visiting chrome://plugins. Linux support is on the way, and we will be enabling the integration by default in the developer channel in the coming weeks. With this effort, we will accomplish the following: PDF files will render as seamlessly as HTML web pages, and basic interactions will be no different than the same interactions with web pages (for example, zooming and searching will work as users expect). PDF rendering quality is still a work in progress, and we will improve it substantially before releasing it to the beta and stable channels. To further protect users, PDF functionality will be contained within the security “sandbox” Chrome uses for web page rendering. Users will automatically receive the latest version of Chrome’s PDF support; they won’t have to worry about manually updating any plug-ins or programs. Currently, we do not support 100% of the advanced PDF features found in Adobe Reader, such as certain types of embedded media. However, for those users who rely on advanced features, we plan to give them the ability to launch Adobe Reader separately. We would also like to work with the Adobe Reader team to bring the full PDF feature set to Chrome using the same next generation browser plug-in API. We’re excited about the usability and security improvements this will bring to Chrome users, and we’ll continue to keep everyone updated on our efforts through this blog. Chromium Blog: Bringing improved PDF support to Google Chrome
×
×
  • Create New...