spooky01
Active Members-
Posts
96 -
Joined
-
Last visited
Everything posted by spooky01
-
Perfect Money and PayPal Money ExtraChange [rata 10:11]
spooky01 replied to k0k0's topic in RST Market
Salut. Userul e banat dupa cum vezi. Daca doresti pot sa te ajut eu. Verifica-mi semnatura -
Iti schimb eu daca vrei. Pm daca esti interesat.
-
Ai cs go pe el ? Ce rankuri ai pe el si cate ore de joc ?
-
Hacker forum Darkode is back and more secure than ever
spooky01 replied to sniffer's topic in Stiri securitate
still...miroase a honeypot.... -
Apuca-te de cocaina. O sa uiti imediat de ruleta ON : Pur si simplu nu te mai duce. Dependenta in jocurile de noroc consta in refacerea pierderilor si incurajarea in castiguri. Pierzi 100 lei si cand realizezi ca ai pierdut si mai bine pleci acasa castigi 10 lei si iti da impresia ca iti poti reface banii pierduti (poate si un castig).
-
The Pirate Bay returns from the dead, comes back online
spooky01 replied to Nytro's topic in Stiri securitate
E mai ceva ca pasarea phoenix. De cate ori il ucizi revine mai puternic , mai mare, mai popular. -
Daca ai multe likeuri organice inseamna ca e o pagina placuta de oameni si urmarita. Asta inseamna ca atunci cand postezi ceva pe pagina facebook va afisa acel post la multa lume si daca stii ce sa postezi poti face un profit frumusel.
-
Spooky01's Exchange BTC || PM || PP || WM || WU || Bank Transfer || Cash
spooky01 replied to spooky01's topic in RST Market
Vad ca nu pot da edit la primul post asa ca o sa scriu aici. ICQ : 675817619 UP inca e valabil.- 78 replies
-
- finalizata
- money
-
(and 3 more)
Tagged with:
-
Buna seara. Cumpar/vand urmatoarele : BTC , Paypal , Perfect Money , WU , Bank Transfer(romania) , cash (bucuresti) , Web Money , Paypal (doar vand). Preturile se iau dupa Bitstamp si comisioanele pot varia intre 0-15% (depinde de moneda tranzactionata/suma etc) , dar in general imi place sa ma mandresc ca am cele mai bune preturi din romania si comisioanele se gasesc pe langa 5% , dar nu e o regula. Reguli: - Nu trimit primul niciodata. - O data tranzactia finalizata ramane finalizata. - Am dreptul sa refuz o tranzactie oricand. - Am dreptul sa cer dovezi de identitate. - Termenii se pot schimba oricand. Va rog postati aici ce vreti (si cat) sa cumparati si cu ce. Pentru timp de asteptare mai mare puteti da pm daca nu vreti sa vada altii ce cumparati.
- 78 replies
-
- 3
-
- finalizata
- money
-
(and 3 more)
Tagged with:
-
Da-l dracu de iphone , da-l pe mana politiei si sa te uiti in ochii lui cand il ridica din casa. Privirea ce ti-o va arunca va fii mai valoroasa ca 10x iphoneuri la un loc.
-
Era 208 si am vrut sa cumpar si in urm 5 minute s-a facut 165 si am cumparat la 165 , iar in 30 de minute a revenit pe la 200 )
-
Da imi amintesc cand era 30 usd. Aceeasi soarta o are si btc o sa ajunga la 10-15 USD.
-
Illuminati confirmed ?
-
A crescut la 205 , dar e bull trap o sa scada iarasi.
-
Ai putea sa iti faci cu two-factor authentification. Eu asa am la bt24 si sunt FOARTE multumit. Atat de aplicatie (functiile ce le ofera) cat si de securitatea ce o ofera + ca banca transilvania are printre cele mai mici fee-uri.
-
Tu nu iti dai seama ca astia sunt sarcastici ? "Se poate, dar nu toata. Da-ne numele tau aici sau trimite un PM si te scoatem de acolo." "Lasa-ne aici numele, prenumele si clasa sa stim pe cine scoatem din db " Crezi ca aici se sparg asa site-urile una doua pentru oricine intreaba pe gratis doar ca sa nu vada parintii cand nu au chef de scoala copii.
-
Te bate taica-tu cand vede ca nu iti place scoala ?
-
Hackers have already bypassed Apple's fingerprint scanner using fake fingerprints, and now they have found a way to reproduce your fingerprints by using just a couple of photos of your fingers. Special Fingerprint sensors have already been used by Apple and Samsung in their smartphones for authentication purposes and in near future fingerprints sensors are believed to be the part of plenty of other locked devices that can be unlocked using fingerprints, just to add an extra layer of authentication. But, How secure are your fingerprints? A member of Europe's oldest hacker collective, the Chaos Computer Club (CCC), claimed to have cloned a fingerprint of a Germany's federal minister of defense, Ursula von der Leyen, using pictures taken with a "standard photo camera" at a news conference. At the 31st annual Chaos Computer Conference in Hamburg Germany this weekend, biometrics researcher Starbug, whose real name is Jan Krissler, explained that he used a close-up photo of Ms von der Leyen's thumb that was taken with a "standard photo camera" at a presentation in October -- standing nine feet (3 meters) away from the official. He also used several other pictures of her thumb taken at different angles. Starbug then used a publicly available software program called VeriFinger with photos of the finger taken from different angles to recreate an accurate thumbprint. According to CCC, this software is good enough to fool fingerprint security systems. "After this talk, politicians will presumably wear gloves when talking in public," Starbug told the audience at the Chaos Computer Conference (CCC) conference. However, this is not the very first time when Chao Computer Club has targeted fingerprints. In past, the group has demonstrated how easily the Apple iPhone 5s can be unlocked using a fake fingerprint obtained from an individual who has touched a shiny surface, such as glass or a smartphone screen. "This demonstrates—again—that fingerprint biometrics is unsuitable as [an] access control method and should be avoided," the group said at the time. Moreover, just three days after the launch of the Galaxy S5, hackers successfully managed to hack Galaxy S5 Fingerprint sensor using a similar method that was used to spoof the Touch ID sensor on the iPhone 5S. But this recent hack did not require any object 'carrying the fingerprints anymore,' which means that any person could potentially steal someone's fingerprint identity from photos posed on Facebook, Twitter or any social networking site. This new finding by Starbug potentially calls into question the effectiveness of fingerprint scanners as a security measure. Fingerprints have been supported in the past as biometric identifiers, but because it can be easily reproduced, using fingerprints for security purposes raises questions. The practical danger is low, because even after obtaining your fingerprint, the data thieves would still need to have your devices or otherwise find a way to sign in using your biometric information. But, the concern is more as the method require no technical skill to perform the fingerprint cloning. http://thehackernews.com/2014/12/hacker-clone-fingerprint-scanner.html
-
- 1
-
Bad News for Internet Explorer fans, if any! Microsoft's almost 20 years old Web browser with a big blue E sign might soon be a thing of the past. With the arrival of Windows 10, probably by next fall, Microsoft could come up with its brand new browser that’s more similar to Mozilla's Firefox and Google's Chrome, but less like Internet Explorer (IE), according to a recent report published by ZDNet. "Ok so Microsoft is about to launch a new browser that's not Internet Explorer and will be the default browser in Windows 10," tweeted Thomas Nigro, a Microsoft Student Partner lead and developer of the modern version of VLC. The browser, codenamed "Spartan," is a "light-weight" browser with extension support, and multiple sources confirm that this new browser isn't IE12. Instead, Spartan is an entirely new browser that will use Microsoft's Chakra JavaScript engine and Trident rendering engine (as opposed to WebKit). But Internet Explorer isn't going away completely. According to ZDNet's Mary Jo Foley, Windows 10 will ship with both Internet Explorer 11 and Spartan, though the former is expected to stick around for backwards compatibility only. The new browser will be available for both desktop and mobile devices running Windows 10. So far it’s unclear whether Spartan will be portable on non-Windows systems, such as Android, iOS, or OS X, but if it is actually imitating Chrome and Firefox, two of the most popular browsers out there, the idea isn't too crazy. The new browser is currently under development. However, if this new browser doesn't use Webkit, it will not likely be accepted into Apple's App store, because Apple requires all "apps that browse the web must use the iOS WebKit framework and WebKit Javascript" according to its app store review guidelines. What Microsoft will call the new browser is also a mystery at this point, as 'Spartan' is just a codename for the project, and there's no revelations on what it might be called by the company. Microsoft hasn’t provided any details about it but the company is hosting a press event on Jan. 21 in the company's hometown of Redmond, Washington, where it is expected to provide more details about the consumer version of Windows 10, so perhaps we will know some more about Spartan then. http://thehackernews.com/2014/12/microsoft-windows-spartan-browser.html
-
A Google security researcher, 'James Forshaw' has discovered a privilege escalation vulnerability in Windows 8.1 that could allow a hacker to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable. The researcher also provided a Proof of Concept (PoC) program for the vulnerability. Forshaw says that he has tested the PoC only on an updated Windows 8.1 and that it is unclear whether earlier versions, specifically Windows 7, are vulnerable. Forshaw unearthed the bug in September 2014 and thereby notified on the Google Security Research mailing list about the bug on 30th September. Now, after 90 days disclosure deadline the vulnerability and Proof of Concept program was made public on Wednesday. The vulnerability resides in the function AhcVerifyAdminContext, an internal function and not a public API which actually checks whether the user is an administrator. "This function has a vulnerability where it doesn't correctly check the impersonation token of the caller to determine if the user is an administrator," Forshaw wrote in the mailing list. "It reads the caller's impersonation token using PsReferenceImpersonationToken and then does a comparison between the user SID in the token to LocalSystem's SID." "It doesn't check the impersonation level of the token so it's possible to get an identify token on your thread from a local system process and bypass this check. For this purpose the PoC abuses the BITS service and COM to get the impersonation token but there are probably other ways." The PoC contains two program files and some set of instructions for executing the files which, if successful, finally result in the Windows calculator running as an Administrator. According to the researcher, the vulnerability is not in Windows User Account Control (UAC) itself, but UAC is used in part to demonstrate the bug. Forshaw tested the PoC on Windows 8.1 update, both 32 bit and 64 bit versions, and he recommended users to run the PoC on 32 bit. To verify perform the following steps: Put the AppCompatCache.exe and Testdll.dll on disk Ensure that UAC is enabled, the current user is a split-token admin and the UAC setting is the default (no prompt for specific executables). Execute AppCompatCache from the command prompt with the command line "AppCompatCache.exe c:\windows\system32\ComputerDefaults.exe testdll.dll". If successful then the calculator should appear running as an administrator. If it doesn't work first time (and you get the ComputerDefaults program) re-run the exploit from 3, there seems to be a caching/timing issue sometimes on first run. A Microsoft spokesperson confirms the vulnerability and says that it’s already working on a fix: "We are working to release a security update to address an Elevation of Privilege issue. It is important to note that for a would-be attacker to potentially exploit a system, they would first need to have valid logon credentials and be able to log on locally to a targeted machine. We encourage customers to keep their anti-virus software up to date, install all available Security Updates and enable the firewall on their computer." At the time of posting this article, there's no patch available and all Windows 8.1 systems are vulnerable to hackers. http://thehackernews.com/2015/01/google-researcher-reveals-zero-day_2.html
-
Pot da eu invitatii daca aveti asa mare nevoie. Da poti face share la cont , dar nu poti downloada in acelasi timp in orice caz. Mi se pare ca trebuie sa astepti 30 min dupa ce ai inchis torentul sa poti downloada de pe alt ip altfel iti iei ban o perioada de timp.