-
Posts
2713 -
Joined
-
Days Won
192
Everything posted by QuoVadis
-
Sorry, nu.
-
Pentru cei carora le place sa citeasca, si se descurca cu engleza, ofer gratuit capitole sau urmatoarele (255) carti intregi in format PDF de pe CRCnetBASE, majoritatea nu pot fi gasite pe torrente sau site-uri de ebooks grauite. Din anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane. Tinand cont ca e un proces manual si trebuie sa imi iau niste masuri de siguranta, e posibil sa dureze ceva daca doriti multe carti sau am un backlog de cereri. Pentru a vedea un rezumat/abstract al cartii inainte sa o cereti, si pentru a salva timpul meu si al vostru, recomand mai intai sa dati un search pe pagina aceasta la titlul cartii in acest field si in dreapta va aparea un pdf gratuit cu rezumatul/abstractul/contents: Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx. UPDATE: Va rog pentru inceput sa cereti doar cate putin, cat cititi odata, nu la gramada tot ce pare fain, ca sa pot servi pe toata lumea. Cand terminati mai trimit - nu plec niciunde. Thx. Lista completa a cartilor: 802.1X Port-Based Authentication A Practical Guide to Security Assessments A Practical Guide to Security Engineering and Information Assurance A Technical Guide to IPSec Virtual Private Networks Adaptive Security Management Architecture Advances in Biometrics for Secure Human Authentication and Recognition Algebraic and Stochastic Coding Theory Algebraic Curves in Cryptography Algorithmic Cryptanalysis An Introduction to Cryptography, Second Edition Android Malware and Analysis Android Security, Attacks and Defenses Anonymous Communication Networks, Protecting Privacy on the Web Architecting Secure Software Systems Assessing and Managing Security Risk in IT Systems, A Structured Methodology Asset Protection and Security Management Handbook Asset Protection through Security Awareness Audit and Trace Log Management, Consolidation and Analysis Authentication Codes and Combinatorial Designs Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Building A Global Information Assurance Program Building an Effective Information Security Policy Architecture Building an Information Security Awareness Program Building and Implementing a Security Certification and Accreditation Program, OFFICIAL (ISC)2 GUIDE to the CAPcm CBK Business Resumption Planning Call Center Continuity Planning Case Studies in Intelligent Computing, Achievements and Trends Case Studies in Secure Computing, Achievements and Trends CISO Soft Skills, Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives CISO's Guide to Penetration Testing, A Framework to Plan, Manage, and Maximize Benefits Complete Book of Remote Access, Connectivity and Security Complete Guide to CISM Certification Complete Guide to Security and Privacy Metrics, Measuring Regulatory Compliance, Operational Resilience, and ROI Computer Security Literacy, Staying Safe in a Digital World Conducting Network Penetration and Espionage in a Global Environment Conflict and Cooperation in Cyberspace, The Challenge to National Security Core Software Security, Security at the Source Critical Incident Management Critical Infrastructure System Security and Resiliency Critical Infrastructure, Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies Cryptanalysis of RSA and Its Variants Cultural Property Security, Protecting Museums, Historic Sites, Archives, and Libraries Curing the Patch Management Headache Cyber Crime Investigator's Field Guide, Second Edition Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition Cyber Fraud, Tactics, Techniques and Procedures Cyber Power, Crime, Conflict and Security in Cyberspace Cyber Security Essentials Cybersecurity for Industrial Control Systems, SCADA, DCS, PLC, HMI, and SIS Cybersecurity, Public Sector Threats and Responses Cybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition Data Governance, Creating Value from Information Assets Data Mining and Machine Learning in Cybersecurity Data Mining Tools for Malware Detection Data Privacy for the Smart Grid Data Protection, Governance, Risk Management, and Compliance Database and Applications Security, Integrating Information Security and Data Management Data-driven Block Ciphers for Fast Telecommunication Systems Defense against the Black Arts, How Hackers Do What They Do and How to Protect against It Developing and Securing the Cloud Digital Forensics for Handheld Devices Digital Privacy, Theory, Technologies, and Practices Discrete Dynamical Systems and Chaotic Machines, Theory and Applications Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks Distributed Networks, Intelligence, Security, and Applications Effective Surveillance for Homeland Security, Balancing Technology and Social Issues Effective Use of Teams for IT Audits Elliptic Curves, Number Theory and Cryptography, Second Edition Group Theoretic Cryptography Handbook of Applied Cryptography Handbook of Elliptic and Hyperelliptic Curve Cryptography Handbook of Financial Cryptography and Security Handbook of Finite Fields Handbook of Surveillance Technologies, Third Edition Hardware Security, Design, Threats, and Safeguards Homeland Security and Private Sector Business, Corporations' Role in Critical Infrastructure Protection Homeland Security Handbook How to Develop and Implement a Security Master Plan Industrial Espionage, Developing a Counterespionage Program Information Assurance Architecture Information Security Architecture, An Integrated Approach to Security in the Organization Information Security Architecture, An Integrated Approach to Security in the Organization, Second Edition Information Security Cost Management Information Security Fundamentals, Second Edition Information Security Governance Simplified, From the Boardroom to the Keyboard Information Security Management Handbook on CD-ROM, 2006 Edition Information Security Management Handbook, Fifth Edition, Volume 3 Information Security Management Handbook, Four Volume Set Information Security Management Handbook, Fourth Edition, Volume 4 Information Security Management Handbook, Sixth Edition Information Security Management Handbook, Sixth Edition, Volume 2 Information Security Management Handbook, Sixth Edition, Volume 3 Information Security Management Handbook, Sixth Edition, Volume 4 Information Security Management Handbook, Sixth Edition, Volume 5 Information Security Management Handbook, Sixth Edition, Volume 6 Information Security Management Handbook, Volume 2 Insider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT Attacks Intelligent Network Video, Understanding Modern Video Surveillance Systems Intelligent Video Surveillance, Systems and Technology Investigations in the Workplace, Second Edition Investigator's Guide to Steganography Iris Biometric Model for Secured Network Access IT Auditing and Sarbanes-Oxley Compliance, Key Strategies for Business Improvement IT Security Governance Guidebook with Security Program Metrics on CD-ROM Lattice Basis Reduction, An Introduction to the LLL Algorithm and Its Applications Machine Learning Forensics for Law Enforcement, Security, and Intelligence Malicious Bots, An Inside Look into the Cyber-Criminal Underground of the Internet Managing A Network Vulnerability Assessment Managing an Information Security and Privacy Awareness and Training Program Managing an Information Security and Privacy Awareness and Training Program, Second Edition Managing Risk and Security in Outsourcing IT Services, Onshore, Offshore and the Cloud Managing the Insider Threat, No Dark Corners Managing Trust in Cyberspace Mechanics of User Identification and Authentication, Fundamentals of Identity Management Multilevel Modeling of Secure Systems in QoP-ML Multilevel Security for Relational Databases Multimedia Content Encryption, Techniques and Applications Multimedia Encryption and Authentication Techniques and Applications Multimedia Security Handbook Multimedia Security, Watermarking, Steganography, and Forensics Multimedia Watermarking Techniques and Applications Multiple-Base Number System, Theory and Applications Network and Application Security, Fundamentals and Practices Network Anomaly Detection, A Machine Learning Perspective Network Attacks and Defenses, A Hands-on Approach Network Perimeter Security, Building Defense In-Depth Network Security Technologies New Directions of Modern Cryptography Noiseless Steganography, The Key to Covert Communications Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK, Second Edition Official (ISC)2 Guide to the CISSP CBK, Third Edition Official (ISC)2 Guide to the CISSP Exam Official (ISC)2 Guide to the CSSLP Official (ISC)2 Guide to the CSSLP CBK, Second Edition Official (ISC)2 Guide to the HCISPP CBK Official (ISC)2 Guide to the SSCP CBK Official (ISC)2 Guide to the SSCP CBK, Second Edition Official (ISC)2® Guide to the CAP® CBK®, Second Edition Official (ISC)2® Guide to the CCFP CBK Official (ISC)2® Guide to the ISSAP® CBK Official (ISC)2® Guide to the ISSAP® CBK, Second Edition Official (ISC)2® Guide to the ISSEP® CBK®, Second Edition Official (ISC)2® Guide to the ISSMP® CBK® Optical Coding Theory with Prime Oracle Identity Management, Governance, Risk, and Compliance Architecture, Third Edition PCI Compliance, The Definitive Guide Pearls of Discrete Mathematics Physical Security and Safety, A Field Guide for the Practitioner Practical Cryptography, Algorithms and Implementations Using C++ Practical Hacking Techniques and Countermeasures Practical Risk Management for the CIO PRAGMATIC Security Metrics, Applying Metametrics to Information Security Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques Profiling Hackers, The Science of Criminal Profiling as Applied to the World of Hacking Protocols for Secure Electronic Commerce, Second Edition Public Key Infrastructure, Building Trusted Applications and Web Services Quantum Communications and Cryptography RC4 Stream Cipher and Its Variants Responsive Security, Be Ready to Be Secure RSA and Public-Key Cryptography Secure and Resilient Software Development Secure and Resilient Software, Requirements, Test Cases, and Testing Methods Secure Computers and Networks, Analysis, Design, and Implementation Secure Data Provenance and Inference Control with Semantic Web Secure Internet Practices, Best Practices for Securing Systems in the Internet and e-Business Age Secure Java, For Web Application Development Secure Semantic Service-Oriented Systems Securing and Controlling Cisco Routers Securing Cloud and Mobility, A Practitioner's Guide Securing Converged IP Networks Securing E-Business Applications and Communications Securing Systems, Applied Security Architecture and Threat Models Securing Windows NT/2000, From Policies to Firewalls Security and Policy Driven Computing Security and Privacy in Smart Grids Security De-Engineering, Solving the Problems in Information Risk Management Security for Service Oriented Architectures Security for Wireless Sensor Networks using Identity-Based Cryptography Security in an IPv6 Environment Security in Distributed, Grid, Mobile, and Pervasive Computing Security in RFID and Sensor Networks Security Management, A Critical Thinking Approach Security of Mobile Communications Security Patch Management Security Software Development, Assessing and Managing Security Risks Security Strategy, From Requirements to Reality Security without Obscurity, A Guide to Confidentiality, Authentication, and Integrity Smart Grid Security, An End-to-End View of Security in the New Electrical Grid Software Deployment, Updating, and Patching Software Test Attacks to Break Mobile and Embedded Devices Standard for Auditing Computer Applications, Second Edition Statistical Methods in Computer Security Strategic Information Security Surviving Security, How to Integrate People, Process, and Technology Testing Code Security The ABCs of LDAP, How to Install, Run, and Administer LDAP Services The CISO Handbook, A PRACTICAL GUIDE TO SECURING YOUR COMPANY The Complete Book of Data Anonymization, From Planning to Implementation The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules The Ethical Hack, A Framework for Business Value Penetration Testing The Hacker's Handbook, The Strategy Behind Breaking into and Defending Networks The Laws of Software Process, A New Model for the Production and Management of Software The Practical Guide to HIPAA Privacy and Security Compliance The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition The Privacy Papers, Managing Technology, Consumer, Employee and Legislative Actions The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments, Second Edition The State of the Art in Intrusion Prevention and Detection The Total CISSP Exam Prep Book, Practice Questions, Answers, and Test Taking Tips and Techniques Trade Secret Theft, Industrial Espionage, and the China Threat Unauthorized Access, The Crisis in Online Privacy and Security Understanding Surveillance Technologies, Spy Devices, Privacy, History & Applications, Second Edition Understanding Surveillance Technologies, Spy Devices, Their Origins & Applications UNIX Administration, A Comprehensive Sourcebook for Effective Systems & Network Management Using the Common Criteria for IT Security Evaluation Vein Pattern Recognition, A Privacy-Enhancing Biometric Verification of Computer Codes in Computational Science and Engineering Visual Cryptography and Secret Image Sharing Vulnerability Management Watermarking Systems Engineering, Enabling Digital Assets Security and Other Applications Web Security, A WhiteHat Perspective What Every Engineer Should Know About Cyber Security and Digital Forensics Windows Networking Tools, The Complete Guide to Management, Troubleshooting, and Security Wireless Crime and Forensic Investigation Wireless Multimedia Communication Systems, Design, Analysis, and Implementation Wireless Security
-
As recomanda sa-i dai un mesaj la @AGSQ , cred ca iti poate oferi ceva de calitate.
- 5 replies
-
- hosting romania
- hosting seo
-
(and 1 more)
Tagged with:
-
La caz ca nu s-a observat, post-ul face referire la un articol extern (de la o sursa destul de credibila as putea adauga) si da, uneori jurnalistii folosesc un "wordplay" pentru a atrage cititorii. Este intradevar "First bionic eye implant in the world" dar pentru o boala anume, dry age-related macular degeneration, care este "most common cause of sight loss in the developed world". Daca pe unii nu va duce bibilica sa comentati tehnologia, posibile viitoare aplicatii, etc., si sunteti hateri, va rezumati la atat cat puteti: trolling.
-
Cu tot respectul, o decizie extrem de proasta.
-
Nu merge la "Stiri Securitate" insa mi s-a parut ceva interesant de citit ce merita share-uit. SURSA - BBC Surgeons in Manchester have performed the first bionic eye implant in a patient with the most common cause of sight loss in the developed world. Ray Flynn, 80, has dry age-related macular degeneration which has led to the total loss of his central vision. He is using a retinal implant which converts video images from a miniature video camera worn on his glasses. He can now make out the direction of white lines on a computer screen using the retinal implant. Mr Flynn said he was "delighted" with the implant and hoped in time it would improve his vision sufficiently to help him with day-to-day tasks like gardening and shopping. The Argus II implant, manufactured by the US firm Second Sight, has previously been used to restore some vision to patients who are blind as a result of a rare condition known as retinitis pigmentosa. The operation, at Manchester Royal Eye Hospital, is the first time it has been implanted in a patient with age-related macular degeneration (AMD) which affects at least half a million people in the UK to some extent. - Pentru articolul full click pe hyperlink-ul sursa de mai sus -
-
Multumesc pentru zambetul adus de dimineata! Sunt curios din ce sat e individul, cel mai probabil Republica Moldova (dupa alfabetul chirilic folosit in unele parti de pe acolo) caci doar pe la sate am auzit ca a) inca mai sunt icafé-uri si sunt denumite "sali de jocuri" si imi spunea cineva ca sunt si pacanele si alte cele. Ce nick sexy, de pescar, are Fantom - o sa il fur! @SynTAX - e din cauza unui pentester ce a ramas fara VIP si sperie copiii
-
Like It Or Not... You Can't Disable Windows 10 Automatic Updates
QuoVadis replied to fan_em's topic in Stiri securitate
Nu am avut timp sa ma uit peste meniul si setarile lor insa sunt sigur ca vor avea optiune de "update via WiFi only" la fel cum e pe Android si iOS. Altfel, cu update-uri automate pe mobile data, se vor trezi cu sute de procese zilnic. Daca ai router prin cartela nu stiu cat de inteligent e sistemul incat sa isi dea seama, banuiesc ca deloc, deci userul trebuie sa isi ia precautiile necesare. Oricum.. sunt convins ca se vor gasi modalitati de stopare daca nu chiar customizare a update-urilor. Necesita putin timp doar. Eu mi-am adaugat si un safety net pe HTC sa ma stopeze automat cand mai am doar 10mb ramasi pe luna respectiva. Ma gandesc ca vor fi app similare pe Win. -
Cat de frustrat poti sa fii.. Take a chill pill! Fiecare reply care il dai e plin de ura.. Am folosit pluralul pentru ca dumnealui s-a adresat unui colectiv de oameni, iar eu am exprimat un punct de vedere care stiu ca si altii il impartasesc. Faci caz si offtopic din toata nimica. Bafta hatere!
-
Salut. Multumim pentru munca si sudoarea depusa pentru copy-paste insa aceasta postare merita cosul de gunoi. 6 sfaturi pentru viitor, daca vrei sa creezi tutoriale pentru noi: - Ofera sursa folosita: cel putin jumatate din ce ai copiat se mai regaseste si aici http://cepsa.licee.edu.ro/lectii/tehnologii/2-1-4.htm (imi e lene sa mai caut cealalta jumatate). - Scrie corect gramatical ( "Se pot" caci e plural.).- Incearca sa pui ceva folositor si de actualitate. Ma indoiesc ca cineva ar gasi folositor, in 2015, treaba copiata de tine. - Observa standardul comunitatii si mai apoi, daca doresti, contribuie cu ceva. Nu ne lua de prosti, fie-ti mila. - Incearca sa folosesti si ceva media, e plictisitor de citit doar text iar multi care au crescut cu ochii in ecran nu vor avea rabdare. Plus ca sunt si altii cu Dyslexia sau cei care invata intr-un mod vizual. - Lungimea tutorialului sa fie adecvata, nici prea scurt - sa isi piarda cineva vremea dar nici prea lung, ci succint si la obiect, oferind o multitudine de informatii intr-un mod comprimat dar coerent.
-
Ahh.. da.. am uitat Pai vazusem ca ii ai trecuti pe linkedin. In locul tau as scoate treaba repede
-
Nu am vrut sa se ajunga aici.. dar sunt fortat. Am primit doua warn-uri de la domnul Ganav, pentru aceste doua postari: 1. aici 2. aici La numarul 1, pentru offtopic. Nu stiu cat de offtopic am fost prin faptul ca am aratat caracterul individului in discutie si eram ironic. Discutabil, insa sa zicem, e ok. Sunt multi altii care nu patesc nimic pentru altele mult mai grave. Dar e ok, nr.1 e meritat, am inteles: ironia e ilegala pe RST. Problema e cu numarul 2 unde cred ca domnul Ganav face exces de zel. Conversatia in ordine cronologica: - Am primit warn: - Ii cer o explicatie domnului Ganav: - Iar dansul, amabil, imi raspunde: Concluzie: Tot nu cred ca am insultat cu nimic, era pur si simplu o mustrare. Mustrarile sunt interzise? E treaba lui TheTime cum raspunde, nu suntem socialisti-comunisti sa fim toti identici. Fiecare avem felul nostru de a gandi, raspunde si reactiona. Incep sa cred ca ai ceva cu mine. Dupa cum spuneam si pe privat, e normal ca fiecare sa avem simpatii si antipatii insa de obicei acestea se pastreaza pentru noi insine. As dori o parere, daca se poate, de la cei avizati. Daca Ganav are dreptate, atunci rog pedeapsa aferenta, caci am adunat vreo 5 warnuri (1 de la Nytro, 4 de la Ganav). Daca eu am dreptate, atunci ce gasiti voi de cuviinta. Multumesc si scuze pentru postarea lunga...
-
10 sugestii succinte: 1. Citeste aici, e pentru un topic relativ diferit dar cu anumite elemente similare si cateva idei se aplica si aici. 2. Piata este supra-saturata, web dev si web dev wannabe's sunt la tot coltul. Gandeste-te care este USP-ul tau? (Unique Selling Point) Cu ce esti diferit fata de altii? Cine iti formeaza competitia? Cu ce poti iesi in evidenta fata de altii? 3. Seteaza-ti niste tinte "destepte" - SMART (Specific, Measurable, Achievable, Realistic and Timely - specifice, masurabile, realizabile, realistice si definite de timp) 4. Vanzarile. Trebuie sa stii sa te vinzi. Web dev este o comoditate, nu un lucru necesar. Invata de la altii care vand comoditati. Marketing-ul face parte involuntar si indirect din ceea ce ofera companiile de web dev. Spre exemplu daca un client vine la tine pentru un site nou pentru ca vor sa atraga mai multi vizitatori, sa mareasca vanzarile, etc., aceasta face parte din strategia lor de marketing iar tu ca si companie va trebui sa cunosti principii standard de marketing si sa le oferi solutii. Cum sa ii ajuti pe altii sa se promoveze cand tu nu stii sa te promovezi pe tine insuti? Trebuie sa iti stabilesti un workflow al vanzarilor profesionist si sa inveti rapid din greseli si feedback. 5. Market research: fa-ti temele de casa si research si axeaza-te pe un segment anume la inceput. Daca alergi dupa mai multi iepuri nu prinzi niciunul. In timp te poti dezvolta si atinge si alte segmente. 6. Gandeste-te la toate sursele posibile prin care potentiali clienti pot ajugne la tine (seo, prima pagina in google si adwords/facebook nu e deajuns) si calculeaza-ti costul de achizitie al unui client, rata de conversie, durata de colaborare, resursele disponibile, etc. Adica un mic studiu personal de fezabilitate. 7. Creeaza-ti un brand. Ceva care este memorabil si profesionist. Acesta va deveni si partea a portfoliului tau si va oferi credibilitate potentialilor clienti. Pe langa portofoliul de lucru care este un lucru obligatoriu, pagina ta proprie trebuie sa fie impecabila. Intai iti aranjezi propria-ti curte inainte de a o aranja pe a altora. 8. Relatiile profesionale cu primii clienti sunt cruciale pentru succes. Acestia pot deveni repeat customers, te pot recomanda altora, tu ii poti folosi ca si case studies pentru a aduce alti clienti, etc. Nu fii nesatul si nesimtit si rezolva-le proiectele pe cat mai ieftin posibil, chiar daca iesi in pierdere. E o investitie pentru viitor. De obicei afacerile standard intra pe profit doar in anul 3 sau 4. 9. Trebuie, la inceput, sa mergi tu "in lumea larga", sa le spui oamenilor despre tine, sa-i aduci la poarta si sa-i convingi sa intre, sa iti devina clienti. Nu te astepta sa pui un website pe picioare si apoi sa fii inundat cu comenzi. 10. Last but not least, cainii nu umbla cu covrigi in coada. La inceput va fi greu si va trebui sa tragi din greu. Perseverenta e esentiala. Insa perseverenta pe directia buna, exista o delimitare clara intre incapatanare si perseverenta. Asculta de feedback-ul celor care sunt in masura sa il dea, fii flexibil si adapteaza cat mai rapid. Este un sector extrem de competitiv si nu vei rezista altfel. Bafta! P.S. - vad ca prezenta ta pana acum web lasa de dorit si esti asociat si cu Hollo - care, cel putin aici pe RST nu are o reclama foarte pozitiva - as rezolva si aceste lucruri de imagine
-
Cumpara-ti ceva de genul HideMyAss - au o lista cu cateve sute de proxy-uri premium (vreo 300 minim cred). Si eu am cont premium la ei si e foarte ok. Poti schimba foarte usor de pe unul pe altul si cand esti pe un site anume, iti notezi ip-ul pe care esti. Apoi, cand vrei sa revii pe acel site, dai inapoi pe proxy-ul folosit din lista.
-
@TheTime - eu as zice sa ii dati totusi VIP, wild sa isi ceara scuze in mod public si Dinu Patriciu sa se rasuceasca in mormant caci el e de vina pentru pixelul albastru cand scrie alinpetre pe forum. Daca mai e loc si pentru marmota sa inveleasca ceva in staniol... treaca de la mine! P.S. -
-
Daca nu ai fi atat de preocupat de ranguri si alte vrajeli, ai avea vreme sa dai o geana si pe la regulament, in special punctul 7: ---- Crezi ca aici e forum de metinari? Insulting...
-
ce copil prost si far' de viitor... imi e mila
-
[TUT] Cum poti folosi versiunea "trial" dupa ce expira.
QuoVadis replied to Aerosol's topic in Cosul de gunoi
Probabil trebuie specificat faptul ca functioneaza doar in anumite imprejurari. Majoritatea (in special cei cu softuri scumpe) au inceput sa si le mute in cloud si cand le pornesti dau un ping la server sa vada daca ai licenta valida. Poti aplica spre exemplu aceeasi metoda la produsele Adobe? Ma indoiesc. -
@mutu1109 - done
-
Done.
-
Cineva posteaza in numele acestui forum-cersand
QuoVadis replied to giustone's topic in Cosul de gunoi
Dar ce sunt eu, Politia Romana Bitcoin? Stiu la ce te referi: nu, nu am trimis pe acea adresa nimic. My best bet: Reckon -
Wild... singura solutie e sa iti ceri scuze in mod public...
-
Vezi postarea de aici https://rstforums.com/forum/101014-pareri-de-la-oameni-intelepti-2.rst#post629918 in special punctul 5. Problema e ca exista un sambure de adevar in ce zice Byte-ul iar adevarul doare, mai ales cand nu stii sa pui intrebari inteligente si astepti totul pe tava.
-
Scrie la raspunsuri ca e greseala de la Amazon, e i5. Pacat, daca era i7 se merita. Si asa tot e pret decent...
-
Sunt mult prea scumpe. Daca ai pe cineva in UK spune-i sa iti ia si trimita asa ceva la £125 - Quality Refurbished IBM Lenovo T410 Laptop ? Intel Core i5 ?4GB ? 320GB ? WIFI ? Warranty ? Windows 7 Pro: Amazon.co.uk: Computers & Accessories 14 inch, Core i7 2.66Ghz, 4GB DDR3 RAM, 500GB HDD, nVidia Quadro 3100m, Windows 7 Professional (licentiat) E refurbished deci folosit dar in calitate foarte buna si cu garantie de 3 luni