Jump to content

go_sword

Active Members
  • Posts

    429
  • Joined

  • Last visited

Everything posted by go_sword

  1. devin penibili tamplarii
  2. incerc maine,din cate am citit,pare ok
  3. IM Report Card - Internet Marketing Ratings, Reviews and Discussion daca te tii de treaba poti face 20-30 $ pe zi.nu e teapa.platesc prin paypal
  4. tu le-ai facut publice ? vipule ma inchin in fata ta ^'>
  5. officialy dead
  6. rezolva-ti modemul,ala e problema.e usor..
  7. mujahedin,problema pe care o aveai si tu,o puteai rezolva folosind google... cel mai probabil aveai speedtouch 516v6,el e sensibil la fluctuatiile de curent,si electrica ne serveste foarte foarte des asemenea cadouri,astfel picandu-ti netu.problema asta o rezolvai din cmd,te logai in modem,si dezactivai protectia la fluctuatii...eureka desigur,puteai sa folosesti si DMT,cu ajutorul careia sacrificai un pic din viteza,pentru cresterea snr-ului,creand astfel o conexiune stabila eu acum am modem huawei si nu imi pica netul deloc,fara sa trebuiasca sa umblu la el.singura chestie nasoala e ca nu pot sa folosesc un dyndns
  8. nu cred ca vrea sa o faca legal
  9. modul de conectare a modemului conteaza,dar nu marca.CrYsTy4N,cum ti-ai conectat modemul ? usb cumva ? si intr-adevar,se pare ca au bagat clase noi.dar asta nu inseamna ca au rezolvat problema
  10. nu are auto-update iar ei nu iti pot accesa routeru cum li se scoala lor
  11. i-am dat reply la ala care zicea ca nu merge
  12. deci tu ne zici ca toti utilizatorii de clicknet din tara si-au modificat user+pass ? sau si-au schimat firmware-ul ?
  13. omg...stay away from me
  14. da se poate,tre sa gasesti algorimul de generare a codurilor
  15. bravo bravo +1
  16. 0:30-0:40 the best
  17. in 21 a fost facut public
  18. Sophisticated SQL injection technique used The website of the Center for Aerosol Research at NASA's Goddard Space Flight Center has been taken offline after a grey hat hacker demoed an attack on its database. The SQL injection exploitation had to be performed manually and was unusually hard to pull off, according to the attacker. "I want to say that it was very hard to make this injection… The webserver had good protection but wasn’t fully secured," TinKode, a Romanian self-confessed grey hat hacker, writes on his blog. "This kind only works manually , you can’t do it with apps," he stresses. The aerocenter.gsfc.nasa.gov is actually the third website associated with NASA's Goddard Space Flight Center (GSFC) that TinKode has hacked in recent months, suggesting a more serious Web development issue on this domain. At the beginning of December we reported that websites belonging to GSFC's Instrument Systems and Technology Division, istd.gsfc.nasa.gov, as well as the Software Engineering Division, sed.gsfc.nasa.gov were compromised in a similar fashion. According to an official description available on the compromised website, before it was taken down, the "AeroCenter is an interdisciplinary union of researchers at NASA Goddard and other organizations in the Washington DC metropolitan area (including NOAA, University of Maryland, and other insititutions) who are interested in many facets of atmospheric aerosols." From the partially obfuscated screenshots published by the security enthusiast, it appears the database contains private information about site members, such as full name, e-mail, phone, affiliation or focus group. TinKode has also revealed details about seven administrative accounts, including those of Lorraine A. Remer, NASA official responsible for the AeroCenter program, Richard Kleidman, curator and Paul D. Przyborski, the Webmaster. As the grey hat hacker indicates, only password "hashes" are stored in the database, which is much better than storing them in plain text. Unfortunately, these hashes can be easily cracked, because they were generated with MD5, an insecure algorithm. sursa : http://news.softpedia.com/news/NASA-Research-Center-Website-Compromised-133074.shtml
  19. go_sword

    Hacking :-)

    uau..ai lipit un fir izolatie de tot cacatu..foloseste banda de izolat nu scoci de hartie
  20. din pacate unii nu au auzit de fud crypter
  21. carding hombre...skimmingu e destul de riscant.. eu l-as vinde..depinde de ce tara e
  22. inca apar posturi dublate si mai apare cate un post mai vechi inaintea primului din topic.. weird
  23. oricine poate face un generator de genu
  24. eu sunt la intensiv info si am 10 ore pe sapt ( cls 12-a)...anu trecut aveam 11 (c++,html,php,mysql si java) mate am 6
×
×
  • Create New...