-
Posts
1376 -
Joined
-
Last visited
-
Days Won
17
Everything posted by ZeroCold
-
L-am facut si eu
-
Cautam pe google dupa bypass sqli si am gasit asta. Download: http://www.4shared.com/get/_Q4pNDir/SQL_Injection_Bypass_All_Permi.html
-
- 1
-
Data viitoare mananc-o! Nu ai invatat la scoala ca bateriile contin substante toxice? (ex cadmiu). D'aia te-a luat cu ameteli. O mai savurai putin, eventual ii dadeai si o limba (din curiozitate asa...) si ajungeai pe la spital.
-
XRumer is a software application that automatically posts your messages to forums, guestbooks, bulletin boards and catalogs of the links (as well as into livejournals and wiki). In a word it is an autosubmitter. Currently available version is XRumer 5.0.12 Palladium. Below are listed main specification and features of XRumer * Multithreaded submitting: over 50 simultaneously running threads possible! (30 threads are recommended for optimal performance under 128 Kbps bandwidth) * Software can perform registration at forums (if necessary for posting messages) and automatically fill in the required fields. Upon successful registration XRumer posts the user-specified message and/or links. * The powerful built-in proxy-server checking script locates available proxy-servers worldwide, choosing anonymous addresses among them. * Software is able to work with lots of different types of forums and guestbooks: phpBB and PHP-Nuke with any modifications, yaBB, VBulletin, Invision Power Board, IconBoard, UltimateBB, exBB, phorum.org, wiki, different types of bulletin boards and even custom-written code. * Attention: unique feature ? software works around EVERY possible type of protection from automatic registration, including: * Pictocode protection (tickets, captcha), which look something like: "Enter the number you see in the box". E-mail activation protection. Java-script protection. * During the process of posting a detailed log is created with precise path-links to posted messages so that you can check every link and every posted message afterwards. * A built-in proprietary "Question-answer" system. * A variations system, using which you can post up to 10000 messages all looking different but with similar contextual meaning and the user-defined hyperlinks in them. It helps to broaden the key queries (for Search Engine optimization) and protect your posts from being filtered out by Search Engines (that is, your posts will be included in SERPs). * If the forum has more than one category, the software chooses the one most suitable for the message, otherwise it sends the message to off-top, flame sections or the like, and in case those do not exist - to the most visited category on the forum. * BB-code can be used. The system is fully user-independent and requires minimum skills to handle: you only need to choose the proper links database, create a message text with one or several hyperlinks and hit the 'Start' button. THAT IS ALL. Download: http://www.multiupload.com/E385ESDRFZ Sursa aici. Deschideti in virtual, nu l-am testat si nu stiu daca are backdoor sau nu.
-
Bill Jensen, Josh Klein, "Hacking Work: Breaking Stupid Rules for Smart Results" [Audiobook, Unabridged] Y-urCohInABox | 2010 | ISBN: 1596595337 | MP3@96 kbps | 6 hrs 23 mins | 263.75 mb One of the ten breakthrough ideas for 2010 - Harvard Business Review Hacking Work blows the cover off the biggest open secret in the working world. Today's top performers are taking matters into their own hands by bypassing sacred structures, using forbidden tools, and ignoring silly rules to increase their productivity and job satisfaction. This audio book reveals a multitude of powerful technological and social hacks, and shows listeners how bringing these methods out into the open can help them maximize their efficiency and satisfaction with work. Hacking work is the act of getting what you need to do your best by exploiting loopholes and creating workarounds. It is taking the usual ways of doing things and bypassing them to produce improved results. Hacking work is getting the system to work for you, not just the other way aroundmaking it easier to do great work. Download: http://www.filesonic.com/folder/3156561
-
Online pdf: http://www.redbooks.ibm.com/redbooks/pdfs/gg243376.pdf
-
Hide your Virus in a Picture File [New Method]
ZeroCold replied to ZeroCold's topic in Tutoriale in engleza
Ah, am uitat/nu am fost atent. -
Verifica daca routerul suporta UPnP si daca il are activat.
-
UP. A aparut versiunea 2.8 (04/06/2011), posibil sa fie FUD. @trasca, aici sectiune "Programe Hack", nu "Sa ma laud". Nu faceti offtopic.
-
If you are developing a password-protected web site, you have to make a decision about how to store user password information securely. What is "secure," anyway? Realize that the data in your database is not safe. What if the password to the database is compromised? Then your entire user password database will be compromised as well. Even if you are quite certain of the security of your database, your users' passwords are still accessible to all administrators who work at the Web hosting company where your database is hosted. Scrambling the passwords using some home-brewed algorithm may add some obscurity but not true "security." Another approach would be to encrypt all passwords in your database using some industry-standard cipher, such as the Message-Digest Algorithm 5 (MD5). MD5 encryption is a one-way hashing algorithm. Two important properties of the MD5 algorithm are that it is impossible to revert back an encrypted output to the initial, plain-text input, and that any given input always maps to the same encrypted value. This ensures that the passwords stored on the server cannot be deciphered by anyone. This way, even if an attacker gains reading permission to the user table, it will do him no good. MD5 does have its weaknesses. MD5 encryption is not infallible: if the password is not strong enough, a brute force attack can still reveal it. So, you can ask: "Why should I use MD5 if I know it is not the most secure?" The answer is fairly straightforward: it's fast, it's easy, and it can be powerful if salted. The greatest advantage of MD5 is its speed and ease of use. It is vitally important to understand that password encryption will not protect your website, it can protect your passwords only. If your website does not have sufficient protection, password encryption will not make it safe from cracking. If your system has been cracked, a hacker can inflict a irreparable damage to it and also gain an access to confidential information, including passwords database. But if you store this information encrypted, hackers practically cannot make use of it. Cracking an encrypted password takes a large amount of time and processing power, even on today's computers. So, let's start. First of all, you need to add a new account to your database. The following code allows to do it. <?php define("DB_SERVER", "localhost"); define("DB_USER", "your_name"); define("DB_PASS", "your_pass"); define("DB_NAME", "your_db"); define("TBL_USERS", "users_table_name"); $connection = mysql_connect(DB_SERVER, DB_USER, DB_PASS) or die(mysql_error()); mysql_select_db(DB_NAME, $connection) or die(mysql_error()); ... function addNewUser($username, $password){ global $connection; $password = md5($password); $q = "INSERT INTO ".TBL_USERS." VALUES ('$username', '$password')"; return mysql_query($q, $connection); } ?> Now, when a new user completes the registration form, his password will be encrypted automatically. After that we should write code that validates a given username/password pair. <?php function checkUserPass($username, $password){ global $connection; $username = str_replace("'","''",$username) $password = md5($password); // Verify that user is in database $q = "SELECT password FROM ".TBL_USERS." WHERE username = '$username'"; $result = mysql_query($q, $connection); if(!$result || (mysql_numrows($result) < 1)){ return 1; //Indicates username failure } // Retrieve password from result $dbarray = mysql_fetch_array($result); // Validate that password is correct if($password == $dbarray['password']){ return 0; //Success! Username and password confirmed } else{ return 1; //Indicates password failure } } ?> And what if you already have users' database ready and want to start using encrypted passwords? To do it, you need to write encypt.php cript with the following code and run it in your browser. <?php define("DB_SERVER", "localhost"); define("DB_USER", "your_name"); define("DB_PASS", "your_pass"); define("DB_NAME", "your_db"); define("TBL_USERS", "users_table_name"); define("FLD_USER", "username_field_name"); define("FLD_PASS", "password_field_name"); set_magic_quotes_runtime(0); $connection = mysql_connect(DB_SERVER, DB_USER, DB_PASS) or die(mysql_error()); mysql_select_db(DB_NAME, $connection) or die(mysql_error()); $q = "SELECT ".FLD_PASS.",".FLD_USER." FROM ".TBL_USERS.""; $result = mysql_query($q, $connection); $total=0; $enc=0; $doencrypt=false; if (@$_REQUEST["do"]=="encrypt") $doencrypt=true; while($data = mysql_fetch_array($result)) { if ($doencrypt) { $total++; if (!encrypted($data[0])) { $q="UPDATE ".TBL_USERS." SET ".FLD_PASS."='".md5($data[0])."' where ".FLD_USER."='". str_replace("'","''",$data[1])."'"; mysql_query($q, $connection); } $enc++; } else { $total++; if (encrypted($data[0])) $enc++; } } function encrypted($str) { if (strlen($str)!=32) return false; for($i=0;$i<32;$i++) if ((ord($str[$i])<ord('0') || ord($str[$i])>ord('9')) && (ord($str[$i])<ord('a') || ord($str[$i])>ord('f'))) return false; return true; } ?> <html> <head><title>Encrypt passwords</title></head> <body> Total passwords in the table - <?php echo $total; ?><br> <?php if($enc==$total && $total>0) { ?> All passwords are encrypted. <?php } else if($total>0) { ?> Unencrypted - <?php echo $total-$enc; ?><br><br> Click "GO" to encrypt <?php echo $total-$enc; ?> passwords.<br> WARNING! There will be no way to decipher the passwords.<br> <input type=button value="GO" onclick="window.location='encrypt.php?do=encrypt';"> <?php } ?> </body> </html> #sursa: aici.
-
* The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans * This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts * Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks * Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog 284 pages- dec. 2005 . pdf . isbn 076459611X. 20,2 Mo Download: http://depositfiles.com/files/0pqck8frx or http://www.megaupload.com/?d=62VNBTT8
-
1) Create your virus. We shall call it 'server1.exe' for now. 2) Get any picture file you want to distribute. 3) Bind the 'server1.exe' and your picture file with any binder, we'll call the binded file 'virus1.exe'. 3.5) I reccomend Easy Binder 2.0, which comes with a bytes adder and a icon extractor, aswell as some really good packing options. If you don't wish to use it, that's fine, find your own. 4) Be sure you have 'Hide common extensions' unchecked in your Folder Options. 5) Change the 'virus1.exe' to '%Picturename%.jpeg - %Email/Web Address%.com'. For example, we'll call it 'HPIC_119.jpeg - test@test.com'. .com works the same as .exe, except fewer people actually know that's what it really is. 6) If you plan on distributing your virus via MSN, please skip to 7. If you plan on distributing your virus via file upload sites, please skip to 8. 6.5) I reccomend Icon Extractor V3.8 FULL with Serial, that can be downloaded from this thread: Multiupload.com - upload your files to multiple file hosting sites! Serial number for Icon Extracter V3.8 New serial: Name: Johny Khan CODE: HP4ANyamVnhPkJUTTsOx2CdPhAyLTMSZiXxkNERW KAwkZC+a6+sTipI7MMPyhJam0jdUttMT4Ebo9USN o9IcmHB9FGrgYIeDPhW7WujYCM1s/bpe7hzoE5tj RKphe5N1gew6I1BDJ37EMijaO+x0ROUw/YUbXOjv V1ZeSKDFqlo= 7) You will now need to change the icon from that ugly box. Find the picture you added to the file, and make it an icon. How? Find one of the various online Picture to Icon converters. Once your picture is a .ico, use your Icon Changer program to change the icon of the file to the .ico you just made from the picture. When you send it to people on MSN, it will show a small box of the picture inside. 8) You will not need to change the icon from that ugly box. Using your Icon Changer program, find the .jpeg icon, and change the ugly box to the .jpeg icon. 9) Conclusion. Your file will now look like a legit picture to 9/10 people. Some people do know that .com is an extension, but the average computer user will not see any difference, and will download it without hesitation. 10) Credits: here.
-
Hack Proofing Your Identity Hack Proofing Your Identity Publisher: Syngress Publishing | ISBN: 1931836515 | edition 2002 | PDF | 393 pages | 10,3 mb Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Download http://hotfile.com/dl/119633785/c14737d/255.zip.html
- 1 reply
-
- 2
-
Sectiune linux si ebooks. Nu stiu cati vor posta in linux, dar am vazut ca au cerut-o multi. Sectiunea ebooks consider ca este utia, nu va mai trebui sa cautam carti printre tutoriale. Linux poate fi sub "Sisteme de operare & hardware".
-
Book Description A collection of over 250 PHP functions with clear explanations in language anyone can understand, followed with as many examples as it takes to understand what the function does and how it works. This book includes numerous additional tips, the basics of PHP, MySQL query examples, regular expressions syntax, and two indexes to help you find information faster: a common language index and a function index. When the internet is not around or you want a simpler explanation along with all the technical details, this book has all of that and more. Title PHP Reference: Beginner to Intermediate PHP5 Author(s) Mario Lurig Publisher: Lulu.com; 1st edition (April 11, 2008) Paperback 164 pages Language: English ISBN-10: 143571590X ISBN-13: 978-1435715905 Download: http://www28.zippyshare.com/v/92811994/file.html
-
E public de 2 saptamani, e detectat de avs, dar nu de toti. Nu il scanati pe cacaturi gen virustotal sau novirusthanks doar de dragul de a afla de cati avs e detectat. Daca nu aveti incredere deschideti-l in virtual box.
-
Remote Administration Tool - Wikipedia, the free encyclopedia This is a tool that allow you to control your computer from anywhere in world. With full support to Unicode language, you will never have problem using this software. Here you can find new updates, informations and tutorials about this software. Version 2.7 (18/05/2011) - Added USB Spreader. - Added Mouselogger. - Added upload files and execute directly. - Webcam function changed. - Some language corrections. - Select webcam and desktop capture functions to start automatically. - New method to identify your servers. - Corrected some bugs using preview images in File Manager. - Upload files to FTP server using File Manager. - Corrected some bugs using grab passwords function. Site oficial: http://sites.google.com/site/nxtremerat/ Download direct http://sites.google.com/site/nxtremerat/XtremeRATv2.7.1.zip?attredirects=0 Password 123 UPDATE: Version 2.8 (04/06/2011) Here some changes since last version: Please, update your servers. - Close window options after select your language and others settings. - Sometimes using Filemanager, when you try to upload some files, the folder name appear with '\\'. Now was corrected. - Corrected a bug, using file manager, when the user select a file with "0 bytes". - Some options on MSN functions was deleted until update to use new windows live messenger. - Added a better handle errors when servers are disconnected. - Changed injection method. - Corrected a bug when try to close options window (UPnP). - Changed GUI. - Corrected high CPU usage that occurs sometimes. - Corrected some bugs using remote shell function. - Added a new column on main list: Account Type. Download direct: http://sites.google.com/site/nxtremerat/XtremeRATv2.8.1.zip?attredirects=0 Pagina oficiala o aveti mai sus. Password: 123
-
20 Things I Learned About Browsers and the Web Link: 20 Things I Learned About Browsers and the Web Interesant.
-
Ma bucur ca se face ordine, cat de cat. Poate peste ceva timp voi fi si eu pe lista aia . Chiar... begood.
-
over and over again! fucking nerds... read this shit.
-
Stiu sa caut, chiar foarte bine pe google, nu am cautat deoarece stiam arata naspa si am zis ca-i mai simplu cu php deoarece stiam deja functia md5(). Mersi pt link nedo. (eram sigur ca arata ceva de genu ) Anyway, am incercat cu PHP_SELF, nu mi-a iesit, trecea direct pe else si imi afisa "Nu exista.." iarasi nervi am zis ca il las pe mai tarziu si m-am limitat la 2 fisiere cu un switch (index.php si lista.txt) index.php <?php if(!isset($_GET['pag'])) $_GET['pag'] = ''; switch($_GET['pag']) { case '': echo '<html> <head> <title>Simple Md5 Bruteforcer by Dictionary</title> </head> <body> <form action="index.php?pag=bf" method="POST"> Introduceti cuvantul pe care doritis a il cautati: <input type="text" name="hash"> <input type="submit" value="Crack"> </form> </body> </head>'; break; case 'bf': { $hash=$_POST['hash']; $file = 'lista.txt'; $data = file($file) or die('Fisierul nu poate fi citit'); foreach($data as $line) { if(md5(trim($line)) == $hash) { echo "<font color=\"green\">DONE:</font> <b>".$line."</b> <br>"; } else { echo "<font color=\"red\">FAIL:</font> <del>" . $line . "</del><br>"; } } } break; } ?> posibil sa mai am greseli, chestii in +, in -... sunt la inceput asta e stilul meu deocamdata, accept orice critica, sugestie, sfat... etc