-
Posts
1259 -
Joined
-
Last visited
-
Days Won
86
Everything posted by gigiRoman
-
Acum totul e corect politic @MrGrj Python joins movement to dump 'offensive' master, slave terms Python creator Guido van Rossum retired as "benevolent dictator for life" in July, but like Michael Corleone in The Godfather III, he's been pulled back in to resolve a debate about politically incorrect language. Like other open source communities, Python's minders have been asked whether they really want to continue using … Sursa: https://forums.theregister.co.uk/forum/6/2018/09/11/python_purges_master_and_slave_in_political_pogrom/#c_3610915 A quiet debate has developed for years in the coding community, forcing programmers to ask whether the terms "master" and "slave" are not insensitive. Now Python, one of the world's most popular programming languages, has abandoned the terminology – and not everyone is happy with it. Master / Slave is generally used in hardware, architecture and coding to refer to a device, database or process that controls another. For more than a decade, there has been some concern that the terms are offensive because of their relationship to the institution of slavery. Last week, a developer named Victo Stinner published four pull requests asking the Python community to consider changing the terms Master / Slave with something like Parent / Worker. "For reasons of diversity, it would be nice to try to avoid the" master "and" slave "terminology that can be associated with slavery," he wrote to explain his thinking. This is the internet, so people have opinions. Some people did not agree with the proposal in measured terms and simply did not think it was necessary. Others have launched on anti-diversity screeds and are predictably talking about censorship and mental control. "Seeing all the PC / SJW absurdities around me, I'm afraid this may be the beginning of Python becoming PCython," wrote a developer. Another commentator decided to take things literally, saying: "As far as I can [ sic ] I say that there is not a single instance where documents use" master "as a reference to human slavery or where use could be seen implicating an endorsement of that notion. " Someone else claimed that the terms are indeed positive in the BDSM community. "You want to support diversity, so why are you discriminating against that subculture?" They asked. And, of course, Reddit turned into a cesspool while the users watched it all go down. It was all enough to involve Guido van Rossum, the creator of Python. Van Rossum officially retired in July, leaving the community to defend itself when it comes to governance, but the quarrels have pulled it back to lay the law. "I'm closing this now," he wrote. His final decision was to accept three of Stinner's four requests. In his view, "the fourth should not be united because it reflects the underlying terminology of UNIX ptys". So you decide that Python 3.8 will change the term "slave" to "worker" or "helper" and "master process" to "parent process". Python was named the most popular programming language in the IEEE Spectrum world in the past year, so this change is great for the programming community. Following is the guide by Drupal and Django. If you think this is just another symptom of a desire out of control of being politically correct or not, it's just a fact that languages change over time. Programmers should know it better than anyone else. Sursa: https://aus.remonews.com/python-programming-language-ditches-master-slave-terms-pissing-off-some/ Fi-r-ar! Cum traducea Irina Margareta Nistor tot: "la naiba!"
-
The culture around Linux will now slowly be replaced by the lame suits of HR, the harpy girl-powered programmers overhearing dork jokes at conferences, gender neutral language, prim and proper mailing list language and the whole works. As an old developer I've been in too many places when this culture takes over. It called "corporate world". Everything slows down 10x. Software expenses increases 10x, bugs abound, computers crawl. Meetings takes most of the day. Ah, you talk about your family and your little dog in the meetings, of course. Feelings are important. It's the natural evolution. When men colonize an environment, just then, women arrive, and womanize the environment. Their social structure is very different than men's. But make no mistake, those people are savages, and will ostracize and force you to resign much more violently that the apparently 'violent' aggressive male culture. Then, the bravest men abandon the place and explore other lands. It's time to explore other lands. ≠============== ..and whats funny, even Soviets weren't retarded enough o abolish meritocracy in science and tech fields, it was only in economy - private enterprise was outlawed and you all know the results - USSR somehow kept up with the capitalist west in technology in many fields, yet failed miserably in economy and wealth/life quality abolishing meritocracy in tech would be a complete disaster but here we are ================== Sursa: https://boards.4chan.org/pol/thread/186016573
-
Linus Torvalds takes a break from Linux to learn empathy ????? https://www.google.ro/search?q=linus+torvalds&client=ms-android-google&prmd=inv&source=lnt&tbs=qdr:w&sa=X&ved=0ahUKEwjMsuSh2sjdAhVwqIsKHeqVA_wQpwUIHA&biw=412&bih=604&dpr=2.63
-
Iti trebuie niste proxy prin care sa treci requesturile.
-
Recuperare date de pe Lumia 520 cu sticla sparta si unlock password?
gigiRoman replied to Che's topic in Discutii non-IT
Am avut si eu un din asta acum 4 ani. I l-am dat lui taica-miu si in 2 luni i-a spart touch-ul. El l-a schimbat cu 100 de lei si merge si astazi. Daca esti mai priceput poti comanda piese de la gsmnet, ca sunt ieftine (cat o masa la unele cantine). Uite link: https://www.gsmnet.ro/cauta/Touchscreen lumia 520 Multa sanatate! Ps: dc lcd e intact trebuie sa iei doar touchul, care e un plastic transparent cu niste sarme. -
Atunci ia-ti un nokia 1020 cu camera de 41 mega pixeli la 400 lei de pe olx.
-
https://ibb.co/gU1Dsp https://ibb.co/jAH8Q9 https://ibb.co/g5BeXp https://ibb.co/gjMeXp https://ibb.co/cnXKXp https://ibb.co/cMi4yU https://ibb.co/kjT4yU https://ibb.co/iaqHJU https://ibb.co/imdRCp https://ibb.co/gixKXp https://ibb.co/eTBDsp Cam trista experienta. Nu este stabil. Se restarteaza din senin. Nu poti sa montezi stick ntfs. Sunt mult mai putine pachete disponibile in apt. Sistemul de operare are rezervati din start 16 gb. Intr-o zi se scurge 50% din baterie daca nu e folosit. Poate in versiunea 18.04 vor schimba ceva. Momentan nu ai ce sa faci cu telefonul in conditiile astea. PS: testele au fost facute pe versiunea stabila 15.04. Incepand cu 16(instabila) dau drumul la libertine container prin care poti rula aplicatii de desktop pe telefon. Exista un demo in care se ruleaza o aplicatie de calc: vedem ce va fi.
- 1 reply
-
- 1
-
Sursa: https://github.com/FICS/atcmd ATtention Spanned A collection of scripts used to automatically extract Android firmware images and process them for AT commands. These scripts may be modified for other tasks, such as extracting specific files or merely extracting base filesystem images. The scripts are divided into directories based on their function. Refer to the READMEs contained in each directory for usage instructions and more detailed information. extract: contains code for extracting AT commands from Android firmware images interact: contains code to spawn a shell for interactively sending AT commands to phones and observing the returned responses send: contains code for automated testing of a large number of AT commands on a physical phone, with all responses recorded in a log file usbswitch: contains code for switching a device to an alternate USB configuration and enabling the modem interface For questions contact the first, second, or third author via email. If you base any academic work off of ATCMD, please cite our paper: @inproceedings {tian18, author = {Dave (Jing) Tian and Grant Hernandez and Joseph I. Choi and Vanessa Frost and Christie Ruales and Patrick Traynor and Hayawardh Vijayakumar and Lee Harrison and Amir Rahmati and Michael Grace and Kevin R. B. Butler}, title = {ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands within the Android Ecosystem}, booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)}, year = {2018}, address = {Baltimore, MD}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/tian}, publisher = {{USENIX} Association}, }
-
- 1
-
Mi-au amintit de puterea panterei: https://www.mariciu.ro/puterea-panterei/
-
La oferta: Titlurile: https://m.imgur.com/a/xYtGaNE Documentele: https://wetransfer.com/downloads/9263b7163faf2142c7781dc08b81566420180827150434/734a80762464fcd8fcb7a14ba157359620180827150434/ec6c68 Succes
-
Baietii cu ochii albastri nu sunt nicodata obositi.
-
Senior Application Security Tester (Pentest)
gigiRoman replied to Zatarra's topic in Locuri de munca
Ceh e mai pentru entry level, parca e facut de niste indieni. Cissp e mai pentru experimentati. Din ce stiu la cissp sunt intrebari practice, situatii din care sa reiasa nivelul de experienta. La ceh e intrebarea si raspunsul. Sa ma contraziceti daca nu e asa. http://www.techexams.net/forums/isc-sscp-cissp/127772-multiple-certification-difficulty-ranking.html -
La ce banca ai fost? In alta ordine de idei, stiu pe cineva contabil si banii multi nu vin din idei marete, ci din aceleasi cacaturi. La firma erau clienti care aveau firme de paza, comert cu masini, marketing, consultanta etc. Unele afaceri prolifereaza orice ar fi.
-
[Ebook] Practical Malware Analysis
gigiRoman replied to Nytro's topic in Reverse engineering & exploit development
Practical Malware Analysis Starter Kit Package last updated: 2016-05-14 This package contains most of the software referenced in Practical Malware Analysis. Some of the links have broken over time, some companies have folded or been bought. I’ve done what I can to compile it all in one place for my own convenience and I figured I’d share it. It contains: MD5DEEP 4.4 and related tools (sha1deep, hashdeep, whirlpooldeep, etc) and 64-bit equivalents. WinMD5Free v1.20 PEiD v0.95 with KANAL plugin Strings v2.52 upx 3.91 PEview v0.9.9 Resource Hacker v4.2.5 PEBrowse Professional v10.1.4 PEBrowse64 Professional v6.3.1 PE Explorer 1.99 R6 (Trial) Process Monitor (procmon) v3.2 Process Explorer (procexp) v16.10 Regshot v1.9.0 ApateDNS v1.0 Netcat (nc) 1.11 and 64-bit build Wireshark v2.0.3 FakeNet 1.0c (INetSim alternative for Windows) Combined Volume Set of Intel® 64 and IA-32 Architectures Software Developer’s Manuals IDA Pro Free v5.0 with FindCrypt plugin, IDA Entropy Plugin Autoruns v13.51 and autorunsc OllyDbg v1.10 and v2.01d OllyDump Plugin WinDbg x86 and x64 v6.11.1.404 Immunity Debugger (ImmDbg) v1.85 SoftICE 4.05 for w98 and NT/XP (SEE FOOTER) SoftIceNT 4.2.7 (from 2.7 Driver Studio build) for XP (SEE FOOTER) OSR Driver Loader v3.0 Poison Ivy RAT 2.3.2 (Password is “malware” with no quotes, if the exe is eaten by your AV) pwdump6 (as PwDump.exe) pwdump7 Pass-The-Hash Toolkit v1.4 Metasploit Framework v4.11.7 PyCrypto (Requires Python 2.7) Snort 2.9.8.2 ScoopyNG v1.0 Mandiant Red Curtain 1.0 ASPack 2.39 (Trial) PETite v2.4 WinUPack v0.39 Final Themida 2.4.1.0 (Trial) shellcode_launcher.exe (Gone from practicalmalwareanalysis.com) Bochs 2.6.8 Burp Suite 1.7.03 CaptureBAT 2.0.0-5574 Cuckoo 2.0-RC1 (Requires Python) CFF Explorer (As Explorer Suite 4) WinHex 18.8.0.0 Import REConstructor (ImpREC) 1.7e LordPE 1.41 Deluxe Malcode Analyst Pack Memoryze 3.0 OfficeMalScanner 0.5 Zynamics BinDiff 4.20 (Key provided by Zynamics) pdfid.py and pdf-parser.py (Requires Python, obviously) Sandboxie v5.10 Buster Sandbox Analyzer v1.88 Update 4 TCPView v3.05 The Sleuth Kit 4.2.0 for Windows VERA v0.3 Volatility 2.5 Yara v1.7.1 x86 and x64 Docs and Licenses when given are in their own folders. I recommend you add the “Portable Binaries” folder to your Windows PATH. WARNING: This is not a toy. There are malicious code samples provided in the labs. Poison Ivy is real C2 malware. Use extreme caution with this software. COPYRIGHT: I do not claim copyright to any of the software packaged. All software provided was freely available online, and included in one place for your convenience. PASSWORD: The password to open the zip is “malware” with no quotes. You will likely need to make exceptions in your AV for the folder you place and extract this package. REGARDING SOFTICE: The provided build of SoftICE is a pirated scene release from 2000. I would consider it abandonware, as it has changed hands from NuMega to Compuware and again to Micro Focus, who has not released or updated the software. It has not received an update nor been available for purchase in ten years. If you are uncomfortable having this software, simply delete SoftICE427installnt.exe, SI405w9x.exe, and the SoftICE 4.05 NT and XP folder from Setup Binaries. It was exceedingly difficult to find the Windows XP version so I have included it for posterity. REGARDING LORDPE: LordPE looks like a pirated scene release but was actually created as a scene tool. Download: zip or torrent. Sursa: https://bluesoul.me/practical-malware-analysis-starter-kit/ -
https://github.com/LookHin/instagram-photo-video-upload-api
-
La începutul mileniului, occidentalul se simte din ce în ce mai „vulnerabil”. Panica, nesiguranţa, apatia socială, evitarea riscurilor, însoţită de măsuri drastice de securitate, au înlocuit spiritul temerar şi eroic, activismul politic, dorinţa de-a experimenta şi a depăşi limitele. Individul încrezător în sine şi în lumea din jur a lăsat locul unui ins ezitant, derutat – victimă neputincioasă sau, în cel mai bun caz, persoană „precaută”, temătoare de riscurile care-o pândesc la tot pasul. Se naşte sub ochii noştri o nouă paradigmă culturală, construită în jurul conceptului de „vulnerabilitate”. Totul a devenit subordonat noţiunii de „safety”, siguranţă, securitate. Aproape nimeni în Occident nu te mai întreabă: te simţi liber? Acum întrebarea pe buzele tuturor este „are you safe?” (te simţi în siguranţă?). „Siguranţa” nu trebuie privită într-un sens restrâns, pur tehnic, ci în adevărul ei profund: viziune asupra lumii, Weltanschauung. Perceperea realităţii prin ochelarii „vulnerabilităţii” este un fenomen cultural, strâns legat de statutul individului în epoca hiperglobalizării şi a postmodernităţii instituţionalizate. Sursa: http://anonimus.ro/2018/08/sindromul-vulnerabilitatii/
-
Sursa: https://www.sri.ro/articole/atacuri-cibernetice-de-amploare-in-perioada-iunie-august-2018
-
Inceperea unei cariere in domeniul IT
gigiRoman replied to Jesusjuice13's topic in Discutii incepatori
La firmele la care am lucrat (in principiu mici 5-12 oameni) nu am vazut pe nimeni care sa faca asa ceva. La firmele mari vin baietii destepti care lucreaza de exemplu la kpmg, deloitte, e&y, pwc sa ia caimacul si internii sa faca treaba.- 15 replies
-
- it
- programare
-
(and 6 more)
Tagged with:
-
Inceperea unei cariere in domeniul IT
gigiRoman replied to Jesusjuice13's topic in Discutii incepatori
Eu ajunsesem anul 2 la contabilitate (si informatica de gestiune). Nu prea se facea info afara de foxpro. Mi-am dat seama ca e de cacat, mi-am bagat pula, m-am angajat si in final am terminat cibernetica(info ec). Acum sunt programator. Dc iti doresti sa stii ca la 23 de ani esti tanar. La master aveam colegi si de 47. Bafta!- 15 replies
-
- 1
-
- it
- programare
-
(and 6 more)
Tagged with:
-
FARA COSTURI, eventual sa primesti bani sa ti-\ faca.
-
Ar fi interesanta o aplicatie din asta world wide. Sa aiba si un sistem de recomandari/comentari.
-
Uite ce zice softpedia: https://forum.softpedia.com/topic/940430-a-folosit-cineva-farataxecom/page__st__432 pare ca s-a discutat pe tema asta. Succes!
-
Sursa:https://www.google.ro/url?sa=t&source=web&rct=j&url=https://news.asis.io/sites/default/files/The%20Art%20of%20Memory%20Forensics.pdf&ved=2ahUKEwj78Oj5gdzcAhUMC-wKHd2-CVgQFjAAegQIABAB&usg=AOvVaw3-t7BtWw48oPsjZLR18go2 PS: am invatat mai bine treaba cu liste (plus alte structuri de date), asm, windows api, hooks, threaduri, procese, kernel, servicii, pooluri, loguri, registri, retele (stiva tcpip), citirea memoriei, windows object si multe altele. E despre cum poti face o versiune mai buna a ta. Te face un programator mai bun, eu mi-am dat seama ca sunt la piciorul broastei. De citit cu picioarele in apa rece. Bafta la disecat. Description Product description Memory forensics provides cutting edge technology to helpinvestigate digital attacks Memory forensics is the art of analyzing computer memory (RAM)to solve digital crimes. As a follow-up to the best seller MalwareAnalyst's Cookbook, experts in the fields of malware, security, anddigital forensics bring you a step-by-step guide to memoryforensics—now the most sought after skill in the digitalforensics and incident response fields. Beginning with introductory concepts and moving toward theadvanced, The Art of Memory Forensics: Detecting Malware andThreats in Windows, Linux, and Mac Memory is based on a five daytraining course that the authors have presented to hundreds ofstudents. It is the only book on the market that focusesexclusively on memory forensics and how to deploy such techniquesproperly. Discover memory forensics techniques: How volatile memory analysis improves digitalinvestigations Proper investigative steps for detecting stealth malware andadvanced threats How to use free, open source tools for conducting thoroughmemory forensics Ways to acquire memory from suspect systems in a forensicallysound manner The next era of malware and security breaches are moresophisticated and targeted, and the volatile memory of a computeris often overlooked or destroyed as part of the incident responseprocess. The Art of Memory Forensics explains the latesttechnological innovations in digital forensics to help bridge thisgap. It covers the most popular and recently released versions ofWindows, Linux, and Mac, including both the 32 and 64-biteditions. From the Back Cover SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OFDIGITAL ATTACKS The Art of Memory Forensics, a follow-up to thebestselling Malware Analyst’s Cookbook, is a practicalguide to the rapidly emerging investigative technique for digitalforensics, incident response, and law enforcement. Memory forensicshas become a must-have skill for combating the next era of advancedmalware, targeted attacks, security breaches, and online crime. Asbreaches and attacks become more sophisticated, analyzing volatilememory becomes ever more critical to the investigative process.This book provides a comprehensive guide to performing memoryforensics for Windows, Linux, and Mac systems, including x64architectures. Based on the authors’ popular training course,coverage includes memory acquisition, rootkits, tracking useractivity, and more, plus case studies that illustrate thereal-world application of the techniques presented. Bonus materialsinclude industry-applicable exercises, sample memory dumps, andcutting-edge memory forensics software. Memory forensics is the art of analyzing RAM to solve digitalcrimes. Conventional incident response often overlooks volatilememory, which contains crucial information that can prove ordisprove the system’s involvement in a crime, and can evendestroy it completely. By implementing memory forensics techniques,analysts are able to preserve memory resident artifacts which oftenprovides a more efficient strategy for investigating modernthreats. In The Art of Memory Forensics, the VolatilityProject’s team of experts provides functional guidance andpractical advice that helps readers to: Acquire memory from suspect systems in a forensically soundmanner Learn best practices for Windows, Linux, and Mac memoryforensics Discover how volatile memory analysis improves digitalinvestigations Delineate the proper investigative steps for detecting stealthmalware and advanced threats Use free, open source tools to conduct thorough memoryforensics investigations Generate timelines, track user activity, find hidden artifacts,and more The companion website provides exercises for each chapter, plusdata that can be used to test the various memory analysistechniques in the book. Visit our website atwww.wiley.com/go/memoryforensics. About the Author Michael Hale-Ligh is author of Malware Analyst's Cookbook, Secretary/Treasurer of Volatility Foundation, and a world-class reverse engineer. Andrew Case is a Digital Forensics Researcher specializing in memory, disk, and network forensics. Jamie Levy is a Senior Researcher and Developer, targeting memory, network, and malware forensics analysis. AAron Walters is founder and lead developer of the Volatility Project, President of the Volatility Foundation, and Chair of Open Memory Forensics Workshop.
-
- 2
-
Da-mi pm ca iti trimit eu kms activator. E si pt win si pt office. M-am chinuit sa il gasesc o gramada ca era plin googleul de virusi. Bafta!
-
Sursa: https://m.ro.sputnik.md/International/20180806/21035203/sparge-hacking-tinder-informatii-secrete-f-35.html Un hacker a reușit să obțină informații secrete legate de avionul militar american după ce a spart contul Tinder al unei militare a forțelor aeriene britanice. BUCUREȘTI, 6 aug — Sputnik. Un hacker necunoscut a spart contul rețelei de socializare Tinder a unei militare din cadrul forțelor aeriene ale Marii Britanii, obținând acces la informații secrete legate de avionul american de luptă F-35 Lightning II, notează Daily Mail. © PHOTO : PUBLIC DOMAIN Avionul american F-35 are rădăcini rusești Obținând datele de acces ale femeii, acesta a luat legătură cu unul din colegii ei și a provocat o discuție legată de noul avion. În pofida faptului că femeia a reclamat spargerea contului ei, o parte a informațiilor secrete a fost compromisă, menționează publicația. Deocamdată nu a fost identificată persoana care a săvârșit spargerea. Autoritățile britanice intenționează să achiziționeze 138 de avioane militare. Prima partidă din patru avioane F-35 Lightning au sosit în Regatul Unit în luna iunie. Wtf: 😵😵😵😵😵😵😵😵😵😵😵😵