Jump to content

urs

Active Members
  • Posts

    93
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by urs

  1. Original Article "You may remember that last year, a hacker exposed the inner workings of Hacking Team, a company that makes spyware for governments. Now that the dust has settled down, someone claiming to be the hacker has posted all the details on how he did it. The hack itself was executed using a common weakness: first, an embedded device within the network was found with a known zero-day weakness. From there, the hacker was able to get into an unencrypted backup and find the passwords for a Domain Admin server, which basically gave him the keys to the kingdom . There wasn’t one gaping security flaw: rather, it was a vulnerability in one tiny device (probably something like a router or network switch), which allowed the hacker to escalate his attack, through a series of small errors like unencrypted backups. But using those small vulnerabilities, the hacker got everything—emails, documents, and even the source code for Hacking Team’s software. " Pastebin story: http://pastebin.com/raw/0SNSvyjJ "Hacking Team was a company that helped governments hack and spy on journalists, activists, political opposition, and other threats to their power [1][2][3][4][5][6][7][8][9][10][11]. And, occasionally, on actual criminals and terrorists [12]. Vincenzetti, the CEO, liked to end his emails with the fascist slogan "boia chi molla". It'd be more correct to say "boia chi vende RCS". They also claimed to have technology to solve the "problem" posed by Tor and the darknet [13]. But seeing as I'm still free, I have my doubts about its effectiveness."
  2. inteleg ca vrei sa faci o aplicatie C# care sa lucreze cu db SAP, corect? arunca un ochi aici: http://stackoverflow.com/questions/15033303/how-do-i-find-my-connection-string-required-to-automate-sap-through-a-c-sharp-ap https://msdn.microsoft.com/en-us/library/cc185437(v=bts.10).aspx https://social.msdn.microsoft.com/Forums/vstudio/en-US/ab07774c-981b-42ed-99da-337142556d13/sap-integration-with-c?forum=netfxbcl http://stackoverflow.com/questions/5300049/step-by-step-tutorial-to-use-sap-net-connector-with-vs-2008
  3. @fallen_angel orale, esse
  4. mi'a luat 5 secunde... https://rstforums.com/forum/search/?type=all&q=cursuri+ccna
  5. urs

    RST 2016

    nu mai citi coaie, citeste carti, te fac neprost.
  6. urs

    RST 2016

    citeste inainte sa intrebi
  7. because you don't learn about encoding...
  8. Din pacate aceasta placa nu se afla inca in stocul Robofun. Fundatia Raspberry PI o ofera direct DOAR catre Adafruit, Pimoroni si ThePiHut (anuntul lor oficial este disponibil aici). Pretul afisat pentru aceasta placa va fi valabil doar in situatia in care Adafruit va permite Robofun sa vanda placa in Romania. Din pacate in acest moment nu avem nici un fel de confirmare de la ei in acest sens, insa este foarte probabil sa nu existe restrictii. Imediat ce vom obtine placa in stoc, vom livra comenzile in ordinea din sistem. Plasarea in acest moment a unei comenzi va ofera posibilitatea de a primi placa cu prioritate (vom livra in ordinea primirii comenzilor), insa NU va obliga sa o cumparati atunci cand ajunge in stoc, in cazul in care ati gasit-o intre timp in alta parte.
  9. https://www.google.ro/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=c%2B%2B%20libraries https://en.wikipedia.org/wiki/C%2B%2B_Standard_Library C++ Standard Library header files - cppreference.com Reference - C++ Reference A list of open source C++ libraries - cppreference.com dar cel mai important: http://calatoriiprinsunet.ro/antreneaza-ti-constant-creierul/
  10. Cum invatam copilul sa-si lege singur sireturile |
  11. urs

    Comanda anonima

    Comanda anonima anonim
  12. urs

    Encrypt.

    nu mai am nevoie de el. nu stiu daca exista o aplicatie care sa cripteze un text si sa il trimita prin alte aplicatii. si nici nu vad logica, vrei criptare folosesti telegram sau ceva de genul. tu vrei sa criptezi tot ce faci pe tel...
  13. urs

    Encrypt.

    sa cripteze ce ai scris, sa il trimita aluia si la ala pe telefon sa fie decriptat?! le: Earlier this year we had a contest to decipher intercepted Telegram messages, that did not produce a winner. Today we announce a new contest with an easier task and a larger prize — $300,000 for cracking Telegram's encryption, and this time contestants can not only monitor traffic, but also act as the Telegram server and use active attacks, which vastly increases their capabilities. https://telegram.org/blog/cryptocontest whateva, eu ma bucur ca nu mai am nevoie de el
  14. urs

    Encrypt.

    Telegram https://play.google.com/store/apps/details?id=org.telegram.messenger&hl=en
  15. Daca ati mai scris jocuri pentru mobile am pe cineva interesat sa lucreze cu oameni care au experienta in asa ceva. PM pentru adresa de email.
  16. ii pui sa inoate cate 5 pe cele 5 piste de inot, ii iei pe cei 5 invingatori (5 inotatori pe cursa, 25 de inotatori, deci 5 curse) si ii pui sa inoate pe cele 5 piste si te alegi cu top 3 cei mai rapizi. zic, nu stiu - pista ma'sii...
  17. https://rapidshare.cc/getfile/code/86df737db1b384806061de21b243acaf How This Book Is Structured Each chapter in this book addresses a different system administration domain and ends with a list of the Perl modules used in that chapter and references to facilitate deeper exploration of the information presented. The chapters are as follows: Chapter 1, Introduction This introductory chapter describes the material covered in the book in more detail, explaining how it will serve you and what you need to get the most from it. The material in this book is powerful and is meant to be used by powerful people (e.g., Unix superusers and Windows-based operating system administrators). The introduction provides some important guidelines to help you write more secure Perl programs. Chapter 2, Filesystems This chapter is about keeping multiplatform filesystems tidy and ensuring that they are used properly. We’ll start by looking at the salient differences between the native filesystems for each operating system. We’ll then explore the process of xvi | Preface Download at Boykma.Com intelligently walking or traversing filesystems from Perl and how that can be useful. Finally, we’ll look at manipulating disk quotas from Perl. Chapter 3, User Accounts This chapter discusses how user accounts manifest themselves on two different operating systems, including what is stored for each user and how to manipulate the information from Perl. That leads into a discussion of a rudimentary account system written in Perl. In the process of building this system, we’ll examine the mechanisms necessary for recording accounts in a simple database, creating these accounts, and deleting them. Chapter 4, User Activity Chapter 4 explores ways to automate tasks centered around user activity, intro- ducing a number of ways to track and control process, file, and network operations initiated by users. This chapter also presents various operating system-specific frameworks and tools (e.g., Windows Management Instrumentation, GUI setup tools, lsof, etc.) that are helpful for user-oriented tasks on different platforms. Chapter 5, TCP/IP Name and Configuration Services Name and configuration services allow hosts on a TCP/IP network to communicate with each other amicably and to self-configure. This chapter takes a historical per- spective by starting with host files, then moving on to the Network Information Service (NIS) and finally to the glue of the Internet, the Domain Name Service (DNS). Each step of the way, it shows how Perl can make professional management of these services easier. We’ll also explore how to work with the Dynamic Host Configuration Protocol (DHCP) from Perl in this chapter. Chapter 6, Working with Configuration Files Almost every system or software package we touch relies heavily on configuration files to be useful in our environment. This chapter explores the tools that make writing and reading those files from Perl easy. We’ll look at various formats, with special attention paid to XML and the current best practices for working with it using Perl. Chapter 7, SQL Database Administration Over time, more uses for relational databases are being found in the system ad- ministration realm. As a result, system administrators need to become familiar with SQL database administration. This chapter explains DBI, the preeminent SQL database framework for Perl, and provides examples of it in action for database administration. Chapter 8, Email This chapter demonstrates how Perl can make better use of email as a system ad- ministration tool. After discussing sending via SMTP (including MIME-based HTML messages), receiving via POP3/IMAP, and parsing via Perl, we’ll explore several interesting applications, including tools for analyzing unsolicited commer- cial email (a.k.a. spam) and managing tech support emails. Preface | xvii Download at Boykma.Com Chapter 9, Directory Services As the complexity of the information we deal with increases over time, so does the importance of the directory services we use to access that information. System administrators are increasingly being called upon not only to use these services, but also to build tools for their management. This chapter discusses some of the more popular directory service protocols/frameworks, such as LDAP and ADSI, and shows you how to work with them from Perl. Chapter 10, Log Files System administrators are often awash in a sea of log files. Every machine, operating system, and program can (and often does) log information. This chapter looks at the logging systems offered by Unix- and Windows-based operating systems and discusses approaches for analyzing logging information so it can work for you. Chapter 11, Security This chapter heads right into the maelstrom called “security,” demonstrating how Perl can make hosts and networks more secure. Chapter 12, SNMP This chapter is devoted to the Simple Network Management Protocol (SNMP). It illustrates how to use this protocol to communicate with network devices (both to poll and to receive trap information). Chapter 13, Network Mapping and Monitoring Perl offers some excellent tools for the mapping and monitoring of networks. In this chapter, we’ll look at several ways to discover the hosts on the network and the services they offer. We’ll then explore helpful graphical and textual ways to present the information collected, including some of the best tools for graphing and charting the data (such as GraphViz and RRDtool). Chapter 14, Experiential Learning This is the chapter you don’t want your boss to catch you reading. Appendixes Some of the chapters assume basic knowledge about topics with which you may not be familiar. For those who are new to these subjects, this book includes several mini-tutorials to bring you up to speed quickly. The appendixes provide introduc- tions to the eXtensible Markup Language (XML), the XML Path Language (XPath), the Lightweight Directory Access Protocol (LDAP), the Structured Query Lan- guage (SQL), the Revision Control System (RCS), translating VBScript to Perl, and SNMP.
×
×
  • Create New...