Jump to content

usrnm

Active Members
  • Posts

    75
  • Joined

  • Last visited

  • Days Won

    4

Posts posted by usrnm

  1. 4 minutes ago, MIKE.01 said:

    Dar este femeie in plm, asta e moda...jumatate sau chiar toti din astia de o injura fac laba uitandu-se la poze cu ea sau de genul, despre ce vorbim?!cunosc o multime de "pitipoance" care iti lasa impresia ca nu stiu altceva decat sa o suga dar defapt sunt doxa de cunostinte si unele au si afaceri.

    Asta e moda pentru ca e femeie? WTF? :(|)  In cazul asta ma bucur de faptul ca sunt de moda veche...mai ramanea sa spui ca unele, pe langa faptul ca sunt "doxa de cunostinte", au si Bemveu, nu doar afaceri. Traim in lumi paralele, din fericire pentru amandoi

  2. eu ma refeream ca pitipoanca pare prea proasta sa duca la bun sfarsit o asa "operatiune" si nu vad finalitatea, stiu ca se fac chestii d-astea, sunt recunoscuti ungurii care de-a lungul istoriei au reusit sa infiltreze in multe cercuri inalte agente , dar pentru ametiti  ca astia sa faci scheme de spionaj, nu stiu ce sa zic....dar daca voi spuneti, va cred pe cuvand...:)

    @Mike.01, din moment ce te pozezi cu buzele tuguiate si buricu' la vedere, eticheta ti-o pui singur,nu o pun ceilalti, fie ei si limitati frustrati...

     

    • Upvote 1
  3. 11 hours ago, gutui said:

    ai grija ce scrii, strici legendarea unei operatiuni a fortelor reunite a "baietilor de baieti, cu ochi albastri" din mai multe tari&continente...

    ar fi pacat ca remarci de acest fel, cinice, sa distruga o operatiune minutios pusa la punct, operatiune in care niste "baieti de baieti, cu ochi albastri" , sub acoperire, au gasit niste fraieri ce se inscriau in profilul dorit, protagonistii arestarii, profil de delicvent extrem de vandabil media.

    mai mult, presupun ca "baietii" sub acoperire le-au pus la dispozitie tools-uri, logistica si bani de start-up...

    asa se intimpla cind "baieti de baieti, cu ochi albastri" au nevoie sa isi justifice existenta, prezenta si persistenta in supravegherea nediscriminatorie si bugetarea acestei activitati.

    acum intelegi de ce era necesara o pipitza bimbo... e ca si imnul cintat de Amy Gordon... cheia succesului...

     

    Tu vrei sa spui ca panarama era pusa de "baietii de baieti" sa atraga hakerii pularai? sau cum? lol! si le implanta "tool-uri" cand le baga degetul in cur banuiesc...asta da teorie a conspiratiei!

    • Thanks 1
  4. Pustiul nu pare rau intentionat, e de apreciat ca e pasionat si vrea sa invete mai mult, doar ca are  nevoie sa fie sprijinit si indrumat pe calea cea buna..la 15 ani nu pricepe care pot fi consecintele daca iti bagi nasul prea mult unde nu ai voie. Eu consider ca l-ai luat prea tare fara sa tineti cont de varsta lui.

    Parerea mea....

    LE: @Zekor, sper ca ai bagat la cap ce ti-au spus ceilalti referitor la deface si ca ai de gand sa treci de la teribilism la invatat lucruri utile din care poti face o cariera LEGALA in viitor...

  5. Most instant messaging applications are providing enriched link summaries (as shown next with Telegram link previews), including description and a preview image of the website.

    Depending on the implementation these nice-to-have features could become privacy intrusive: indeed, it might force your client into downloading some remote content from an untrusted third party, hence leaking your IP address and OS version (User-Agent).

    How does it work?

    The application (client side or server side) will grab the webpage and look for metadata through the Open Graph protocol. These are simple HTML tags included in the <head> section.

    Twitter Direct Messages

    When you share a URL to someone using Twitter DM, the server shall see at least two probes: one request coming from Twitter (AS13414) that will load the URL to get the card and, strangely, a second request coming from a Amazon EC2 server with a random mobile User-Agent. Most likely this is done to check for virus/phishing (Twitter will display a warning upon suspicious links on new messages).
    Privacy: URL is known to the server, no IP addresses leak (message isn’t E2E encrypted anyway)

    iMessages

    Upon sending a link, your mobile device will generate a preview card. All data appear to be processed locally from your device. The receiver will not grab the URL but will have the preview data, meaning either data is cached on Apple server, or data is directly sent to the receiver through the encrypted channel.
    Privacy: fair

    WhatsApp

    WhatsApp will have the same design as iMessage: the sender will generate the link preview (grabbing metadata from the URL) and send this data to the recipient through the server. This will occur even when end-to-end encryption is enabled but it doesn’t seem to violate E2E (URL is grabbed from the client, not the server).
    Privacy: fair

    Signal

    Signal does not have any enriched link preview, neither the client nor server are grabbing the URL. 👍
    Privacy: good

    Telegram

    The Telegram mobile application will generate the preview server-side. From an app that claims to have E2E this is kind of a big issue.
    Privacy: URL is known to the server, no IP addresses leak

    Wire

    Wire will generate a preview locally (from your mobile device). Interestingly, the Wire web app (on desktop) won’t generate any preview. Worth pointing out you can disable link preview in the application settings, good move.
    Privacy: fair

    FB Messenger

    Facebook servers will grab the URL to display the preview card. Haven’t tested with Secret Conversations.
    Privacy: URL is known to the server, no IP addresses leak

    Skype

    Skype servers will generate the link preview as well.
    Privacy: URL is known to the server, no IP addresses leak

    Slack

    Slack app is generating the link preview server-side.
    Privacy: URL is known to the server, no IP addresses leak

    Discord

    Same thing with discord (tested on Discord web app).
    Privacy: URL is known to the server, no IP addresses leak

    Sursa:

    https://blog.0day.rocks/link-previews-in-im-apps-and-privacy-d32e6056095b

    • Upvote 2
  6. Sa inteleg ca il vinzi mai ieftin, altfel care e treaba? Ai 1000 de variante de a cumpara credit, spune-ne de ce sa luam de la tine, cu ce esti special, in afara de faptul ca vinzi credit pt o retea care nu mai exista (cosmote)? :)

     

  7. 1 hour ago, QuoVadis said:

    Doar oile pun botul la tehnicile lor. Dar tot folosesc site-ul des caci in multe cazuri au preturi mai bune decat hotelul caci ii storc la celalalt capat si pe proprietari. De obicei inainte sa rezerv ceva prin ei ma uit si direct pe site-ul hotelului (b&b dupa caz) si in peste 65% din cazuri era mai ieftin pe booking.com. Sau dau un telefon sa vad ce zic aia de la receptie. Ma uit apoi si pe trivago.com si hotels.com - rareori gasesc mai ieftin pe ele. Si apoi pe langa reviews de pe site-ul lor scriu si numele hotelului in google cu reviews si ma uit sa vad ce apare. Toata treaba e rapid, nu ia nu stiu cat.

    Eu mai folosesc si tripadvisor, majoritatea hotelurilor au la review si poze  facute de cei care s-au cazat acolo si pot sa imi fac o idee de cum arata camera in realitate si nu in pozele cosmetizate

  8. Nu ca nu era imputita, dar se impute si mai tare... http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html

     

    Talos recently published a technical analysis of a backdoor which was included with version 5.33 of the CCleaner application. During our investigation we were provided an archive containing files that were stored on the C2 server. Initially, we had concerns about the legitimacy of the files. However, we were able to quickly verify that the files were very likely genuine based upon the web server configuration files and the fact that our research activity was reflected in the contents of the MySQL database included in the archived files.

    In analyzing the delivery code from the C2 server, what immediately stands out is a list of organizations, including Cisco, that were specifically targeted through delivery of a second-stage loader. Based on a review of the C2 tracking database, which only covers four days in September, we can confirm that at least 20 victim machines were served specialized secondary payloads. Below is a list of domains the attackers were attempting to target.

    • Upvote 1
×
×
  • Create New...