Jump to content

yo9gjx

Active Members
  • Posts

    473
  • Joined

  • Last visited

  • Days Won

    6

Posts posted by yo9gjx

  1. CLI Companion

    Conceput pentru începãtori, programul este o unealtã excelentã pentru a invãta lucrul în Terminal si detine o bazã de date cu comenzile importante. Versiunea nouã are o serie de plugin-uri ce îi oferã functii suplimentare.

    %25255BUNSET%25255D.png?imgmax=800

    Detine o listã de comenzi prestabilitã si i se pot adãuga altele având si functia de search. Totodatã se poate accesa lista de comenzi de la All commands | commandlinefu.com. Pentru utilizatorii de distributii cu baza Debian se poate adãuga PPA-ul la lista existenta.

    • sudo add-apt-repository ppa:clicompanion-devs/clicompanion-nightlies
    • sudo apt-get update
    • sudo apt-get install clicompanion

    În acest fel veti avea mereu ultima versiune a programului.

    Link-uri:

    commandlineFu

    Launchpad

  2. Gazduite in SUA

    A Social Networking Site for People of European Descent

    WhiteResister.com - The White Resister

    KKK History Website | This KKK website discusses the Ku Klux Klan and its historyKKK History Website | This KKK website discusses the Ku Klux Klan and its history etc.

    sau cauta unul de gen si da si tu un wois

    si a jidanilor din Romania.

    Va mirati?. Cine naiba credeti ca ne conduce tara ?

    Un singur exemplu, coleg de breasla si bun prieten cu Ponta, aceeasi scoala:

    Biografie MRU

    Patapievici

    tot etc. sunt doar doua mici exemple

    Invazia Exon, Chevron etc au si o explicatie, uitati un reportaj scurt mai jos:

    http://www.youtube.com/watch?v=dqwIQrBMaOI&feature=player_embedded

  3. A hacker demonstrates that code can be hidden inside a new computer to put it forever under remote control, even after upgrades to the hard drive or operating system.

    As the manufacturing of computers and other gadgets has migrated to China, an occasional paranoid voice has asked whether the country might be tempted to preinstall software for surveillance. This remains a far-fetched notion, but now a French hacker has at least shown how such a covert back door could be created.

    computer-infected-virus-1.jpg

    At the Black Hat security conference in Las Vegas last week, Jonathan Brossard demonstrated software that can be hidden deep inside the hardware of a PC, creating a back door that would allow secret remote access over the Internet. His secret entrance can't even be closed by switching a PC's hard disk or reinstalling its operating system.

    Corporate and government-sponsored computer espionage is a growing problem, and hackers are using ever more sophisticated methods to bypass security ramparts. A congressional report, published in March this year, concluded that electronics manufactured in China posed a "potential" threat to U.S. communication systems, but there is no evidence of attempted espionage by hiding surveillance tools inside new equipment to date.

    Brossard's backdoor tool, dubbed Rakshasa, needs to be installed into the BIOS chip on a PC's motherboard, on which the main processor and other core components are mounted. A computer's BIOS chip contains the first code, known as firmware, which a computer runs when it is powered on to start the process of booting up the operating system. Brossard also found he could hide his malicious code inside chips of other hardware components such as network cards, and have it jump into the BIOS when necessary.

    "If someone puts a single rogue firmware on your machine, he basically owns you forever," Brossard told an audience of fellow hackers and computer security professionals at Black Hat.

    When a PC with Rakshasa installed is switched on, the software looks for an Internet connection to fetch the small amount of code it needs to compromise the computer. If Rakshasa can't get an Internet connection, it can't operate.

    The design makes Rakshasa extra stealthy. "For a nation-state-quality back door, think Flame or Stuxnet, we want plausible deniability," explained Brossard, referring to malware that experts believe was created by government-sponsored hackers. "If you fetch over the Internet every time, we don't leave a trace on the file system."

    The code Rakshasa fetches is used to disable a series of security controls that limit what changes low-level code can make to the high-level operating system and memory of a computer. Then, as the computer's operating system is booted up, Rakshasa uses the powers it has granted itself to inject code into key parts of the operating system. Such code can be used to disable user controls, or steal passwords and other data to send back to the person controlling Rakshasa.

    In an onstage demonstration at Black Hat, Brossard proved his idea works by having Rakshasa boot a computer with Windows 7 installed and override its password authentication. A person chosen from the audience was then able to use a randomly chosen password to log into the admin account.

    Brossard built Rakshasa by combining several legitimate open-source software packages for altering firmware. Due to the efforts of programmers that have contributed to those projects, Rakshasa works on 230 different models of motherboard, says Brossard. It likely works on many more models of PC, since it is common for a manufacturer to use the same motherboard model in many different PC models.

    Because Rakshasa only ever resides inside motherboard chips, it is safely out of view of antivirus software and resilient to the most common responses by IT staff cleaning up a badly infected PC.

    "Even if you change your hard drive or change your OS, you're still very much going to be owned," said Brossard, who has tested the code that Rakshasa fetches against a standard battery of 43 antivirus programs and found that none flagged it as dangerous.

    Of course, deploying Rakshasa would require getting access to the motherboard of a computer, perhaps in a factory or warehouse. "Another attack scenario is you buy a new network card and get back-doored," said Brossard, because of the way Rakshasa can jump from other components into the BIOS.

    Anyone fearing a Rakshasa-style attack would need to replace the firmware on the chips of the motherboard and other components with versions known to be safe.

    The attack can work on PCs with any kind of processor, but many of the standard features of PC motherboards originated with Intel. Suzy Greenberg, a spokeswoman for that company, said in an e-mail that Brossard's paper was "largely theoretical," since it did not specify how an attacker would insert Rakshasa onto a system, and did not take into account that many new BIOS chips have cryptographically verified code that would prevent it from working.

    However, Brossard notes that this added layer of protection is available only on a minority of PCs so far, and that an organization with access to PC manufacturing or distribution would have many opportunities to install Rakshasa-style software.

    sursa: A Computer Infection that Can Never Be Cured

  4. In locul lui T1 folosesti un transformator de frecventa intermediara de 455 khz. Totul e ca oscilatoarele sa aiba aceeasi frecventa (la unul va devia la apropierea bobinei de un metal). Se gasesc in receptoarele radio, cauta si tu pe cineva cu un aparat de radio defect, tip Gloria, Madrigal etc. nu prea conteaza, TR-urile de medie frecventa sunt cu mici exceptii standard.

  5. T1 nu e integrat. E un transformator de frecventa intermediara folosind o singura infasurare ca oscilator. Circuitul integrat e IC care pare a fi LM324 sau similar. Sigur scrie in lista de componente pe care nu ai postat-o.

  6. Search onion sites motor cautare pentru pagini .onion

    si cum se face - tor2web: visit anonymous websites citeste wiki la tor2web wiki

    https://www.torproject.org/projects/projects.html.en - vezi toate proiectele ex. TorCloud vezi setari Vidalia

    Se pot accesa intranet-uri. Apropo am gasit multa documentatie ciudata prin DeepWeb inclusiv constructii practice din seria anarhist.

    Revin cu un edit: incercati Tails, merge excelent, eu il am instalat pe un stick USB. https://tails.boum.org/

  7. O pagina cu cateva tutoriale video excelente pentru incepatori si nu numai.

    Electronics Tutorial Videos in HD!

    Foarte utila tinand seama de nivelul extrem de scazut al cunostintelor elementare din domeniu, pe care le puteti vedea citind postarile de pe thread-ul https://rstcenter.com/forum/47359-electromagnetic-pulse-em.rst

    Mai bine de 90% din "postaci" nu au nici baza minima in fizica. Asa ca luati cateva carti pentru incepatori, urmariti tutorialele din link, faceti cel putin 50 montaje (recomand kit-uri) si apoi incepeti sa va dati cu parerea.

    Bonus - Electronics Tutorials

    Oricum sunt utile pentru toata lumea. Succes.

    begood edit : facut sticky.

  8. Timpul este o "energie" si constanta doar sistemului din care face parte. Tine strict de lumina si se pare influentabil de gravitatie si strans legat de spatiu. Fiecare sistem solar are propriul lui timp. Timpul nu poate fi masurat ci doar constatata trecerea lui prin masurari indirecte empirice, respectiv sistemul orar (24 ore standardizat). Decalaje de sisteme in timp au toate sondele trimise pe alte planete, pe Marte pana la 6 minute dovada ca timpul difera in functie de factori precum campul geomagnetic, gravitatia plus alte energii necunoscute ce tin de obiectul ceresc respectiv insa cu mici variatii ramane cam in zona solara. Deci concluzie e generat de Sol si depinde de activitatea acestuia. Cele mai spectaculoase anomalii le are sonda Pioneer 10 ce a parasit sistemul solar in 1982.

    Urmariti cu atentie reportajul de mai jos. O demonstratie cu miu-mezoni din 1963 ca timpul nu e o constanta, chiar poate fi incetinit sau accelerat. Experimentul e pe bune, nu teorie matematica.

    Time Dilation - An Experiment With Mu-Mesons | SciVee

    Ca titlu informativ:

    Singurul experiment facut cu o bomba nucleara de 150 megatone a avut loc prin anii '60 in Kazahstan, fosta URSS. Nu s-a mai repetat din motive banuite dar unul din efectele secundare a fost acela ca toti participantii la intoarcerea la baza aveau ceasurile decalate inainte cu peste 4 ore fata de ora normala (e vorba de ceasuri mecanice). Nu s-a tinut secret ba chiart s-au facut dezbateri publice in universitati (gasiti n+1 materiale publicate in anii respectivi- recomand revista Atomist a Academiei de Fizica a URSS). Ce efecte a putut avea energia imensa degajata si necontrolata? Cine poate sti?

    Pentru YO7CJF:

    Unul din efectele majore ce intereseaza radioamatorii, efectul L.D.E. observat prima oara in 1927. Efectul de inghet al undei sau blocaj in timp datorat tot activitatii solare ( CME - solar flares).

    https://www.google.ro/#hl=ro&sclient=psy-ab&q=L.D.E.+phenomena&oq=L.D.E.+phenomena&gs_l=serp.3...46730.53062.1.53497.12.7.0.0.0.3.170.893.0j7.7.0...0.0.nSGGBa6eZhc&psj=1&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.,cf.osb&fp=6da3f3c5be2ee682&biw=1280&bih=883

    "Sometimes we receive strange radio signals delayed

    compare to sent radio signals. The delaying time may

    take up to 30 minutes! We do not know yet, where the

    signals travel in the delaying time. Modern experiments

    confirm LDE, and scientists keep silence about the

    inexplicable

    effect." - Igor Grigorov, RK3ZK

    Academia de fizica URSS

    Tot pentru YO7CJF - uite un film SF dar interesant ca idee ce tine de LDE http://www.imdb.com/title/tt0186151/

    si aici torrent- http://thepiratebay.se/torrent/4514947/

×
×
  • Create New...