Jump to content

aelius

Administrators
  • Posts

    4995
  • Joined

  • Last visited

  • Days Won

    388

Everything posted by aelius

  1. <hahah> Eu folosesc Oust Browser. Viata mea s-a schimbat in bine. </hahah>
  2. CMD (apple) + R la pornire. Iti trebuie mac keyboard. Recovery/Install se face online, nu ai nevoie de CD, Stick, etc ...
  3. "This Power Saver use a state of the electrical technology to actively monitor and improve the power factor of your household or office appliances. In addition, the intelligent technology optimizes the voltage and current demands thus reducing the active power/ KwH demands and achieves up to 35% savings on your electricity bill. It reduces waveform distortions. It also acts as a voltage stabilizer by storing emery for up to 10 seconds and therefore suppliers the load with constant voltage during momentary power surges. As a result, this power saver prolongs lifespan of the electrical appliances." Hahhahahaha, astia nu au invatat ce cacat e energie activa si reactiva. In plus, chiar sunt convinsi ca un cacat mic cu motz invelit in staniol auriu ce contine un condesator de capacitate mica, poate asigura un consum pentru 10 secunde (exemplu, in cazul unui compresor de frigider - fiind un motor, la pornirea lui consumul este mult mai mare decat cel de functionare)
  4. Cea mai tare prezentare pe o comunitate IT. Banuiesc ca si merele iti plac mai mult daca-s ale altuia
  5. Sunt AP-uri specializate ce utilizeaza controllere (scule hardware separate) si au protectii inclusiv pe canale daca sunt utilizate AP-uri multiple pe controller. Nu aveti ce le face, cel putin nu stiu sa existe vreo tehnica asa ca va pierdeti timpul.
  6. Update; Doua bucati: Cpu Model: Xeon 3065 @ 2.33 GHz Cpu Specs: 2 Core, 4MB L2 Cache 2 x 160 GB SATA2 Raid 1 Mirror Memory: 8 GB Monthly traffic: 20 TB Network Port Speed: 100Mbps 2 IP Addresses included with custom reverse DNS Monthly cost: 45 euro Setup fee: 0 euro *** Nota: nu se accepta niciun fel de continut ilegal *** //update: s-au dat.
  7. Modifica "CHALLANGE" in "CHALLENGE" atat in site cat si in titlul topicului deschis. Sau scrie in romaneste daca e grea engleza.
  8. Ba, ce calange ? Si de ce ai mai pus target "aHR0cDovL3doaXRlLWhhY2tlcnMuY29tL2NoYWxsYW5nZS94c3MtY2hhbGxhbmdlLWhhcmQucGhw" cand se vede in status bar la browserul tau de unde citeste.
  9. Si Microsoft de Romarg SRL. Am inteles ca technet e gazduit pe shared cu 3 usd pe an.
  10. Sa ne suga pula, Gabriel Mazilu si angajatii lui. Aia labagii care cheltuie din banul public sa stea la filaje dupa himere.
  11. Ma intreb de ce ai postat asta chiar de pe ip-ul tau ) The IP Address is: 188.173.X.X The host name is: 188-173-X-X.next-gen.ro
  12. Idee: sms gateway + un abonament bun cu sms-uri nelimitate catre orice retea in RO. Ei vad ca au adsense.
  13. Salutari, Userul d3vtn si-a luat ban pentru teapa. Adresa acestuia de email utilizata la inregistrare pe RST a fost alecsandru.daniel@gmail.com IP Address Search for User: "d3vtn" Registration IP Address 151.54.56.112 Post IP Addresses 151.19.80.245 [Find More Users with this IP Address] 151.54.56.106 [Find More Users with this IP Address] 151.54.56.112 [Find More Users with this IP Address] 151.54.58.64 [Find More Users with this IP Address] 185.19.141.192 [Find More Users with this IP Address] 185.19.141.196 [Find More Users with this IP Address] 185.19.141.203 [Find More Users with this IP Address] 185.19.141.26 [Find More Users with this IP Address] 185.19.141.39 [Find More Users with this IP Address] 185.19.141.44 [Find More Users with this IP Address] 185.19.142.174 [Find More Users with this IP Address] 185.19.142.250 [Find More Users with this IP Address] 185.19.142.41 [Find More Users with this IP Address] 77.89.5.218 [Find More Users with this IP Address]
  14. Update Sunt doar trei servere: Sandy Bridge Intel CPU Intel i5-2500 @ 3.3 Ghz 4 Core, 4 Threads, 6MB L2 Cache 16 GB DDR3 Memory 2 x 500 GB SATA2 Raid 1 Software Monthly traffic: 20 TB Network Port Speed: 100Mbps 2 IP Addresses included with custom reverse DNS Monthly cost: 60 euro * Setup fee este 0 pentru ca sunt deja pe stoc si au ramas de la clientii ce au facut upgrade // update: mai e unul.
  15. A intrat: https://www.dropbox.com/s/isjokvmeez0n8mx/Screenshot%202014-03-21%2023.28.50.png si a si vazut threadul. Last Activity Today 07:53 PM La foametea care e in unii, pt. 400 de euro ar fute-o si pe ma-sa Noi vorbim de ban pe forum
  16. @verdelemeu: Simplu fapt ca-i dam ban utilizatorului (o sa-i dam), nu te ajuta cu nimic in cazul tau. Ai dat banul, nu-l mai vezi inapoi iar el isi poate face alt user si poate sta in continuare aici. https://www.dropbox.com/s/vq4xfg7gqg6vlc4/Screenshot%202014-03-21%2023.23.06.png Pula noastra, exploit pt. apache 5.x si apache e abia la versiunea 2.x. Sunteti cei mai tari oamenilor.
  17. Intr-o tara in care statul s-a pisat pe tine, te astepti sa primesti dreptate pe un forum ?
  18. Salut, Orice discutie care deviaza de la subiect este mutata in categoria respectiva. Atata timp cat nu a fost sters, nu vad sa fie vreo problema. Nu vad despre ce injurii e vorba
  19. A Bitcoin exchange is blaming its colocation provider for a security breach that left to the theft of about $100,000 in virtual currency. Ottawa-based Canadian Bitcoins says that staff at the Rogers Data Center failed to check the identity of a scammer using a tech support web chat, allowing him access to the company’s servers. “It is important to note that this breach occurred without any authentication being performed by the Rogers Data Centre staff whatsoever,” the exchange said in a statement. The Oct. 1, 2013 incident was outlined in a story by The Ottawa Citizen, which said an online chat user claimed to be James Grant, the owner of Canadian Bitcoins. Here’s an excerpt: Rogers told the paper that it has offered a credit to Canadian Bitcoins, which has instead removed its equipment from the Rogers data center. “Canadian Bitcoins has requested a full accounting from Rogers regarding the security breach at their Ottawa Data Centre and also filed a police report,” the company said. “The situation surrounding this customer is unique to this customer, and does not apply to any other customer of Rogers Data Centres. Rogers has been fully co-operative with authorities in the investigation,” Rogers told the newspaper. An email to Rogers customers, which was posted on Reddit, said the incident occurred while the facility was operated by Granite Networks, which in the process of being acquired by Rogers. “ It should be noted that this incident took place during the acquisition period before Rogers Data Centres had full business operational control of the facility,” the email read. “Once Rogers Data Centre had taken full operational control of this Granite location, its full suite of security protocols was implemented.” Source: Bitcoin Exchange Blames Data Center Provider for $100,000 Theft | Data Center Knowledge More info about attack: http://www.coindesk.com/canadian-bitcoin-exchange-lose-100000-in-attack/
  20. An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders. The compromised server is used by two websites in the ea.com domain, and is ordinarily used to host a calendar based on WebCalendar 1.2.0. This version was released in September 2008 and contains several security vulnerabilities which have been addressed in subsequent releases. For example, CVE-2012-5385 details a vulnerability which allows an unauthenticated attacker to modify settings and possibly execute arbitrary code. It is likely that one of these vulnerabilities was used to compromise the server, as the phishing content is located in the same directory as the WebCalendar application. The phishing site attempts to trick a victim into submitting his Apple ID and password. It then presents a second form which asks the victim to verify his full name, card number, expiration date, verification code, date of birth, phone number, mother's maiden name, plus other details that would be useful to a fraudster. After submitting these details, the victim is redirected to the legitimate Apple ID website at https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/ The compromised server is hosted within EA's own network. Compromised internet-visible servers are often used as "stepping stones" to attack internal servers and access data which would otherwise be invisible to the internet, although there is no obvious outward facing evidence to suggest that this has happened. In this case, the hacker has managed to install and execute arbitrary PHP scripts on the EA server, so it is likely that he can at least also view the contents of the calendar and some of the source code and other data present on the server. The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network. As well as hosting phishing sites, EA Games is also the target of phishing attacks which try to steal credentials from users of its Origin digital distribution platform. For example, the following site — which has been online for more than a week — is attempting to steal email addresses, passwords and security question answers. EA's Origin servers also came under attack earlier this year, causing connectivity and login problems in various EA games. A tweet by @derpTrolling appeared to claim responsibility for the outages, while also suggesting that it was a distributed denial of service attack which caused the problems. ("Gaben" is a reference to Gabe Newell, managing director of Valve Corporation, which owns the competing Steam digital distribution platform) Netcraft has blocked access to all phishing sites mentioned in this article, and informed EA yesterday that their server has been compromised. However, the vulnerable server — and the phishing content — is still online at the time of publication. The Audited by Netcraft service provides a means of regularly testing internet infrastructure for old and vulnerable software, faulty configurations, weak encryption and other issues which would fail to meet the PCI DSS standard. These automated scans can be run as frequently as every day, and can be augmented by Netcraft's Web Application Security Testing service, which provides a much deeper manual analysis of a web application by an experienced security professional. Source: EA Games website hacked to steal Apple IDs | Netcraft
  21. Traficul ala nu e real (care il spui tu) 1. Nu se merita decat pentru vizibilitate (daca vrei branding), nu pt. click-uri. 2. Monetizeaza destul de bine ce are acum si fara riscuri (adsense) 3. (vezi ca ai doua puncte cu 2). Nu va da randament ca al lui, in mod sigur. 4. Nu are legatura aici spatiul ce-l ocupa. Oricum, are in jur de 5 GB 5. Nu totul se rezuma la porcaria aia de facebook.
  22. aelius

    Salut

    Esti baiatul lui Octavian ? Welcome
  23. Pai bine ma, vrei sa iei 300 de produse cu 0 lei si tot tu faci pe gica duru. NU SUNT ALE TALE, CE CACAT E GREU DE INTELES. LA MUUUNCAAAA
  24. E ok omul bre, are familie, copil, nu e mucea de pe net. Nu va certati aiurea.
  25. Bre, in loc sa ne sustii si sa-ti bagi puleasca in fiecare institutie preacurvita a statului roman care se uita sa jepcareasca si ultimul ban ramas cetateanului de rand, tu sustii preacurvia si spui ca defapt institutiile astea sunt oneste )) Injuraturile le primesc pe skype ))
×
×
  • Create New...