Jump to content

aelius

Administrators
  • Posts

    5013
  • Joined

  • Last visited

  • Days Won

    398

Everything posted by aelius

  1. Si Microsoft de Romarg SRL. Am inteles ca technet e gazduit pe shared cu 3 usd pe an.
  2. Sa ne suga pula, Gabriel Mazilu si angajatii lui. Aia labagii care cheltuie din banul public sa stea la filaje dupa himere.
  3. Ma intreb de ce ai postat asta chiar de pe ip-ul tau ) The IP Address is: 188.173.X.X The host name is: 188-173-X-X.next-gen.ro
  4. Idee: sms gateway + un abonament bun cu sms-uri nelimitate catre orice retea in RO. Ei vad ca au adsense.
  5. Salutari, Userul d3vtn si-a luat ban pentru teapa. Adresa acestuia de email utilizata la inregistrare pe RST a fost alecsandru.daniel@gmail.com IP Address Search for User: "d3vtn" Registration IP Address 151.54.56.112 Post IP Addresses 151.19.80.245 [Find More Users with this IP Address] 151.54.56.106 [Find More Users with this IP Address] 151.54.56.112 [Find More Users with this IP Address] 151.54.58.64 [Find More Users with this IP Address] 185.19.141.192 [Find More Users with this IP Address] 185.19.141.196 [Find More Users with this IP Address] 185.19.141.203 [Find More Users with this IP Address] 185.19.141.26 [Find More Users with this IP Address] 185.19.141.39 [Find More Users with this IP Address] 185.19.141.44 [Find More Users with this IP Address] 185.19.142.174 [Find More Users with this IP Address] 185.19.142.250 [Find More Users with this IP Address] 185.19.142.41 [Find More Users with this IP Address] 77.89.5.218 [Find More Users with this IP Address]
  6. Update Sunt doar trei servere: Sandy Bridge Intel CPU Intel i5-2500 @ 3.3 Ghz 4 Core, 4 Threads, 6MB L2 Cache 16 GB DDR3 Memory 2 x 500 GB SATA2 Raid 1 Software Monthly traffic: 20 TB Network Port Speed: 100Mbps 2 IP Addresses included with custom reverse DNS Monthly cost: 60 euro * Setup fee este 0 pentru ca sunt deja pe stoc si au ramas de la clientii ce au facut upgrade // update: mai e unul.
  7. A intrat: https://www.dropbox.com/s/isjokvmeez0n8mx/Screenshot%202014-03-21%2023.28.50.png si a si vazut threadul. Last Activity Today 07:53 PM La foametea care e in unii, pt. 400 de euro ar fute-o si pe ma-sa Noi vorbim de ban pe forum
  8. @verdelemeu: Simplu fapt ca-i dam ban utilizatorului (o sa-i dam), nu te ajuta cu nimic in cazul tau. Ai dat banul, nu-l mai vezi inapoi iar el isi poate face alt user si poate sta in continuare aici. https://www.dropbox.com/s/vq4xfg7gqg6vlc4/Screenshot%202014-03-21%2023.23.06.png Pula noastra, exploit pt. apache 5.x si apache e abia la versiunea 2.x. Sunteti cei mai tari oamenilor.
  9. Intr-o tara in care statul s-a pisat pe tine, te astepti sa primesti dreptate pe un forum ?
  10. Salut, Orice discutie care deviaza de la subiect este mutata in categoria respectiva. Atata timp cat nu a fost sters, nu vad sa fie vreo problema. Nu vad despre ce injurii e vorba
  11. A Bitcoin exchange is blaming its colocation provider for a security breach that left to the theft of about $100,000 in virtual currency. Ottawa-based Canadian Bitcoins says that staff at the Rogers Data Center failed to check the identity of a scammer using a tech support web chat, allowing him access to the company’s servers. “It is important to note that this breach occurred without any authentication being performed by the Rogers Data Centre staff whatsoever,” the exchange said in a statement. The Oct. 1, 2013 incident was outlined in a story by The Ottawa Citizen, which said an online chat user claimed to be James Grant, the owner of Canadian Bitcoins. Here’s an excerpt: Rogers told the paper that it has offered a credit to Canadian Bitcoins, which has instead removed its equipment from the Rogers data center. “Canadian Bitcoins has requested a full accounting from Rogers regarding the security breach at their Ottawa Data Centre and also filed a police report,” the company said. “The situation surrounding this customer is unique to this customer, and does not apply to any other customer of Rogers Data Centres. Rogers has been fully co-operative with authorities in the investigation,” Rogers told the newspaper. An email to Rogers customers, which was posted on Reddit, said the incident occurred while the facility was operated by Granite Networks, which in the process of being acquired by Rogers. “ It should be noted that this incident took place during the acquisition period before Rogers Data Centres had full business operational control of the facility,” the email read. “Once Rogers Data Centre had taken full operational control of this Granite location, its full suite of security protocols was implemented.” Source: Bitcoin Exchange Blames Data Center Provider for $100,000 Theft | Data Center Knowledge More info about attack: http://www.coindesk.com/canadian-bitcoin-exchange-lose-100000-in-attack/
  12. An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders. The compromised server is used by two websites in the ea.com domain, and is ordinarily used to host a calendar based on WebCalendar 1.2.0. This version was released in September 2008 and contains several security vulnerabilities which have been addressed in subsequent releases. For example, CVE-2012-5385 details a vulnerability which allows an unauthenticated attacker to modify settings and possibly execute arbitrary code. It is likely that one of these vulnerabilities was used to compromise the server, as the phishing content is located in the same directory as the WebCalendar application. The phishing site attempts to trick a victim into submitting his Apple ID and password. It then presents a second form which asks the victim to verify his full name, card number, expiration date, verification code, date of birth, phone number, mother's maiden name, plus other details that would be useful to a fraudster. After submitting these details, the victim is redirected to the legitimate Apple ID website at https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/ The compromised server is hosted within EA's own network. Compromised internet-visible servers are often used as "stepping stones" to attack internal servers and access data which would otherwise be invisible to the internet, although there is no obvious outward facing evidence to suggest that this has happened. In this case, the hacker has managed to install and execute arbitrary PHP scripts on the EA server, so it is likely that he can at least also view the contents of the calendar and some of the source code and other data present on the server. The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network. As well as hosting phishing sites, EA Games is also the target of phishing attacks which try to steal credentials from users of its Origin digital distribution platform. For example, the following site — which has been online for more than a week — is attempting to steal email addresses, passwords and security question answers. EA's Origin servers also came under attack earlier this year, causing connectivity and login problems in various EA games. A tweet by @derpTrolling appeared to claim responsibility for the outages, while also suggesting that it was a distributed denial of service attack which caused the problems. ("Gaben" is a reference to Gabe Newell, managing director of Valve Corporation, which owns the competing Steam digital distribution platform) Netcraft has blocked access to all phishing sites mentioned in this article, and informed EA yesterday that their server has been compromised. However, the vulnerable server — and the phishing content — is still online at the time of publication. The Audited by Netcraft service provides a means of regularly testing internet infrastructure for old and vulnerable software, faulty configurations, weak encryption and other issues which would fail to meet the PCI DSS standard. These automated scans can be run as frequently as every day, and can be augmented by Netcraft's Web Application Security Testing service, which provides a much deeper manual analysis of a web application by an experienced security professional. Source: EA Games website hacked to steal Apple IDs | Netcraft
  13. Traficul ala nu e real (care il spui tu) 1. Nu se merita decat pentru vizibilitate (daca vrei branding), nu pt. click-uri. 2. Monetizeaza destul de bine ce are acum si fara riscuri (adsense) 3. (vezi ca ai doua puncte cu 2). Nu va da randament ca al lui, in mod sigur. 4. Nu are legatura aici spatiul ce-l ocupa. Oricum, are in jur de 5 GB 5. Nu totul se rezuma la porcaria aia de facebook.
  14. aelius

    Salut

    Esti baiatul lui Octavian ? Welcome
  15. Pai bine ma, vrei sa iei 300 de produse cu 0 lei si tot tu faci pe gica duru. NU SUNT ALE TALE, CE CACAT E GREU DE INTELES. LA MUUUNCAAAA
  16. E ok omul bre, are familie, copil, nu e mucea de pe net. Nu va certati aiurea.
  17. Bre, in loc sa ne sustii si sa-ti bagi puleasca in fiecare institutie preacurvita a statului roman care se uita sa jepcareasca si ultimul ban ramas cetateanului de rand, tu sustii preacurvia si spui ca defapt institutiile astea sunt oneste )) Injuraturile le primesc pe skype ))
  18. E reala chestia asta. Am un prieten care a fost intrebat daca vrea, chiar la camera de comert si industrie.
  19. Eu am account de vreo doi ani la ei si nu primesc niciun spam pe acel email. Obisnuiesc sa fac account-uri cu nume_site@domeniulmeu.ro
  20. ) pai exista rai si buni ?
  21. Eu nu incurajez nicio chestie de genul. A fost o chestie mai mult ca o gluma pe un site fara valoare. (gandul cu voturile). Voturile acelea nu au vreo importanta si cu totii stim asta. Chiar va rog sa NU va apucati sa dati flood sau sa spargeti site-uri in numele comunitatii. Sunt de acord cu prank-urile si astea dar numai atat.
  22. Auzi, din pura curiozitate: Doresti sa faci modulul in tehnologie SMD?
  23. Nu scrie mare lucru pe disc el iar ce scrie nu e la calitate Full HD sa zici ca incetineste ceva. Vezi ca daca il conectezi in lan, exista client desktop pt. el (view/download, etc ...)
  24. Eu am alta idee: DVR-ul ruleaza un linux embedded. Cred ca poti face cumva sa poti accesa imaginile pe FTP. Ce Marca si model este DVR-ul ? Dahua cumva?
  25. Salut, Te rugam sa postezi si sursa (in cazul in care nu este facut de tine) Multumim
×
×
  • Create New...