Jump to content

aelius

Administrators
  • Posts

    5034
  • Joined

  • Last visited

  • Days Won

    411

Everything posted by aelius

  1. Intr-o tara in care statul s-a pisat pe tine, te astepti sa primesti dreptate pe un forum ?
  2. Salut, Orice discutie care deviaza de la subiect este mutata in categoria respectiva. Atata timp cat nu a fost sters, nu vad sa fie vreo problema. Nu vad despre ce injurii e vorba
  3. A Bitcoin exchange is blaming its colocation provider for a security breach that left to the theft of about $100,000 in virtual currency. Ottawa-based Canadian Bitcoins says that staff at the Rogers Data Center failed to check the identity of a scammer using a tech support web chat, allowing him access to the company’s servers. “It is important to note that this breach occurred without any authentication being performed by the Rogers Data Centre staff whatsoever,” the exchange said in a statement. The Oct. 1, 2013 incident was outlined in a story by The Ottawa Citizen, which said an online chat user claimed to be James Grant, the owner of Canadian Bitcoins. Here’s an excerpt: Rogers told the paper that it has offered a credit to Canadian Bitcoins, which has instead removed its equipment from the Rogers data center. “Canadian Bitcoins has requested a full accounting from Rogers regarding the security breach at their Ottawa Data Centre and also filed a police report,” the company said. “The situation surrounding this customer is unique to this customer, and does not apply to any other customer of Rogers Data Centres. Rogers has been fully co-operative with authorities in the investigation,” Rogers told the newspaper. An email to Rogers customers, which was posted on Reddit, said the incident occurred while the facility was operated by Granite Networks, which in the process of being acquired by Rogers. “ It should be noted that this incident took place during the acquisition period before Rogers Data Centres had full business operational control of the facility,” the email read. “Once Rogers Data Centre had taken full operational control of this Granite location, its full suite of security protocols was implemented.” Source: Bitcoin Exchange Blames Data Center Provider for $100,000 Theft | Data Center Knowledge More info about attack: http://www.coindesk.com/canadian-bitcoin-exchange-lose-100000-in-attack/
  4. An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders. The compromised server is used by two websites in the ea.com domain, and is ordinarily used to host a calendar based on WebCalendar 1.2.0. This version was released in September 2008 and contains several security vulnerabilities which have been addressed in subsequent releases. For example, CVE-2012-5385 details a vulnerability which allows an unauthenticated attacker to modify settings and possibly execute arbitrary code. It is likely that one of these vulnerabilities was used to compromise the server, as the phishing content is located in the same directory as the WebCalendar application. The phishing site attempts to trick a victim into submitting his Apple ID and password. It then presents a second form which asks the victim to verify his full name, card number, expiration date, verification code, date of birth, phone number, mother's maiden name, plus other details that would be useful to a fraudster. After submitting these details, the victim is redirected to the legitimate Apple ID website at https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/ The compromised server is hosted within EA's own network. Compromised internet-visible servers are often used as "stepping stones" to attack internal servers and access data which would otherwise be invisible to the internet, although there is no obvious outward facing evidence to suggest that this has happened. In this case, the hacker has managed to install and execute arbitrary PHP scripts on the EA server, so it is likely that he can at least also view the contents of the calendar and some of the source code and other data present on the server. The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network. As well as hosting phishing sites, EA Games is also the target of phishing attacks which try to steal credentials from users of its Origin digital distribution platform. For example, the following site — which has been online for more than a week — is attempting to steal email addresses, passwords and security question answers. EA's Origin servers also came under attack earlier this year, causing connectivity and login problems in various EA games. A tweet by @derpTrolling appeared to claim responsibility for the outages, while also suggesting that it was a distributed denial of service attack which caused the problems. ("Gaben" is a reference to Gabe Newell, managing director of Valve Corporation, which owns the competing Steam digital distribution platform) Netcraft has blocked access to all phishing sites mentioned in this article, and informed EA yesterday that their server has been compromised. However, the vulnerable server — and the phishing content — is still online at the time of publication. The Audited by Netcraft service provides a means of regularly testing internet infrastructure for old and vulnerable software, faulty configurations, weak encryption and other issues which would fail to meet the PCI DSS standard. These automated scans can be run as frequently as every day, and can be augmented by Netcraft's Web Application Security Testing service, which provides a much deeper manual analysis of a web application by an experienced security professional. Source: EA Games website hacked to steal Apple IDs | Netcraft
  5. Traficul ala nu e real (care il spui tu) 1. Nu se merita decat pentru vizibilitate (daca vrei branding), nu pt. click-uri. 2. Monetizeaza destul de bine ce are acum si fara riscuri (adsense) 3. (vezi ca ai doua puncte cu 2). Nu va da randament ca al lui, in mod sigur. 4. Nu are legatura aici spatiul ce-l ocupa. Oricum, are in jur de 5 GB 5. Nu totul se rezuma la porcaria aia de facebook.
  6. aelius

    Salut

    Esti baiatul lui Octavian ? Welcome
  7. Pai bine ma, vrei sa iei 300 de produse cu 0 lei si tot tu faci pe gica duru. NU SUNT ALE TALE, CE CACAT E GREU DE INTELES. LA MUUUNCAAAA
  8. E ok omul bre, are familie, copil, nu e mucea de pe net. Nu va certati aiurea.
  9. Bre, in loc sa ne sustii si sa-ti bagi puleasca in fiecare institutie preacurvita a statului roman care se uita sa jepcareasca si ultimul ban ramas cetateanului de rand, tu sustii preacurvia si spui ca defapt institutiile astea sunt oneste )) Injuraturile le primesc pe skype ))
  10. E reala chestia asta. Am un prieten care a fost intrebat daca vrea, chiar la camera de comert si industrie.
  11. Eu am account de vreo doi ani la ei si nu primesc niciun spam pe acel email. Obisnuiesc sa fac account-uri cu nume_site@domeniulmeu.ro
  12. ) pai exista rai si buni ?
  13. Eu nu incurajez nicio chestie de genul. A fost o chestie mai mult ca o gluma pe un site fara valoare. (gandul cu voturile). Voturile acelea nu au vreo importanta si cu totii stim asta. Chiar va rog sa NU va apucati sa dati flood sau sa spargeti site-uri in numele comunitatii. Sunt de acord cu prank-urile si astea dar numai atat.
  14. Auzi, din pura curiozitate: Doresti sa faci modulul in tehnologie SMD?
  15. Nu scrie mare lucru pe disc el iar ce scrie nu e la calitate Full HD sa zici ca incetineste ceva. Vezi ca daca il conectezi in lan, exista client desktop pt. el (view/download, etc ...)
  16. Eu am alta idee: DVR-ul ruleaza un linux embedded. Cred ca poti face cumva sa poti accesa imaginile pe FTP. Ce Marca si model este DVR-ul ? Dahua cumva?
  17. Salut, Te rugam sa postezi si sursa (in cazul in care nu este facut de tine) Multumim
  18. Aia era ideea, sa eviti eth0:0, eth0:1 ... etc https://www.dropbox.com/s/9b7ey7s5tsbyrzm/Screenshot%202014-03-18%2013.28.30.png
  19. Chiar tu ai spus ca nu tinea. Te-am intrebat ce si cum pentru a incerca sa-ti dau o solutie cat de cat fiabila la un pret ok. Sunt absolut sigur ca nu aveai peste 500 Gbps la atacuri si ca ai platit o suma destul de considerabila pentru protectie. Sa fie de inteles pentru toata lumea: Nu exista protectie DDoS. Sunt echipamente specializate sau tehnici de mitigare ale atacurilor. Mai exact, tot ce se face la un atac DDoS este sa inlaturi o mare parte din efectele sale. Ne poti da mai multe detalii despre ce fel de atac este ? (syn, syn spoofed, udp, udp spoofed, http flood, botnet cu http, ntp). De asemenea, ce aplicatii vrei sa protejezi. Ma intereseaza asta pentru ca este necesar sa stiu daca ai nevoie de altceva in afara de TCP. Chestia cu mi-a dat flood si singura solutie e sa-i dau si eu nu aduce niciun rezultat. Mai bine cauti sa-l prinzi si sa-l calci putin pe cap.
  20. Ramai la problema ta. Te-am intrebat sa-ti pot da un sfat, daca nu-l vrei, e problema ta. Threadul se va inchide pentru ca nu permitem chestii de genul aici.
  21. Cat plateai la Voxility pentru "500Gbps protectie" ? Cunoscatorii stiu de ce e intre ghilimele.
  22. Daca ar fi legal ... site-ul mitropoliei ar fi plin de poze cu shemale.
  23. HAHAHAHHAHA. DOAMNE, SE TRANSFORMA CIORILE FRATE ? ))))
  24. @Jannes: Tu cum te distrezi, te imbeti ca porcu si canti fericit in ruseste ? E o chestie care a durat doua minute s-o facem si am ras doua ore. // edit: rafinat, ahahahhaa. Tigani strainezi )
×
×
  • Create New...