Jump to content

aelius

Administrators
  • Posts

    5013
  • Joined

  • Last visited

  • Days Won

    398

Everything posted by aelius

  1. Vand server IBM eServer xSeries 335 model 8676GKG / SN: KKKMV1W Grade: 1U Devices ibm335# pciconf -lv hostb0@pci0:0:0:0: class=0x060000 card=0x00000000 chip=0x00141166 rev=0x33 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'Host Bridge (CNB20-HE)' class = bridge subclass = HOST-PCI hostb1@pci0:0:0:1: class=0x060000 card=0x00000000 chip=0x00141166 rev=0x00 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'Host Bridge (CNB20-HE)' class = bridge subclass = HOST-PCI hostb2@pci0:0:0:2: class=0x060000 card=0x00000000 chip=0x00141166 rev=0x00 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'Host Bridge (CNB20-HE)' class = bridge subclass = HOST-PCI vgapci0@pci0:0:1:0: class=0x030000 card=0x02401014 chip=0x47521002 rev=0x27 hdr=0x00 vendor = 'ATI Technologies Inc. / Advanced Micro Devices, Inc.' device = 'ATI On-Board VGA for HP Proliant 350 G3 (Rage XL PCI)' class = display subclass = VGA aac0@pci0:0:2:0: class=0x010400 card=0x02869005 chip=0x02859005 rev=0x01 hdr=0x00 vendor = 'Adaptec Inc' device = 'PCIX133 32/64bit (Adaptec 2410SA SATA RAID)' class = mass storage subclass = RAID hostb3@pci0:0:15:0: class=0x060000 card=0x02011166 chip=0x02011166 rev=0x93 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'CSB5 PCI to ISA Bridge' class = bridge subclass = HOST-PCI atapci0@pci0:0:15:1: class=0x01018a card=0x02121166 chip=0x02121166 rev=0x93 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'CSB5 PCI EIDE Controller' class = mass storage subclass = ATA ohci0@pci0:0:15:2: class=0x0c0310 card=0x02201166 chip=0x02201166 rev=0x05 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'OpenHCI Compliant USB Controller (OSB4)' class = serial bus subclass = USB isab0@pci0:0:15:3: class=0x060100 card=0x02301166 chip=0x02251166 rev=0x00 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'PCI Bridge (CSB5)' class = bridge subclass = PCI-ISA hostb4@pci0:0:17:0: class=0x060000 card=0x00000000 chip=0x01011166 rev=0x05 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'CIOB-X2' class = bridge subclass = HOST-PCI hostb5@pci0:0:17:2: class=0x060000 card=0x00000000 chip=0x01011166 rev=0x05 hdr=0x00 vendor = 'ServerWorks (Was: Reliance Computer Corp)' device = 'CIOB-X2' class = bridge subclass = HOST-PCI bge0@pci0:2:1:0: class=0x020000 card=0x026f1014 chip=0x16a714e4 rev=0x02 hdr=0x00 vendor = 'Broadcom Corporation' device = 'BCM5703X NetXtreme Gigabit Ethernet' class = network subclass = ethernet bge1@pci0:2:2:0: class=0x020000 card=0x026f1014 chip=0x16a714e4 rev=0x02 hdr=0x00 vendor = 'Broadcom Corporation' device = 'BCM5703X NetXtreme Gigabit Ethernet' class = network subclass = ethernet ibm335# CPU ibm335# grep CPU /var/run/dmesg.boot CPU: Intel(R) Xeon(TM) CPU 3.20GHz (3189.40-MHz 686-class CPU) FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs cpu0: <ACPI CPU> on acpi0 cpu1: <ACPI CPU> on acpi0 cpu2: <ACPI CPU> on acpi0 cpu3: <ACPI CPU> on acpi0 Memory ibm335# dmesg | grep memory real memory = 4294967296 (4096 MB) Disks 2 x 73 GB / 15.000 rpm (SCSI U320) FUJITSU .... pass0 at aacp0 bus 0 scbus0 target 0 lun 0 pass0: <FUJITSU MAU3073NC 5C01> Fixed Uninstalled SCSI-3 device pass0: 211.200MB/s transfers (512bit) pass1 at aacp0 bus 0 scbus0 target 1 lun 0 pass1: <FUJITSU MAU3073NC 5C01> Fixed Uninstalled SCSI-3 device pass1: 211.200MB/s transfers (512bit) Pe retea are doua porturi gigabit, din cate se vede la pciconv (Broadcom NetXtreme) Pret pentru rst-isti: 150 euro, ca ma lovesc de el pe acasa // edit: Am pus un cleste ampermetric pe cablul de alimentare: - Asta e la pornire: https://www.dropbox.com/s/y0fu6yaw7ulu42s/DSCF7513.JPG - Asta e cu serverul in idle (0,824 Amperi): https://www.dropbox.com/s/nqfpvxpi3dkx27f/DSCF7516.JPG (Consum) Wati = Volti * Amperi Serverul suporta 8 GB memorie (maxim) si are 4 sloturi. In el sunt 4 memorii de 1 GB ECC acum.
  2. aelius

    Hosting ?

    La Webfactor -> https://webfactor.ro/ iti recomand // edit: M-a intrebat cineva daca este al meu site-ul. Nu este al meu si eu nu mai ofer hosting deocamdata (doar servere dedicate). Recomand webfactor pentru ca sunt vechi pe piata si sunt oameni seriosi.
  3. aelius

    Hosting ?

    - Hosting shared, virtual (vps/vds) sau servere dedicate ? - In Romania sau afara ? - Aplicatia web sau ce vrei sa gazduiesti, necesita resurse speciale ? - Ai nevoie de suport tehnic permanent ?. De poti trezi cu surprize sa nu ti se raspunda 1-2-3 zile sau in weekend. Sunt multe criterii cand alegi o firma de hosting.
  4. - VLF and ELF Electric and Magnetic Fields - Effects of 6-10 Hz ELF on Brain Waves | Journal of Borderland Research - electromagnetic mind control frequencies energy radiation elf gwen towers haarp chemtrails aerosol spraying - Total Population Control - Paranoia (4.5 Hz), Depression (6.66 Hz), Manic Rage (11.3Hz)... >> Four Winds 10 - Truth Winds - The ELF God - Mind Control Technology and Harassment - http://csglobe.com/mass-mind-control/
  5. Nu nu, awnly3jhc2g e de treaba, e ok omul. Am scos acum banul, cred ca ai uitat
  6. aelius

    Apache Libcloud

    Trebuie sa faci API acolo. Mai bine folosesti asta: https://rstforums.com/forum/82299-apache-cloudstack-open-source-computing.rst Practic e un wrapper peste VM-uri si este utilizat de multe companii mari.
  7. Ba da, dar este interesanta ca si procedura. Te poate ajuta procedurile de genul daca vrei sa-ti dezvolti un sistem IDS / UTM
  8. aelius

    Apache Libcloud

    Libcloud is a Python library for interacting with many of the popular cloud service providers using a unified API. It was created to make it easy for developers to build products that work between any of the services that it supports. Resource you can manage with Libcloud are divided in the following categories: - Cloud Servers and Block Storage - services such as Amazon EC2 and Rackspace CloudServers - Cloud Object Storage and CDN - services such as Amazon S3 and Rackspace CloudFiles - Load Balancers as a Service - services such as Amazon Elastic Load Balancer and GoGrid LoadBalancers - DNS as a Service - services such as Amazon Route 53 and Zerigo Web page: https://libcloud.apache.org/ Documentation: https://libcloud.readthedocs.org/en/latest/
  9. Apache CloudStack is open source software designed to deploy and manage large networks of virtual machines, as a highly available, highly scalable Infrastructure as a Service (IaaS) cloud computing platform. CloudStack is used by a number of service providers to offer public cloud services, and by many companies to provide an on-premises (private) cloud offering, or as part of a hybrid cloud solution. CloudStack is a turnkey solution that includes the entire "stack" of features most organizations want with an IaaS cloud: compute orchestration, Network-as-a-Service, user and account management, a full and open native API, resource accounting, and a first-class User Interface (UI). CloudStack currently supports the most popular hypervisors: VMware, KVM, XenServer and Xen Cloud Platform (XCP). Users can manage their cloud with an easy to use Web interface, command line tools, and/or a full-featured RESTful API. In addition, CloudStack provides an API that's compatible with AWS EC2 and S3 for organizations that wish to deploy hybrid clouds. Webpage: Apache CloudStack: Open Source Cloud Computing About: About Apache CloudStack Wiki page: https://cwiki.apache.org/confluence/display/CLOUDSTACK/Home Wikipedia page: http://en.wikipedia.org/wiki/Apache_CloudStack
  10. FreeBSD supports CARP (Common Address Redundancy Protocol) and has done for many years now. We’ve been using it here at Gconnect as part of our ‘Mailout’ system with no issues at all and it’s served use well since FreeBSD version 6.’something’. As part of the Mailout system upgrade i’ll be using CARP again, and heres how to make it work.. Firstly the requirements: 1. The two servers should load balance 2. A failure of one server should not be noticed by the users 3. When a failed server recovers, load balancing should resume Our plan is to create 2 servers, both with a normal ip address on the interface. These server will share 2 more ‘virtual ip’ addresses using carp. Each server will be the ‘master’ for one of the virtual ip addresses and the ‘backup’ for the other. Our DNS record will have both ip addresses and will do the basic round robin load balancing. When a server fails, the remaining server will become the ‘master’ for both of the virtual ip addresses. When the server recovers, the system will return to normal. For this system to work we need a method of forcing one server to become the master and another to become the backup. To do this we use the ‘advskew’ setting, which is like a weighting. Then we need to enable ‘pre-emtion’ to ensure that once a server is master for a virtual ip address, it will give it up again if another server which a higher advskew value joins the group. device carp If not, add it, rebuild the kernel and off you go. Now requirement number 3 was that upon recovery the servers should resume load balancing. Pre-emtion requires an explicit setting via sysctl. You can get a list of carp based values like this: # sysctl net.inet.carp net.inet.carp.allow: 1 net.inet.carp.preempt: 0 net.inet.carp.log: 1 net.inet.carp.arpbalance: 0 net.inet.carp.suppress_preempt: 0 We need to make ‘net.inet.carp.preempt’ = 1, to do that, type in: # sysctl net.inet.carp.preempt=1 net.inet.carp.preempt: 0 -> 1 To make the change permanent, i.e. happen when the system boots, add the following line to /etc/sysctl.conf net.inet.carp.preempt=1 Now we can put the config into /etc/rc.conf (server A): cloned_interfaces="carp0 carp1" ifconfig_carp0="vhid 1 pass my_password1 172.16.2.9 255.255.255.0" ifconfig_carp1="vhid 2 advskew 100 pass my_password2 172.16.2.10 255.255.255.0" And in server B cloned_interfaces="carp0 carp1" ifconfig_carp0="vhid 1 advskew pass my_password1 172.16.2.9 255.255.255.0" ifconfig_carp1="vhid 2 pass my_password2 172.16.2.10 255.255.255.0" Notice the subtle difference? The advskew value is a mirror of the first server. After a reboot we can see the CARP by typing ‘ifconfig’ ... carp0: flags=49 metric 0 mtu 1500 inet 172.16.2.9 netmask 0xffff0000 carp: MASTER vhid 1 advbase 1 advskew 0 carp1: flags=49 metric 0 mtu 1500 inet 172.16.2.10 netmask 0xffff0000 carp: BACKUP vhid 2 advbase 1 advskew 100 Now if you reboot a server you will see that the reaming server will become master for both carp0 and carp1 and when its finish the situation returns as we wanted! Source: FreeBSD & Carp – failover and load balancing | Dan Massey's Blog
  11. The Open MPI Project is an open source MPI-2 implementation that is developed and maintained by a consortium of academic, research, and industry partners. Open MPI is therefore able to combine the expertise, technologies, and resources from all across the High Performance Computing community in order to build the best MPI library available. Open MPI offers advantages for system and software vendors, application developers and computer science researchers. Features implemented or in short-term development for Open MPI include: - Full MPI-3 standards conformance - Thread safety and concurrency - Dynamic process spawning - Network and process fault tolerance - Support network heterogeneity - Single library supports all networks - Run-time instrumentation - Many job schedulers supported - Many OS's supported (32 and 64 bit) - Production quality software - High performance on all platforms - Portable and maintainable - Tunable by installers and end-users - Component-based design, documented APIs - Active, responsive mailing list - Open source license based on the BSD license Official page: Open MPI: Open Source High Performance Computing Documentation: Open MPI v1.6.4 documentation
  12. MPICH is a high-performance and widely portable implementation of the Message Passing Interface (MPI) standard (MPI-1, MPI-2 and MPI-3). The goals of MPICH are: (1) to provide an MPI implementation that efficiently supports different computation and communication platforms including commodity clusters (desktop systems, shared-memory systems, multicore architectures), high-speed networks (10 Gigabit Ethernet, InfiniBand, Myrinet, Quadrics) and proprietary high-end computing systems (Blue Gene, Cray) and (2) to enable cutting-edge research in MPI through an easy-to-extend modular framework for other derived implementations. See our collaborators. MPICH is distributed as source (with an open-source, freely available license). It has been tested on several platforms, including Linux (on IA32 and x86-64), Mac OS/X (PowerPC and Intel), Solaris (32- and 64-bit), and Windows. Please see the README, CHANGES, and RELEASE_NOTES files in the distribution for more details. See download page for more details. MPICH was originally developed during the MPI standards process starting in 1992 to provide feedback to the MPI Forum on implementation and usability issues. This original implementation was based on the Chameleon portability system to provide a light-weight implementation layer (hence the name MPICH from MPI over CHameleon). Around 2001, development had begun on a new implementation named MPICH2. MPICH2 implemented additional features of the MPI-2 standard over what was implemented in the original MPICH (now referred to as MPICH-1). The final release of the original MPICH is 1.2.7p1. The version numbers of MPICH2 were restarted at 0.9 and continue to 1.5. Starting with the major release in November 2012, the project is renamed back to MPICH with a version number of 3.0. Check out our news and events for more informations. MPICH and its derivatives, form the most widely used implementations of MPI in the world. They are used exclusively on nine of the top 10 supercomputers (November 2013 ranking), including the world’s fastest supercomputer: Tianhe-2. Official page: MPICH | High-Performance Portable MPI Documentation: Guides | MPICH
  13. Hiawatha Web Server Introduction: Hiawatha is an open source webserver with a focus on security. I started Hiawatha in January 2002. Before that time, I had used several webservers, but I didn't like them. They had unlogical, almost cryptic configuration syntax and none of them gave me a good feeling about their security and robustness. So, I decided it was time to write my own webserver. I never thought that my webserver would become what it is today, but I enjoyed working on it and liked to have my own open source project. In the years that followed, Hiawatha became a fully functional webserver. Secure: Hiawatha has been written with security in mind. This resulted in a highly secure webserver in both code and features. Hiawatha can stop SQL injections, XSS and CSRF attacks and exploit attempts. Via a specially crafted monitoring tool, you can keep track of all your webservers. Easy to use: You don't need to be a HTTP or CGI expert to get Hiawatha up and running. Its configuration syntax is easy to learn. The documentation and examples you can find on this website will give you all the information you need to configure your webserver within minutes. Lightweight: Although Hiawatha has everything a modern webserver needs, it's nevertheless a small and lightweight webserver. This makes Hiawatha ideal for older hardware or embedded systems. Special techniques are being used to keep the usage of resources as low as possible. Official webpage: https://hiawatha-webserver.org/
  14. This page contains a quick reference guide for Linux 2.6+ tuning for Data Transfer hosts connected at speeds of 1Gbps or higher. Note that most of the tuning settings described here will actually decrease performance of hosts connected at rates of OC3 (155 Mbps) or less, such as home users on Cable/DSL connections. - Linux Tuning These notes are intended to help users and system administrators maximize TCP/IP performance on their computer systems. They summarize all of the end-system (computer system) network tuning issues including a tutorial on TCP tuning, easy configuration checks for non-experts, and a repository of operating system specific instructions for getting the best possible network performance on these platforms - TCP Tune
  15. Most people know how problematic protection against SYN denial of service attacks can be. Several methods, more or less effective, are usually used. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, the modification of the TCP/IP stack of a given operating system can be performed by an administrator. This method, the tuning of the TCP/IP stack in various operating systems, will be described in depth in this article. While SYN attacks may not be entirely preventable, tuning the TCP/IP stack will help reduce the impact of SYN attacks while still allowing legitimate client traffic through. It should be noted that some SYN attacks do not always attempt to upset servers, but instead try to consume all of the bandwidth of your Internet connection. This kind of flood is outside the scope of scope of this article, as is the filtering of packets which has been discussed elsewhere. What can an administrator do when his servers are under a classic, non-bandwidth flooding SYN attack? One of most important steps is to enable the operating system's built-in protection mechanisms like SYN cookies or SynAttackProtect. Additionally, in some cases it is worth tuning parameters of the TCP/IP stack. Changing the default values of stack variables can be another layer of protection and help better secure your hosts. In this paper I will concentrate on: - Increasing the queue of half-open connections (in the SYN RECEIVED state). - Decreasing the time period of keeping a pending connection in the SYN RECEIVED state in the queue. This method is accomplished by decreasing the time of the first packet retransmission and by either decreasing the number of packet retransmissions or by turning off packet retransmissions entirely. The process of packet retransmissions is performed by a server when it doesn't receive an ACK packet from a client. A Packet with the ACK flag finalizes the process of the three-way handshake. Note that an attacker can simply send more packets with the SYN flag set and then the above tasks will not solve the problem. However, we can still increase the likelihood of creating a full connection with legitimate clients by performing the above operations. We should remember that our modification of variables will change the behavior of the TCP/IP stack. In some cases the values can be too strict. So, after the modification we have to make sure that our server can properly communicate with other hosts. For example, the disabling of packet retransmissions in some environments with low bandwidth can cause a legitimate request to fail. In this article you will find a description of the TCP/IP variables for the fallowing operating systems: Microsoft Windows 2000, RedHat Linux 7.3, Sun Solaris 8 and HP-UX 11.00. These variables are similar or the same in current releases. Definitions: SYN flooding and SYN spoofing A SYN flood is a type of Denial of Service attack. We can say that a victim host is under a SYN flooding attack when an attacker tries to create a huge amount of connections in the SYN RECEIVED state until the backlog queue has overflowed. The SYN RECEIVED state is created when the victim host receives a connection request (a packet with SYN flag set) and allocates for it some memory resources. A SYN flood attack creates so many half-open connections that the system becomes overwhelmed and cannot handle incoming requests any more. To increase an effectiveness of a SYN flood attack, an attacker spoofs source IP addresses of SYN packets. In this case the victim host cannot finish the initialization process in a short time because the source IP address can be unreachable. This malicious operation is called a SYN spoofing attack. We need to know that the process of creating a full connection takes some time. Initially, after receiving a connection request (a packet with SYN flag set), a victim host puts this half-open connection to the backlog queue and sends out the first response (a packet with SYN and ACK flags set). When the victim does not receive a response from a remote host, it tries to retransmit this SYN+ACK packet until it times out, and then finally removes this half-open connection from the backlog queue. In some operating systems this process for a single SYN request can take about 3 minutes! In this document you will learn how to change this behavior. The other important information you need to know is that the operating system can handle only a defined amount of half-open connections in the backlog queue. This amount is controlled by the size of the backlog queue. For instance, the default backlog size is 256 for RedHat 7.3 and 100 for Windows 2000 Professional. When this size is reached, the system will no longer accept incoming connection requests. Read more: Hardening the TCP/IP stack to SYN attacks | Symantec Connect Community
  16. "A Hacker" )) Cat de penal
  17. Am votat cu "Fa-i datele publice" iar mai jos argumentez asta. Sunt baieti aici care au gasit gramada de vulnerabilitati in companii mari precum Adobe, Apple, Microsoft, Yahoo, Google, NTT si altele. Au gasit vulnerabilitatile, le-au reportat si au primit bani si respect pentru asta. Dupa ce s-au rezolvat bug-urile, au facut public ce au descoperit. Este ETIC si corect din orice punct de vedere. Acele companii deruleaza programe de gasire a vulnerabilitatilor si recompenseaza oamenii. Suntem o comunitate de oameni pasionati de IT, nu suntem escroci. Din cate am inteles, Valium a mai cerut inca 300 de euro de la oameni si a primit. Acum cere inca 3000 si ameninta in stanga si in dreapta. Serios, asta e santaj de cea mai joasa speta si nu are nicio legatura cu hacking-ul. Cred ca stim cu totii cat de greu e sa iti ridici un business. In mod sigur nu v-ar placea sa arunce un gigel cu mocirla in stanga si in dreapta si sa va ceara si gramada de bani. Atitudinea este gresita din start. NU avem nevoie de escroci aici. Si asa ne-a fost patata imaginea de pomana iar unii dintre noi au platit scump.
  18. Injurati-va pe PM. Merci,
  19. Salut, Daca te ajuta cu ceva: Sunt zener acele diode. (mai exact, nu au ca scop redresarea unei tensiuni). Ele sunt puse intre plus si minus pentru a stabiliza tensiunile la un anumit prag. (in cazul in care aceste valori sunt depasite). In diagrama mica (cea cu dioda) este specificat faptul ca sunt diode stabilizatoare de 5,1 Volti. Desigur, trebuie respectata polaritatea. R1 + R2 sunt pentru caderea de tensiune. BZX79C5V1, Zener Diode, 5.1V 500mW / abatere (toleranta): 5%
  20. Au fost mitinguri anti taxe. Rezultatul a fost zero. Au fost mitinguri anti guvern. Rezultatul a fost zero. Atata timp cat nu intereseaza pe nimeni iar Romanul revoltat arata cam asa, nu o sa se schimbe nimic. Lasa sa vina razboiul, il astept demult. Vreau sa trag pe roata niste politicieni.
  21. Eu am avut .org cu page rank 6 si iesa foarte bine pe cautari pe o nisa pe care e batalie mai mare ca pe poker. Nu cred ca conteaza prea mult daca e .net, .org, .com (Sa nu fie extensie pe tara totusi). Cred ca totul se rezuma la de cat de bun esti in seo, ce continut ai si link-urile de calitate catre tine.
  22. There are many things to consider when securing a web application but a definite "quick win" is to start taking advantage of the security HTTP response headers that are supported in most modern browser. It doesn't matter which development platform you use to build your application, these headers will make a notable difference for the security of your website anyway! The screenshot shows what the security headers look like. The security headers are included in the web server's response to a browser — instructing the browser to enable (or disable) certain security features. They're invisible to the user, but you can have look at them with tools such as Fiddler or the developer tools that are built into the major browsers. In IE or Chrome press F12, in Opera (Ctrl+Shift+i), in Firefox (Ctrl+Shift+k), for Safari have a look here to enable the developer tools. A great thing about these response headers is that they're very easy to get started with. In many cases you might not even have to change a single line of code in your application as you can set the headers either through your application's configuration, or they can likely be set by whatever web server you use. If you're building ASP.NET applications I would like to point you to NWebsec, an ASP.NET security library that lets you easily configure these headers for your application. Go and have a look at the documentation, it explains how you can configure the headers through web.config. Don't worry, if you're the MVC kind of person you can use filter attributes instead. You'll find the library on NuGet so you'll be up and running in a matter of minutes! Disclaimer: I built it, so I think it's pretty cool. A quick note: Last year, I gave a lightning talk at the ROOTs conference about the role browsers play for your online security. There I also discussed security headers. Slides and video are online if you want to check them out: "The browser - your best friend and worst enemy" (slides / video). Now let's have a look at the headers and how they can improve the security of your website. The security headers Here's the security headers that are supported by some or all of the major browsers at the time of writing. - X-Frame-Options - Strict-Transport-Security - X-Content-Type-Options - X-Download-Options - X-XSS-Protection - X-Content-Security-Policy / X-Content-Security-Policy-Report-Only - X-WebKit-CSP / X-WebKit-CSP-Report-Only We'll have a look at each header and discuss their merits. I've included some important references for each header so you can study them in more detail if you'd like. To remove any doubt that these headers help prevent attacks that are both real and practical, I've also included some videos showing how some of the attacks work. Read more: Security through HTTP response headers
  23. Ma intreb cum convertesti tu 12vcc in 110 sau 220vca cu ajutorul unui transformator, tinand cont ca transformatoarele functioneaza numai cu tensiune alternativa. De asemenea, te rugam sa acorzi atentie la data la care a fost facut un thread sau cand s-a vorbit ultima oara in el.
  24. Nu ne bagam peste deciziile moderatorilor/adminilor sa scoatem banuri fara un motiv bine intemeiat. Sa nu aveti obiectii de facut si sa nu se supere omul ce v-a dat ban, va propun altceva. Va scot banurile si aveti 5 zile timp sa puneti fiecare cate 10 stiri bune de securitate sau cate 5 tutoriale (photoshop, windows, linux, php, python ... sau orice altceva tehnic si de calitate) Ati calcat pe bec si ati luat ban. Cred ca si ceilalti mods/admins sunt de acord sa va scoatem banurile dar sa prestati ceva munca pentru comunitate Daca incalcati intelegerea, aveti ban permanent de la mine, si va adaug la usere un sufix cu "_Labar". Nu incercati sa ma furati la cantar. Usere: - askwrite - Cifre - Byte-ul Deal ?! Au fost de acord toti. In cateva minute o sa fie banurile scoase. Deci aveti timp 5 zile. ---------------------------- edit - 02.03.2014 Thread-uri facute de Byte-ul https://rstforums.com/forum/82145-boeing-launches-ultra-secure-black-smartphone-has-self-destruct-feature.rst https://rstforums.com/forum/82147-chameleon-virus-spreads-across-wifi-access-points-like-common-cold.rst https://rstforums.com/forum/82159-optic-nerve-nsa-hacked-into-webcam-millions-yahoo-users-private-images.rst https://rstforums.com/forum/82162-dissecting-newest-ie10-0-day-exploit-cve-2014-0322-a.rst https://rstforums.com/forum/82173-yahoo-vulnerability-allows-hacker-delete-1-5-million-records-database.rst https://rstforums.com/forum/82200-hackercare-aims-hack-healthcare-startups.rst https://rstforums.com/forum/82201-auroracoin-airdrop-approaches-iceland-adopts-cryptocurrency.rst https://rstforums.com/forum/82199-amex-debuts-its-most-mobile-integrated-rewards-focused-credit-card.rst Threaduri facute de Cifre https://rstforums.com/forum/82136-fortress-may-first-public-company-own-millions-dollars-bitcoins-disclose.rst https://rstforums.com/forum/82137-mt-gox-files-bankruptcy-claims-63-6m-debt.rst https://rstforums.com/forum/82144-how-use-twitter-bootstrap-create-responsive-website-design.rst https://rstforums.com/forum/82151-how-create-windows-store-app-using-html-javascript.rst https://rstforums.com/forum/82187-creating-new-google-play-multi-level-navigation-scratch.rst https://rstforums.com/forum/82188-how-encrypt-custom-configuration-section-asp-net.rst Threaduri facute de askwrite https://rstforums.com/forum/82134-photoshop-cum-sa-faci-un-logo-sigla.rst https://rstforums.com/forum/82138-photoshop-dispersion-effect-smoke-cs7.rst https://rstforums.com/forum/82139-photoshop-cum-sa-faci-un-banner-web-animat.rst https://rstforums.com/forum/82140-photoshop-soft-focus-effect.rst https://rstforums.com/forum/82142-photoshop-glowing-line-effect.rst askwrite pare ca ne-a cam furat la cantar cu deal-ul. Cifre si Byte-ul chiar au postat baietii. // edit: Puteti continua baieti. Daca mai faceti si voi ocazional cate un post de calitate oamenii vor tine cont de ele. Asta e ideea unei comunitati.
  25. Cablul de antena este coaxial si are 75 ohmi. Cablul pentru antenele wireless are de regula o impedanta de 50 de ohmi si lucreaza in frecvente foarte mari. Iti recomand sa folosesti cablu standard de extensie pentru wireless.
×
×
  • Create New...