Jump to content

aelius

Administrators
  • Posts

    4995
  • Joined

  • Last visited

  • Days Won

    388

Everything posted by aelius

  1. A fost distractie mare. 666BLODAS666 bantuia pe acolo pe chat si ne-am gandit sa-i facem un prank. Askwrite a dat pe chat un link cu o poza (aparent), era defapt un php ce facea header location pe logout-ul de la chat. Am profitat de ocazie si i-am pus un avatar frumos si o semnatura potrivita. El le-a schimbat repede. Le-am schimbat si eu inca odata. El intreba pe chat disperat, credea ca askwrite i-a luat cookie-urile. I-am spus ca ala i-a dat un trojan, un malware ceva si l-am sfatuit sa formateze hdd-ul. Cred ca nu mai avea mult oricum. Bineinteles, a urmat o ploaie de injuraturi catre askwrite, sa nu-i mai umble prin cont. (00:21:41) askwrite: ahahahahahahahahhahahahahahahaha?hahahaha (00:21:48) 666BLODAS666: cine pula mea imi tot schimba avatarul si toate si isi bate pula de contul meu? (00:21:53) askwrite: eu (00:55:49) 666BLODAS666: mi-ai furat cookieurile (00:55:50) 666BLODAS666: atat
  2. Mai bine lasa-l asa. E mai rapida asta. Fuck web 2.0; Nu ai nevoie de desene animate, doar de o interfata de email decenta. Cred ca am folosit pine (client email de CLI) cativa ani. Just plain text.
  3. Sunt unele aplicatii care determina daca sistemul are swap sau nu. Nu functioneaza fara el. Daca ai SSD (sau orice alt storage rapid) si suficienta memorie, recomand un sysctl -w vm.swappiness=0 si sa pui 'vm.swappiness=0' in '/etc/sysctl.conf' Deci, poti pune un 512 MB swap (just in case). Daca ruleaza deja sistemul si nu vrei sa umblii la partitionare, poti face swap cu dd (imagine)
  4. As promised in an October 2013 announcement, consumer Internet giant Yahoo! has enhanced the privacy and security for its users by enabling HTTPS connections by default for all Yahoo Mail users. “Anytime you use Yahoo Mail - whether it’s on the web, mobile web, mobile apps, or via IMAP, POP or SMTP- it is 100% encrypted by default and protected with 2,048 bit certificates,” Jeff Bonforte, SVP of Communication Products at Yahoo! wrote in a blog post Tuesday. The HTTPS encryption will secure emails, attachments, contacts, as well as Calendar and Messenger in Mail, Yahoo said, protecting data and messages as they move between users' browsers and Yahoo’s servers. Yahoo Mail users have had the choice to enable HTTPS for some time, but now all users will benefit from the secure connections by default. The move to the secure browser sessions by default follows similar moves by Facebook, which enabled HTTPS by default in July 2013, and Google, which set the HTTPS default in early 2010, but has had the option for users to do so since 2008. Using HTTPS is increasingly beneficial when accessing Internet services from public networks such as Wi-Fi hotspots, and helps protect browser sessions from being snooped on by others. Nota personala: S-au facut magarii in Franta inclusiv cu certificatele ssl pentru google. Deci, nu o sa-i impiedice nimic sa obtina ce vor. Zilele trecute raspandeau malware prin intermediul site-ului, acum fac si ei 'by default' SSL. Praf in ochi pentru utilizatori. Source: Yahoo Enables HTTPS Encryption by Default for Yahoo Mail | SecurityWeek.Com
  5. PARIS - France's data protection watchdog on Wednesday fined Google 150,000 euros ($205,000) -- the maximum possible -- for failing to comply with its privacy guidelines for personal data. The watchdog, the CNIL, also ordered the US Internet giant to publish a statement relating to its decision on its French homepage for at least 48 hours within the next eight days. Google was informed of the decision on January 3, the CNIL said in a statement. France's move follows Google's introduction in 2012 of a new privacy policy which enables it to track user activity across its search engine, Gmail, the Google+ social networking platform and other services it owns, which include YouTube. The changes make it easier for Google to collect and process data that could be used by advertisers to target individuals with tailored offers, thereby increasing the company's revenue potential. The CNIL had asked Google to inform web users in France on how it processes their personal data and to define exactly how long they can store the information. It had also requested that the US giant obtain user permission before storing cookies on their computers, referring to files that track web surfers and allow companies to target them with tailored commercials. Google has always maintained that its treatment of data gathered from users is in line with European law and has previously refused to get into an argument about the specific French requirements. The issue of data protection has gathered steam worldwide following revelations by Edward Snowden, a former contractor with the National Security Agency, that the US had a vast, secret program called PRISM to monitor Internet users. Google has defended the changes it made last year on the ground that they simplify and standardize its approach across its various services. But critics argue that the policy, which offers no ability to opt out aside from refraining from signing into Google services, gives the operator of the world's largest search engine unprecedented ability to monitor its users' tastes and purchasing patterns. Source: France Fines Google Maximum Penalty in Data Privacy Row | SecurityWeek.Com
  6. Iti recomand blog-ul lui Valentin Bosioc
  7. Valim, respectul nu se castiga 'bagand' flood la site-uri fara un motiv anume. Nu castigi nimic si iti faci si dusmani. Crezi ca forumul tau nu pica la DDoS ? Orice pica. Inclusiv GOOGLE, AKAMAI, YAHOO. Infestezi 200.000 servere si trimiti din ele pachete ca pe conducta. Nu e nimic constructiv.
  8. Daca vreti sa descarcati toate cartile de acolo si sa aveti si timp liber de cafea: marian@pluto:~$ mkdir books marian@pluto:~$ cd books/ marian@pluto:~/books$ marian@pluto:~/books$ wget -r -A "pdf" http://n-pn.info/repo/HackBBS/HackBBS/Docs_HackAngel/ marian@pluto:~/books$ mv n-pn.info/repo/HackBBS/HackBBS/Docs_HackAngel/* . marian@pluto:~/books$ rm -rf n-pn.info/
  9. Pai ai codul la indemana, poti implementa singur absolut tot ce iti trebuie. E si 'how to' acolo. https://rstforums.com/forum/79735-emergency-self-destruction-luks-kali.rst http://thehackernews.com/2014/01/Kali-linux-Self-Destruct-nuke-password.html
  10. Si aici, pe forum, avem/am avut masoni. Unu era vai de steaua lui, agramat, dadea cu Haviji si aposostroful in site-uri si dupa un an a devenit expert in securitate, inginer in cibernetica, mecatronica, fizica cuantica si General Manager la o firma de securitate. 'De care este.' Oare tot 'pro/re gresul' asta s-o datora masoneriei si stiintelor oculte ?! )
  11. Pai si ... nu stiu cum sa te intreb. Vrei sa-l ajuti ? O fi crezut omul ca esti poponete si s-a simtit lezat. Nu vad asta un abuz de putere. "Nu e nicidecum o insult? adus? unui moderator" - Si Becali zicea: "El m-a facut incult, eu l-am facut oligofren si hahalera, nu l-am jignit!"
  12. aelius

    Fun stuff

    https://www.youtube.com/watch?v=aeaPanpU-iw
  13. Raspunsuri sunt, trebuie doar sa pui intrebarea potrivita. "Nu ma pot conecta la internet. Cum sa fac asta?!" nu este o intrebare buna. Citeste pe aici cate ceva, o sa ai nevoie. Deci, ce fel de conectivitate ai la internet ? - Este PPPOE ? (Cu user si parola) - Ai un router "in fata" pc-ului ? - Ai un modem 3G sau dialup ? - Ce furnizor de internet ai? - Cum ai incercat sa te conectezi si nu ti-a reusit ? Si scoate emoticonurile alea cand intrebi ceva serios.
  14. Da, chiar nu e o solutie asta. Dar e recomandat sa iti schimbi periodic parolele.
  15. Kali Linux Full Disk Encryption As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensitive materials. Setting up full disk encryption with Kali is a simple process. The Kali installer includes a straightforward process for setting up encrypted partitions with LVM and LUKS. Once encrypted, the Kali operating system requires a password at boot time to allow the OS to boot and decrypt your drive, thus protecting this data in case your laptop is stolen. Managing decryption keys and partitions is done using the cryptsetup utility. Nuking our Kali Linux FDE Installation A couple of days ago, one of us had the idea of adding a “nuke” option to our Kali install. In other words, having a boot password that would destroy, rather than decrypt, the data on our drive. A few Google searches later, we found an old cryptsetup patch by Juergen Pabel which does just that, adding a “nuke” password to cryptsetup, which when used, deletes all keyslots and makes the data on the drive inaccessible. We ported this patch for a recent version of cryptsetup and posted it on Github. Read more: Emergency self-destruction of LUKS in Kali | Kali Linux
  16. aelius

    Fun stuff

    (12:18:32) Oust: )) (12:18:38) Oust: Tre' sa merg sa ma pensez. (12:19:02) aelius: iti dai si cu creme ? (12:19:08) aelius: pai ce ma, esti muiere (12:19:08) Oust: Nu. (12:19:10) aelius: )))) (12:19:11) aelius: hahahaha (12:19:13) Oust: Imi e frica. (12:19:18) Oust: M-am mai dus odata sa ma penseze. (12:19:21) Oust: Ba imi era frica... (12:19:23) Oust: Serios va spun. (12:19:27) nedo: e doar un pic de frica (12:19:32) nedo: un pic de durere* (12:19:33) Oust: Imi era asa o frica ca ma face muiere. (12:19:35) nedo: mare branza (12:19:37) aelius: te penseaza si la Fofoloanca ? (12:19:37) Oust: Nu e durere. (12:19:39) Oust: Nu de durere ma. (12:19:42) nedo: ) (12:19:42) Oust: Pis pe ea de durere. (12:19:45) aelius: ))))))))))))))))))))))) (12:19:49) Oust: Mie imi era frica ca imi fute sprancenele. (12:19:55) Oust: Si o sa arat ca smigle. (12:20:02) Oust: Ca AZIS. (12:20:04) Oust: (12:20:08) aelius: ))) (12:20:15) Oust: Ma duc doar sa le tunda si sa ia din parti putin. (12:20:17) ENCODED: eu nu`mi pensez sprancenele (12:20:18) Oust: Nu sa le contureze. (12:20:20) ENCODED: sunt perfecte (12:20:21) ENCODED: ) (12:20:22) aelius: sa-ti proptim spranceana pe maciuca ma (12:20:24) Oust: Foarte bine. (12:20:26) aelius: )))))))))))))))))))))))))))) (12:20:27) ENCODED: la tine se unesc ? (12:20:32) Oust: Nu. (12:20:37) aelius: da-ne-ai cu spranceana-n burta (12:20:39) aelius: ahahahaha (12:20:39) Oust: Ca nu le las. (12:20:49) Oust: Eu sunt paros ba, am par si pe piept. (12:20:56) Oust: Sunt barbat, nu muiere. (12:21:09) aelius: http://wow7.ro/wp-content/upload?s/2013/08/tanar-haios-infiorator-?cu-sprancene-unite-01.jpg (12:21:10) Oust: Am dat 200 ron pe un bodygroom. (12:21:11) aelius: HAHAHAHHAHAHAHA (12:21:16) aelius: ete ma, ai pus poza pe net (12:21:21) Oust: Hahahaha (12:21:25) Oust: Nu ma nu le am asa. (12:21:25) aelius: ce pula mea e aia, spranceana sau COZOROC de sapca (12:21:28) aelius: )))}HAHAHAHHAHAHAHAHA (12:21:30) aelius: HAHAHAHHAHAHAHHAHA (12:21:33) Oust: HHHAHAHAHAHAHAHAHA (12:21:36) Oust: )) (12:21:56) ENCODED: ala e Oust ? (12:21:57) ENCODED: Oare e Oust ? http://wow7.ro/wp-content/upload?s/2013/08/tanar-haios-infiorator-?cu-sprancene-unite-01.jpg
  17. Acele aplicatii malware sunt destinate Windows-ului. Pe linux oricum ai control mai mare: Rulezi aplicatiile sub un user cu privilegii restranse, poti vedea foarte usor procesele ce ruleaza si ai o gramada de scule pentru monitorizare si debugging. (tcpdump, iptraf, ps, pstree, lsof). Daca esti paranoic, poti face "daily md5sum" pe binare pentru a te asigura ca este totul ok. (poti instala chiar si un IDS sa monitorizeze fisiere, etc ..) (acum depinde si de experienta)
  18. Suntem de parere ca esti un mare labagiu si ca te folosesti de munca altuia, fara a acorda credit. This photo set was shared via Share.Pho.to Cand copiezi o idee de la un om, pui link catre el, nu iti atribui tu munca lui. Eject. (ban)
  19. After Snapchat hack, this can be another worst data breach of the new year. A Pakistani hacker 'H4x0r HuSsY' has successfully compromised the official Forum of 'openSUSE', a Linux distro developed, sponsored & supported by SUSE. The hacker managed to deface the Forum and uploaded its custom message page as shown and account information of 79,500 registered users' may have been compromised. The popular website MacRumors's Forum was compromised in last November using an alleged zero day exploit, which is based on vBulletin, a famous forum software. The openSUSE Forum is also based upon vBulletin. Another interesting fact is that openSUSE is still using vBulletin 4.2.1, which is vulnerable to inject rogue administrator accounts flaw. Whereas, the latest patched vBulletin 5.0.5 is available. Possibly, Hacker exploits same or another known vBulletin version 4.2.1 vulnerability to access the website's administrative panel. Read more: Exclusive - openSUSE Forum Hacked; 79500 Users' Data Compromised Nota personala: Mie imi pare o cacanarie sa se intample asta cu un soft comercial. Costul nu este deloc mic si pe langa costul lui, trebuie sa platesti pentru suport. Suport la ce ? La o saracie low-end cu gauri de securitate?! Se pare ca vBulletin devine un fel de mambo. Cine e vechi pe net stie ce nebunie era inainte la mambo / joomla. Observ din imaginile de acolo ca au folosit inclusiv un phpshell. Cat de retard sa fie un admin incat sa nu stie sa dezactiveze niste functii php si sa instaleze ceva module de protectie (just in case).
  20. Nu am observat ca a mai fost postat
  21. Am folosit cisco din seria 7600 si unele mai mici dupa ele, insa restrictionate la net din acl-uri (pentru evitarea atacurilor in general). Ca routere, prefer Force 10. Publicase un polonez o chestie foarte interesanta referitoare la BIOS-uri si interceptari/operatii remote. (sa vad daca-l gasesc)
  22. Several American tech companies have responded to a report published in Germany’s Der Spiegel magazine detailing how National Security Agency officials exploit vulnerabilities in their hardware and software. The report, released in tandem with an address by security expert Jacob Appelbaum at Germany’s 30C3 conference, was based on classified NSA documents that were among those presumably disclosed to journalists by former government contractor Edward Snowden. Among the documents released over the weekend was a “catalog” of spy hardware and software developed by “ANT,” a previously unknown unit at the NSA. The group is tasked with developing spy gadgets for use by agents at the NSA and elsewhere. The gadgets developed by ANT take advantage of previously-unknown vulnerabilities in computer hardware and software manufactured by at least nine American companies: Dell, Hewlett-Packard, Cisco, Juniper, Apple, Microsoft, Western Digital, Seagate/Maxtor and Oracle. At the 30C3 Conference, Appelbaum questioned whether or not the American companies named in the documents were complicit in “leaving us vulnerable,” but said it was ultimately important to name the companies because “some of them are victims. “It’s important to note that we don’t yet understand which is which,” Appelbaum said, “so it’s important to name them so that they have to on record, and so that they can say where they are.” Read more: American companies respond to new NSA hacking claims | The Desk
  23. Source: http://www.dailytech.com/Tax+and+Spy+How+the+NSA+Can+Hack+Any+American+Stor es+Data+15+Years/article34010.htm
  24. Confirm, astazi am primit un reply de la un email de abuse trimis pe 16.12.2013
  25. Iti trag pula pe nas tigane, nu s-a folosit de prostia mea. Daca erai atent ai fi observat ca nu am participat acolo. In plus, nici nu ma intereseaza tool-urile alea de seo, ma pis pe ele. Sunt inutile pentru ca nu ma ocup de SEO. Vezi ca are mai multe sensuri ? Manca-mi-ai troscotul de pe santul curului de epuizat de laba. Daca o futeam eu pe ma-ta, erai geniu inca de la 7 ani. Ai facut offtopic si ai primit un warn. Ne-ai luat pula-n gura si ai facut politica, ai luat ban. Treaba cu AOL-ul ti-am spus-o pentru ca esti un cacat de copil idiot care crede ca daca sta pe AOL poate face orice infractiuni pe net ca nu il monitorizeaza nimeni. In rest, imi trag pula pe tine, pe ma-ta stramba si stirba si pe familia ta. Sugi pula, nu ai ce face decat sa comentezi si tu acolo de pomana, labare. ban.
×
×
  • Create New...