-
Posts
4995 -
Joined
-
Last visited
-
Days Won
388
Everything posted by aelius
-
Ai doua zile sa faci o dovada ca te-a inselat cu ceva.
-
Daca ai o discutie, trebuie sustinuta cu argumente nu cu puli de suspensie. Cred ca nu v-ati dat seama ca aici este o comunitate orientata catre IT. In alta ordine de idei, nici mie nu imi plac ungurii si ciorile din mai multe motive. Toata saracia asta cu "ungurii vor Ardealul" se trage de la politicieni. In Ardeal, sunt gramada de familii mixte care traiesc in armonie si nu isi dau in cap pe strada. Sincer, mai bine traiesc langa un ungur decat langa un tigan. Faceti brigazi impotriva ciorilor daca tot vreti sa faceti ceva. Dar nu pe net! Cu tastatura in mana toti sunt viteji. Apropo, cred ca stiu aici pe forum cel putin un ungur care e respectat de baieti. Nu mai arunca cu rahat aiurea. Mare conducator de oaste esti, inarmat cu tastatura ... Apropo, ai mai mult de 20 ani ? - Ce te face nationalist ? - Ce iti ofera tie statul Roman in afara de obligatia de a plati taxe? Hai sa-ti spun ce mi-a oferit mie. Am invatat ani de zile si am ajuns la concluzia ca cele peste 20 de diplome or sa ramana aruncate intr-un sertar pentru ca statul chiar nu o sa-mi ofere nimic pentru ca totul la noi merge pe spaga, tupeu si smecherie. Am plecat in Germania si am stat acolo 5 ani, mi-am facut o firma pe care am ridicat-o de la 0 la peste 350.000 de euro pe an ca cifra de afaceri si m-am intors in RO cu gand sa fac si aici ceva (reprezentanta, ceva locuri de munca, etc). Surpriza: Statul Roman mi-a dat cu sutul, mi-au distrus business-ul si m-au arestat; Asta in conditiile in care plateam o suma de peste 10.000 de euro lunar la firme din Romania (ceva furnizori - bani din care se plateau salarii, taxe, etc). Cireasa de pe tort: peste 3000 de clienti platitori de taxe au ramas fara echipamente sau site-uri si cativa au dat faliment. Capul sus! Mergem mai departe si o luam de la capat. Deci, poti baga pulile de suspensie in BabuinLand, tara in care traim si sa intelegi ca nu vei avea niciun viitor aici. Aviz amatorilor: Ultimul care pleaca, sa stinga lumina. Apa o trag eu! Poti sa ma si injuri, mi se indoaie ;-))
-
Parca era vorba de web development.
-
Spune-ne si noua cate tipuri de XSS cunosti si ce le diferentiaza. Eu nu cred ca am vreun post la show-off, dar asta nu inseamna ca sunt habarnist
-
Dai pace frate .... Daca a gasit XSS in google.com, inseamna ca noi suntem imparati peste ceruri. Sunt baieti aici cu cap care au dovedit de multe ori ce stiu (paypal, google, att, apple ... samd), dar nu el.
-
Bun venit. Intrebare: Daca nu te reprezinta, de ce l-ai ales ? Puteai sa-ti pui nickname 'CrosetezMileuri'. E liber. :> // edit: glumeam, am vrut sa vad ce spui ;-)
-
Salut, Incearca http://www.phpmotion.com/ Features: Videos - Easy uploading of Videos directly from the user computer - Support for many formats including (mpg, avi, divx and more) - View upload process as it happens - Edit video at anytime, change the title, description and tags - Delete Video at anytime allowing management of files - Make video public or private for those who don't like to share - Allow or disallow video comments and also video embedding - Allow or disallow embedding Photos/Images (This feature can easily be disabled) - Create a new photo album - Upload photos images - Bulk upload of photos (up to 3 at a time) Audio/Mp3 - Support for mp3 file format - Automatic audio meta tags reading (title, genre etc) Blogs (This feature can easily be disabled) - Create a new blog - Full editing features including wysiwyg editor Groups - Create a new group for even more video sharing - Group admin can make group private or public - Videos can be deleted and added to the group very easily - Group admin can deleted members and also comments - Members can talks together using the group comments Favorites - Add videos to favourites allowing for easy playback of the list - Videos can be deleted at anytime Member Profile - Members can edit their personal profile including adding a picture - Members will have a unique url for their profile page - Fully customizable profile page (background images, colors, styles etc)* Messaging - Full featured internal email systems for member communication Friends - Each member can have a list of this friends - Easily invite more friends to join them on the network - Share videos with friends - Delete or add friends at anytime Comments System - Add comments to videos - Add comments to blogs - Add comments to images - Add comments to profile pages PS: Nu iti merge pe shared hosting. Iti trebuie un vps sau un dedicat pentru ca necesita ffmpeg si alte tool-uri de convertire video.
-
Posturile de genul ar trebui sa dispara, parerea mea + ca pare preacurvit sa spui root uid 0. Ce saracia, a vazut cineva root uid 1000 ? Am scris si eu despre asta aici. Trebuie facuta curatenie de 'Mos Craciun'
-
Ti-l taie si nu apuci nici sa iei primii marafeti. Ce rost are ?
-
Presimt ca in urmatoarele 3 ore o sa fie nebunie mare in threadul asta. Stiu, e mult 3 ore
-
A II-a. Daca o alegi pe prima, peste 10-20 de ani, nu o sa mai arate asa bine si ramai cu una si urata si proasta. A II-a se invata ea, daca e desteapta are si mintea deschisa + ca o femeie arata mai bine mai plinuta, sa ai pe ce pune mana, ce saracie Mie nu-mi plac alea de stau hainele pe ele ca pe gard la uscat. Cu mutatul la tine, mai asteapta. ps: am +30 si .. //offtopic: Muta-te in lumea araba. Le poti tine pe amandoua .... pentru o relatie stabila ) // edit: lasa frate ... ca rapandule de saltele gasesti la orice drum. A II-a pare femeie dupa descriere.
-
Servere dedicate la preturi bune. Config 1: Haswell Intel CPU Intel i5-4570 @ 3.2 Ghz 4 Core, 4 Threads, 6MB L2 Cache 16 GB DDR3 Memory 1 x 240 GB SSD Force 3 (6Gb/s, 85.000 IOPS) Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 60 euro Setup fee: 65 euro Config 2: Haswell Intel CPU Intel i5-4570 @ 3.2 Ghz 4 Core, 4 Threads, 6MB L2 Cache 32 GB DDR3 Memory 2 x 240 GB SSD Force 3 (6Gb/s, 85.000 IOPS) Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 88 euro Setup fee: 65 euro Config 3: Haswell Intel CPU Intel i7-4770 @ 3.4 Ghz 4 Core, 8 Threads, 6MB L2 Cache 32 GB DDR3 Memory 1 x 2 TB SATA3 Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 110 euro Setup fee: 65 euro Config 4: Haswell Intel CPU Intel i7-4770 @ 3.4 Ghz 4 Core, 8 Threads, 6MB L2 Cache 32 GB DDR3 Memory 2 x 240 GB SSD Force 3 (6Gb/s, 85.000 IOPS) Raid 1 Hardware controller (Adaptec/3Ware) Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 130 euro Setup fee: 65 euro Config 5: Haswell Intel CPU Xeon E3-1230 @ 3.2 Ghz 4 Core, 8 Threads, 8MB L2 Cache 16 GB DDR3 Memory 2 x 2TB eSATA Enterprise Raid 1 Hardware controller (Adaptec/3Ware) Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 150 euro Setup fee: 65 euro Config 6: Haswell Intel CPU Xeon E3-1230 @ 3.2 Ghz 4 Core, 8 Threads, 8MB L2 Cache 32 GB DDR3 Memory 4 x 2TB SATA3 Raid 10 Hardware controller (Adaptec/3Ware Monthly traffic: 20 TB Network Port Speed: 100Mbps (upgrade to 1Gbps for just +20 euro per month) 2 IP Addresses included with custom reverse DNS Monthly cost: 200 euro Setup fee: 65 euro Note: - Latimea de banda este garantata catre orice destinatie (EU/US/Asia) / Avem peer-uri private cu peste 300 de furnizori. Cu tot ce nu este peer, iesim cu conexiune prin Level3, Cogent, Telia, Hurricane Electric si NTT. De asemenea, pe BGP folosim solutiile Noction (in caz ca exista loss pe o routa aleasa de BGP, se comuta pe o alta) - Nu se accepta child porn/spam/scan/phishing/fraude - Serverele sunt activate in aproximativ 3 zile de la efectuarea platii - Adresele IP alocate sunt de Germania. - Plata se poate face prin PayPal. - Se poate face contract daca este necesar. - Preturile de mai sus sunt finale si nu se mai adauga TVA sau altceva la ele. - La cerere, se poate instala pe servere apache, php, mysql, nginx. De asemenea, se poate face si un tuning initial pe langa instalare. (nu au cost aditional) - Consultanta si suport tehnic premium pentru tot ce se mananca cu linux. (atat telefonic cat si pe email) - Pe langa serverele prezentate, avem toata gama de la HP (de la HP DL120 pana la DL980), dar e clar ca acolo sunt alte costuri pentru ca nu se incadreaza la categoria 'low end/cost' - Cine vrea sa reinchirieze serverele, putem colabora si putem face alte preturi. (discutam) - OS-uri: Orice distributie de linux, FreeBSD, NetBSD, OpenBSD, Solaris. Momentan nu avem Windows pentru ca acestea au un cost ridicat de licentiere si nu oferim suport tehnic pentru asa ceva ;-) Cei interesati sunt rugati sa dea un mesaj privat. La nevoie, pot sa va sun personal pentru a va da mai multe detalii. wget tests (without tcp tuning): root@pluto:~# wget -O /dev/null http://cachefly.cachefly.net/100mb.test --2013-12-15 20:55:24-- http://cachefly.cachefly.net/100mb.test Resolving cachefly.cachefly.net (cachefly.cachefly.net)... 205.234.175.175 Connecting to cachefly.cachefly.net (cachefly.cachefly.net)|205.234.175.175|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 104857600 (100M) [application/octet-stream] Saving to: `/dev/null' 100%[===============================>] 104,857,600 94.9M/s in 1.1s 2013-12-15 20:55:25 (94.9 MB/s) - `/dev/null' saved [104857600/104857600] root@pluto:~# wget -O /dev/null http://mirror.de.leaseweb.net/speedtest/100mb.bin --2013-12-15 20:56:13-- http://mirror.de.leaseweb.net/speedtest/100mb.bin Resolving mirror.de.leaseweb.net (mirror.de.leaseweb.net)... 46.165.198.1, 2a00:c98:2010:1:1:face:d06:f00d Connecting to mirror.de.leaseweb.net (mirror.de.leaseweb.net)|46.165.198.1|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 100000000 (95M) [application/octet-stream] Saving to: `/dev/null' 100%[===============================>] 100,000,000 64.3M/s in 1.5s 2013-12-15 20:56:14 (64.3 MB/s) - `/dev/null' saved [100000000/100000000] root@pluto:~# wget -O /dev/null http://mirror.leaseweb.com/speedtest/100mb.bin --2013-12-15 20:56:20-- http://mirror.leaseweb.com/speedtest/100mb.bin Resolving mirror.leaseweb.com (mirror.leaseweb.com)... 94.75.223.121, 2001:1af8:4030:1:0:dead:beef:cafe Connecting to mirror.leaseweb.com (mirror.leaseweb.com)|94.75.223.121|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 100000000 (95M) [application/octet-stream] Saving to: `/dev/null' 100%[===============================>] 100,000,000 78.0M/s in 1.2s 2013-12-15 20:56:22 (78.0 MB/s) - `/dev/null' saved [100000000/100000000] root@pluto:~# wget -O /dev/null http://ftp.iasi.roedu.net/mirrors/centos.org/6.5/isos/x86_64/CentOS-6.5-x86_64-bin-DVD2.iso --2014-01-28 00:30:34-- http://ftp.iasi.roedu.net/mirrors/centos.org/6.5/isos/x86_64/CentOS-6.5-x86_64-bin-DVD2.iso Resolving ftp.iasi.roedu.net (ftp.iasi.roedu.net)... 81.180.250.146, 2001:b30:1::146 Connecting to ftp.iasi.roedu.net (ftp.iasi.roedu.net)|81.180.250.146|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 1284395008 (1.2G) [application/octet-stream] Saving to: `/dev/null' 43% [================================> ] 554,423,034 103M/s eta 9s ^C root@pluto:~# wget -O /dev/null http://mirror.nl.leaseweb.net/speedtest/10000mb.bin -4 --2014-02-24 23:07:19-- http://mirror.nl.leaseweb.net/speedtest/10000mb.bin Resolving mirror.nl.leaseweb.net (mirror.nl.leaseweb.net)... 94.75.223.121 Connecting to mirror.nl.leaseweb.net (mirror.nl.leaseweb.net)|94.75.223.121|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 10000000000 (9.3G) [application/octet-stream] Saving to: `/dev/null' 5% [====> ] 511,839,952 108M/s eta 91s ^C root@pluto:~# hdparm test pe un server cu SSD Force3: root@ns:~# hdparm -t --direct /dev/sda1 /dev/sda1: Timing O_DIRECT disk reads: 284 MB in 0.56 seconds = 509.85 MB/sec root@ns:~# hdparm -T /dev/sda1 /dev/sda1: Timing cached reads: 27844 MB in 2.00 seconds = 13940.39 MB/sec root@ns:~#
-
1. Sunt MD5 2. Daca tu faci SQL Injection eu sunt Mitropolit peste biserici si patron peste casele de toleranta 3. E decriptare nu "descriptare" 4. Havijareee, ai pus un link intr-o aplicatie de rahat si ai dat enter. Ce cacat de hacking e asta ? Pune mana si invata MySQL si PHP, sa stii cu ce se mananca alea. Ti-ai satisfacut curiozitatea. Nu ai nevoie de parole. Sigur vrei sa dai deface.
-
De aici ? Pai de ce am face asta ?
-
Daca-l capturez pe Basescu si-l duc in Africa sa-i trag un glont in cap, apoi sa-l decapitez, o sa fiu acuzat in BabuinLand (Romania) doar ca l-am rapit pe ovulul ala fecundat in vitro, plantat pe cale bucala si nascut pe cea dorsala ? @Stfean_Iordache: Spala-te pe ochi ma. Acum te-ai trezit ? Nu vezi ca omul e in Germania )
-
E Docsis atunci, nu ADSL*. Ei trimit configuratia pe tftp. La inceput, routerul cere un cod format de regula din 10 cifre. Dupa introducerea acestora, se asteapta un timp de sincronizare (pana la trimiterea configuratie initiale). @ZeroDoi: La youtube iti apare Gema si nu iti permite sa-l vizualizezi. (Uite asa: http://postimg.org/image/tu5ovgkl5/) Nu e tara comunista. E o tara care a inteles ca daca vrea ceva, trebuie sa plateasca. Si s-au dezvoltat pe baza principiilor sanatoase. Si nu, filmele adult nu sunt interzise decat in tarile islamice si probabil pe la chinezi. Poate te referi la child porn - Alea sunt interzise peste tot, si pe buna dreptate
-
Nu poti schimba routerul (nu ofera suport pentru asta, il poti schimba defapt) pentru ca ei trimit configuratia prin TFTP. Daca ai fritzbox inseamna ca ai ADSL sau ADSL2. Nu intereseaza pe nimeni ce descarci tu, conexiunile in Germania nu sunt monitorizate decat cu ordin judecatoresc (nu se fac abuzuri ca in romania ca intai sa te intercepteze si apoi sa obtina un ordin pentru asta). Singura chestie e sa nu descarci dupa trackere sau site-uri germane (chiar daca nu au domeniu cu .de - Sa nu fie adresate publicului din DE si sa nu fie in lb. Germana). Iti spun sigur pentru ca am firma in Germania si ca obiect de activitate e ISP. Daca totusi vrei sa fii linistit, foloseste un OpenVPN. De preferat de Olanda. (In olanda pirateria nu intra sub incidenta penala. Sunt cazuri civile doar). Cumpara un VPS pe acolo cu trafic nelimitat si iti pot face un tutorial cum sa pui OpenVPN pe el. (Este f. usor si se face in cateva minute) ps: nu cumpara si nu te conecta pe 'servere sparte'. Iti cumperi VPS legal in NL si e simplu.
-
Ia dupa filelist. In DE. sunt monitorizate trackerele si site-urile lor. Sigur 100% Plus ca providerii nu tin log-uri. Pentru a te prinde, trebuie sa-ti ia ip-ul dupa trackerul/site-ul monitorizat si in momentul ala sa sune la ISP. Daca nu se intampla asta, nu se mai intampla nimic.
-
E categoria RST Market. Daca vrei si-ti trebuie, cumperi. Daca nu, sterge-o de aici. Nu strica topicul omului aiurea. Vinde domenii, nu vinde blana ursului din padure ca voi (root, bnc, vnc si ce sloboaze mai aveti)
-
Download from here: http://www.sendspace.com/file/s96iwp The password EnjoyFuckingRedpoison I don't know if this shit works but you can extract all files from the archive. macbook Downloads$ mv jRAT.rar temp/ macbook Downloads$ cd temp/ macbook temp$ unrar x jRAT.rar UNRAR 4.20 freeware Copyright (c) 1993-2012 Alexander Roshal Extracting from jRAT.rar Enter password (will not be echoed) for args.txt: Creating jRAT OK Extracting jRAT/args.txt OK jRAT/Client.jar - use current password ? [Y]es, [N]o, [A]ll A Extracting jRAT/Client.jar OK Creating jRAT/files OK Extracting jRAT/files/API Stub.jar OK Extracting jRAT/files/API.jar OK Extracting jRAT/files/Builder.exe OK Extracting jRAT/files/db.dat OK Creating jRAT/files/help OK Creating jRAT/files/help/Building OK Extracting jRAT/files/help/Building/Allowed OS.txt OK Extracting jRAT/files/help/Building/Binder.txt OK Extracting jRAT/files/help/Building/Debug Messages.txt OK Extracting jRAT/files/help/Building/Delay.txt OK Extracting jRAT/files/help/Building/Error Handling.txt OK Extracting jRAT/files/help/Building/Final.txt OK Extracting jRAT/files/help/Building/General.txt OK Extracting jRAT/files/help/Building/Host File.txt OK Extracting jRAT/files/help/Building/Install Message.txt OK Extracting jRAT/files/help/Building/Mutex.txt OK Extracting jRAT/files/help/Building/Network.txt OK Extracting jRAT/files/help/Building/Output.txt OK Extracting jRAT/files/help/Building/Persistance.txt OK Extracting jRAT/files/help/Building/Plugins.txt OK Extracting jRAT/files/help/Building/Startup.txt OK Extracting jRAT/files/help/Building/Timeout.txt OK Extracting jRAT/files/help/Building/Tray Icon.txt OK Extracting jRAT/files/help/Building/USB.txt OK Creating jRAT/files/help/Control Panel OK Creating jRAT/files/help/Control Panel/File System OK Extracting jRAT/files/help/Control Panel/File System/File Manager.txt OK Extracting jRAT/files/help/Control Panel/File System/File Searcher.txt OK Creating jRAT/files/help/Control Panel/Fun OK Extracting jRAT/files/help/Control Panel/Fun/Drain CPU.txt OK Extracting jRAT/files/help/Control Panel/Fun/Fun Manager.txt OK Extracting jRAT/files/help/Control Panel/Fun/Messagebox.txt OK Extracting jRAT/files/help/Control Panel/Fun/Piano.txt OK Extracting jRAT/files/help/Control Panel/Fun/Remote Chat.txt OK Creating jRAT/files/help/Control Panel/Network Functions OK Extracting jRAT/files/help/Control Panel/Network Functions/Download Manager.txt OK Creating jRAT/files/help/Control Panel/Remote MSConfig OK Extracting jRAT/files/help/Control Panel/Remote MSConfig/Registry Startup.txt OK Extracting jRAT/files/help/Control Panel/Remote MSConfig/Windows Services.txt OK Creating jRAT/files/help/Control Panel/Scripting OK Extracting jRAT/files/help/Control Panel/Scripting/Batch.txt OK Extracting jRAT/files/help/Control Panel/Scripting/HTML.txt OK Extracting jRAT/files/help/Control Panel/Scripting/JavaScript.txt OK Extracting jRAT/files/help/Control Panel/Scripting/VB Script.txt OK Creating jRAT/files/help/Control Panel/Spy Functions OK Extracting jRAT/files/help/Control Panel/Spy Functions/Keylogger.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Offline Keylogger.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Remote Screen.txt OK Extracting jRAT/files/help/Control Panel/Spy Functions/Sound Capture.txt OK Creating jRAT/files/help/Control Panel/Stealers and Data OK Extracting jRAT/files/help/Control Panel/Stealers and Data/Clipboard.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/FileZilla.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/Minecraft.txt OK Extracting jRAT/files/help/Control Panel/Stealers and Data/uTorrent downloads.txt OK Creating jRAT/files/help/Control Panel/System Functions OK Extracting jRAT/files/help/Control Panel/System Functions/Hosts File.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Installed Programs.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Registry.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Remote CMD.txt OK Extracting jRAT/files/help/Control Panel/System Functions/Remote Process.txt OK Creating jRAT/files/help/Control Panel/System Info OK Extracting jRAT/files/help/Control Panel/System Info/Computer Info.txt OK Extracting jRAT/files/help/Control Panel/System Info/Drives.txt OK Extracting jRAT/files/help/Control Panel/System Info/Environment Variables.txt OK Extracting jRAT/files/help/Control Panel/System Info/JVM Info.txt OK Extracting jRAT/files/help/Control Panel/System Info/Monitors.txt OK Extracting jRAT/files/help/Control Panel/System Info/System Monitor.txt OK Extracting jRAT/files/help/Control Panel/System Info/System Properties.txt OK Creating jRAT/files/help/Customizing Appearance OK Extracting jRAT/files/help/Customizing Appearance/Changing Icons.txt OK Extracting jRAT/files/help/Customizing Appearance/Colors.txt OK Extracting jRAT/files/help/Customizing Appearance/Ping Icons.txt OK Creating jRAT/files/help/Sockets OK Extracting jRAT/files/help/Sockets/Listening.txt OK Extracting jRAT/files/Installer.jar OK Extracting jRAT/files/Stub.jar OK Extracting jRAT/launch_unix.sh OK Extracting jRAT/launch_win.bat OK Creating jRAT/plugins OK Creating jRAT/plugins/Keylogger OK Extracting jRAT/plugins/Keylogger/icon.png OK Extracting jRAT/plugins/Keylogger.jar OK Creating jRAT/plugins/stubs OK Extracting jRAT/plugins/stubs/Keylogger with window titles (Windows only).jar OK Extracting jRAT/plugins/stubs/Keylogger.jar OK Extracting jRAT/plugins/stubs/Webcam.jar OK Creating jRAT/plugins/Webcam OK Extracting jRAT/plugins/Webcam/config.properties OK Extracting jRAT/plugins/Webcam/icon.png OK Extracting jRAT/plugins/Webcam.jar OK Creating jRAT/settings OK Extracting jRAT/settings/.bookmarks OK Extracting jRAT/settings/.colors OK Extracting jRAT/settings/.id OK Extracting jRAT/settings/.settings OK Extracting jRAT/settings/.sockets OK Extracting jRAT/settings/.stats OK Extracting jRAT/settings/.theme OK Creating jRAT/files/notes OK All OK macbook temp$ cd .. macbook Downloads$ rm -rf temp/ macbook Downloads$
-
PARIS — For all their indignation last summer, when the scope of the United States’ mass data collection began to be made public, the French are hardly innocents in the realm of electronic surveillance. Within days of the reports about the National Security Agency’s activities, it was revealed that French intelligence services operated a similar system, with similarly minimal oversight. And last week, with little public debate, the legislature approved a law that critics feared would markedly expand electronic surveillance of French residents and businesses. The provision, quietly passed as part of a routine military spending bill, defines the conditions under which intelligence agencies may gain access to or record telephone conversations, emails, Internet activity, personal location data and other electronic communications. The law provides for no judicial oversight and allows electronic surveillance for a broad range of purposes, including “national security,” the protection of France’s “scientific and economic potential” and prevention of “terrorism” or “criminality.” In an unusual alliance, Internet and corporate groups, human rights organizations and a small number of lawmakers have opposed the law as a threat to business or an encroachment on individual rights. The government argues that the law, which does not take effect until 2015, does little to expand intelligence powers. Rather, officials say, those powers have been in place for years, and the law creates rules where there had been none, notably with regard to real-time location tracking. While conceding that the new law “does effectively expand the existing regime to adapt it to the missions and reality of our intelligence services,” Defense Minister Jean-Yves Le Drian told the Senate that “it especially reinforces oversight as compared with the current situation.” In effect, analysts say, the government has either staked out rights to a vast new range of surveillance practices, or acknowledged that it has already been collecting far more data, under far less regulated circumstances, than people realized. Neither prospect is terribly comforting to the law’s opponents. “We feel that anything can be placed under the heading ‘national security,’ ” said Clémence Bectarte, a lawyer for the International Federation for Human Rights. The law, she said, expanded the list of state administrations authorized to request electronic surveillance, for example to include the budget ministry. “There should have been a parliamentary commission and a real public debate,” she said. French intelligence agencies have little experience publicly justifying their practices. Parliamentary oversight did not begin until 2007. The Association des Services Internet Communautaires, or @sic, an advocacy group whose members include AOL, eBay, Facebook, Google, Microsoft and several top French Internet companies, discovered the new legislation essentially by chance. “There was no consultation at all,” said Giuseppe de Martino, @sic’s director and an executive at Dailymotion, a French online video service. “No one said anything about it to us.” The National Commission for Information Technology and Freedoms, a state administration meant to protect the rights and privacy of citizens, said it was not consulted on the contentious elements of the bill, though it was asked to review other provisions. The government denied any effort to shield the law from public scrutiny. The bill went through four votes in Parliament, noted one government official. “Not exactly discreet, as maneuvers go,” he said, speaking on condition of anonymity because he was not authorized to speak publicly. @sic said the law could give the authorities blanket rights to seize “all documents stocked in a ‘cloud’ service subscribed by a given Internet user,” for instance. Currently, such a seizure would require a warrant, the group argued. “We don’t know what this is going to mean in practice,” Mr. de Martino said. “But now the doors are open.” French intelligence services are already reputed to be rapacious collectors of foreign industrial secrets, and there is some concern the law could discourage international investment. Internet service companies worry that users may begin to turn away from the Internet or share their personal information less freely. But Jean-Pierre Sueur, a senator from President François Hollande’s Socialist Party, said identical provisions have been in place since the passage of an electronic intercepts law in 1991. “If they’re angry about this, they ought to have been angry for 23 years,” Mr. Sueur said. The new law created “only additional guarantees,” he said, and stricter rules for the 200,000 or so intercept operations conducted by French intelligence services each year. He rejected calls for judicial oversight, saying, “In the context of the antiterror fight, day to day, it’s impossible.” Alain Juillet, president of the Academy of Economic Intelligence and a former intelligence director for France’s foreign intelligence service, said the law’s value was “that it puts a framework where there wasn’t one before. Before, there was nothing; it was total freedom,” he said. Laurent Borredon, a reporter for Le Monde, qualified that endorsement. “If one can reproach the parliamentarians for something,” he wrote last week, “it’s to have regulated the tip of an iceberg whose depth we’re only barely beginning to measure today.” Source: http://www.nytimes.com/2013/12/15/world/europe/france-broadens-its-surveillance-power.html?src=recg
-
SAN FRANCISCO — A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure. The flaw — which involves a small but measurable number of cases — has to do with the way the system generates random numbers, which are used to make it practically impossible for an attacker to unscramble digital messages. While it can affect the transactions of individual Internet users, there is nothing an individual can do about it. The operators of large Web sites will need to make changes to ensure the security of their systems, the researchers said. The potential danger of the flaw is that even though the number of users affected by the flaw may be small, confidence in the security of Web transactions is reduced, the authors said. The system requires that a user first create and publish the product of two large prime numbers, in addition to another number, to generate a public “key.” The original numbers are kept secret. To encrypt a message, a second person employs a formula that contains the public number. In practice, only someone with knowledge of the original prime numbers can decode that message. For the system to provide security, however, it is essential that the secret prime numbers be generated randomly. The researchers discovered that in a small but significant number of cases, the random number generation system failed to work correctly. The importance in ensuring that encryption systems do not have undetected flaws cannot be overstated. The modern world’s online commerce system rests entirely on the secrecy afforded by the public key cryptographic infrastructure. The researchers described their work in a paper that the authors have submitted for publication at a cryptography conference to be held in Santa Barbara, Calif., in August. They made their findings public Tuesday because they believe the issue is of immediate concern to the operators of Web servers that rely on the public key cryptography system. “This comes as an unwelcome warning that underscores the difficulty of key generation in the real world,” said James P. Hughes, an independent Silicon Valley cryptanalyst who worked with a group of researchers led by Arjen K. Lenstra, a widely respected Dutch mathematician who is a professor at the École Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that 99.8 percent security is fine,” he added. That still means that approximately as many as two out of every thousand keys would not be secure. The researchers examined public databases of 7.1 million public keys used to secure e-mail messages, online banking transactions and other secure data exchanges. The researchers employed the Euclidean algorithm, an efficient way to find the greatest common divisor of two integers, to examine those public key numbers. They were able to produce evidence that a small percentage of those numbers were not truly random, making it possible to determine the underlying numbers, or secret keys, used to generate the public key. They said they “stumbled upon” almost 27,000 different keys that offer no security. “Their secret keys are accessible to anyone who takes the trouble to redo our work,” they wrote. To prevent this, one of the organizations that had collected the public keys has removed the information from the Internet and taken steps to protect it from theft. To perform their study, the researchers used several databases of public keys, including one at the Massachusetts Institute of Technology and another created by the Electronic Frontier Foundation, a Internet privacy rights group. The foundation’s database results from a project, known as the SSL Observatory, originally intended to investigate the security of the digital certificates that are used to protect encrypted data transmitted between Internet users and Web sites. “We were very careful: we did not intercept any traffic, we did not sniff any networks,” Mr. Hughes said. “We went to databases that contained public information and downloaded public keys.” Source: http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html?_r=0
-
- authentication
- encrypt
-
(and 3 more)
Tagged with:
-
Bine ai venit, rau ai nimerit. (02:38:04) Vmask: incerc de ceva timp sa copiez pacina de login www.postepay.it nu reusesc deloc (02:38:10) Vmask: ma poate ajuta cineva (02:39:04) Vmask: bineinteles nu degeaba (02:40:50) tex: Vmask (02:41:01) tex: postepay e banca (02:41:06) tex: de ce ai vrea s-o copiezi ? (02:42:30) tex: pentru scam ? (02:42:48) Vmask: da (02:43:14) RST: Vmask has been logged out (Kicked). Scammer - La munca nu la furat banii oamenilor! Ban permanent.
-
SecureAuth, a provider of 2-Factor authentication solutions, this week launched SecureAuth 2-Factor as a Service (2FaaS), a cloud-hosted authentication solution. SecureAuth 2FaaS provides flexible authentication options while maintaining user credentials on-premise, the Irvine, California-based company said. According to the company, its s technology leverages a “Device Fingerprinting mechanism” that avoids placing a thick client or an insecure cookie on users' devices, making the solution ideal for enterprise-wide, B2C, and OEM integration. SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. The solution can be deployed for web applications, including Microsoft OWA, SharePoint, and IBM WebSphere. It can also be integrated with enterprise mobile applications, including Android, Apple and iOS apps. While the solution is cloud-based, no user information or password credentials are ever stored with SecureAuth or in the cloud, the company said. A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations, making integration into their applications and deployment easy and fast. Source: SecureAuth Launches 2-Factor as a Service | SecurityWeek.Com
-
WASHINGTON - The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials. The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times. The program differs from controversial data collection by the National Security Agency, which receives phone records or other "meta-data" from telecommunications companies through court orders. The CIA passes on phone numbers of suspected militants abroad and AT&T then sifts through its database for records of phone calls that can identify foreigners with terror links, the newspaper reported. Most of the logs handed over by AT&T are related to foreign-to-foreign calls, the report said. For international calls that include one end in the United States, the company does not reveal the identity of the Americans and hides several digits of their phone numbers, which allows the CIA to comply with a ban on domestic spying, it said. The Central Intelligence Agency could choose to refer a hidden number to the FBI, which could then issue a subpoena demanding AT&T divulge the information, according to the report. An AT&T spokesman did not confirm or deny the program but said the firm acted in accordance with laws in the United States and in foreign countries. "In all cases, whenever any governmental entity anywhere seeks information from us, we ensure that the request and our response are completely lawful and proper," spokesman Mark Siegel told AFP. But he added: "We do not comment on questions concerning national security." Without verifying the existence of the program, the CIA said its intelligence gathering does not violate the privacy of Americans. "The CIA protects the nation and upholds the privacy rights of Americans by ensuring that its intelligence collection activities are focused on acquiring foreign intelligence and counterintelligence in accordance with US laws," said spokesman Todd Ebitz. The CIA is usually associated with gathering intelligence through spies in the field while the NSA focuses on eavesdropping abroad and code-breaking. But an unnamed intelligence official told the Times that the CIA sometimes needs to check phone records in "time-sensitive situations" and be able to act with speed and agility. The report offered the first indication that the CIA had a role in electronic data collection as leaks from a former intelligence contractor, Edward Snowden, have sparked a global firestorm around the NSA's digital spying. US Internet communications firms have voiced complaints that they are legally required to cooperate with the NSA's "data mining." Industry advocates have expressed concerns that NSA spying revelations could turn consumers in the US and abroad against the American technology companies. Source: CIA Paid AT&T for Phone Records: Report | SecurityWeek.Com