-
Posts
4999 -
Joined
-
Last visited
-
Days Won
388
Everything posted by aelius
-
Bine ai venit, rau ai nimerit. (02:38:04) Vmask: incerc de ceva timp sa copiez pacina de login www.postepay.it nu reusesc deloc (02:38:10) Vmask: ma poate ajuta cineva (02:39:04) Vmask: bineinteles nu degeaba (02:40:50) tex: Vmask (02:41:01) tex: postepay e banca (02:41:06) tex: de ce ai vrea s-o copiezi ? (02:42:30) tex: pentru scam ? (02:42:48) Vmask: da (02:43:14) RST: Vmask has been logged out (Kicked). Scammer - La munca nu la furat banii oamenilor! Ban permanent.
-
SecureAuth, a provider of 2-Factor authentication solutions, this week launched SecureAuth 2-Factor as a Service (2FaaS), a cloud-hosted authentication solution. SecureAuth 2FaaS provides flexible authentication options while maintaining user credentials on-premise, the Irvine, California-based company said. According to the company, its s technology leverages a “Device Fingerprinting mechanism” that avoids placing a thick client or an insecure cookie on users' devices, making the solution ideal for enterprise-wide, B2C, and OEM integration. SecureAuth 2FaaS enables authentication via SMS, telephony, or PUSH notification OTPs, eliminating the need for hard tokens. The solution can be deployed for web applications, including Microsoft OWA, SharePoint, and IBM WebSphere. It can also be integrated with enterprise mobile applications, including Android, Apple and iOS apps. While the solution is cloud-based, no user information or password credentials are ever stored with SecureAuth or in the cloud, the company said. A graphical user interface (GUI) console gives administrators a selection of authentication protocols through easy to use dropdown menus and wizard installations, making integration into their applications and deployment easy and fast. Source: SecureAuth Launches 2-Factor as a Service | SecurityWeek.Com
-
WASHINGTON - The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials. The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times. The program differs from controversial data collection by the National Security Agency, which receives phone records or other "meta-data" from telecommunications companies through court orders. The CIA passes on phone numbers of suspected militants abroad and AT&T then sifts through its database for records of phone calls that can identify foreigners with terror links, the newspaper reported. Most of the logs handed over by AT&T are related to foreign-to-foreign calls, the report said. For international calls that include one end in the United States, the company does not reveal the identity of the Americans and hides several digits of their phone numbers, which allows the CIA to comply with a ban on domestic spying, it said. The Central Intelligence Agency could choose to refer a hidden number to the FBI, which could then issue a subpoena demanding AT&T divulge the information, according to the report. An AT&T spokesman did not confirm or deny the program but said the firm acted in accordance with laws in the United States and in foreign countries. "In all cases, whenever any governmental entity anywhere seeks information from us, we ensure that the request and our response are completely lawful and proper," spokesman Mark Siegel told AFP. But he added: "We do not comment on questions concerning national security." Without verifying the existence of the program, the CIA said its intelligence gathering does not violate the privacy of Americans. "The CIA protects the nation and upholds the privacy rights of Americans by ensuring that its intelligence collection activities are focused on acquiring foreign intelligence and counterintelligence in accordance with US laws," said spokesman Todd Ebitz. The CIA is usually associated with gathering intelligence through spies in the field while the NSA focuses on eavesdropping abroad and code-breaking. But an unnamed intelligence official told the Times that the CIA sometimes needs to check phone records in "time-sensitive situations" and be able to act with speed and agility. The report offered the first indication that the CIA had a role in electronic data collection as leaks from a former intelligence contractor, Edward Snowden, have sparked a global firestorm around the NSA's digital spying. US Internet communications firms have voiced complaints that they are legally required to cooperate with the NSA's "data mining." Industry advocates have expressed concerns that NSA spying revelations could turn consumers in the US and abroad against the American technology companies. Source: CIA Paid AT&T for Phone Records: Report | SecurityWeek.Com
-
Probabil ca folosesti un cablu "ecranat" de proasta calitate (cablul care iti vine in receiver sau cel AV). Trece cumva vreunul pe langa priza ?
-
- root nu reprezinta un server - root nu reprezinta o distributie de linux "Trebuia sa intrebi: Am un server cu Linux, RedHat/Debian/Fedora/Ubuntu si doresc sa instalez perl. Ma puteti ajuta ?" - Daca vreti ajutor, evitati cuvintele astea "root, roata, scanu" si pana mea. Pa. Ban permanent.
-
ar trebui sa iei ban. next time, cand deschizi topicuri de genul, chiar e al tau
-
maxmind nu face update-uri cum trebuie. am o subnet si desi e alocat in UK, el arata ca e in romania (toate datele la whois arata de UK) Mai sunt si la RDS adrese ip cu 5.x (le vede de Olanda) Poate sa faci un tool sa se bazeze pe mai multe raspunsuri: maxmind, whois (ripe) + mtr/traceroute output (sa vezi nodurile prin care trece)
-
Butonul ... deasta e pus acolo, sa fie si putin fun Nu e chestie de raspuns la intrebari. Acolo sa fie doar pentru discutii tehnice, sa nu ne mai invadeze toti cu discutii despre muieri, iarba, Ousti, si altele
-
Sunteti de acord sa facem doua canale acolo ?. Adica sa fie cel default RST, cum este acum, si inca unul, TECH, pe care o sa fie numai discutii tehnice, sa nu mai vedem balarii acolo. Mai intra cate un om ce cere un mic ajutor si scriem de pomana ce si cum sa configureze, ca suntem spamati de alte texte. Este util si pentru discutii strict tehnice. // edit: Selectati POLL Nota: Multumim lui silvian0 pentru idee.
-
Study Shows Cost Of Data Center Outage at $7,900 Per Minute While never seen or talked about by most employees in a typical enterprise, data centers play a critical role in keeping operations moving and transactions processing, so it’s no surprise that any data center outage can be severely costly. As organizations continue to increasingly rely on technology and applications hosted in a data center, the cost of an outage has increased significantly, according to the results of a recent study. According to the 2013 Cost of Data Center Outages study, a Ponemon Institute study sponsored by Emerson Network Power, the cost of an unplanned data center outage is approximately $7,900 per minute, an increase of 41 percent from $5,600 in 2010. The 2013 report analyzed outage costs at 67 data centers within the last year across varying industry segments with a minimum size of 2,500 square feet. “Given the fact that today’s data centers support more critical, interdependent devices and IT systems than ever before, most would expect a rise in the cost of an unplanned data center outage compared to 2010. However, the 41 percent increase was higher than expected,” said Larry Ponemon, Ph.D., chairman and founder, the Ponemon Institute. “This increase in cost underscores the importance for organizations to make it a priority to minimize the risk of downtime that can potentially cost thousands of dollars per minute.” In September, Emerson Network Power released the first part of this study, which surveyed more than 450 U.S.-based data center professionals and focused on the root causes and frequency of data center downtime. Eighty-three percent of respondents said they knew the root cause of the unplanned outage. Thirty-four percent of respondents cited cyber attacks as the root cause of a data center outage, a 15 percent increase since 2010. Other frequently cited root causes of outages include: • UPS battery failure (55 percent) • Accidental EPO/human error (48 percent) • UPS capacity exceeded (46 percent). • Weather-related outage (30 percent) Highlights of the 2013 Costs of Data Center Outages report include: • Average cost of data center downtime across industries was approximately $7,900 per minute. (A 41 percent increase from the $5,600 in 2010.) • The average reported incident length was 86 minutes, resulting in average cost per incident of approximately $690,200. (In 2010 it was 97 minutes at approximately $505,500.) • For a total data center outage, which had an average recovery time of 119 minutes, average costs were approximately $901,500. (In 2010, it was 134 minutes at about $680,700.) • For a partial data center outage, which averaged 56 minutes in length, average costs were approximately $350,400. (In 2010, it was 59 minutes at approximately $258,000.) “Those organizations with revenue models that depend on the data center’s ability to deliver IT and networking services to customers – such as telecommunications service providers and e-commerce companies – and those that deal with a large amount of secure data – such as defense contractors and financial institutions – continue to incur the most significant costs associated with downtime; with the highest cost of a single event more than $1.7 million,” the report said. “As data centers continue to evolve to support businesses and organizations that are becoming more social, mobile and cloud-based, there is an increasing need for a growing number of companies and organizations to make it a priority to minimize the risk of downtime and commit the necessary investment in infrastructure technology and resources,” said Peter Panfil, vice president, global power, Emerson Network Power. Source: Cyber Attacks Are The Root Cause in 30 Percent of Data Center Outages: Study | SecurityWeek.Com
-
Pai da-le ma peste nas. Unde cacat vad ei carduri aici ? Futu-le sfintenia sufletelor de labagii notorii care vorbesc prostii.
-
Activitatea ta pe RST se termina la prezentare. Ban permanent. Thread closed.
-
doar dedicate - dar am vazut ca te ocupi cu scanul si nu prezinti incredere // edit: Asta ?
-
Cum s-ar spune, 'bashed'! (23:06:03) Oust: -bash: cd: /dev/sda4/: Not a directory (23:06:10) Oust: Plm, nu pot sa intr-un sda4. (23:06:11) Oust: E criptat.
-
post hunter, ban 24 de ore -> http://photobase.ro/di-78X1.png Va multumim pentru audienta.
-
Cumparati fratilor daca vreti. E 3 euro, ce rahat mai cautati seriale si nenorociri. E mai putin decat un pachet de tigari.
-
Baaaa, terminatilor, daca tot nu sunteti in stare sa va faceti un scanner bun, de ce saracia va apucati de rahaturi. Folositi toti synscan facut de Baganontu (DrBios) acum 14 ani in urma. L-au luat toti labagii gata facut si au pus un bash preacurvit international pe langa el cu "Powered by }{ Gica Hackeru, ilustrul geniu al lumii contemporane }{ cu pupici si floricele la nickname" sa vada lumea ca sunt ei priceputi. Mai stricati si cutiile oamenilor de pomana cu mizeriile astea. Ce sfantul excremente faceti cu ele ? Va faceti boti/emech/psybnc-uri pentru nemurirea sufletului ? Threadul asta aici nu e deschis de pomana. Si nu mai dezgropati threadurile astea adormite de mai bine de un an. Thread closed, da-l in sfantul si minunatul corahoz.
- 79 replies
-
- 2012
- bruteforce
-
(and 2 more)
Tagged with:
-
E URI prea lung, mai taie din el N-are rost sa dau pm.
-
Nu imi plac distributiile ce folosesc pachete/manager rpm. //offtopic shaggi, ce crocobaur zici acolo frate ? Doamne, cum suna, CrunchBang. De ce as utiliza o distributie bazata pe o alta distributie care la randul ei este debian based ? )
-
Asta denota ca statul comite orice ilegalitate pentru interesele sale. Practic accesezi example dot com pe https, certificatul este valid, domeniul example este cunoscut si te autentifici. Nu ai de unde stii ca o organizatie de stat redirecteaza traficul printr-un server local si mapeaza pe domeniu un alt certificat ssl pentru interceptarea de date. (sau ma rog, un certificat intermediar intre cel ce se afla in radacina browserelor si cel al domeniului)
- 2 replies
-
- chrome
- cyber defense
- (and 5 more)
-
Salutari, Au mai fost discutii de genul (chiar foarte multe) si nu s-a concretizat nimic pentru ca s-a cazut de comun acord ca sunt idei proaste. Aici nu sunt numai Romani iar comunitatea este deschisa pentru oricine este interesat si nu calca pe bec intr-un fel sau altul. Testele de genul ar descuraja inregistrarea in mod sigur. Da, am face o selectie probabil, dar nu cred ca e cazul sa ajungem la captcha de genul de mai jos pentru inregistrare. Cred ca e simplu, in orice moment este cel putin un moderator sau un admin online iar retarzii o sa isi ia ban in maxim un minut daca posteaza ceva aiurea.
- 14 replies
-
- jos manelele
- mie nu mi-ati dat like
-
(and 1 more)
Tagged with:
-
“ar fi” sau “ar fii”? | diacritica Si nu va mai intindeti la offtopic ca va luati ban pe coaja. @euintreb: Vorbeste frumos, las-o pe ma-sa in pace
-
Adevarul despre Chevron si protestele de la Pungesti
aelius replied to v1or3l's topic in Discutii non-IT
Se supara cineva daca inchid threadul asta? E o discutie interminabila, fara sens. Completati de pomana petitii online si discutati la fel. Si nu mai credeti tot ce se scrie in presa. Sunt doar ziaristi halitori de rahat si sunt in stare sa faca orice pentru audienta. -
Vad ca ai "11 point(s) total" - Nu stiu dupa ce criterii vBulletin calculeaza reputatia. Pare in regula, nu este vorba de un abuz. In cel mai rau caz, de o eroare (insa nu este cazul). Eu am 262 puncte si imi afisaza rep power 10. Serios, chiar nu sta nimeni sa "manareasca" rep power-ul userilor.
-
In yet another washup from the Snowden revelations, the developers of FreeBSD have decided to take several steps backwards in their crypto work, to stop using hardware random number generators (RNGs). The two hardware RNGs singled out by the FreeBSD developers in this post are Intel's RDRAND (in Ivy Bridge processors), and VIA's Padlock. The decision was made at the FreeBSD Developer Summit, held in Malta in September, but the decision to pull the hardware RNGs didn't attract any attention at the time. “For [FreeBSD] 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random. It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more”, the post states. One solution on offer from Polish developer Pawel Jakub Dawidek, the post states, is to use the time it takes to attach devices at boot time, and feed these numbers into /dev/random: “it turns out that one can get about 4 good bits of entropy from each device”. Among the many things Edward Snowden's documents have suggested is that the NIST's crypto standardisation efforts were nobbled by the NSA. This confirmed long-standing knowledge that the Dual Elliptic Curve Deterministic Random Bit Generator is weak, leading to RSA abandoning it in September. Not everybody believes that RDRAND falls into the same category. Linus Torvalds, for example, dismissed concerns about the instruction, telling the author of an online petition to yank the command from Linux “we actually know what we're doing. You don't”. In that debate, Torvalds pointed out that RDRAND isn't the only source of entropy for values streamed into /dev/random in a Linux implementation. Source: FreeBSD abandoning hardware randomness • The Register Personal note: You can use EGD instead of standard '/dev/random'. Also, you can use it for apache (httpd) in https configurations.