-
Posts
5013 -
Joined
-
Last visited
-
Days Won
398
Everything posted by aelius
-
It's not surprising that FBI uses malware to track the activities and location of suspects. A New article published by Washington Post covers the story about FBI using malware for surveillance to track suspect's movements. FBI team works much like other hackers, targets suspects with the Spear Phishing technique that will attempt to exploit vulnerability in the target's machine and installs malware. The malware then collects information from the infected machine and send it back to FBI's server. The malware is also capable of covertly activating webcams. In a bank fraud case, Judge Stephen Smith rejected FBI request to install spyware in the suspect's system in April. Smith pointed out that using such kind of technologies ran the risk of accidentally capturing information of others who are not involved in any kind of illegal activity. In another case, another judge approved the FBI's request in December 2012. The malware also successfully gathered enough information from the suspect's system and helped in arresting him. In another case, July 2012, an unknown person who is calling himself "Mo" from unknown location made a series of threats to detonate bombs at various locations. He wanted to release a man who had been arrested for killing 12 people in a movie theater in the Denver suburb of Aurora, Colo. After investigation, they found out Mo was using Google Voice to make calls to Sheriff , he also used proxy for hiding his real IP. After further investigation, FBI found out Mo used IP address located in Tehran when he signed up for the email account in 2009. In December 2012, judge approved FBI's request that allowed the FBI to send email containing surveillance software to the suspect's email id. However, the malware failed to perform as intended. But, Mo's computer sent a request for info to FBI's server from two different IP address. Both suggested that he was still in Tehran. Source: http://www.ehackingnews.com/2013/12/fbi-uses-spear-phishing-technique.html
-
- fbi
- fbi phishing
-
(and 1 more)
Tagged with:
-
More than 30 India's state 'Rajasthan' Government websites has been hacked and defaced by a Pakistani hacker named as "H4x0r HuSsY". The motivation of the hack is appeared to be increasing defacement notification in Zone-h. The hacker claims he is the "person with the highest number of special (.IN) Notifs." "Proved to be Hell For India! I might Opt Out of the Cyber World As I don't get much time. But Here's a Peace Message. To All Indian Hackers etc etc U Gotta Look at my Zone-H Archive Whenever you have Intentions of hacking (.PK) Sites" The defacement message reads. It appears hacker does not like to deface the main page because it will be easily detected by admins. He just uploaded 1337.html which contains the defacement contents instead. This is not the first time these Rajasthan Government Government websites being hacked by Pakistani hackers; Last year, KhantastiC haXor defaced them. The hacker also mentioned that the server was previously compromised by the Khantastic and he again compromised the server with another security flaw in the server. In july 2013, H4x0r HuSsY also hacked more than 15 Goa government websites. // Mai bine le zicea H4x0r PuSsY nu HuSsY ;-) Sursa: Over 30 Rajasthan Government websites hacked by Pakistan Hacker "H4x0r HuSsY" - E Hacker News
-
When Google took the wrapper off its Amazon-like Compute Engine service last week, investors in rival cloud companies – including Amazon – panicked. Shares in Amazon and the OpenStack-backer Rackspace fell as investors feared Mountainview would translate its dominance of internet search and ads to cloud hosting. There's certainly a new chapter opening in the battle to own the cloud, signified by Amazon, Google and others announcing new features and strategies. They all want one thing: to rent your data to you by becoming your outsourced data centre provider. But Amazon isn't the one likely to feel the heat - not any time soon. And this isn't a battle for number one - at least not yet. Currently, we're looking at a battle for the number two, and it's a battle that'll be waged between Google and Microsoft, based on the customers they can leverage and their level of drive and determination. OpenStack, Rackspace and those pitching the "open cloud" aren't in the race for number two. Based on size and growth, Amazon's AWS is the one to beat. The S3 storage service component of EC2 at last count in April held 2 trillion objects - that was up from 1.3 trillion five months before 1 trillion 10 months before that. S3 is growing like a hockey stick: it took six years to hit 1 trillion objects, but now it's going straight up. Meanwhile, Microsoft claimed 8.5 trillion objects in rival Windows Azure cloud in June, but such claims are worth taking with a pinch of salt. They came out after Amazon's statistic and Windows Azure is several years younger than AWS. Judging by the places where cloud companies are making changes by introducing new features, the target demographic for rapid growth is the business customer. Business customers have have warehouses full of data, most of which is considered mission-critical to something or other. Once you've got them on your platform, it's difficult for them to move because data is sticky and heavy. Amazon has been adding more business-class features to AWS for the years and in the last month it added PC virtualisation, app streaming, high-throughput storage, identity management and data stream processing options to EC2. Not so fast, Google... Since when were you the biz bods' choice? Now Google is gunning for business customers. Business customers are a ripe target: they like the idea of outsourcing their servers but in truth want something less Amazon-y, especially the Microsoft shops. Microsoft shops want to re-use their existing skills and investments. Also, they want the kind of security and SLAs that come with Microsoft. Redmond is big in business, so it's a natural fit. Google's has business customers - just not so many. Its customer base is mostly consumer thanks to internet search and ads, but it has been making a business play. Also, it has been signing up more companies to Google Apps. If you don't think Google can do this, just remember Amazon was an online book shop before it became a supplier of enterprise IT. If you don't like Microsoft or Amazon and don't trust Google, there is another option: OpenStack. This sprung to life in 2010 as a project at NASA with Rackspace – one provided the compute while the other contributed storage components. OpenStack was supposed to sow the seeds for an open cloud, with a project like Linux - hence it was described as Linux for the cloud. A thousand OpenStack clouds were supposed to bloom. Problem is, OpenStack has not found its launchpad moment. There has been plenty of enthusiasm and developer interest: More than 517 contributors and 230 new features at last count in April. Industry support has poured in from AT&T, IBM, Cisco, Hewlett-Packard, Dell, Juniper, Rackspace and Red Hat. But we're not seeing the public OpenStack cloud deployments. The biggest we have is HP's Public Cloud service in September 2011, but two years on HP is not talking business, revenue or customers. And now, even NASA has dumped OpenStack for Amazon, as the consultants who built its OpenSack implementation left long ago to go into consulting and development. The problem seems to have be OpenStack's customisability: There's too much choice and too much focus on features. The result has been a handful of OpenStack consultants and specialists working the cloud scene on a number of customer implementations. That's great for the consultants but bad for mass-market, public adoption of OpenStack because it remains too rocket-sciency for the average adopter. HP faced problems getting OpenStack up and running thanks to the paucity of knowledge and its own lack of internal experience. Until last week, the battle for biz cloud appeared to be a comfortable two-way fight between Amazon and Microsoft. The former had a huge lead on customers and features, while the latter kept launching new features and price packages to catch up. Amazon would respond with more new features and lower prices. Google opens up a new front for Amazon. You're unlikely to see Amazon flinch, not yet at least. Not until Microsoft and Google have finished punching each other up. Sursa: Amazon won't break into sweat about Google's cloud. Yet • The Register // nota personala: Parerea mea este ca Google mai are mult de invatat pana sa ajunga la nivelul lui Amazon. De acord, sistemul de la Amazon este foarte stufos insa e destul de profesional incat sa dea clasa la orice concurent in momentul de fata.
-
nterview A TrueCrypt audit project has uncovered a well of technical support with its plans to publicly audit the widely used disk and file encryption utility for the first time. TrueCrypt is a widely used utility that encrypts and decrypts entire drives, partitions or files within a virtual disk. The tool can also hide volumes of data on discs. The TrueCrypt audit project raised enough money to pay for a professional review of the software within days of its launch. The Register recently caught up with one of the two founders of the project – Kenneth White, principal scientist at biotechnology firm Social & Scientific – to find out more about where the project goes from here. The Reg: You've achieved your early funding goals but will carry on accepting donations because there's much more you'd like to do, such as the bug bounty? Kenneth White: On IndieGoGo, you have to set a funding time range, so the 60 days was arbitrary, and, at the time we thought $25,000 was a pretty ambitious stretch goal. It turns out we hit that target in the first four days of the campaign. But yes, we've set our sights high in terms of what we would like to accomplish. We have formed a technical advisory panel and are discussing different strategies to make best use of our funding, perhaps a combination of professional security engineering analysis, academic review and public research. We are also in talks with a couple of non-profits who have offered to co-sponsor the work, but several details [need] to be worked out. The Reg: Are there any historic precedents for your project? Do you think the same idea could be applied to evaluating other security packages? I understand that you want to do TrueCrypt first but am wondering if this type of kick-starter idea might be applied to other security projects, by yourself or others, in future? White: The closest with TrueCrypt was by the 2008 review by engineers working with privacy-cd.org. But more broadly, the best model we have seen - and [one which we] hold as our standard - is the recent public review (PDF) of SecureDrop by the University of Washington CS Engineering Department, along with Bruce Schneier and Jacob Applebaum. The Reg: A security researcher has compiled TrueCrypt 7.1a for Win32 and matched the official binaries. Xavier de Carné de Carnavalet, a master's student in information systems security at Concordia University, Canada, claims he achieved what few others have managed so far. I know confirming the Win executable matches the source code was one of your goals. So does Xavier's work satisfy this or is further confirmation needed? Is Xavier affiliated with yourselves? White: It's a necessary first step, and we were impressed by Xavier's work. He's not affiliated, but has offered to help. He's a very talented engineer, and very humble. The Reg: What does the future hold? White: With the recent NIST recall and subsequent third party review of their entire "body of existing cryptographic work", I suspect there will be many more stories to come. Source: TrueCrypt audit project founder: 'We've set our sights high' • The Register
-
- truecrypt
- truecrypt audit
-
(and 1 more)
Tagged with:
-
The Russian government has charged a group of people with organized crime offenses related to the creation and use of the Blackhole malware kit. Word first leaked out via Europol in October that a man going by the alias "Paunch", who was suspected of being the creator of the infamous crimeware tool, had been arrested in Russia. On Friday, the Russian Ministry of Internal Affairs Investigation Department posted a notice that a total of 13 individuals had been charged with crimes under Article 210 of the Criminal Code of the Russian Federation, which covers "creation of a criminal community (criminal organization) and participation therein." According to the Ministry's press release, the group used Trojan horse programs and other malware to engage in "massive embezzlement of funds from the accounts of individuals and legal entities," to the tune of about 70m Russian rubles ($2.1m). Russian banks throughout Moscow, Tyumen, Ulyanovsk, Krasnodar, Petrozavodsk, and the Kursk region were reportedly targeted in the scheme. All of that seems to have come to an end now, however, as security researchers report that the Blackhole kit stopped being updated shortly after the suspects were arrested – aren't life's little coincidences funny sometimes? – and cybercriminals have reportedly begun moving on to other tools. None of the accused were named in the Russian government's notice. Under Russian law, anyone convicted under paragraph 1 of Article 210, "creation of a criminal community (criminal organization) for the purpose of committing one or several grave or especially grave crimes," faces imprisonment for 12-20 years and fines of up to 1m rubles ($30,600). The accused have also been charged under paragraph 2 of Article 210, "participation in a criminal community (criminal organization) or in an association of organizers, leaders, or other representatives of organized groups," which carries an additional penalty of 5-10 years' imprisonment and fines up to 500,000 rubles ($15,300). The accused are all currently being held under "pretrial restraints," although no date was given for when the case is expected to be brought before a judge Source: Russia charges 'criminal organization' behind Blackhole malware kit • The Register
-
Thirteen US defendants last week pleaded guilty to taking part in attacks by Anonymous against PayPal. The US Department of Justice (DoJ) said the accused had all admitted to carrying out a Distributed Denial of Service (DDoS) cyber-attack against PayPal in December 2010 in protest against the payment processing firm's decision to stop handling donations to WikiLeaks over the Cablegate affair. One of the defendants also pleaded guilty to a separate cyber-attack on the website of Santa Cruz County. In a plea agreement, the accused admitted using the Low Orbit Ion Cannon tool, Anonymous's favourite website flooding utility, to hit PayPal as part of “Operation Avenge Assange”. The 13 defendants pleaded guilty to computer hacking offences. In a DoJ statement, the accused were named as: Christopher Wayne Cooper, 26 (AKA Anthrophobic), from Elberta, Alabama; Joshua John Covelli, 28, (AKA Absolem) from Fairborn, Ohio; Keith Wilson Downey, 29, from Jacksonville, Florida; Mercedes Renee Haefer, 22, (AKA No) from Las Vegas, Nevada; Donald Husband, 32, (AKA Ananon) from Fairfield, California; Vincent Charles Kershaw, 29, (AKA Trivette, Triv, and Reaper) from Fort Collins, Colorado; Ethan Miles, 36, from Flagstaff, Arizona; James C. Murphy, 39, from Baldwin Park, California; Drew Alan Phillips, 28, (AKA Drew010) from Santa Rosa, California; Jeffrey Puglisi, 30, (AKA Jeffer) from Clinton Township, Michigan; Daniel Sullivan, 24, from Camarillo, California; Tracy Ann Valenzuela, 44, from Napa, California; and Christopher Quang Vo, 24, from Attleboro, Massachusetts. Covelli also pleaded guilty to executing a DDoS attack (with another defendant, presently a fugitive) against the Santa Cruz County web server, which the Feds reported him as saying was "in retaliation" for the break-up of a local protest camp by the City of Santa Cruz. Covelli and others, calling themselves the “People’s Liberation Front” or “PLF” and claiming to allegiance to Anonymous, launched a DDoS against Santa Cruz County’s website as part of “Operation Peace Camp 2010”. All 13 defendants were released on bail pending sentencing hearings scheduled for November and December 2014. Last week eBay chairman Pierre Omidyar called for leniency in the prosecution of those accused of playing a part in DDoSing PayPal. He pointed out that the accused are part of thousands who took part in the protest. There's no particular suggestion that any of the accused can be properly described as ringleaders in the protest but despite this and even after their guilty pleas, the suspects are still at risk of finding themselves behind bars for a prolonged stay at Club Fed. The PayPal DDoS prosecution follows an investigation by the Federal Bureau of Investigation, along with cooperation from PayPal. Authorities in the Netherlands, Germany and France have also taken their own investigative and enforcement actions. The National Cyber-Forensics and Training Alliance also provided assistance in investigating the high profile case. Source: PayPal 13 plead guilty to launching DDoS attacks • The Register
-
- cyber-attack
- ddos
-
(and 2 more)
Tagged with:
-
Ai recompilat kernelul, da ? Ceva nu s-a pus bine acolo, banuiesc ca e de la vechea versiune de kernel system-mapul ala. Ai asta aici ? "/usr/src/linux/System.map" Daca fisierul e acolo si ai recompilat kernelul, copiaza fisierul ala in system.map cp [COLOR=#000000]/usr/src/linux/System.map [/COLOR][COLOR=#333333]/boot/System.map-2.6.32-220.el6.x86_64[/COLOR]
-
DDoS Attacks originated from thousands of .EDU and .GOV WordPress Blogs
aelius replied to aelius's topic in Stiri securitate
Thank you. I use another theme. (should be fixed now) // edit: done, merci- 3 replies
-
- ddos
- http flood
-
(and 1 more)
Tagged with:
-
Un singur DL380 cu link de 10Gbps (nu mai stiu placa de retea ce era, dar faceam tcp offloading si cu ea). Serverul mai ducea inca. Request-urile erau de la un botnet cu http flood. Ce zice 'uname -r' ? Asigura-te ca este asa: /boot/System.map-$(uname -r); Sa nu fi copiat tu aiurea dupa recompilare.
-
Linux -> Debian (nota: am folosit multi ani Slackware). In rest ... FreeBSD (dar asta nu e linux) De ce Debian ? - Simplitate in utilizare si administrare. Pachetele sunt relativ ok. Se descurca bine cu dependintele iar managerul de pachete este super. De ce FreeBSD ? - Suport networking (carp - failover, load balancing), management foarte bun pe resurse, packet filter (de sute de ori mai bun decat iptables), high available storage, suport bun ZFS si multe altele. - Un alt plus: Suporta TUNING la "nesimtire". Am tinut cu un FreeBSD si un nginx modificat putin in jur de 800.000 de requesturi http pe secunda.
-
Content delivery network (CDN) specialist Akamai Technologies is acquiring Prolexic in a bid to extend its web optimization and security offerings. Prolexic is a natural extension for Akamai, as the hybrid CDN/security model has been on the rise. Akamai will acquire all of the outstanding equity of Prolexic in exchange for a net cash payment of approximately $370 million, after expected purchase price adjustments, plus the assumption of outstanding unvested options to purchase Prolexic stock. Prolexic gives Akamai (AKAM) further cloud-based security for protecting data centers and enterprise IP applications from distributed denial of service (DDoS) attacks. DDoS attacks can temporarily cripple a organization, preventing legitimate users from accessing a service. “Any company doing business on the Internet faces an evolving threat landscape of attacks aimed at disrupting operations, defacing the brand, or attempting to steal sensitive data and information,” said Tom Leighton, CEO of Akamai. “By joining forces with Prolexic, we intend to combine Akamai’s leading security and performance platform with Prolexic’s highly-regarded DDoS mitigation solutions for data center and enterprise applications protection. We believe that Prolexic’s solutions and team will help us achieve our goal of making the Internet fast, reliable, and secure.” Companies like CloudFlare that provide a hybrid of CDN and security services have captured a lot of the consumer market, and stand as a possible future threat to Akamai’s business. Akamai needs to evolve, and it is doing so here. Akamai is firmly rooted in the higher end of the market and will maintain its position by expanding its portfolio of security solutions, in addition to content delivery services. The acquisition means businesses can acquire performance and DDoS mitigation from a single vendor. “Today, business is defined by the availability, security and latency of Internet-facing applications, data and infrastructure,” said Scott Hammack, CEO at Prolexic, which has been a pioneer in DDoS defense. “Being able to rely on one provider for Internet performance and security greatly simplifies resolution of network availability issues and offers clients clear lines of accountability. We believe that, together, we will be able to deliver an unprecedented level of network visibility and protection.” Akamai intends to provide customers with a comprehensive portfolio of security solutions designed to defend an enterprise’s Web and IP infrastructure against application-layer, network-layer and data center attacks delivered via the Internet. Source: Akamai Acquires Prolexic to Protect Customers From DDoS Attacks | Data Center Knowledge
-
- akamai
- cloudflare
-
(and 4 more)
Tagged with:
-
SIM cards are among the most widely-deployed computing platforms with over 7 billion cards in active use. Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks. A German cryptographer Karsten Nohl, the founder of Security Research Labs claims to have found encryption and software flaws that could affect millions of SIM cards, and allows hackers to remotely gain control of and also clone certain mobile SIM cards. This is the first hack of its kind in a decade. Nohl will be presenting his findings at the Black Hat security conference this year. He and his team tested close to 1,000 SIM cards for vulnerabilities, exploited by simply sending a hidden SMS. According to him, Hackers could use compromised SIMs to commit financial crimes or engage in espionage. Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone. The exploit only works on SIMs that use an old encryption technology known as DES. DES is used in around three billion mobile SIMs worldwide, of which Nohl estimates 750 million are vulnerable to the attack. GSMA, which represents nearly 800 mobile operators, will notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts. Nohl believes that cyber criminals have already found the bug. Now the theoretical details of the vulnerability is out, he expects it would take them at least six months to crack it, by which time the wireless industry will have implemented available fixes. Sim Card Cloning Hack affect 750 millions users around the world - The Hacker News
-
In a recent cyber attack on a Forum site, thousands of outdated legitimate WordPress blogs were abused to perform DDOS attacks using previously known vulnerabilities. After analyzing the Log file from the victim's server, we have noticed many Wordpress CMS based educational (.EDU) and Government (.GOV) websites from where the attack was originated. In the past we have reported about many such cyber attacks, where attackers hacked into the Wordpress blogs using password brute-force attack or they used the PINGBACK vulnerability in older versions of Wordpress without compromising the server. WordPress has a built in functionality called Pingback, which allows anyone to initiate a request from WordPress to an arbitrary site and it can be used for a single machine to originate millions of requests from multiple locations. We have seen more than 100,000 IP addresses involved in the recent DDOS attack and the victim's Forum website received more than 40,000 requests in 7 minutes from different Wordpress blogs and IP addresses. In this recent attack, we have noticed more than 4000 .EDU and .GOV sites along with thousands of other abused sites, including following: These large servers can cause much more damage in DDoS attacks because the servers have the large network bandwidth and are capable of generating significant amounts of traffic. At this time it's not clear that either these Wordpress blogs are compromised or the Pingback vulnerability was used to perform the attack. But It’s always wise to learn from other’s mistake. If you still use 'admin' or common name as a user name on your blog, change it, use a strong password. There are also security plug-ins available, two-factor authentication options available for WordPress and of course make sure you are up-to-date on the latest version of WordPress. Source: DDoS Attacks originated from thousands of .EDU and .GOV WordPress Blogs - The Hacker News My opionion: looks like a lame http flood ;-)
- 3 replies
-
- ddos
- http flood
-
(and 1 more)
Tagged with:
-
Pacatosule, vine ajunul craciunului ))
-
Adica te referi la document root. Este calea completa catre site. In config.php in loc de: $config['basedir'] = '/home/username/public_html'; pui asa: $config['basedir'] = $_SERVER["DOCUMENT_ROOT"]; Pentru cealalalta problema: macbook upload$ grep Powered */* [U]themes/right.tpl[/U]: <b>Powered by 9GagCloneScript.com</b> macbook upload$ ps: Cam vechi threadul, nu mai scotociti prin gunoi frate ;-)
-
[B](02:12:42) shaggi: tex, si eu cu inca cativa eram sa ne ducem dracu rau... [/B](02:12:46) Oust: Sau poate e idiot. (02:12:53) shaggi: deci, era unu cu un tir (02:12:55) Bolovanus: oust zice asa ca poate si el a facut asa [B](02:13:00) shaggi: si noi cu o mazda[/B] (02:13:01) Oust: )) [B](02:13:02) shaggi: rx7[/B] (02:13:08) shaggi: sa-l depasim (02:13:23) Oust: Pai asa am facut si n-am vazut, dar era o masina si mi-a dat flash-uri, si m-am bagat din nou pe banda 2. (02:13:27) shaggi: si cand ajungem pe la jumatatea tirului, se apuca el sa depaseasca o bicicleta (02:13:30) shaggi: pe larg:| (02:13:32) Oust: Dar voiam sa ma bag pe b3. [B](02:13:35) Bolovanus: pai care cativa ca in masina aia intra doar 2 (02:13:51) LLegoLLaS: pwn[/B] (02:13:52) shaggi: cx7 (02:13:54) shaggi: scuze (02:14:00) tex: PWN (02:14:01) tex: ))) (02:14:06) tex: hihihihihhihihihihhihihihihhihih?ihihhihihihihhihihihih (02:14:19) shaggi: coaie, m-am incurcat (02:14:25) Oust: (02:14:26) Oust: Hahahah (02:14:28) shaggi: defapt uitasem cum era masina (02:14:29) Oust: Pai ba. (02:14:35) Bolovanus: )) (02:14:41) LLegoLLaS: seamana (02:14:41) shaggi: si am zis primul model de mazda ce mi-a venit in cap (02:14:42) tex: hahahaha (02:14:42) LLegoLLaS: (02:14:43) tex: mor ba (02:14:47) tex: MOR DE RAS (02:14:47) Oust: Voi erati de vina, nu el. (02:14:49) tex: )) (02:15:00) shaggi: Oust, de ce ma? (02:15:04) tex: pai da, ce cautati manca-ti-as 17 insi in masina cu doua locuri (02:15:09) tex: ))) ) ))))) (02:15:10) shaggi: daca ala nu a semnalizat? (02:15:11) Oust: )))))))))))))0 (02:15:14) LLegoLLaS: )))) (02:15:15) Oust: Hahahaha (02:15:22) tex: erati pakistanezi (02:15:24) tex: ce naiba (02:15:26) tex: )))))) (02:15:28) shaggi: coaie, am precizat, era cx7.. (02:15:31) Bolovanus: )))) (02:15:33) LLegoLLaS: shaggi parca esti tata: orice are 4 roti si motor = masina (02:15:33) tex: deci faza asta a fost super tare ba (02:15:34) LLegoLLaS: )) (02:15:37) tex: da, am inteles (02:15:39) shaggi: scuze pentru dezimformarea de mai sus (02:15:47) Oust: Chill ba. (02:15:47) tex: hahahahha (02:15:50) LLegoLLaS: dezinformarea* (02:15:50) Oust: Nu mai pune botul. (02:15:55) Oust: Glumim si noi. (02:15:59) Oust: Pai voi erati de vina. (02:16:01) LLegoLLaS: )
-
se pare ca nu se poate: "Facebook does not offer a way for you to see friend-requests that you previously rejected explicitly or deleted" (raspuns gasit cu google, nu ma pricep la facebook)
-
Linux distro to crack Windows passwords.
aelius replied to dooma's topic in Sisteme de operare si discutii hardware
A fost discutia asta ieri: https://rstforums.com/forum/78384-remove-password-administrator-live-cd.rst Pune un Ubuntu sau Debian pe USB Stick (daca stie PC-ul sa booteze dupa USB) si instalezi chntpw Nu poti merge la un prieten sa descarci imaginea ? -
Ba da #include <stdio.h> int main() { printf("User Adde has been banned permanently\n"); } Omul ti-a explicat frumos cum se face. Ca un rezumat pentru ce a spus: Securitatea nu consta intr-un soft instalat. Noroc bun.
-
Atentie Un mare hacker se da mare ca gaseste xss in nasa =))
aelius replied to ANYK's topic in Cosul de gunoi
Multumesc. - hacksoft - ban doua saptamani - thread mutat la gunoi. -
Atentie Un mare hacker se da mare ca gaseste xss in nasa =))
aelius replied to ANYK's topic in Cosul de gunoi
@ANYK: Cine e Kronzy ? Cel ce a deschis threadul ? -
Doua banuri la threadul asta. Sa va invatati minte si sa nu mai faceti mizerie peste threadurile oamenilor.
-
Ban doua saptamani. Pai va bateti joc de noi frate ? Ce e cu threadurile astea preacurvite ...
-
Categoria este cereri, nu oferte si este deja deschis un thread dedicat pentru asta. Va rog sa nu mai deschideti alte threaduri cu torente. Threadul se muta la cosul de gunoi si se inchide Merci.