m@mb@
Active Members-
Posts
92 -
Joined
-
Last visited
Everything posted by m@mb@
-
@danger2u le poti proba singur in SopCast
-
Sondaj pentru verificarea utilizatorilor vechi activi
m@mb@ replied to a topic in Anunturi importante
sunt inca activ -
Over a million Apple Unique Device Identifiers (UDIDs) have been posted online after hackers claimed to have obtained them from an FBI breach. In a lengthy statement, the AntiSec hacking group said it had 1,000,001 Apple Devices UDIDs linking to their users and their push notification service tokens. It said: “The original file contained around 12,000,000 devices. We decided a million would be enough to release. We trimmed out other personal data [such] as, full names, cell numbers, addresses, zipcodes, etc. Not all devices have the same amount of personal data linked. “Some devices contained lot of info. Others [had] no more than zipcodes or almost anything. We left those main columns we consider enough to help a significant amount of users to look if their devices are listed there or not. The DevTokens are included for those mobile hackers who could figure out some use from the dataset.” It then went on to say that it ‘never liked the concept of UDIDs since the beginning' and said it was a ‘really bad decision from Apple'. As for why it was exposing this personal data, the profanity-ridden release said that it had issue with the FBI ‘using your device info for a tracking people project' and wanted people to be aware of the FBI using people's device details and information. It said: “Looking at the massive number of devices concerned, someone should care about it. Also we think it's the right moment to release this knowing that Apple is looking for alternatives for those UDID currently and since a while blocked axx to it, but well, in this case it's too late for those concerned owners on the list. We always thought it was a really bad idea. That hardware coded IDs for devices concept should be erradicated from any device on the market in the future.” It said that it came by the data after a Dell Vostro notebook, used by an FBI supervisor special agent was breached using the ‘Atomic Reference Array' vulnerability in Java. The statement said that during the shell session, some files were downloaded from the users's desktop folder and one had the name ‘NCFTA_iOS_devices_intel.csv' which was a list of 12,367,232 Apple iOS devices that included UDIDs and personal details. Original post Link download
-
Nu stiu daca a mai fost dar este destul de interesant link PS. daca a mai fost - skip
-
@ em20346 - "ca eu nu mai primesc" -> sa inteleg ca ai primit si te-ai lasat?! @ em20346 - "4 ani i-am explicat asta" -> tu ai stat 4 ani sai explici sal uite??!! Daca ai nevoie de spovedanie du-te frate la biserica - ce ne intereseaza pe noi povestea ta de iubire sau ce draq este - si ce legatura este cu forumul RST?? RST a ajuns un forum de dating sau Impartasanie Online?? JET DE AICI - eu nu am bagat in discutie fiinta care tea avortat.
-
eu propun altceva: - facem rost neaparat de adresa lui X - ti-o dam tie - ca tu sai rupi capul - iei 5 ani - tu ne dai adresa prietenie sa nu ramana "neconsolata" E ok?
-
Source and binSource
-
Full article Anonymous ready to dump 2.6GB of Haditha docs - Boing Boing
-
Bai, pe mine ma "sperie", eu unul sunt FOARTE FOARTE SPERIAT de faptul ca sunt pe forum pre multi "hackeri" - au cate 200- 300 de posts si nu inteleg sensul unei propozitii, nu au logica in exprimare si se cred HACKERI - puneti mana pe carte.
-
BBC News - Russian software tycoon Kaspersky's son 'missing'
-
rootkit.com cleartext passwords On February 6, 2011, as part of their attack on HBGary, the Anonymous group social engineered administrator of rootkit.com, Jussi Jaakonaho, to gain root access to rootkit.com. The entire MySQL database backup was then released by Anonymous and announced using HBGary's CEO Twitter account, @aaronbarr: Sup, here's rootkit.com MySQL Backup http://stfu.cc/rootkit_com_mysqlbackup_02_06_11.gz #hbgary #rootkit #anonymous. The table below is the list of accounts found in rootkit.com MySQL database backup with passwords in cleartext. JtR is used to translate the password to cleartext_password. Most of the passwords were successfully acquired by feeding a password dictionary (17.5MB) to JtR and the rest are being acquired by using JtR incremental mode. Among the passwords found at rootkit.com, the following are the 10 most used passwords: Rank Password Accounts 1 123456 1023 2 password 392 3 rootkit 341 4 111111 190 5 12345678 181 6 qwerty 175 7 123456789 170 8 123123 99 9 qwertyui 92 10 letmein 91 Top 500 most used passwords ? By randomly putting the passwords to test, many appear to be reused by the same user elsewhere on sites presumably of lower value to the user, e.g. Facebook, Twitter, forum sites, secondary email accounts, etc. To date, mechanize has found at least 1346 accounts using @gmail.com alone can be used to login to Twitter; marked with t in the list below. If your account or account of someone you know appears in the list below, we urge you to take an action to change the password immediately if it is used elsewhere and enforce use of strong passwords. UPDATE (February 19, 2011): The full disclosure is now available to logged in user. Login with your Facebook account by clicking on the Facebook login button at the top left corner. UPDATE (February 15, 2011): The public disclosure on this page with details on rootkit.com accounts leaked by the Anonymous group has sparked heated discussion due to potential password reuse. This has resulted in this page being brought down several times by our upstream providers. While we are putting the effort to bring this disclosure to the public, we are no longer displaying the password and cleartext_password fields below. Please follow the discussion on this public disclosure using the discussion board at the bottom of this page. MAI MULTE AICI
-
pr00f - vezi ca drivere pe x64 au (din cate stiu eu cam pe toate modelele de USBmodem) dar nu sunt semnate digital (posibil sa nu ti le incarce Win-ul)-vezi ca se poate scoate verificarea de semnatura digitala (Vist/Win7).
-
don.paco - esti cumva EMO? - lacrimi, mov, gangsteri - wtf!
-
dau gratis 300 pass - ce kkneala - le luati gratis si va gasiti aici sa le vindeti - nu stiti din ce sa mai faceti bani
-
ai doua (2) post-uri si doua cereri; eu prevad ban ai aici niste trucuri foarte utile
-
cine stie sa se "inspire" gaseste link-ul din titlu
-
remove link
-
"Mah eu sint un hacker si vrau sa va impart si voua din programele mele" mare dreptate ai )
-
cam multe "Link de dowloand .. " asa din "prima"-8 posts , poate "trece" ceva?! -la mai multi BANi
-
"1- Cine nu se pricepe sa nu comenteze aiurea!! " omul te intraba : "Date catre tine" , dar intradevar ai dreptate "Cine nu se pricepe .." esti tare
-
Top antiviruşi 2011- tot ce ai nevoie pentru un PC făra viruşi
m@mb@ replied to datdraq's topic in Stiri securitate
AVG a "supt-o" rau de tot -
ce faci Bebee te-ai speriat ?! ai sters iStealer-ul Mari hackeri mai sunt pe aici
-
Trilulilu Downloader - Bebee ha ha Powered By Bebe1911 si de ce trebui <script>alert("Muie cu dero!")</script> pus in fisierul "servit" de tine?