Jump to content

the.red

Members
  • Posts

    31
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by the.red

  1. Learn why your salary is a matter of degrees. By Chris Kyle The college diplomas of an engineering and music major look nearly identical. Their bank accounts at the mid-career mark... not so much. Not long after the ink dries on their degrees, a petroleum engineer will make $100,000 more per year than a music major, according to mid-career salary statistics from Payscale's 2010-2011 College Salary Report. [Looking for a degree? Start here] For those curious about the average pay that comes with different bachelor's degrees, we count down some of the most popular degrees from highest to lowest. The results may surprise you... Study Finance, Earn $91,500 While it may pale in comparison to petroleum engineers, who earn a whopping $157,000, finance graduates with a bachelor's degree still do quite well, earning an average mid-career salary of $91,500. Typical finance careers include financial planners, bankers, and stockbrokers. [Find the right Finance degree program for you] Study Information Technology (IT), Earn $79,300 Information technology gave birth to today's paperless business world, making an IT bachelor's degree valuable in every profession imaginable, from the computer industry to health care and beyond. According to Payscale's 2010-2011 report, IT grads make nearly $80,000 mid-career. [search for IT and Information Systems bachelor's degree programs] Study Accounting, Earn $77,500 Forget about Mandarin, Spanish, or even English. The most important language in the business world is accounting. According to Payscale, those with a bachelor's degree in accounting have an average salary of $77,500 mid-career. It's also a smart choice for those seeking an associate's degree since many accountants enter the workforce with only two years of training. [Find Accounting schools and programs] Study Marketing, Earn $77,300 Knowing how to market a product to the masses is a skill that will always be in demand. Grads with a bachelor's degree in marketing get paid handsomely for their efforts, averaging at $77,300 per year mid-career. For even quicker training, you can earn a marketing associate's degree. [Find local and online Marketing schools now] Study Business, Earn $70,600 While business administration remains one of the most popular bachelor's degrees, Payscale broke down undergraduate business degrees into two categories: international business and business. Today's global economy gives a slight edge to international business majors, who average at $73,700 mid-career, just ahead of the $70,600 in average salary for business majors. [search for local and online Business degree and MBA programs] Study Literature, Earn $65,700 Sure, you will strengthen your reading and writing skills by studying literature. But reading great books can also deepen your ability to understand the human condition. Literature majors often move on to study law or work in communications or marketing as writers and editors. Study Human Resources (HR), Earn $61,900 Recruiting and retaining the best and brightest employees is an HR professional's goal. By gaining a bachelor's in human resources, you can position yourself for a mid-career salary of nearly $62,000 by learning how to best use your people skills in all kinds of workplace environments. [Find online Human Resources training programs today] Study Criminal Justice, Earn $58,000 Lawyers and paralegals aren't the only ones who study laws and how to apply them. Everyone from federal agents and police officers to private investigators can benefit from studying criminal justice. A mid-career salary of $58,000 is the norm for those with a bachelor's degree. [search for Criminal Justice bachelor's degree programs now] *All salary data is based upon mid-career averages of those with a bachelor's degree and comes from Payscale's 2010-2011 College Salary Report. Study This, Earn That - Yahoo! Education
  2. MLM, nu va bagati. sistemele piramidale / matriciale sunt ilegale in foarte multe tari, se bazeaza pe naivitatea voastra pentru a creste. Documentati-va inainte de a va alatura orbeste, asa cum va recomanda ei. Au fost si multe discutii pe tema asta, cititi pe Hackpedia - View topic - Ce stiti despre LYONESS ? Ati investi in aceasta firma ?
  3. Free File Hosting, Online Storage &amp File Upload with FileServe care le dld pentru mine ? nu-s acasa si le-am gasit acum, mi teama sa nu fie sterse. elcomsoft thunder tables free Free File Hosting, Online Storage &amp File Upload with FileServe pe scurt : sunt scumpe. sparg parole la microsoft office in cateva secunde.
  4. elms.pjwstk.edu.pl - /sdc/ Index of /MSDNAA/Rapid_Setup inca doua site-uri. DOWNLOADER link : http://robolab.cse.unsw.edu.au/~mmcgill/ Acesta trebuie analizat pentru a descoperi tipul de encriptie folosit. Downloader_for_Windows_XP_Pro_SP3.exe *n-am vrut sa pun versiunea mea, pentru ca nu vreau sa risc sa-mi expun numele. ** are aceeasi iconita si interfata cu downloaderul meu <=> it's the same shit.
  5. Dude, Serials & keys - unlocks the world
  6. pm me or begood pentru downloader. Il veti primi doar daca consider eu adecvat <=> dovediti ca stiti reverse engineering.
  7. Cum le-am gasit : Am primit acces liber la orice software din partea Universitatii la care studiez, pe site am primit un downloader si o licenta. Licenta ti-o poti genera si singur, sunt keygen-uri cacalau. Exista patch si pentru microsoft genuine la toate versiunile de windows. Avantajul cand downloadezi de pe linkurile de mai sus este practic urmatorul : esti 100% sigur ca e produs microsoft original <=> nu a fost modificata imaginea iso <=> nu are virusi/troieni/etc.
  8. Applications (Other) 26-Aug-2009 03:40 - Applications (Windows) 06-Oct-2009 21:06 - Applications (MAC) 26-Sep-2007 13:42 - Albums 04-May-2009 20:18 Downloads 15-Aug-2009 02:22 - Games (PS2) 17-Feb-2009 16:07 - Games (Other) 27-Mar-2009 00:22 - Games (Mac) 18-Oct-2006 21:39 - Games (XBox 360) 23-Sep-2009 13:34 - Games (Windows) 01-Oct-2009 16:34 - Music 30-Sep-2009 00:16 - Movies 02-Oct-2009 13:37 - Porn 29-Oct-2009 01:04 - Porn DVDs 18-Sep-2009 05:48 - Random stuff 23-May-2007 14:36 - TV Shows 05-Oct-2009 00:24 - Videos 19-Nov-2007 09:28 - recomand porn, sunt multe si pe categorii. Windows-uri originale + software licentiat original de la microsoft, descarcate de pe MSDNAA. Schimbati extensia din sdc in iso sau ce e nevoie. http://upe.venta.lv/pub/msdnaa_downloads/ http://software.cs.utep.edu/MSDNAA/ http://repo.ite.gmu.edu/msdnaa/ http://msdnaa.unixag-zw.fh-kl.de/msdnaa_downloads/ http://www.google.ro/search?q=index+of+en_windows_xp_professional_with_service_pack_3_x86_cd_x14-80428.sdc&hl=ro&client=firefox-a&rls=org.mozilla:en-US:official&ei=Rs66TLWEGoPOswaYm8jHDQ&start=10&sa=N sau http://www.google.ro/search?q=inurl:msdnaa_downloads&hl=ro&client=firefox-a&rls=org.mozilla:en-US:official&filter=0
  9. stai ca acum realizez, tu ai fost futut de niste ratati ?
  10. 14. Chiar daca amatorii/incepatorii in hacking sunt bine veniti pe acest forum cereri/ajutor de genu: i."Imi sparge cineva id yahoo/hotmail?" ii."Imi sparge cineva site-ul xxx.com?" NU sunt tolerate.
  11. the.red

    Chat RST

    kw3, daca toate chat-urile sunt prea bune pentru tine, atunci macar alege unu mai putin prost din toate astea proaste care exista. avem nevoie de ceva, ce-ti pica mana sa instalezi un rahat de script ?
  12. YouTube - Parov Stelar - Matilda YouTube - Parov Stelar - Libella Swing
  13. lista cu programe : NST Links @_@ are destul de multe chestii, merita incercat.
  14. When a laptop is locked with password, a checksum of that password is stored to a sector of the FlashROM - this is a chip on the mainboard of the device which also contains the BIOS and other settings, e.g. memory timings. For most brands, this checksum is displayed after entering an invalid password for the third time: The dramatic 'System Disabled' message is just scare tactics: when you remove all power from the laptop and reboot it, there are not new penalties such as additional passwords, locks and so on. From such a checksum (also called "hash"), valid passwords can be found by means of brute-forcing. Another method commonly used is that instead of a checksum, a number is displayed from which a randomly generated password can be calculated. Quite often, vendors also resort to storing the password in plain text, and instead of printing out just a checksum, an encrypted version of the password is shown. Either way, my scripts can be used to derive valid passwords with the hash. Some vendors have implemented obfuscation measures to hide the hash from the end user - for instance, some FSI laptops require you to enter three special passwords for the hash to show up (see other post). HP/Compaq laptops only show the hash if the F2 or F12 key has been pressed prior to entering an invalid password for the last time. Depending on the "format" of the number code/hash (e.g. whether only numbers or both numbers and letters are used, whether it contains dashes, etc.), you need to choose the right script - it is mostly just a matter of trying them all and finding the right one. This is an overview of the algorithms that I took a look at so far: VendorHash EncodingExample of Hash Code/SerialScripts Compaq 5 decimal digits 12345 pwgen-5dec.py Dell serial number1234567-595B 1234567-D35B 1234567-2A7B Windows binary&source Fujitsu-Siemens 5 decimal digits 12345 pwgen-5dec.py Windows binary Fujitsu-Siemens 8 hexadecimal digits DEADBEEF pwgen-fsi-hex.py Windows binary Fujitsu-Siemens 5x4 hexadecimal digits AAAA-BBBB-CCCC-DEAD-BEEF pwgen-fsi-hex.py Windows binary Fujitsu-Siemens5x4 decimal digits1234-4321-1234-4321-1234pwgen-fsi-5x4dec.py Windows binary Hewlett-Packard5 decimal digits12345pwgen-5dec.py Windows binary Hewlett-Packard/Compaq Netbooks10 charactersCNU1234ABCpwgen-hpmini.py Windows binary Phoenix (generic)5 decimal digits12345pwgen-5dec.py Windows binary Samsung12 hexadecimal digits07088120410C0000pwgen-samsung.py Windows binary The .NET runtime libraries are required for running the Windows binary files (extension .exe). If the binary files (.exe) don't work out for you, install Python 2.6 (not 3.0!) and run the .py script directly by double-clicking them. Please comment on what make/model the scripts work and on what they don't. Also, be aware that some vendors use other schemes to handle the passwords - among them are e.g. IBM/Lenovo. You are then at the mercy of their service. Dogbert's Blog: BIOS Password Backdoors in Laptops //aici gasiti si algo. hash de la fiecare marca laptop (py code)
  15. For organizations using VMware virtualization technologies, there are likely a number of different virtual machines in the environment, representing a number of platforms ranging from Windows desktops and servers to Linux and UNIX systems as well. Each of these will have an associated file with the VMX extension that contains the VM’s specific configuration details – hardware specifications, software information, and a number of settings that can definitively impact security and compliance for the environment hosting that virtual machine. Unfortunately, documentation for these files is sorely lacking, and auditors are often left to their own devices to determine what VM settings are enabled and what their impacts could be. Here we’ll take a look at settings that impact security, and how they should ideally be configured: Goal: Disabling Copy & Paste operations between the VMware host and the VM guest VMX Settings: isolation.tools.copy.disable = “TRUE” -Disables copy functionality isolation.tools.paste.disable = “TRUE” -Disables paste functionality isolation.tools.setGUIOptions.enable = “FALSE” -Disables any GUI functionality for these options Goal: Disable “Drag and Drop” functionality between VMware host and guests VMX Setting: isolation.tools.dnd.disable = “TRUE” -Disables Drag and Drop functionality Goal: Disable shared folders between the VMware host and any VMs (mostly applicable on Workstation versions) VMX Setting: isolation.tools.hgfs.disable = “TRUE” -Disables all shared folder functionality Goal: Ensure proper logging is enabled for the VM, and that ESX-VM logging interactions are set accordingly VMX Settings: log.rotateSize 100000 -This value should be set to a number in Kbytes (this example is 100k). As these logs can become very large, a policy for these is important to maintain. log.keepOld 10 -This value determines the number of log files maintained in a rotation schedule (this example is 10 distinct logs kept at a time) isolation.tools.log.disable = “FALSE” -This setting ensure that logging is enabled. This setting is the default, and so the configuration item may not be present, which is fine. logging = “TRUE” -This enables VM logging for the ESX host, monitoring the VMX process that manages VM interaction log.fileName = “logs/vm.log” -Sets the log file name and path. Ensure this matches policy and process. Goal: Disable Unauthorized hardware and devices within a VM VMX Settings: floppy<x>.present = “FALSE” serial<x>.present = “FALSE” parallel<x>.present = “FALSE” All of these settings disable various device types, replacing <x> with a numeral starting at 0 (depending on the number of devices in a system) Goal: Prevent VM users from connecting and removing devices VMX Settings: isolation.tools.connectable.disable = “TRUE” -This setting disables a user’s ability to connect removable devices, such as USB drives. <devicename>.allowGuestConnectionControl = “FALSE” -This setting, on a per -device basis, disables Guest user control of a specific device. This is not a complete list of VMX settings, by any means, and there are many more that could potentially be configured within your environment. This is a great start in terms of “best practices” security settings, however, and can help you begin to develop a baseline for ongoing monitoring and measurement. IT Audit: 6 VMWare Settings Every IT Auditor Should Know About
  16. BitDefender released a free removal tool targeting all known variants of the Stuxnet worm, as well as the rootkit drivers that are used to conceal critical components of the worm. Stuxnet is a breed of e-threats that emerged around mid-July. Although it infects all Windows-based systems alike, it primarily targets SCADA systems which run the Siemens WinCC software. The worm spreads by taking advantage of a multitude of 0-day exploits in the current versions of Windows. Moreover, it can execute itself from an infected removable medium as soon as the .lnk file on the drive which has been read by the operating system. Successful exploitation of this vulnerability results in the injection of a backdoor, as well as the installation of two rootkits that will conceal both the .lnk files and the accompanying .tmp files. The tool can be run on both 32- and 64-bit installations and it will eliminate both the rootkit drivers and the worm. Free Stuxnet removal tool
  17. The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game. A Guide to Kernel Exploitation covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. A Guide to Kernel Exploitation
  18. Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that the use of the invisible "soft hyphen" - or "SHY character", as it is sometimes called - in such links can help them do so. The soft hyphen is represented in HTML4 as “*”, and it is used to represent line breaks within a word. The reason why scammers can sometimes successfully use it is because some commonly used Web browsers and email clients don't render it, making the obfuscated URL look like a regular, correctly formatted URL, and the URL filters fail to react. According to Symantec's Samir Patil, there are advanced content filters and signature technologies that spot and block such URLs, but I expect issues tied to the rendering inconsistencies will pop up more rarely - hopefully never! - when HTML5 becomes the standard and HTML code will finally be interpreted by all browsers in the same way. Spammers using new URL obfuscation technique
  19. A Firefox Trojan has been found to force the Internet browser to save user passwords and then use those passwords to create a new user account on the infected computer. Most security researchers recommend that users tell Firefox not to remember their passwords, since saved ones are so easily extracted by malware. The Trojan-PWS-Nslog malware discovered by security company Webroot, however, gets around user preferences altogether by actually deactivating the Firefox code that asks if it should save those passwords when the user logs into a secure site. "Before the infection, a default installation of Firefox 3.6.10 would prompt the user after the user clicks the Log In button on a Web page, asking whether he or she wants to save the password," Webroot researcher Andrew Brandt explained in a blog post on Wednesday. "After the infection, the browser simply saves all login credentials locally, and doesn't prompt the user." Specifically, the Trojan adds a few lines of code and "comments out" other portions of code from the Firefox file called nsLoginManagerPrompter.js, with the result that all passwords get saved locally without any input from the user. Clues Left Behind With that information, the Trojan creates a new account under the name "Maestro" on the infected computer. It then "scrapes information from the registry, from the so-called Protected Storage area used by IE to store passwords, and from Firefox's own password storage, and tries to pass the stolen information onward, once per minute," Brandt added. The Web domain intended to receive the stolen data has already been shut down, but code inside the malware revealed the author's name and email address, which led Webroot to a Facebook page for a hacker based in Iran who provides a free keylogger creator tool targeting users of Microsoft Windows. Webroot can easily identify and remove the Trojan from infected machines, it says. To fix the modified Firefox file, users should download the latest Firefox installer and install it over the existing installation. No bookmarks or add-ons will be lost in the process, Brandt said. How to Make Firefox Forget Mozilla's Firefox ranks second in global browser market share, according to Net Applications, with 23 percent of the browser market in September. The first beta release of Firefox 4 for Android phones just debuted this week. By default, Firefox does remember passwords. To tell it not to, go to the Tools menu and select Options. From there, open the Security tab and uncheck the appropriate box, Webroot advises. Trojan Forces Firefox to Save Your Passwords - PCWorld Business Center
  20. Mixmaster is the type II remailer protocol and the most popular implementation of it. Remailers provide protection against traffic analysis and allow sending email anonymously or pseudonymously. Mixmaster consists of both client and server installations and is designed to run on several operation systems including but not limited to *BSD, Linux and Microsoft Windows. In this video, we will look at how to anonymize your emails using MixMaster. Anonymize your Emails using MixMaster Tutorial
  21. Hope we all like stratagy game to play so one of the best strategy game Age of empires. And now its online - Familiar Age of Empires gameplay - Download and play from almost anywhere - Game continues to evolve over time - Cooperative multiplayer quests and trading - Empire creation and resource management - Historical setting, easy-to-use RTS controls <a href="http://www.burstnet.com/ads/ad20486a-map.cgi/ns/v=2.3S/sz=468x60B/" target="_top"> <img onload="NcodeImageResizer.createOn(this);" src="http://www.burstnet.com/cgi-bin/ads/ad20486a.cgi/ns/v=2.3S/sz=468x60B/" border="0" alt="Click Here" title="Game : Age of empires online" /></a> Game is realy fast and easy to play as you are playing it on console. We enjoyed it playing hope you to enjoy it. Click here to play Age of empires
  22. instructiuni : http://www.h7labs.in/readme.txt http://www.h7labs.in/webhex.php?tool=rfiown
×
×
  • Create New...