Jump to content

Silviu

Active Members
  • Posts

    2384
  • Joined

  • Last visited

  • Days Won

    29

Everything posted by Silviu

  1. Aplic si eu, doar daca e vorba despre ceva legal, plata in avans PayPal sau Bancar.
  2. Am nevoie de 8 euro orange pentru uz personal. Cine vinde, sa ma caute pe PM. Multam!
  3. La ce cacat sa iti scoata ban-ul cand ai 2 posturi cu acel user si cu o saptamana mai vechi decat actualul, de pe care postezi?
  4. ?i eu repet întrebarea: ce îi opre?te s? afle parola înainte de moarte? C? pân? la urm? asta e dilema principal?. Mul?umesc. Edit : eu zic c? r?spunsul este l?sarea parolei într-un testament, iar dup? moarte, ambele p?r?i trebuie s? fie prezente pentru a primi parola, conform testamentului.
  5. P?i ce îi împiedic? s? comploteze înainte de moarte?
  6. P?i ?i ce îi împiedic? s? fac? brute force, chit c? nu ai murit?
  7. În afar? c? ur?sc petardele ?stea de site-uri ?i c? nu ai voie cu link de referal, de ce mai pui oamenii pe aici s? se înscrie sub referal dac? tu e?ti proprietarul site-ului ?i mai ales ce câ?tigi tu din asta?
  8. A, ma gandeam ca zici de partea tehnica, adica de protocoale ca acolo ma durea pe mine Au viteza redusa dintr-un singur motiv, 10 mii de gigei le folosesc simultan pentru ca sunt indexate de Google si cine cauta liste de proxy, le gaseste pe acelasi pe care le-a gasit si Vasile acum 3 minute.
  9. Scuzati ca ma bag, dar daca imi poti oferi o explicatie pentru ultima afirmatie facuta.. Adica vreau niste argumente la
  10. Ii instalezi Cerberus sau faci ce au zis baietii mai sus.
  11. Nu, el cred ca se refera la port forwarding, daca nu ma insel.
  12. Mosule, aici nu e facebook si ai cam postat in categoria gresita.
  13. Last year, Just after Snowden leaks, the U.S Government warned that NSA surveillance revelations will make harder to track bad guys trying to harm the United States, as disclosures can be helpful to terrorist groups. In response to the NSA revelations, the terrorists at Al-Qaeda have started using strongest encryption techniques in order to bypass the standard cryptographic protections in its various communications, according to the recent report released by the Threat Intelligence company, Recorded Future. The analysis carried out by the intelligence firm revealed that the Infamous Terrorist Organizations, Al-Qaeda that attacked civilian and military targets in various countries, has switched to new encryption software for the first time in seven years, following the revelations of the US National Security Agency (NSA) by former contractor Edward Snowden. Al-Qaeda is a global militant Islamist and takfiri organization which operates as a network comprising both a multinational, stateless army and a radical Sunni Muslim movement calling for global jihad. Since 2007, Al-Qaeda was using their own built encryption software, Mujahideen Secrets for the online and cellular communications, but the intelligence firm has noticed that now they are using number of new encryption tools and adopting new services like mobile, instant messaging, and Mac as well, to mask its communications with overseas' operatives. “The nature of these new crypto products indicates strategy to overlay stronger and broader encryption on Western (mainly US) consumer communication services,” states the report. “We do not find evidence of abandonment of US-based consumer communication services. Likely risks are still greater to hide outside the consumer crowd, and non-US-based services may be exposed to even stronger lawful intercept.” The three different terrorist organisations associated with Al-Qaeda - GIMF, Al-Fajr Technical Committee and ISIS - released three new major encryption tools within a three-to-five month period of the Snowden leaks, according to the report. These three tools bolster the original 'Mujahideen Secrets' tool that have primarily been used for email by Al-Qaeda since 2007. NEW Al-Qaeda ENCRYPTION TOOLS Tashfeer al-Jawwal, a mobile encryption platform developed by the Global Islamic Media Front (GIMF) and released in September 2013. Asrar al-Ghurabaa, another alternative encryption program developed by the Islamic State of Iraq and Al-Sham and released in November 2013, around the same time the group broke away from the main Al-Qaeda following a power struggle. Amn al-Mujahid, an encryption software program developed by Al-Fajr Technical Committee which is a mainstream al Qaeda organization and released in December 2013. The massive surveillance conducted by the National Security agency may lead to the change in communication behavior of terrorists and criminals. Cybercriminals have to just secure their communication before performing any crime, Whereas terrorists need an undetectable communications along with the secure one, because for them nothing is more important than operational security. WHY BLAME SNOWDEN? But, should Edward Snowden be blamed for this situation? No, because some analysts also point out that Al-Qaeda and like-minded militant groups were already aware of the enormous capabilities of the NSA to snoop on their communications, and had already taken measures to try to evade detection. In 2011, German Intelligence officials revealed that militants in Germany had developed some effective encryption tools for secure communication over the Internet with terrorist operatives in Pakistan, CNN reported. In 2009, An American-Yemeni cleric personally instructed European militants in Yemen how to use the encryption software so they could communicate without their e-mails being intercepted. And in many more cases, such communications were obviously not detected by the NSA, otherwise terrorist would have been arrested before trying to carry out an attack. It seems that NSA and U.S Government are more concerned about the surge of “malware” spreading over the Internet and to combat with the Economic frauds, but they should definitely need to be alert from the “terrorwares,” that may use a large amounts of publicly available online data to predict the timing and targets of the future terror attacks. Sursa: http://thehackernews.com
  14. Nu vezi bre ca omu' e banat?
  15. Cea mai mi?to prezentare a cuiva pe forum! Bine ai venit ?i felicit?ri pentru program!
  16. Google is reportedly testing out some new UI changes for its popular email service, Gmail on the desktop browser that would redesign your inbox in totally different Interface. So, the traditional Gmail we all know may soon get a new makeover and we hope users will definitely love it. Google has invited a selected team of users to test a completely new user friendly interface for the webmail client which appears as a part of the trial, according to the leaked screenshots obtained by Geek's website. According to the report, we can only presume that the new feature will enable a user to have a fancy access to Google's Gmail with a brand-new fly-in menu system that flies in and out of the browser window replaces Google's otherwise static sidebar on the left bolted into Gmail last year that organizes your inbox, chats, and labels. In the beginning of the April, the Geek also provided the screenshots revealing a series of new feature for the mobile Gmail client. So, it can be assumed that the goal behind the changes is to make Gmail work friendlier with the Google's mobile version of Gmail and with an expanded array of desktop sizes and resolutions without losing any functionality in the process. Google has habit to test new features for its various products but on the same time, it typically changes Gmail slowly. So, just on the basis of leaked screenshots, it cannot be guaranteed that Google will soon or will ever propose these changes to its Gmail service. But, still it gives an idea of what Google is thinking next about Gmail. NEW FEATURES The traditional Gmail offers you the Star system as away to highlight the important emails, which have been replaced with a new Pinnig system. This pinnig approach will offers you options for your pinned emails to always display at the top of your inbox, or revert back if you want to see everything in the order it arrived. A switch to flick between the full inbox view and only pinned messages is at the top. The left sidebar tabbed system currently offered in Gmail, has now been changed to a "grouped in the inbox" system that automatically sorts your email by topic such as Travel, Purchases, Finance, Social, Updates, Forums, and Promos, in order to keep your inbox manageable and organized. Till now, it’s not at all clear if you can edit or modify these categories. A big Plus "+" icon is added in the Gmail's lower-right corner that offers a new pop-up menu for composing new messages and adding new reminders into Gmail. Also Google Hangouts is integrated into the new Gmail interface, now you just need to click on the chat-bubble-like icon at the bottom right corner of the display in order to pop out a sidebar that allows you to chit-chat with your friends and make video calls. "There's no expected release date for any of these features, or even a guarantee that Google will implement them in the way we see them in these images, but after spending a few minutes in this interface it is clear that Google is eager to shake things up in Gmail. With any luck most of these features will make the cut and we'll see an all new Gmail any day now," writes Geek's Russell Holly. Stay Tuned! Sursa: http://thehackernews.com
  17. Visiting a website certified with an SSL certificate doesn’t mean that the website is not bogus. Secure Sockets Layer (SSL) protect the web users in two ways, it uses public key encryption to encrypt sensitive information between a user’s computer and a website, such as usernames, passwords, or credit card numbers and also verify the identity of websites. Today hackers and cyber criminals are using every tantrum to steal users’ credentials and other sensitive data by injecting fake SSL certificates to the bogus websites impersonating Social media, e-commerce, and financial websites as well. DETECTING FAKE DIGITAL CERTIFICATES WIDELY A Group of researchers, Lin-Shung Huang , Alex Ricey , Erling Ellingseny and Collin Jackson, from the Carnegie Mellon University in collaboration with Facebook have analyzed [PDF] more than 3 million SSL connections and found strong evidence that at least 6;845 (0:2%) of them were in fact tampered with forged certi?cates i.e. self-signed digital certificates that aren’t authorized by the legitimate website owners, but will be accepted as valid by most browsers. They utilized the widely-supported Flash Player plug-in to enable socket functionality and implemented a partial SSL handshake on our own to capture forged certi?cates and deployed this detection mechanism on an Alexa top 10 website, Facebook, which terminates connections through a diverse set of network operators across the world. Generally Modern web browsers display a warning message when encountering errors during SSL certi?cate validation, but warning page still allows users to proceed over a potentially insecure connection. Fake SSL connections can argue that certi?cate warnings are mostly caused by server mis-con?gurations. According to usability survey, many users actually ignore SSL certi?cate warnings and trusting forged certificates could make them vulnerable to the simplest SSL interception attacks. This means that a potential hacker can successfully impersonate any website, even for secure connections i.e. HTTPS, to perform an SSL ma-in-the-middle attack in order to intercept encrypted connections. FAKE DIGITAL CERTIFICATES SIGNED WITH STOLEN KEYS FROM ANTIVIRUS Researchers observed most of the forged SSL certi?cate are using same name as original Digital Certificate issuer organizations, such as VeriSign, Comodo. Some Antivirus software such as Bitdefender, ESET, BullGuard, Kaspersky Lab, Nordnet, DefenderPro etc., has ability to intercept/Scan SSL connection on Clients’ system in order to defend their users from Fake SSL connections. These Antivirus products generate their own certi?cates that would be less alarming than other Self-signed digital certificates. "One should be wary of professional attackers that might be capable of stealing the private key of the signing certificates from antivirus vendors, which may essentially allow them to spy on the antivirus users (since the antivirus root certificate would be trusted by the client)," the researchers explained. "Hypothetically, governments could also compel antivirus vendors to hand over their signing keys." Similar capabilities are observed in various Firewall, Parental Control Software and adware software those could be compromised by hackers in order to generate valid, but fake digital certificates. DIGITAL CERTIFICATES GENERATED BY MALWARE Researchers also noticed another interesting self-signed digital certificate, named as ‘IopFailZeroAccessCreate’, which was generated by some malware on client-end systems and using same name as trusted Certificate issuer “VeriSign Class 4 Public Primary CA.” “These variants provide clear evidence that attackers in the wild are generating certi?cates with forged issuer attributes, and even increased their sophistication during the time frame of our study,” they said. Detected statistics shows that the clients infected with same malware serving ‘IopFailZeroAccessCreate’ bogus digital certificates were widespread across 45 different countries, including Mexico, Argentina and the United States. Malware researchers at Facebook, in collaboration with the Microsoft Security Essentials team, were able to con?rm these suspicions and identify the speci?c malware family responsible for this attack. DETECTION AND ATTACK MIGRATION TECHNIQUES Attackers may also restrict Flash-based sockets by blocking Flash socket policy traffic on port 843 or can avoid intercepting SSL connections made by the Flash Player in order to bypass detection techniques used by the researchers. To counter this, websites could possibly serve socket policy ?les over ?rewall-friendly ports (80 or 443), by multiplexing web traf?c and socket policy requests on their servers. In Addition, researchers have discussed migration techniques in the paper such as HTTP Strict Transport Security (HSTS), Public Key Pinning Extension for HTTP (HPKP), TLS Origin-Bound Certi?cates (TLS-OBC), Certi?cate Validation with Notaries and DNS-based Authentication of Named Entities (DANE), those could be used by servers to enforce HTTPS and validate digital certificates. Sursa: http://thehackernews.com
  18. La unul dai userul ?i la cel?lalt parola?
  19. Pentru 20 de dolari pe an, ar putea face singur acest lucru. Nu cred c? un om cu mii de euro de investit în promovare, ar apela la cineva s? îi "lucreze" domeniul, mai ales dac? nu e targetat pe ceva original. Eu mi-am expus punctul de vedere, pe m?sura lucrurilor care se întâmpl? în online. Mult succes!
  20. Pentru c? suntem în domeniu, concuren?a conteaz? cel mai mult, pentru c? e vorba de un site cu target pe cuvinte cheie ?i ajungem la seo, iar tu nu te po?i bate serios cu nimeni pe chestia asta f?r? câteva mii de euro, ajungând la concluzia c? nici cei r?t?ci?i nu vor ajunge pe forumul t?u, mai ales dac? nu ai subiecte unice. În al doilea rând, de când cu expansiunea Facebook-ului, forumurile nu mai sunt active ca ?i mijloc de comunicare, pentru c? e mult mai simplu s? discu?i acolo, pe un grup, de exemplu. (nu m? pasioneaz? Facebook-ul ?i am cont doar pentru facultate). În concluzie, dac? ce vrei s? faci tu e doar un feti?, te sf?tuiesc s? încerci s? investe?ti timpul în idei cât de cât unice, pentru c? forumuri exist? cu duiumul ?i majoritatea sunt în moarte clinic?. Baft?!
  21. Acum s? te întreb ?i eu ceva. De ce ar sta lumea la tine pe forum ?i nu ar sta pe Softpedia, de exemplu, care este un forum tot pe aceea?i ni?t? cu ce vrei tu s? faci?Plus c? are o vechime considerabil?.
  22. Sortare in functie de activitatea pe ele.
  23. Pe bune? Ai incercat sa dai o cautare pe Google? CrackedTech: What is the difference between BackTrack and Kali Linux?
  24. Du-te ba in pula noastra Salut. Ma numesc Sandu. As dori sa va intreb. Cine doreste sa faca o comunitate de cstrike cu mine ForumGratuit Yahoo : sanuronaldo Yahoo.com skype:sanusanu8892
  25. Social Unlocker - Share Unlocker - Watch videos and photos without share online - am facut si eu asta acum cateva saptamani, dar apar mereu scripturi futute. Pana acum a mers pe aproape orice site cu video-uri blocate.
×
×
  • Create New...