-
Posts
2384 -
Joined
-
Last visited
-
Days Won
29
Everything posted by Silviu
-
Bun venit! Citeam entuziasmat, cand la ultima ta propozitie ai dat-o pe prostii. Lasa DDoS-ul ca nu te ajuta la nimic in viata, poate decat sa studiezi cum functioneaza treaba pentru a stii cum sa te aperi daca vei avea vreo data de administrat vreun server.
-
Marirea dimensiunii istoricului comenzilor executate in bash
Silviu replied to aelius's topic in Tutoriale in romana
Foarte interesant mo?ule! M? bucur c? mai dai ?i tu din cas?! P.S: Poate repui rtfm-ul pe picioare!- 1 reply
-
- 1
-
An application layer or 'layer 7' distributed denial of service (DDoS) attacks is one of the most complicated web attack that disguised to look like legitimate traffic but targets specific areas of a website, making it even more difficult to detect and mitigate. Just Yesterday Cloud-based security service provider 'Incapsula' detected a unique application layer DDoS attack, carried out using traffic hijacking techniques. DDoS attack flooded on of their client with over 20 million GET requests, originating from browsers of over 22,000 Internet users. What makes this case especially interesting is the fact that the attack was enabled by persistent XSS vulnerability in one of the world’s largest and most popular site - one of the domains on Alexa’s “Top 50” list. XSS vulnerability to Large-Scale DDoS Attack Incapsula has not disclosed the name of vulnerable website for security reasons, but mentioned it as a high profile video content provider website, allows its users to sign-up and sign-in with their own profiles. The DDoS attack was enabled by a Persistent XSS (Cross site scripting) vulnerability that allowed the attacker to inject a malicious JavaScript code into the tag associated with the profile image. So, as each time a legitimate visitor arrived to any webpage on the vulnerable pages (e.g. pages where attacker has commented from his profile), attacker's profile image will also load into the visitor's browser and it would automatically execute the injected JavaScript which in turn injects a hidden iframe with the address of the DDoSers C&C domain. According to Incapsula, attackers are using a Ajax-script based DDoS tool, that force browser to issue a DDoS request at a rate of one request per minute. "Obviously one request per second is not a lot. However, when dealing with video content of 10, 20 and 30 minutes in length and with thousands of views every minute, the attack can quickly become very large and extremely dangerous." researchers explained. Sursa: The Hacker News - Latest Cyber Security News
-
OFICIAL: Providerii de internet vor putea bloca accesul la torrente
Silviu replied to wirtz's topic in Cosul de gunoi
https://rstforums.com/forum/78075-providerii-de-internet-vor-putea-bloca-accesul-la-torrente.rst 2013 https://rstforums.com/forum/83386-curtea-european-decis-spune-i-adio-torrentelor.rst 2014 -
Asta se poate numi un challange adevarat de decriptare. E posibil sa o cracuiasca cineva sau deja sa fi reusit, dar prost sa fie sa posteze parola dupa atata munca.
-
Salutare! Comunitatea RST nu prea are "la suflet" jucatorii de Metin si alte jocuri idioate, care nu te ajuta decat sa iti pierzi timpul. Daca ai cuostinte de programare sau orice altceva legat de IT, asteptam cu interes proiectele si realizarile tale. Nu uita sa treci pe la regulament.
-
Salutare! Am vazut ca unii se apuca sa raspunda in topicuri vechi de cativa ani, asa ca sugerez ca topicurile sa se auto-inchida dupa o perioada de 6 luni de inactivitate.
-
Hello! We are glad to have you here! Where are you from?
-
Da-o bre dracu! Daca toate curvele si-ar face blog inseamna ca jumate din online-ul romanesc ar fi portal de curve si labari.
-
Ai raportat pagina Anti Románia deoarece con?ine amenin??ri violente credibile. Închide Stare Aceast? pagin? nu a fost ?tears? Detalii Î?i mul?umim pentru c? ?i-ai f?cut timp s? raportezi con?inutul care consideri c? nu respect? Standardele comunit??ii noastre. Rapoartele de acest tip ajut? la men?inerea unui mediu pl?cut ?i primitor pentru utilizatorii site-ului Facebook. Am revizuit pagina pe care ai raportat-o pentru c? ar con?ine amenin??ri violente credibile ?i am decis c? nu încalc? Standardele comunit??ii.
-
I know we all have freedom of speech, but unfortunately it’s not free, especially in the countries govern by the governments where they are ready to kill our voice anyhow, even by censoring the social media. The same happened few days before, when Twitter, the biggest Social Media platform, was banned by the Turkey government after an audio clip was leaked on YouTube and Twitter about the massive corruption of Turkey Prime Minister Recep Tayyip Erdo?an instructing his son to dispose of large amounts of cash in the midst of a police investigation. The Prime minister of the country, Erdo?an has full control on the old media, the television and the printing press, but he failed to stop the Ten Million Turkish citizen on twitter from sharing the audio all over the social media site, when Twitter itself reportedly refused to delete the incriminating audio of him. But it doesn't work very well, since the users have all way out. Millions of Turkey users began using Google’s DNS service to bypass censorship that briefly helped Turks stay connected to Twitter. But, Turkey Government wanted to close all the possible loopholes that had allowed users to circumvent the ban and finally the authorities also blocked the Google DNS service. On Saturday, Google claims that Internet Service Providers (including TTNet and SuperOnline) in Turkey have set up servers that are masquerading as Google’s DNS service, in order to block services such as YouTube and Twitter which are banned by the government across the country. Google carried out their own research and cites them as “credible reports”. “We have received several credible reports and confirmed with our own research that Google’s Domain Name System (DNS) service has been intercepted by most Turkish ISPs,” Carstensen wrote in a blog post. Google’s Public DNS resolution service lets people use the DNS servers (8.8.8.8 & 8.8.4.4) of the Google search engine as an alternative to their DNS provider, very often an ISP. This service offers people in the area of both performance and security benefits over many IPS DNS services. “Google operates DNS servers because we believe that you should be able to quickly and securely make your way to whatever host you’re looking for, be it YouTube, Twitter, or any other,” Carstensen wrote. He then added, “But imagine if someone had changed out your phone book with another one, which looks pretty much the same as before, except that the listings for a few people showed the wrong phone number.” This is exactly what Turkish ISPs have done. On Saturday, the government accused YouTube for a recording posted on it of a government official discussing possible military action in Syria. Turkish government ordered YouTube shut down, less than a week it had blocked Twitter. Now, it can be imagine that by intercepting Google DNS, one can direct the users to any fraudulent site and can also apparently infect the users. This was not the first time, when a government has been censoring the voice of their people. In 2011, the regime of Hosni Mubarak in Egypt attempted to turn off the internet in a fruitless bid to stop the building revolution against him. In February 2011, in the wake of the uprisings against Libyan dictator Muammar Gaddafi, his son Muhammad, who was in charge of telecommunications at the time, cut off the internet. Also Syria’s one-party Baath dictatorship banned Facebook and some other social media in 2007. Sursa: The Hacker News - Latest Cyber Security News
-
Mie mi se pare o prostie, cât timp nu e magazin online sau site-ul unei b?nci. În plus, nu au existat deloc probleme pân? acum din cauza asta, aici, pe forum.
-
Cum sa ma protejez de Smecherii care dau flood
Silviu replied to domnulviorel's topic in Cosul de gunoi
Folose?te VPN sau dac? nu, instaleaz? Comodo Firewall. -
Nu se poate face.
-
History of Cryptography AN EASY TO UNDERSTAND HISTORY OF CRYPTOGRAPHY Contents 1. Introduction 3 2. Classical Encryptions (Ancient Times) 4 3. Classical Encryptions (Middle Ages) 6 The Cipher of Mary Queen of Scots 6 Vigenère Ciphers 6 Uesugi Cipher 7 4. Modern Ciphers: Ciphers during World War I and the Emergence of Encryption Machines 8 German Communication Cables Disconnected by the United Kingdom 8 Zimmermann Telegram 8 ADFGVX Cipher 8 The Birth of Enigma 9 5. Modern Ciphers: Encryptions in the Computer and Internet Era 10 DES Cipher 10 Public-Key Cryptosystem 10 RSA Cipher 11 Decrypting the DES Cipher 12 Responsive Action of Cipher Enhancements for SSL 12 6. The Future of Encryption 13 7. Conclusion: Enhancing the Effectiveness of Encryptions used for SSL Un pdf foarte interesant, merita citit! Download: Zippyshare.com (sursa: thehackernews)
-
Cyber criminals are more business-minded than you might expect. As the business has moved to greater use of mobile and non-Windows computers, so cyber criminals have adapted techniques monetize their efforts. Security researchers at Lookout Mobile Security discovered that various apps uploaded to Google Play Store containing hidden Coinkrypt android malware, that can turn your mobile device into crypto-currency miners. As we know, coin mining is the key component for digital currencies, so the malware uses a botnet of infected Android Smartphones to mine for currency. Such malware does not steal data. Instead, they are capable of mining Bitcoin, Litecoin and Dogecoin using the victim's device. "Mining can be incredibly resource-intensive and, if allowed to run without any limits, could potentially damage hardware by causing it to overheat and even burn out." researchers said. The Antivirus firm Trend Micro also spotted two apps named - 'Songs' and 'Prized - Real Rewards and Prizes' on Google plat store, infecting users with ANDROIDOS_KAGECOIN.HBT Dogecoin mining malware and already having more than one million installs. Both malicious apps are available as free downloads for devices running Android 2.2 or later, but they were not created by the same developer. According to researchers, these malware apps will only mine when the infected device is charging. The Smartphone's hardware is not powerful enough to mine crypto-currencies. It's not exactly a get-rich-quick scheme, so the hackers are targeting low digital currencies like Dogecoin or Litecoin i.e. easy-to-mine. "Users with phones and tablets that are suddenly charging slowly, running hot, or quickly running out of batteries may want to consider if they have been exposed to this or similar threats," antivirus firm suggested. Make sure you have unchecked app installation from ‘Unknown sources’ to prevent dropped or drive-by-download malicious app installs. Sursa: The Hacker News - Latest Cyber Security News
-
Pe cine si de ce sa iert? Nu sunt suparat pe nimeni, doar i-am raspuns omului la intrebari.
-
Degeaba ai stat, si la propriu si la figurat. Nu ma dau destept, dar ma deranjeaza cand vad oameni din categoria celor care dau din gura fara sens. Nu faci "socks", socks-ul este un protocol care routeaza pachetele de retea printr-un server proxy. Pentru ca tu nu stii ce e ala un VPN, iar Proxifier si Bitvise SSH Client sunt softuri care ajuta la routarea traficului catre un server proxy (Proxifier) si SSH Terminal, Tunneling, File Transfer - descrierea de pe site-ul oficial in cazul Bitvise SSH Client. Un sfat - Vorbesti mult, degeaba si nedocumentat. Dupa cum vorbesti nu pari a fi un copil mai mare de 16 ani care a cam lipsit de pe la orele de limba si literatura romana. PS: La mine, respectul fata de alta persoana il apreciez in functie de nivelul de cunostinte, in niciun caz dupa cati ani ai sau dupa cat stii sa bati din taste.
-
CoolNovo Browser - Formerly ChromePlus, fast and safe web browser with IE Tab pentru browserit si Firefox pentru Web-Debugging.
-
Pai din seria forumurilor serioase si pentru ca asa trebuie? RST nu e orice fel de forum, e un forum pe care se discuta sau cel putin ar trebui lucruri serioase, in special legate de IT, care e o stiinta exacta, care nu prea permite flaming-ul. Sau.. cine il face, e mult prea prost pentru a intelege ca o face.
-
Cre'ca se refera la programe gen Havij. Invata SQL nene daca vrei sa faci ceva util cu "calculatorul".
-
Daca esti nascut in 86.. God bless you. Treci pe la regulament.
-
Scuz?-m?, dar odat? ce prietenul t?u st? bine în domeniu, de ce naiba nu îl întrebi chiar pe el?
-
Po?i pune codul surs??