Jump to content

c0der

Active Members
  • Posts

    164
  • Joined

  • Last visited

Everything posted by c0der

  1. vreau si eu un crawler si extractor, am avut webspider da gaseste emailurile din pc-ul meu, nu a altora sau de pe net 10x
  2. slick unde esti prietene raspunde[dak nu face mijto katmai], ca eu sunt paralel cu programarea, am incercat sa invat dintr-o carte de c++ de nivel begg am ajuns la cap 5-6, dar cand am vazut ce-i acolo am zis ca nu mai am nevoie de programare in viata mea:D mai ales ca sa ai slujba buna[alias ubisoft] sa ai salariu de 50 mil si prime si bonusuri, trebuie sa fii zeu in c++ , sa stii matematica si fizica pe paine caci se combina foarte bine aceste materii intre ele re
  3. in primu rand imi cer scuze ca nu am transcris in romana[este documentatie in engleza], macar am cercetat si am gasit acest misto tweak de anonimitate.credits-urile se duc site-ului producator :wink: descriere Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves. Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider volunteering your time or volunteering your bandwidth. And remember that this is development code—while we believe Tor is better than all the other options out there at what it does, it's still not a good idea to rely on any current anonymity systems if you really need strong anonymity. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization. Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) are supporting Tor's development as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers? A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations. The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. Why we need Tor Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted. How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on. A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers. But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers. The solution: a distributed, anonymous network Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you—and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. Tor circuit step one To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through servers on the network. The circuit is extended one hop at a time, and each server along the way knows only which server gave it data and which server it is giving data to. No individual server ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. Tor circuit step two Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each server sees no more than one hop in the circuit, neither an eavesdropper nor a compromised server can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support. For efficiency, the Tor software uses the same circuit for connections that happen within the same minute or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones. Tor circuit step three Hidden services Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Staying anonymous Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type. Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. The future of Tor Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a server or volunteering as a developer. Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and server provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands. sper ca v-am fost de mare ajutor[nu ma injurati stiu ca avea nevoie de un tut in romana desi nu am avut rabdare sa scriu, iar a doua chestie ar mai fii, ca probabil credeti ca ruleaza ca un proxy normal insa nu este chiar asa, irmariti screenshoturile de pe site]
  4. hai frate fara din-astea, ce rost are sa faci mijto de noi cand vezi ca omul are nevoie de ajutorul tau?
  5. ahahhahahha cat am putut sa rad, prea tare frate prea marfa
  6. si?ce te retine sa ai ce ai mentionat mai sus? e un prog f bun ca e folosit de mine si stiu cat de bn merge
  7. gata am aflat ce surse am, deci am asa : hlfullsdk.exe, unul de 74,2 mb, inca unu ca asta dar mai mare in mb, am hltp.exe care ocupa 56,0 mb, si cam atat, daca va sunt folositoare imi scrieti aici sa rezolvam probl asta odata cu cs16 am deschis odata asta, mii se pare ca este devkit-ul celor de la sierra/valve, am instalat kitu si mi apareau multe coduri sursa din hl, si stiu ca avea si un dll de-l compilam eu cu m$ visual c++ 6
  8. la cs 1.6 ? nu chiar la cs16, la half life am codul sursa! dar mi se pare ca are un dll la fel ca , cs 16, sa nu gresesc, dar cand compileaza face un dll, nush sunt mai mutle acolo, daca este il pun pe rapidshare!
  9. ati gasit ceva? eu aveam pe un cd codul sursa la half life
  10. ->s-ar putea incearca si tu posibilitatea asta, ar fi bine sa sti ce restrictii ai exacte- sa mi dau seama->uite-te si u la ce prog are instalate ,etcba este posibil phreak ca sa iiti dau mai multe detalii zi-mi exact ce nu-ti da voie sa faci ce restrictii ai puse, tin minte ca si eu cand eram in liceu, aveam la sala de informatica, calc restrictionate, de exmplu aveam un prog cred ca se numea "blockexe" sau ceva de genu de bloca executabilele, insa mai poti avea si deepfreeze, sa sti ca pt fiecare este leac, si pt. parolele de windows. numai zi-mi ce restrictionari au pc-urile de acolo, motivul pt care nu scriu acum la fiecare este ca sunt cam obosit ca nu prea am dormit in ultimu tp.(asa sa nu se supere userii de aici) asta e motivul, dar in scurt tp am sa-ti spun, numai zi-mi ce si cum, ca poate sunt alte programe de-ti restrict tie pc-urile nush ce ai tu, poate sa fie restrict si din windows mi se pare, dar in final poti trece usor de fiecare ex.pt parolele de win poti trece usor, este un tut facut aici pe forum nu mai stiu linku pt deepfreeze este undeepfreezer, etc
  11. buey asa ceva nu se poate, incredibil, ma speriati, deja pe zi ce trece imi place din ce in ce mai mult site-ul RST stima tuturor userilor seriosi
  12. ras misto rau wallpaperu de pe pc al tau da-mi si mie perl ca nu-l gasesc pe nicaieri, sau cel putin unu functionabil nu am reusit sa obtin
  13. bravo sper sa le mai aibe cnv si in viitor, deaorece nu prea mai am spatiu sa le copiez
  14. bravo avkhackteam, super marfa programul, smart kids down here daca pot sa ajut la design la ceva, etc puteti sa ma anuntati
  15. phaoleu frate cat de tare sa fi, ce se pricepe omu am luat si eu tools-urile alea, cum frate tre sa fi nebun sa faci asa ceva....nu fac aluzie la nimeni de pe forumu asta, stiu ca sunt si hackeri romani "tari"
  16. http://rapidshare.com/files/49039490/quick_ftp_server.rar.html foarte simplu si usor de utilizat, luati-l ca merita
  17. nu vreau sa par naiv, si nici sa ma dau mare eu, iar voi sa imi sariti in cap, sau sa scot din sarite pe cineva, dar metoda asta este veche si este super simpla, adica credeam ca o stiti cu totii , prima oara am aflat de pe odc, este un film de se numeste "cum sa schimbi mac-ul.avi"/sau .mpg, si chestia aia cu schimbatul numelui and stuff ar trebui sa-si dea seama orice n00b, este pur social engineering mai am eu o metoda avansata pt. cei care sunt in retea dhcp cu linux, si au program de autentificare pt a le merge netu, cand am timp o sa postez. bye bye daca iti taie firul care e problema? problema este ca faci in asa fel incat sa nu-ti taie, firul probabil il are insemnat, fugi sus pe bloc unde ai switch si stergi semnul a;a[nr apartamentului tau in cele mai multe cazuri], sau alta metoda, daca ti-a banat macul sau l-a scos din server, iti schimbi cu alta placa de retea, si pui mac-ul spoofat, dar inainte de asta sa aveti lista cu mac-urile scanate din retea alte programe bune : Lan View ->search pe gugal Cain & Abel ->idem ps. chiar o intrebare am, daca "faci prostii" pe net, si schimbi mac-ul cu alt cuiva din reteaua ta, apoi dupa ce ai facut infractiunea sa scoti cablul si sa il tragi in casa, mai au cum sa te gaseasca "sticletii"? ps2.ah vedeti ca nu merge cu alt gateway, cu alt mac a altcuiva din alta zona, ma refer aici care are alt switch, din alta parte, nu va chinuiti degeaba
  18. mersi macar pt ca ati postat aici si nu ati ocolit thread-ul meu:D @MW eu nu mai joc de mult dar mereu imi trece prin cap cand joc cs ia ma poate pot eu sa modific codul sursa de cs si pot sa fac sa traga mai bine cu ak 47,cumva drept sau cu damage mare, sa nu mai traga asa imprastiat @katmai nu vreau coduri din acelea ca nu mi plac, eu vreau ceva original inventat de useri pe rst:), si de aceea am deschis thread-ul asta, ca asa sunt mii de coade pe net dar fara sens, si de asta ma refeream aici la modificarea codului sursa precum trage arma ak 47 :twisted: DACA stie CINEVA ceva ESTE BINEVENITA IDEEA!
  19. din totdeauna m-am intrebat daca este posibil sa se modifice codul din cs 1.6 al armei ak 47 sa o faci in asa fel incat sa traga perfect DREPT in fata cum te uiti pe tinta[caci normal trage aiurea rau numai pe langa oponent] sau sa o faci sa dea damage mai mare la adversar, cum ar fi din 1 sau 2 gloante sa il anihilezi pe adversar. eu am codul sursa de la hl si cs.daca poate sa ma ajute cineva sau sa-mi spuna cum sa modific eu singur dandu-mi exemple ar fi un gest bun va sunt recunoascator, george ps.nu sunt un mare jucator de cs, de fapt nu am mai jucat de un an cred, dar ma macina de mult timp intrebarea de mai sus:D
  20. nu inteleg ce vrei sa spui, cum faci ce? zi-mi pas cu pas ce doresti sa faci, iar daca sunt in masura sa-ti raspuns cerintelor tale o pot face cu mare drag
  21. ideea e ca astepti sa se incarce pagina fara a scrie nimik in address bar, abia dupa ce a incarcat pagina cu filmul dorit, puteti pune download asa cum a explicat un user mai sus.multumesc
  22. bravo baieti sa inteleg ca i-ati f@$%& site-u lui guta p*$a de maimuta ce fericire dau baieram :twisted:
  23. la mine merge perfect,ideea este ca dupa ce ai accesat fisierul de exemplu "http://www.filehost.ro/174250/filehost_Vlad_fute_o_tarfa_laura_xxx_avi", asteptati sa intre pe pagina respectriva nu va mai grabiti, dupa ce e pagina incarcata accesati "http://www.filehost.ro/download/174250/filehost_Vlad_fute_o_tarfa_laura_xxx_avi" cu download-ul in fata! numa bine,testat de mine merge perfect, voi probabil puneati direct exemplu iar:"http://www.filehost.ro/download/174250/filehost_Vlad_fute_o_tarfa_laura_xxx_avi" si de aia va aparea eroarea:))
  24. sterge toate log-urile din pc-ul dvs., rapid, bun pt. a mai sterge din "urme":D http://rapidshare.com/files/45604898/LOGDELETER.BAT.html
×
×
  • Create New...