Jump to content

Nytro

Administrators
  • Posts

    18725
  • Joined

  • Last visited

  • Days Won

    706

Everything posted by Nytro

  1. Te astepti sa te laude toti pentru ca ai dat un click in Havij?
  2. Nu stiu daca ai observat, dar acolo se genereaza un request HTTP, care se presupune a fi trimis catre un server. Ok, Denial Of Service, adica sa primesti cateva mii de request-uri nu e nimic, tu avand 3 trilioane de procesoare, da, nu este problema, dar este ce mai mult de atat. "try to execute code at 0x1111111111111111" for ($i=1; $i<8; $i++) { $payload .= "\x11"; } Asta nu spune nimic?
  3. Se stie din noiembrie 2011, s-a votat pe 26 ianuarie 2012, de unde stiai tu acum 7 ani de ACTA?
  4. In Bucuresti pula, pe Facebook ziceau ca vin 40.000, sa imi suga pula cei care ziceau ca vin si si-au facut laba pe Facebook. "Pentru cei care protesteaza de pe Facebook: MUIE specatorilor!"
  5. Deci care veniti? La 4:30 la Universitate, dati mesaj privat daca vreti sa ne strangem.
  6. Cred ca o sa ne strangem cativa, ne intalnim la Universitate, pe la 16;00-17:00. Cine vine sigur, sa imi dea un mesaj privat. Oricum, e posibil ca eu sa fiu unul cu un steag mare cu Romania pe spate. Daca aveti materiale sau puteti face rost, orice, aduceti cu voi.
  7. Cea mai smechera
  8. [h=1]As Iran Cracks Down Online, Tor Tests Undetectable Encrypted Connections[/h] Andy Greenberg, Forbes Staff [h=6]2/10/2012 @ 11:48AM[/h]Keeping secrets on the web in a country as digitally repressive as Iran isn’t easy. But as Iran tightens the screws on its Web censorship, the hackers at the anti-censorship Tor project are working on something harder: Keeping secret the act of keeping secrets. Ahead of the anniversary of Iran’s revolution Saturday, the country’s government has locked down its already-censored Internet, blocking access to many services and in some cases cutting off all encrypted traffic on the Web of the kind used by secure email, social networking and banking sites. In response, the information-freedom-focused Tor Project is testing a new idea: Encrypted connections that don’t look encrypted. To skirt the so called “deep packet inspection” filters Iran’s government has deployed to block all Secure Sockets Layer and Transport Layer Security (SSL and TLS) encryption that protesters might use to communicate privately, Tor is trying a new kind of bridge to the Web, one the group is calling “obfsproxy,” or obfuscated proxy. Tor executive director Andrew Lewman says the idea is to “make your Ferrari look like a Toyota by putting an actual Toyota shell over the Ferrari,” where the Toyota is normal communications and the Ferrari underneath is the encrypted communications. “Basically, say you want to look like an XMPP chat instead of SSL,” he writes to me, referring to a protocol for instant messaging as the decoy for the encrypted SSL communications. “Obfsproxy should start up, you choose XMPP, and obfsproxy should emulate XMPP to the point where even a sophisticated [deep packet inspection] device cannot find anything suspicious.” Lewman warns that obfsproxy is in a “super alpha” stage of development, and in its current form might only last a short time before Iran finds a way to detect the obscured encrypted communications. The tool currently only obscures SSL and TLS as the SOCKS protocol used by proxy servers, but in the future, he hopes it will be able to impersonate any sort of traffic, including HTTP or instant messages. In addition to its crackdown on encryption, sources inside Iran are reporting that the country is blocking access to sites including Gmail, Hotmail, and Yahoo! using its traditional IP blocking technology. Tor typically circumvents that censorship technique by routing Internet traffic through a series of volunteers’ computers around the world, and in recent years using a collection of more secret encrypted “bridge” connections that relay users’ traffic to that network. Between 50,000 and 60,000 users in the country use Tor daily. But the country’s efforts to block all SSL and TLS traffic put that strategy at risk. Hence the group’s efforts to prevent the government’s censors from distinguishing its encrypted traffic from normal traffic with the new obfsproxy tool. Lewman says that despite a few bugs, the early users of obfsproxy report that it’s “working well in-country.” In the mean time, Tor is looking for technically-skilled users to run obfsproxy bridges to give Iranians a path to the uncensored web. “This kind of help is not for the technically faint of heart but it’s absolutely needed for people in Iran, right now,” wrote Tor developer Jacob Appelbaum in an email to the Tor Talk mail list. Read Appelbaum’s full message asking for obfsproxy volunteers here, and read a full technical desription of how obfsproxy works here. Sursa: As Iran Cracks Down Online, Tor Tests Undetectable Encrypted Connections - Forbes
  9. [h=1]Eight features Windows 8 'borrowed' from Linux[/h]By Sandro Villinger, ITworld February 09, 2012, 3:24 PM — "Good artists borrow, great artists steal!" Pablo Picasso said it. So did T.S. Eliot. And, more recently, . Let's face it: If something makes sense and succeeds, it gets imitated.Though Windows 8 and Linux distributions differ greatly from each other in design, ideology and -- last but not least -- their primary audience, they're all built on the same basic principles of OS design so there's bound to be some overlap. And while Microsoft has long been accused of stealing from the open source community, according to some Linux fans, it's getting to the point where Microsoft simply appropriates good Linux features. [ FREE DOWNLOAD: Windows 8 Deep Dive Report | Windows 8: The 10 biggest problems so far ] I've been following the Windows 8 development very closely and noticed some hefty backlash on some of the features of Windows 8. This was especially true in some Linux/Windows forums and the Building 8 blog, where Sinofsky and friends write extensively about the new upcoming Windows iteration. All this fingerpointing made me curious about where some of the best new-to-Windows features in Windows 8 really came from and how Microsoft put its own spin on them (or not). [h=3]1. File copy dialogue[/h] In an effort to create more transparency, Microsoft implemented an improved copy, move, rename and delete dialog that doesn't just show the progress of each operation, but also a throughput graph and the ability to actually pause individual copy operations. Oh, did that cause a firestorm in the open source community! Pretty much the same dialogue has been part of Linux's Dolphin and Nautilus file managers -- the file transfer dialogue also lets users pause operations and view multiple copy jobs in one window. We've even got the gimmicky bandwidth graph that appears once the user hits "More details". The Microsoft twist: When there's a problem with a file operation, Windows 8 doesn't just stop the entire process but keeps these problems in the error queue. However, it's quite obvious that Microsoft took a good, hard look at the open source world here. What neither Linux nor Windows 8 have is a queue feature. Of course, you could manually pause and resume individual copy operations, but that's not helping you on a massive copy job. Users of both Windows (see the comments on this post) and Linux have been waiting for this for quite a while. [h=3]2. ISO mounting[/h] In Windows 8, Microsoft finally introduces mount ISO files. Once mounted, a new drive letter appears in Windows Explorer that represents the virtual CD/DVD ROM. And while it's a nice addition that lets users finally get rid of annoying third-party tools such as Daemon Tools, Power ISO or Virtual CloneDrive, both Linux and Mac have had this ability for quite a while. The Microsoft twist: No Linux distro does ISO mounting as easily as Windows 8, as it requires some command line trickery (or, again, third-party tools). [h=3]3. Windows To Go[/h] Windows To Go allows (enterprise) users to create a bootable Windows 8 environment on a USB 2.0/3.0 flash drive. It even supports unplugging the drive, which causes the OS to freeze momentarily until you plug the Windows To Go stick back in. Awesome. The Microsoft twist: Obviously, such "live environments" have been around for quite a while in the Linux world, but their performance was never quite up to par with a natively running OS. Since Microsoft optimized their NTFS file system for such a scenario, Windows 8 runs fluently even on USB 2.0. Upon testing Windows To Go, I found that both boot and overall speed were far superior to any Linux live distribution I have ever tested. [h=3]4. The Metro UI[/h] The basic idea for the Metro UI appeared in Media Center and Zune hardware more than 5 years ago. When you use the Metro UI for the first time, you'll see that it's a very unique way of working with a device. But Microsoft didn't pioneer the idea. Various Linux distros, Ubuntu and GNOME in particular, have tried to overhaul the user interface to fit the "one UI to rule them all" approach before Microsoft did. There's no denying that various updates to the UI of Linux, especially Ubuntu, were made specifically with tablets in mind. But even the most ardent Linux users admit that touch support could by no means be called anything other than half-baked. The Microsoft twist: Microsoft is taking a very risky step in making the new Metro UI the default view of the new OS, but it's also much more comfortable to use either with touch or a pen. [h=3]5. Social integration[/h] Linux distributions -- notably Ubuntu -- have, for a long time now, included social media integration by default. The "Me" menu, which first appeared in early alpha versions of Ubuntu 10.04, allows you to update your status to all your accounts and get important feeds directly to your desktop. And when Microsoft finally added its Tweet@Rama, Photo Picker and Socialite app to the developer preview, loyal Linux users again pointed out that this has been done before. The Microsoft twist: No twist here. Microsoft was simply late to catch on to the trend. [h=3]6. Native support for USB 3.0[/h] In their very first blog post, the Building 8 folks explained their new native USB 3.0 stack and, of course, that news was greeted with comments of the "Linux has been doing that for three years" variety. The Microsoft twist: Move along. Nothing to see here. USB 3.0 devices work pretty well with Windows 7 already since hardware manufacturers provide their own drivers. Microsoft just finally implemented an industry standard. [h=3]7. Cloud integration[/h] Both Windows 8 and Linux sport features that let you sync data with the cloud. In Ubuntu 11, the Ubuntu One service offers a free online backup service with 5 GB. If you want more storage space, there's always the option of purchasing an additional 20 GB for $2.99 a month. The Microsoft twist: Windows 8 is going to tightly integrate with SkyDrive's 25 GB online storage, which is not just for photos or music, but also allows for hosting your user account (personal settings, backgrounds, some data...) for you to log in from anywhere. Ubuntu, however, counters with their new Music Streaming service. [h=3]8. ReFS[/h] The newly introduced ReFS (Resilient File System, codenamed Protogon) is Microsoft's next-generation file system. It will first debut in Windows Server 8, but client adoption is well underway. The system itself is strikingly similar to ZFS (the Z File System) and the Linux-derived Btrfs (B-tree file system) as it also supports copy-on-write snapshots when coupled with Microsoft Storage Spaces. For further security, it also provides integrity checksums and B+ Trees. Also, the increased file/volume/directory sizes are also strikingly similar to Btrfs. The Microsoft twist: Let's just say that Microsoft didn't do anything from scratch. While I did not dive deep into the file system drivers, I suspect that Microsoft looked very hard at some of the principles that worked years ago in both ZFS and then Btrfs and got the "inspiration" to develop something very similar. [h=3]Stealing or innovating?[/h] While I won't deny that Microsoft has "borrowed" many ideas from the open source world, overall they're trying to find their own game in Windows 8. Sursa: Eight features Windows 8 'borrowed' from Linux | ITworld
  10. Sa vorbesc cu cateva persoane si vorbim apoi.
  11. Da ionutcristea, un exemplu bun pentru tinerii de azi care traiesc pe banii parintilor. Si ca tot suntem pe un forum de IT, e "pa trend" ca toti studentii de la info sa se astepte la salarii de miliarde fara sa munceasca nimic. Nu e asa, viata nu e chiar asa usoara nici in IT. Puneti mana si invatati, exista atatea carti si tutoriale care asteapta sa fie citite, va pierdeti atat de mult timp cu seriale de cacat si nu va ganditi la viitorul vostru. Ar fi pacat sa ajungeti cu picioarele pe pamand cand va fi prea tarziu.
  12. Nytro

    Studiu Salarii

    In primul rand alege ce iti place, chiar daca e ceva mai putin platit, e important. Nu vrei sa te chinui toata viata cu ceva ce nu iti place sa faci nu? Apoi, nu te astepta la sute de milioane din Internship-uri. Mai mult de 15 milioane nu cred ca ai cum sa ei, eu stiu pe cineva care a fost in Internship la Adobe, baiat destept, si lua 14 milioane, cam asa. Apoi, Java si C# sunt doua domenii total diferite, desi limbajele sunt practic inrudite. In Java cred ca ai lucra ceva mai low-level, in C# probabil trebuie sa cunosti bine .NET-ul, iar domeniile de aplicabilitate sunt total diferite. Java, nu numai ca e cross-platform si se poate executa pe Linux, ideea din spate este ca poate rula pe platformele mobile. Iar C# e pentru aplicatii mai comerciale, care doresc a fi facute mai rapid, dar cu un consum de resurse mai mare. La fel, administrator de sistem poate insemna doua lucruri: administrator Linux si administrator Windows. Pe parte de Linux, trebuie sa stii la perfectie Linux, protocoale de retea si multe altele. Pe partea de Windows trebuie sa cunosti serviciile Microsoft, gen Sharepoint, sau Exchange Server. Legat de castig, poti castiga bine sau prost in ambele, depinde cat de bine o duce firma la care te angajezi. Munca de sysadmin poate sa fie mai lejera, dar poti fi sunat la 3 noaptea in caz ca "x a spart un site" si sa fi nevoie sa repari problema. Nu cred ca exista pe aici persoane care sa iti descrie ambele posturi, depinde mult de la firma la firma cat de mult trebuie sa muncesti, ce beneficii si salariu ai.
  13. Zicem noi de ACTA, dar de cativa ani, Google tot incearca sa monopolizeze Internet-ul, sa obtina cat mai multe informatii despre utilizatori si sa aiba un cat mai mare control asupra lor. Muie Google.
  14. Deci cine vine maine in Bucuresti?
  15. [h=1]Microsoft to issue more critical patches next week for Win7 than XP[/h] By Gregg Keizer February 9, 2012 05:27 PM ET Computerworld - Microsoft today said it would deliver nine security updates next week, four of them critical, to patch 21 vulnerabilities in Windows, Internet Explorer (IE), Office, .Net and Silverlight. This year's February Patch Tuesday will feature three fewer updates and one less patch than 2011's. Four of the nine updates were tagged "critical," the highest threat ranking in Microsoft's four-step system, while the other five were marked "important," the second-level rating. All of the critical updates and two of those pegged important will patch bugs that Microsoft admitted could be exploited by attackers to hijack computers and plant malware on PCs. One interesting thing in today's advance notification, said Andrew Storms, director of security operations at nCircle Security, was the impact on Windows Server 2008 R2, Microsoft's newest server operating system. "Seven Windows- and IE-related bulletins are applicable to Server 2008 R2, but Windows XP [32-bit] has only four. It's another lopsided month," said Storms, referring to past Microsoft claims that older software receive more security updates than newer titles. That upside-down pattern has been prevalent lately. "If it keeps up, pretty soon 'lopsided' won't be lopsided," Storms said in an interview. Another sign is the difference in the number of bulletins that affect Windows XP and Windows 7: One critical update is not applicable to the 10-year-old Windows XP, but does affect both 2007's Windows Vista and 2009's Windows 7. Storms and several other security experts who weighed in via email unanimously pointed to the IE update as the one users will want to deploy first. Microsoft patches its browser every other month. "Last month, we saw how quickly attackers are incorporating browser-based attacks into their toolkits," Wolfgang Kandek, chief technology officer of Qualys, said in an email today. "An exploit for MS12-004 was detected a mere 15 days after Patch Tuesday." MS12-004 was issued Jan. 10 to quash a pair of bugs in Windows Media Player that could be exploited using "drive-by" attacks triggered when users simply browse to a malicious site. Two weeks later, antivirus firm Trend Micro said browser-based attacks leveraging a Media Player bug were already circulating. Marcus Carey, a security researcher at Rapid7, agreed with Kandek. "We're seeing a great many browser patches from Microsoft these days because researchers and attackers have realized that browser exploits have the most potential for harm and are currently the best attack surface," Carey said. Next Tuesday's IE update will address one or more vulnerabilities in all versions of the browser, from the decade-old IE6 to last year's IE9. Storms pointed out that IE6's update is graded as "moderate," third on Microsoft's scale, while the newer browsers' patches will be pegged critical or important, depending on the version and operating system. "The conclusion we can draw is that while IE6 is still vulnerable, [the bug] may be harder to get at than the other versions," said Storms. "But they'll patch it anyway." Other updates will tackle vulnerabilities in Visio 2010, a diagramming application that's part of the Office family; SharePoint Server 2010; and the .Net and Silverlight frameworks, which are used by developers to craft applications and websites. None of the updates scheduled to ship next week appear to be connected to an unsolved security advisory, Storms said. Microsoft will release the nine updates at approximately 1 p.m. ET on Feb. 14. "That's Valentine's Day," noted Storms. "I can bet that some will be using it as an excuse that they forgot." Unless Microsoft issues a surprise security update after next Tuesday -- unlikely, as it shipped just one "out-of-band" patch in all of 2011 -- next week's batch will be the last from the company before its Windows 7 and Internet Explorer 9 face exploits at this year's Pwn2Own hacking contest, which will kick off March 7 and wrap up two days later. Sursa: Microsoft to issue more critical patches next week for Win7 than XP - Computerworld
  16. In limba romana vazusem ceva, dar sunt multe carti si scumpe (daca le iei pe toate). Si mai era o carte, dar era mai veche si nu foarte utila. Eu incepusem "Visual C# - Step by step.pdf": Visual C# - Step by step.pdf - Speedy Share - upload your files here E cam "lame" la inceput, dar inveti multe chestii utile.
  17. - C++ manual complet, Herbert Schild - Totul despre C si C++, Kris Jamsa - C++ pentru incepatori, vol I si II, Liviu Negrescu Bine, nu imi aduc aminte exact numele si autorii, dar sunt pe aproape.
  18. Vezi Developer Tools din Internet Explorer, Tab-ul Script, dai Start Debugging. Ar trebui sa fie util.
  19. Da, nici eu nu am idee, verifica daca acele imagini exista.
  20. Aveti toti warn ca sa va linistiti.
  21. Vad doar un link cu o eroare, SQL Injection inseamna sa extragi date. Nu vad date. Se muta la gunoi.
  22. Haideti totusi sa nu decadem atat de mult incat sa numim ghicirea unei parole "Hacking" si metoda sa fie "Social engineering", este penibil si trist...
  23. Acum cativa ani imi doream sa devin hacker. Acum, nu imi mai doresc asta, mass-media mi-a daramat visele.
  24. Spam aici? Ban: larisuka_alecs@yahoo.com
  25. L-a descarcat cineva? Nu ma pot conecta la thepiratebay, si ceva suspect, Mozilla zicea ca nu se poate conecta la "127.0.0.1". Si nu am antivirus, si nici ceva in hosts. Puteti lua torrent-ul?
×
×
  • Create New...