Jump to content

Nytro

Administrators
  • Posts

    18712
  • Joined

  • Last visited

  • Days Won

    701

Everything posted by Nytro

  1. Eu sunt curios ce o sa faceti cu ele... Cred ca o sa le tineti bibelou, de dragul de a avea
  2. Next Generation of Btrfs Linux Filesystem Nears Prime Time Brtfs = Better Filesystem Btrfs, Future Linux Default Filesystem Sean Michael Kerner Friday, August 27, 2010 09:55:12 AM Since at least 2008, the Btrfs Linux filesystem has been talked about as a next-generation technology one day potentially rivalling or supplanting the current dominant Linux filesystems. According to Chris Mason, founder of the Btrfs effort and now director of software development at Oracle, Btrfs is today generally stable and usable even though it's yet to be finalized. And although he admits the filesystem still has some issues to overcome as development continues, Mason said he would like to see Btrfs ultimately replacing existing Linux filesystems like the popular Ext3 and Ext4 systems that are often the default on enterprise Linux distributions. "The reason why we decided to go with a new filesystem instead of expanding an existing one is we wanted to provide something that was focused on features that the existing Linux filesystems just couldn't provide," Mason said during an Oracle-sponsored webcast on the state of Btrfs, which first landed in the Linux 2.6.29 kernel and has been improved with each subsequent kernel release. Mason explained that the foundation of Btrfs is its use of copy on write (COW), an approach that means Btrfs never directly overwrites data during normal operations. Instead, Mason said Btrfs writes the new values for metadata and data elsewhere, and then points the filesystem to the new location. "What this allows us to do is have very strong consistency checks and integrity checks to make sure, as we move along, that the drive returns exactly the data that we wrote," Mason said. "That's a very important part of keeping data manageable as you scale storage up to massive sizes." In addition to COW, Btrfs provides the ability to take snapshots as well as the ability to resize the filesystem. For migration, Mason noted that Btrfs provides the ability to do offline conversion of existing Ext3 or Ext4 filesystems to make it easier for developers to try out the new filesystem. "We create the Btrfs filesystem in the free space of the Ext3 or Ext4 filesystem and we create Btrfs metadata that points to the data blocks from the Ext3/4 files," Mason said. "Then we basically make a snapshot of the Ext3/4 filesystem."
  3. Top Ten Security Reasons to Upgrade to Windows 7 # July 12, 2010 # By Lisa Phifer After a devastating wrong turn with Vista, Microsoft is back on its game with Windows 7. Sure, Windows 7 has annoyances – such as touting attractive features, but making most of them available only to those who pay extra for Enterprise (or Ultimate). But Windows 7 Enterprise delivers a plethora of improvements to justify the cost and pain of migration. The security benefits you could reap by upgrading to Windows 7 Enterprise include the following: 1.Improved platform security. Windows 7 picks up where XP SP2 and Vista left off, extending Data Execution Protection and Address Space Layout Randomization to deter malware, even when browsing. Kernel Patch Protection stops malware from hooking 64-bit kernel events, and Windows Service Hardening can enforce resource access profiles for included Microsoft services. Alas, not all applications use DEP and ASLR and only services can use WSH, but Windows 7 starts with a more solid foundation from which to fend off attackers. 2.Safer browsing. Internet Explorer 8, supplied with all versions of Windows 7, incorporates a wealth of security enhancements, including SmartScreen filtering, trusted domain highlighting, type 1 cross-site script attack filters, and InPrivate browsing. IE8 takes advantage of ASLR and DEP and can apply more granular ActiveX settings—for example, letting admins authorize riskier ActiveX controls, but only by trusted sites or users. IE8 can also be installed on XP SP3 and Vista, but upgrading to Windows 7 makes the most of some IE8 features and provides further incentive to retire older, less secure browsers. 3.Secure protocol support. Network protocols may not "wow" end users or sys admins, but they're a vital part of building a more secure foundation. Windows 7 includes native support for IPv6 (including IPv6 IPsec) and DNSSEC. These more secure protocols make it harder for attackers to spoof IP packets and addresses by providing cryptographic authentication and integrity checks. Enterprise networks must master other hurdles to actually use these protocols, but embedding protocol support in all of your endpoints satisfies one big pre-requisite. 4.Location-aware connection security. Windows 7 includes policy-based network segmentation, letting admins apply different Windows Firewall rules to each adapter based on location (e.g., Wi-Fi at the office, Wi-Fi at home, Wi-Fi at a public hotspot). The Windows 7 Firewall itself has grown from outbound-only packet filtering into a full bi-directional TCP/IP firewall, enforcing rules that can now be centrally-configured with ActiveDirectory GPOs. Windows 7 still doesn't have the best personal firewall around, but this is a noteworthy improvement. 5.Quick-and-easy file recovery. Windows XP creates System Restore points to roll a damaged PC back to a know-good earlier state. Windows 7 and Vista beef this up with Volume Shadow Copy (VSC) – a service that backs up entire volumes, including Windows system files, program files, settings, and user files. By default, shadow copies are created weekly on a Windows 7 PC with idle time. On-the-go workers can use VSC to recover a single lost document or a corrupted DLL in minutes, without connectivity or help. However, because shadow copies are stored on the same disk, they are not a replacement for routine data backup to archive. 6.Always-on secure remote access. For those tired of intrusive VPNs, Windows 7 Enterprise offers DirectAccess. DA uses auto-initiated, authenticated, encrypted IPv6/IPsec tunnels to securely connect remote Windows 7 users to private network resources. DA tunnels can terminate at a Windows Server 2008 DA gateway or at any IPv6 Windows Server 2008 behind that gateway. Alas, in order to achieve user-transparent always-on secure remote access with DA, the enterprise must deploy Windows Server 2008 and IPv6. Fortunately, DA can wrap IPv6 inside IPv4 or HTTPS to traverse home and public networks that usually lack IPv6 today. 7.Usable user access control. The tighter User Access Controls first introduced by Vista are back in Windows 7 – after a rigorous reality-check back at Redmond. UAC deters apps and users from making unauthorized changes by defaulting to Standard User and requiring explicit permission to elevate privileges when needed. Windows 7 now silently elevates many activities routinely needed by end-users (e.g., adding printers, changing time/date) to reduce prompting. Many Microsoft apps have also been refactored to segregate activities that do and do not require elevation, and admins can now configure prompts without disabling UAC altogether. 8.Better desktop auditing. Vista added XML-based audit events at a finer level of granularity. Windows 7 took this further by including more helpful information in audit events—for example, indicating not just that a given activity was permitted or denied, but why that decision was made. These enhancements improve forensic analysis and troubleshooting capabilities and make it possible to easily find all changes made by an individual user or group. 9.Application whitelisting. In Windows 7 Enterprise, XP/Vista Software Restriction Policy blacklists are replaced by AppLocker whitelists. SRPs were too hard to maintain and too easy to bypass. Windows 7 AppLocker strikes a better balance by permitting or denying program launch based on Publisher Rules (recommended), Hash Rules (for programs without signatures), and Path Rules (as a last resort). Publisher Rules check signatures on executables, installers, scripts, and libraries. A new wizard can even search an entire reference PC to find all programs and propose AppLocker Publisher Rules, falling back to Hash Rules only for programs without signatures. AppLocker still isn't for everyone, but it can deliver a more effective defense against malware while enforcing potentially-unwanted-program policies. 10.On-the-go data protection. BitLocker, introduced in Vista, is back in Windows 7 Enterprise with major improvements. BitLocker full-disk encryption can now be controlled by GPOs, use a wider PIN or two-factor authentication to unlock drives, and interface with a central recovery key store. Windows 7 also plugs the "USB hole" with BitLocker To Go—portable data encryption for USB drives. BitLocker To Go stores an encrypted volume on a USB drive, along with a reader that can be used to decrypt those files on Vista or XP PCs. GPOs can be used to control whether unencrypted data can be written to USB, thereby enforcing encryption whenever files are permitted to leave an otherwise locked-down PC. Take a hard look at these and other Windows 7 security features to determine how you can get the biggest bang for your buck during your OS migration. Some of these features require additional infrastructure – most notably DirectAccess. Several are only available when upgrading to Windows 7 Enterprise (or Ultimate). Most require careful planning and testing prior to broad rollout (e.g., UAC, AppLocker). However, if used wisely, Windows 7 can help many organizations strengthen their security postures.
  4. MAC Address Spoofing for Windows, Linux and Mac # June 7, 2010 # By Eric Geier Network adapters come preconfigured from the factory with their own globally unique physical or Media Access Control (MAC) address, which helps them identify themselves when communicating with other networking components. Though you can't change the permanent MAC address actually stored by the network adapter, you can make it provide a different address using your operating system (OS). We'll see how to do this with Windows, Mac OS X, and Linux. There are a few reasons you might want to simulate another MAC address, including troubleshooting and testing your network. From a security standpoint, it's a good idea to understand the technique, referred to as "MAC spoofing," because hackers also find it useful to get around MAC address filtering. This filtering is used by some network administrators to help control which devices end-users can connect to the network or even as another layer of security against hackers. If nothing else, understanding MAC spoofing will help you demonstrate to yourself or others just how easy it is to change your address and bypass MAC-based security measures. Changing Your MAC Address in Windows Before you change the MAC address, you might want to write down the original one. One way to bring it up is to open the Network Connections window, double-click the desired network adapter, and on the Network Connection Status window, click the Details button to look for the Physical Address. Another way is to open a Command Prompt, type ipconfig /all, find the desired Network Connection, and look for the Physical Address. The more user-friendly way to change your MAC address in Windows is via the Network Adapter Properties. You probably want to try this first, leaving the Registry method as a last resort. When you're ready, give it a try: 1. Open the Network Connections window and double-click the desired network adapter. 2. On the Network Connection Status window, click the Properties button. 3. On the Network Connection Properties window, click the Configure button. 4. On the Network Adapter Properties window, select the Advanced tab. 5. Choose the Network Address or Locally Administered Address Property, select the Value radio button, and then enter the new MAC address. If using Windows 7, you must use a special format as we'll note in a moment. 6. Click OK to save changes. If you don't have success changing your MAC via the Network Adapter Properties, you might want to try using the Windows Registry. However, you should first copy down the original address before proceeding so you'll have it if you want to restore it. When you're ready, here's how to edit the Windows Registry setting: 1. Open the Registry Editor by typing regedit into the Start Menu field or Run prompt. Browse to the following key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass{4D36E972-E325-11CE-BFC1-08002BE10318} 2. You should see 4-digit sub-keys, such as 0000, 0001, 0002, 0003 and so on. Find the right network adapter by referencing the DriverDesc attribute of each sub-key. 3. Once you find the desired adapter, see if it contains a NetworkAddress attribute. If not, create a new String (REG_SZ) and label the Value Name as NetworkAddress. 4. To edit the NetworkAddress, double-click it and type the desired MAC address (without separators) in as the Value Data. If using Windows 7, use the special format discussed next. For either method in Windows 7, the second character of the MAC address must be a 2, 6, A, or E, such as the following examples: x2-xx-xx-xx-xx-xx x6-xx-xx-xx-xx-xx xA-xx-xx-xx-xx-xx xE-xx-xx-xx-xx-xx Now you should double-check you're using the new MAC address, using one of the methods we discussed in the beginning of the section. If you have problems changing your MAC address, you might consider using a third-party utility, such as Technitium MAC Address Changer. Changing Your MAC Address in Mac OS X Spoofing the MAC address for AirPort adapters in Mac OS X 10.4 (Tiger) and later is fairly easy. However, by default the original address is restored after rebooting. First, you might want to check out your current address; type the following into a Terminal window: ifconfig en1 | grep ether Then change the MAC with the following command: sudo ifconfig en1 ether xx-xx-xx-xx-xx-xx Be sure to replace the x's with your desired address. You might also need to change the interface number (en1) to something else. You can review interfaces by typing ifconfig. The IP address info listed for each interface might give you a clue when distinguishing between them. If you have problems getting it to work, try disconnecting from all wireless networks but leave the AirPort adapter on, and then retry. You can force it to do this by copying and pasting the following command: /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport -z If you run into issues, you might want to try the ChangeMAC utility. Changing Your MAC Address in Linux Changing the MAC address in Linux also requires a few commands in a Terminal window. First, you should check which interface number is associated with the desired network adapter and possibly copy down the original MAC address before making changes: type ifconfig into a Terminal window. When you're ready, bring up a Terminal window, and start by deactivating the interface: sudo ifconfig eth0 down If you want an interface other than eth0, be sure to replace it in these examples. Then you can assign it a new address, replacing the x's with your desired address: sudo ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx Now you can reactivate the interface: sudo ifconfig eth0 up Lastly, verify it has changed: sudo ifconfig eth0 | grep HWaddr
  5. # March 31, 2010 # By Eric Geier The Windows Registry is just one of those things we learn to love, and learn to hate. It's a huge, seemingly unorganized and highly sensitive mess of settings that tell Windows how to behave. As you may know, you can tweak Windows, its features, and other programs by making changes to the Windows Registry. We're going to discuss ten different registry changes or hacks relating to networking. You might discover a few tricks and shortcuts that may save you some time or a headache. Without further ado, here they are in no real particular order: 1. Hide Your Computer From the Network If file and printer sharing is enabled on a Windows computer, it by default sends announcements in the background to all the other computers. This makes the computer show up in Network or Network Neighborhood. However, with this registry hack, you can hide your computer so others can't browse to it even if you're sharing. Create or change the "Hidden" DWORD value to "1" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters Then you can still access the computer and shares with the Universal Naming Convention (UNC) path in a web browser or windows explorer window: \computernamesharename 2. Display Error Statistics on the Network Connection Status Window By default, the Network Connection Status window shows the number of packets or bytes received and sent via the network adapter. This can help when troubleshooting by letting you know if any traffic is getting in or out. However, a simple registry hack can give you another piece of information: the number of errors. This can help alert you of network issues. Create or change the "ShowLanErrors" DWORD value to "1" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetworkConnectionsStatMonShowLanErrors 3. Change Advanced 802.1X Authentication Settings 802.1X authentication helps better protect wired and wireless networks, but it adds another step to the connection process. This added step might have an adverse impact to clients that roam between wireless access points. Fine-tuning the Pairwise Master Key (PMK) and preauthentication settings, however, might help. In Windows XP and Vista, you must configure these settings via registry values. Start by browsing to the following location: HKEY_LOCAL_MACHINESOFTWAREMicrosoftEAPOLParametersGeneralGlobal Then you can change the following DWORD values: PMKCacheMode: Set "1" to enable PMK caching, "0" to disable. PMKCacheTTL: Number of minutes (5-1440) to keep PMK entries cached, up to 24 hours. PMKCacheSize: Maximum number of PMK entries (1-255) that can be cached. PreAuthMode: Set "1" to enable preauthentication, "0" to disable. PreAuthThrottle: Number of wireless access points (1-16) that the client will try preauthentication with, based on the order of network profiles created in Windows. 4. Remove Cached 802.1X Login Credentials in XP Windows XP by default saves the login credentials for 802.1X authentication for later connections. Unfortunately, you must modify the Windows Registry to delete this cache in XP, unlike with Windows Vista and 7. To remove the cached 802.1X login credentials, delete the following registry key: HKEY_CURRENT_USERSoftwareMicrosoftEapolUserEapInfo 5. Enable the Network Adapter's Onboard Processor Some network adapters have an integrated processor that can run some networking functions instead of passing them on to the main processor. Ideally, this frees up your main CPU for other tasks and increases overall performance. However, this on-board processor capability is turned off by default in Windows XP and requires a registry change to enable. Create or change the "DisableTaskOffload" DWORD value to "0" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParameters 6. Change the IP Address of the Wireless Hosted Network A new feature in Windows 7 and Windows Server 2008 R2 lets you create a virtual Wi-Fi router, called a Wireless Hosted Network. By default, Windows assigns this virtual interface the IP address of 192.168.137.1. However, you can change this address in Windows Registry. Change the "ScopeAddress", "ScopeAddressBackup", and "StandaloneDHCPAddress" DWORD values at the following location: HKEY_LOCAL_MACHINE\SYSTEMCurrentControlSetservicesSharedAccessParameters 7. Remove the Public Folder Shortcuts If you don't use the Public folders provided by Windows, you may want to remove the shortcuts in XP or Vista. You find them on most open/save file dialogs and in the Favorite Links section of Windows Explorer windows. A shortcut is even on the main folder list, among the shortcuts to the user folder and to the drives. These shortcuts do not appear in Windows 7. However, the Public folders are by default chosen as a location for the Libraries, which you might want to change. To remove the shortcut from the Favorite Links in XP or Vista, open your Links folder (C:Usersyour_user_nameLinks) and delete Public.lnk. To remove the shortcut from the Folders List, you must delete the following registry key: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion explorerDesktopNameSpace{4336a54d-038b-4685-ab02-99bb52d3fb8b} 8. Remove the Shortcuts to the Shared Documents Folder If you don't want users to use the Shared Documents folder in Windows XP, you might want to hide the shortcuts to it. Just create the "NoSharedDocuments" DWORD value and set to "1" at the following location: HKEY_CURRENT_USERSoftware\MicrosoftWindowsCurrentVersionPoliciesExplorer 9. Change the Default IP Address of ICS As you may know, Windows includes a very useful feature called Internet Connection Sharing (ICS) that lets you share your Internet connection. Windows gives the virtual router the IP address of 192.168.0.1 and hands out addresses via DHCP to computers. This however is the default IP of popular off-the-shelf routers like D-Link. Therefore, you might want to change the default to something else to avoid an IP conflict. To change the IP address of ICS, modify the "ScopeAddress", "ScopeAddressBackup", and "StandaloneDhcpAddress" DWORD values at the following registry location: HKEY_LOCAL_MACHINESYSTEMControlSetServicesSharedAccessParameters 10. Remove the Hand From Icons of Shared Resources By default, Windows adds an image of a hand to all the icons of shared folders and printers. This makes it easy to distinguish resources that are being shared on the network. Sometimes you might not want this. Luckily, there's a quick registry hack to remove the hands. Change the "Default" REG_SZ value from "ntshrui.dll" to blank at the following location: HKEY_CLASSES_ROOTNetworkSharingHandler Eric Geier is the Founder and CEO of NoWiresSecurity, which helps businesses easily protect their Wi-Fi with enterprise-level encryption by offering an outsourced RADIUS/802.1X authentication service. He is also the author of many networking and computing books, for brands such as For Dummies and Cisco Press.
  6. C++Ox: The Dawning of a New Standard Pagini: 42 It's been 10 years since the first ISO C++ standard, and 2009 will bring us the second. The new standard will support multithreading, with a new thread library. Find out how this will improve porting code, and reduce the number of APIs and syntaxes you use. In this special report, Internet.com delves into the new features being discussed by the standards team. Learn how these new features will revolutionize the way you code. Special report topics include: * Overview: C++ Gets an Overhaul * Easier C++: An Introduction to Concepts * Simpler Multithreading in C++0x * The State of the Language: An Interview with Bjarne Stroustrup * Timeline: C++ in Retrospect Screenshot: http://i51.tinypic.com/2qir41s.png Download: http://www.speedyshare.com/files/24120293/5147_c_0_specialreport_op.pdf http://www.mediafire.com/?8m9sarucs3w9swk
  7. Get Answers to Your Wi-Fi Questions Pagini: 15 Screenshot: http://i52.tinypic.com/124vxhg.png Download: http://www.speedyshare.com/files/24120221/3852_wifiqa_ntwk.pdf http://www.mediafire.com/?12o67j3o3s42m3v
  8. Mastering Network Protocols Pagini: 8 Scurt si la obiect Screenshot: http://i56.tinypic.com/2n0ikhx.png Download: http://www.speedyshare.com/files/24120148/3852_mstrng_net_prot.pdf http://www.mediafire.com/?idzac8np82kj38k
  9. Nu am citit ce e pe acolo, dar poate daca ii dai ceva bani administratorului...
  10. Ce plm faceti cu logurile? Nu prea aveti ce face cu ele... Asta daca nu sunteti niste boscheti care abia asteptati sa scrieti "HACKED by VASILE" pe hi5-uri...
  11. kills, plays, lies, cooks, beats, licks, likes, eats, drikns, fart, flirts with... Pff, sunt o gramada Mai sunt pe la comentarii
  12. yo9gjx: Nu am cum sa ajung maintainer, e prea mult de munca. Da, sunt astfel de comentarii, asa cum oricine poate face patch-uri, asa oricine poate lasa propriile comentarii. Pe mine insa nu ma deranjeaza. Kabron: Thanks
  13. Nu e problema HTML, e problema PHP. Probabil a fost uitata o paranteza e inchidere, sau poate niste ghilimele sau punctul si virgula.
  14. Am incercat sa imi compilez si eu un kernel ca tot omul, si am vazut ca mai apar unele erori la compilare. Si de ce sa nu incerc sa le rezolv, daca tot nu e greu? Si am cautat in fisierul cu pricina, era vorba de un switch() pe o variabila care era de tipul enum v4l2_mbus_pixelcode. Acel switch avea un "case 0:" iar tipul enum v4l2_mbus_pixelcode nu continea aceasta valoare, asta fiind cauza avertismentului la compilare. In prima instanta am modificat header-ul care definea acea structura, dar am vorbit cu maintainer-ul in cauza si am decis ca e mai bine sa scot acel "case 0" deoarece este inutil. Cu alte cuvinte, patch-ul (un fel de "Hello world" al patch-urilor, dar totusi un patch) inseamna de fapt 3 linii scoase din fisierul "/drivers/media/video/mt9v022.c". Dar e si asta util, pe langa faptul ca nu veti mai primi eroare la compilare, am scapat si de 3 linii de cod inutile. Deci kernelu vostru ca fi mai mic si mai rapid Screenshot cu mail-ul trimis: http://i55.tinypic.com/345k77p.png Am ascuns mail-ul meu, deoarece nu am trimis de pe nytro_rst@yahoo.com, ci de pe un alt mail pe care il folosesc mai frecvent. Patch-ul: --- a/drivers/media/video/mt9v022.c 2010-08-27 02:47:12.000000000 +0300 +++ b/drivers/media/video/mt9v022.c 2010-09-01 16:12:00.704505851 +0300 @@ -402,9 +402,6 @@ if (mt9v022->model != V4L2_IDENT_MT9V022IX7ATC) return -EINVAL; break; - case 0: - /* No format change, only geometry */ - break; default: return -EINVAL; } Stiu ca nu e cine stie ce, dar cred ca e un inceput bun. Oricum, am mai trimis 2 patch-uri (insa doar 1 e trimis corect), dar nu am primit raspuns. PS: Patch-ul nu a fost inca vazut si aprobat de Linus, dar nu vad de ce nu ar face-o. Am incercat sa ma fac util
  15. Nytro

    Conturi

    Doar un alt topic de 2 lei...
  16. Linux System Administrators Guide Pagini: 107 Screenshot: http://i52.tinypic.com/291cak4.png Download: http://www.speedyshare.com/files/24094090/sag-0.6.2.pdf http://www.mediafire.com/?ag9dds7dc6a473o
  17. Linux Network Administrators Guide Pagini: 489 Screenshot: http://i51.tinypic.com/14tx2d5.png Download: http://www.speedyshare.com/files/24094067/nag2.pdf http://www.mediafire.com/?f662nms0wn57c30
  18. Linux Programmers Guide Pagini: 131 Screenshot: http://i55.tinypic.com/nwwti8.png Download: http://www.speedyshare.com/files/24094052/lpg-0.4.pdf http://www.mediafire.com/?8un2zndvvby1abi
  19. Linux Kernel 2.4 Internals Pagini: 55 Screenshot: http://i56.tinypic.com/2qnnqio.png Download: http://www.speedyshare.com/files/24094027/lki.pdf http://www.mediafire.com/?dqu2dzgbdv1ivjm
  20. Am gasit-o prin /usr/share/doc/Books/ Prezinta mai multe distributii de Linux, si e destul de stufoasa (300+ pagini). Problema ar fi ca e scrisa in 1998, dar cred ca e foarte utila. Download: http://www.speedyshare.com/files/24093998/install-guide-3.2.pdf http://www.mediafire.com/?qo3333d7513ifty
  21. Nytro

    Dau la schimb

    M-am cam plictisit sa vad trade-uri de 2 lei pe aici...
  22. Pai spune ca banuiesti ca e un flase positive, nu zice ca "moama, il detecteaza 8 antivirusi" si atat. Si cui ceri explicatie? Lui Slick? El a facut antivirusii aia? Cere-le alora. Se pot trimite mailuri pentru false positive, dar nu sta nimeni sa trimita, nu are rost, nu ii pasa lui Slick ca se trezesc unii ca e programul detectabil.
  23. Amice, tocmai ai zis ca programul asta e un virus. Vino in plm cu dovezi, analizeaza-l, nu cu un scan de 2 lei. Si tocmai de asta nu sunt in afara subiectului, ti-am dat exemplu, sa inteleaga si tampu de tine, ca nu e un virus, si ca de multe ori antivirusii gasesc fisiere inocente ca "virusi". Ce vrei, sa posteze sursa, sa o hexeze toti ratatii? Nu ca unul ca tine ar sti ce sa faca cu o sursa, dar na, trebuie sa iti explic. Daca mai vrei sa zici ceva dai PM.
  24. Alt destept... Yahoo! Manager, tampenia aia a mea, era detectata de o gramada de antivirusi. Si ai sursa acolo, te uiti in ea, si vezi ca nu face nimic. Si uita-te si tu ca ce anume e detectat. Nu, gata, scan, e virus...
  25. Nytro

    Sql injection

    Nu citi pseudo-tutoriale ca cel scris de totti, nu o sa intelegi nimic. Nici nu ai ce intelege... Adica nu e nici o explicatie. E "fa aia", "scrie aia", dar nici un "Scri aia CA SA...". Sau "Asta face CA..." Lasa tutorialele astea, invata mai intai SQL (MySQL recomand, deoarece pentru asta gasesti cele mai multe articole si carti). Apoi poti citi "tutoriale".
×
×
  • Create New...