Jump to content

enigmas

Members
  • Posts

    45
  • Joined

  • Last visited

Everything posted by enigmas

  1. Is more complicated than that, but in short words 5 instructions is based on AND / OR circuits, let's say millions of transistors which acts as micro switches, and combination between them.
  2. You'll need base 2 table which looks like: 2^0=1 2^1=2 2^2=4 2^3=8 2^4=16 2^5=32 2^6=64 2^7=128 2^8=256 ... and you put 1 every time you can subtract the base two value from your number and 0 when you can't when you subtract you make the differences and compare the values again. 234 < 256 we will start from 128 234 - 128 = 106 -> 1 106 - 64 = 42 -> 1 42 - 32 = 10 -> 1 10 < 16 -> 0 10 - 8 = 2 -> 1 2 < 4 -> 0 2 - 2 = 0 -> 1 1 > 0 -> 0
  3. In other words: 11101010 = 8chars so the formula will be [1x(2^7)]+[1x(2^6)]+[1x(2^5)]+[0x(2^4)]+[1x(2^3)]+[0x(2^2)]+[1x(2^1)]+[1x(2^0)] = (1x128)+(1x64)+(1x32)+(0x16)+(1x8)+(0x4)+(1x2)+(1x1) = 128+64+32+0+8+0+1+1 = 234
  4. @offtopic: I don't want to start a fight with you, I don't bother, but there is no rule which doesn't allow me to speak in English, second you are already breaking some of the forum rules take for example rule 7. http://rstcenter.com/forum/815-forum-rules-please-read-carefully.rst#post6722 Beside that you just abash your self. Peace man.
  5. AVG - Dropper.Small.GPI Antivir - TR/VBSilly.A BitDefender - Gen:Trojan.Heur.oq3@rPUmCkd ClamAV - Heuristic.Trojan.SusPacked.XCPP FSecure - Gen:Trojan.Heur.oq3@rPUmCkd GData - Gen:Trojan.Heur.oq3@rPUmCkd Ikarus - Backdoor.Win32.Iroffer Nod32 - MSIL/Injector.AT Vba32 - Constructor.MSIL.Logger.n
  6. Indeed CDBurnerXP is a good alternative to NERO but is not the same, Nero has many other bundled applications which allows you to edit audio files, dvds, etc. If you are limiting to burning option, it could be an alternative. Open Office or Libre Office which is the same application but splited from Oracle as an alternative to Microsoft Office Mozilla Firefox as an alternative to Microsoft Outlook Ant Movie Catalog, InfraRecorder, Keepass, InkScape, Recuva and many others which can replace some of the actual payable applications.
  7. If I remember well Apple had something similar on the OSX.
  8. If the unix/linux server is maintained by a good admin, all the IO commands will have traces even if you delete the files mentioned in that pearl file, also you should know that history is memory resident and dumped to file after you log out your console, so even if you delete the file before logging out, there is a big chance to leave traces.
  9. cd directory which contains the txt files cat *.txt >> newfile.txt
  10. Also on VoIP you can't get the CID unless the service provider provide it, for VoIP they are using PBX or switches, the signalization varies from SS7 to Sigtran, and so one.
  11. You can't unless you have access to the operators switch and disable the option to hide CID/CLID/CNID.
  12. enigmas

    Anti-spam

    I think will be easy to put Captcha at every login.
  13. javascript:alert(document.cookie) - get current cookie present on your computer, or on the computer where the link was launched all __utmx keys are part of Google Analytics tracking __utmb * Hashcode * Changes to identify each unique session * Non-persistent cookie * Works with __utmc to determine when a session ends * Dies when a browser is closed * If it disappears a new visitor session is started __utmc * Session based cookie * Destroyed after 30 minutes of inactivity * Can be set higher * Works with __utmb to determine when session ends * If it disappears, a new visitor session starts * Visitor timeout set in __utm.js. Default is 1800 seconds * 30 minutes is appropriate. Some websites and their visitor traffic may require a different timeout value __utma = domainhash.unique.ftime.ltime.stime.sessioncount; * domainhash = hash of the domain name of the website * unique = a randomly generated 31 bit integer * ftime = UTC timestamp of first visitor session * ltime = UTC timestamp of last visitor session * stime = UTC timestamp of current visitor session * sessioncount = number of sessions; always incremented for each new session __utmz * keeps track of where the visitor came from, what search engine you used, what link you clicked on, what keyword you used, and where they were in the world when you accessed a website __utmv * gets set on the person’s computer, so that Google Analytics knows how to classify that visitor SID = session id of the user connected to that page. Unless you are able to force someone to launch javascript command and send you the returning info is useless. The only think vulnerable is SID but depends how this SessionID is treated.
×
×
  • Create New...