Jump to content

sicilianul

Active Members
  • Posts

    1210
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by sicilianul

  1. ....iar ei stocheaza parola in plaintext... Super!
  2. Esti inteligent inseamna. Adica una din scursurile tarii! Te-as scuipa daca ai fi in fata mea acum! Cat despre topic, sa stii ca in 90% din cazuri se gaseste cauza defectului, in cazul tau a placii video, si o primesti inapoi cu refuz garantie. Cine te indeamna sa strici si sa farami, e cu IQ-ul sub nivelul marii!
  3. Felicitari inca o data! Si uite asa ai bani de sarbatori
  4. Parerea mea e sa il tii pe cel original, cat timp nu iti face probleme.
  5. Mersi mult de idee. Chiar aveam nevoie sa imi fac o carte de vizita, si eram in pana de idei.
  6. Un Buget ? Te intreb pentru ca vad o placa de baza cam low-end. Si nu cred ca vrei sa iti recomand o placa video de 300$.
  7. Care Europa World Security Project. ? It's not just you! Europa World Security Project looks down from here.
  8. Eu am tot incercat cu Cyberghost VPN si nu mergea. Am bagat un ssh de Austria si imediat l-a luat. Mersi de info
  9. Mie mi se pare ca faci reclama, si mai ales ca ai 9 posturi, toate "de calitate". Apropo, te da de gol pop-up-ul
  10. A team of Internet security researchers has stumbled upon a massive online cache of more than 2 million hacked email addresses, usernames, and passwords. SpiderLabs, a division of online firm Trustwave that bills itself as an "elite team of ethical hackers, investigators and researchers," made the announcement Tuesday. The majority of hacked accounts come from major sites: Facebook, Yahoo, Google, Twitter, LinkedIn, and Russian and eastern European social networking sites odnoklassniki and VK. The thing that many of the hacked accounts had in common? Outrageously easy passwords. Tens of thousands of them had passwords like "12345," "1," "admin," and the ever-popular "password." As you'd expect, the fewer characters and complexity a password had, the more likely it was to end up on that list. The passwords had been harvested by an enormous botnet referred to as a "Pony," which the BBC referred to as "probably run by a criminal gang." As this Pony's operators did a good job of covering their tracks, SpiderLabs couldn't confirm where the attackers were based, though the dump was written in Russian. Source: The daily Dot More info: Look What I Found: Moar Pony! - SpiderLabs Anterior
  11. Microsoft didn’t wait long after unveiling its state-of-the-art cybercrime center to make a calculated strike against online scam artists. The new facility, based on the company campus in Redmond, Wash., is already collaborating with law enforcement agencies worldwide to disrupt the sprawling and insidious ZeroAccess botnet—which not incidentally represents a grave threat to Microsoft customers and the tech giant itself. ZeroAccess, sometimes identified as max++ or Sirefef, has harnessed the processing power of as many as 2.2 million enslaved PCs to carry out Bitcoin mining operations and other moneymaking schemes. Victims are tricked, in a variety of ways, into downloading a Trojan rootkit, which not only allows for further infiltration of a device but cleverly conceals any evidence of a malware attack, ensuring continued access. Security blogger Brian Krebs wrote about how the botnet was recently tweaked so that infected computers would participate in so-called click fraud, “the practice of fraudulently generating clicks on ads without any intention of fruitfully interacting with the advertiser’s site.” That activity costs online advertisers as much as $2.7 million a month—so while the security and privacy of Microsoft Windows users are certainly compromised, ZeroAccess is bad for business across the board. Working closely with the FBI, the cybercrime divisions of Europol and several European countries, and other industry players including A10 Networks—a sure indication of the increasingly cozy relationship between government and private tech, at least where their interests align—Microsoft filed a civil suit against eight individuals believed to be operating the ZeroAccess botnet. The company was also authorized “to simultaneously block incoming and outgoing communications between computers located in the U.S. and the 18 identified Internet Protocol (IP) addresses being used to commit the fraudulent schemes,” according to Europol. So far, it’s been hard to gauge the impact of these moves, and it’s not as though the infected computers will be suddenly “cured.” As Krebs explained, the damage was done to “servers that deliver a specific component of ZeroAccess that gives infected systems new instructions on how to defraud various online advertisers.” That may significantly slow the spread of malware; stopping it altogether would be a more difficult matter. The problem, according to Dell SecureWorks researcher Brett Stone-Gross, who has studied the resilience of malicious botnets in detail, is that ZeroAccess and similar entities are built to withstand such a blow. With a peer-to-peer network that scraps any point of failure to keep the rest of the botnet active, the operators can release a new plugin “to restart their click fraud and search engine hijacking activities,” he said. Indeed, in response to the disruption the criminals swiftly uploaded a template identified as “zooclicker” to the millions of still-infected PCs and got their click-fraud scheme humming again—but it didn’t last, and the servers went down soon after. The next configuration files to appear carried the text “WHITE FLAG,” though there’s no telling if the surrender is permanent or even a simple feint. One gets the feeling, rather, that this war has just begun. Source: The Daily Dot More details: krebsonsecurity.com
  12. Eu zic ca mai intai sa intri ca ucenic si in timpul asta sa faci cursuri, sau cand ai tu timp. Combini munca cu teoria
  13. Daca va pricepeti la reparat aparate foto, video, sisteme audio, video etc. Tot ce tine de gama asta sau se poate incadra in astfel de categorie, va pot pune la dispozitie un interviu si o proba practica, sa dovediti ceea ce sustineti ca stiti. Jobul este in cadrul unui service din Bucuresti, autorizat Samsung. Program de 8 ore + 1 ora pauza. Trebuie sa cunoasteti electronica, sa fiti calmi chiar si in cazurile cand aveti un client fata in fata si sa aveti habar de ce trebuie reparat. Mai multe detalii va dau prin PM.
  14. A-ti fost? Sa intamplat ceva? Eu am ajuns cam tarziu aici....
  15. Maine iti ofer un raspuns concret pentru laptopul tau. Dar cam tot la 300 lei se invarte, si e cel original oferit de ASUS. //350 lei OEM
  16. Era odat? un tân?r ambi?ios care atunci când era mic vroia s? se fac? un “mare” scriitor. Când i s-a cerut s? defineasc? “mare” a spus: - “Vreau s? scriu chestii pe care s? le citeasc? toat? lumea, chestii la care lumea s? reac?ioneze emo?ional, lucruri care s?-i fac? s? strige, s? plâng?, s? urle, s? se zbat? de durere, disperare ?i mânie!” Acum lucreaz? pentru Microsoft ?i scrie mesaje de eroare…
  17. Aceasta este o intamplare adevarata petrecuta la Word Perfect Help Line. > Angajatul companiei care a participat la discutia de mai jos a fost concediat. Ulterior, el a dat in judecata compania pentru "concediere fara motiv". Ceea ce urmeaza este un pasaj din discutia care a dus la concediere. > "Word Perfect Technical Desk, va pot ajuta cu ceva?" > "Da, am o problema cu Word Perfect" > "Ce problema?" > "Pai, scriam si dintr-o data toate cuvintele au disparut." > "Au disparut?" > "Da, au disparut." > "Hmm. Si ce afiseaza ecranul tau acum?" > "Nimic." > "Nimic?" > "E negru; si nu accepta nimic din ceea ce scriu." > "Esti inca in Word Perfect, sau ai iesit?" > "De unde vrei sa-mi dau seama?" > "Vezi un prompter C: pe ecran?" > "Ce-i ala un prompter C:?" > "Nu conteaza. Poti misca cursorul pe ecran?" > "Nu e nici un cursor; Ti-am spus ca nu accepta nimic din ceea ce tiparesc!" > "Monitorul tau are un indicator de functionare?" > "Ce e ala un monitor?" > "Este chestia aia cu ecran si care arata ca un TV. Are o luminita care sa-ti arate daca e deschis sau nu?" > "Nu stiu." > "Atunci uita-te in spatele monitorului si vezi unde duce cablul electric. Poti sa vezi asta?" > "Da, cred ca da." > "Minunat. Urmeaza cablul electric, si spune-mi daca este bagat in priza." > "...Da, este." > "Cand te-ai uitat in spatele monitorului, ai observat ca sunt doua cabluri si nu doar unul bagat in monitor?" > "Nu." > "Ei bine, sunt doua. Mai uita-te o data si gaseste si celalt cablu." > "Ok, l-am gasit." > "Urmareste-l si spune-mi daca este bagat bine in spatele computerului tau." > "Nu pot sa fac asta." > "Huh. Dar macar poti vedea daca este?" > "Nu." > "Nici daca iti pui genunchiul pe ceva sau te intinzi pe ceva?" > "O, nu e din cauza ca nu am unghiul bun, ci din cauza ca e intuneric." > "Intuneric?!" > "Da, lumina din birou este stinsa, singura lumina care vine este de afara." > "Pai, aprinde lumina in birou." > "Nu pot." > "Nu? De ce?" > "Pentru ca e o pana de curent." > "Aaa...o pana de curent? Aha, ok. Cred ca am rezolvat problema. Mai ai cutiile si manualele si chestiile de impachetare cu care a venit computerul tau?" > "Da, le tin in dulap." > "Bine. Du-te si adu-le, si baga sistemul in cutii exact asa cum l-ai primit. Si apoi du-l inapoi de la magazinul de la care l-ai luat." > "Adevarat? Este chiar atat de grav?" > "Da, ma tem ca da." > "Atunci asta e, il duc inapoi. Si ce sa le spun?" > "Spune-le ca esti prea prost ca sa ai un computer."
  18. For your Fun: CodePen - Pen
  19. A indexat Google tot! Nu a tinut cont ca e piratat sau nu. Chiar si daca dai search dupa pagina care are continut piratat, tot o gaseste. Deci le-a dat cu flit la fileu.
  20. Security of Java takes a dangerous turn for the worse, experts say Beware of increasingly advanced exploits targeting flaws that will never be fixed. by Dan Goodin - Sept 12 2013, 3:35am GTBDT The security of Oracle's Java software framework, installed on some three billion devices worldwide, is taking a turn for the worse, thanks to an uptick in attacks targeting vulnerabilities that will never be patched and increasingly sophisticated exploits, security researchers said. The most visible sign of deterioration is in-the-wild attacks exploiting unpatched vulnerabilities in Java version 6, Christopher Budd, threat communications manager at antivirus provider Trend Micro, wrote in a blog post published Tuesday. The version, which Oracle stopped supporting in February, is still used by about half of the Java user base, he said. Malware developers have responded by reverse engineering security patches issued for Java 7 and using the insights to craft exploits for the older version. Because Java 6 is no longer supported, those same flaws will never be fixed. "This is a large pool of vulnerable users who will never be protected with security fixes and so [they're] viable targets for attack," Budd said. He went on to cite the recent bundling of the JAVA_EXPLOIT.ABC trojan in the Neutrino Exploit Kit, a software tool available on the Internet that streamlines the development of exploits. JAVA_EXPLOIT.ABC exploits the CVE-2013-2463 vulnerability that Oracle fixed in Java 7 two months ago. The other dynamic causing the decline in Java security is the increase in ever-more-sophisticated exploits that target a much lower level of the Oracle software platform, known as the Java native layer. Trend Micro researchers described the maturing of this technique in a blog post a couple weeks ago. Budd recommended people make it a priority to update to version 7, an undertaking that will be painful for businesses with custom-written apps that work only on the older Java version. Those who can't update should take steps to mitigate the damage that can be done. He also draws parallels to the retirement of Windows XP that Microsoft has scheduled for April. Source: Security of Java takes a dangerous turn for the worse, experts say | Ars Technica
  21. "When you open Internet Explorer and listen very closely, you will hear your computer crying: please kill me..."
  22. Asta e o transcriptie a unei convorbiri radio reale intre un vas din Armata Statelor Unite si autoritatile canadiene de coasta din Newfoundland in octombrie 1995. Americani: Va rugam, schimbati directia voastra cu 15 grade la nord cu motivul de a evita ciocnirea. Canadieni: Recomandam ca DV sa schimbati directia VOASTRA cu 15 grade la sud ca sa evitam ciocnirea. Americani: Aici capitanul vasului Armatei SUA. Repet: schimbati directia. Canadieni: Nu, repetam: voi trebuie sa schimbati directia. Americani: AICI SUNTEM PORTAVIONUL ABRHAM LINCOLN, AL DOILEA VAS IN DIMENSIUNI AL FLOTEI STATELOR UNITE ALE AMERICII IN OCEANUL ATLANTIC. NE INTOTESC TREI DISTRUGATOARE, TREI CRUCISATORI SI NUMEROASE VASE DE SPRIJIN. CER CA DV SA VA SCHIMBATI DIRECTIA CU 15 GRADE LA NORD, SAU VOM LUA MASURI PENTRU A GARANTA SECURITATEA ACESTUI VAS. Canadieni: Noi suntem un far. Voi hotariti.
×
×
  • Create New...