Jump to content

Un.Neuron

Active Members
  • Posts

    106
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by Un.Neuron

  1. depanare: detectare si rezolvare probleme hardware + cele software( 99% windows), o experienta destul de mare....

    acuma invat c++, f putin html....

    office-- word, powerpoint --- f bine

    excel--bine( am mai uitat din el)

    putina editare video...

    recuperare date, mentenanta sistem

    deci nu stii nimic pe partea de programare...

    spor la invatat!

  2. Plus o tzava decenta.

    Ce ati face voi cu ei ?

    Cum as putea ajuta comunitatea RST ?

    Postati aici.

    PS : nu ma intereseaza banii.

    ce ai putea face cu hostingul ?

    de pilda, ce a zis si Mr.Jan, adica un FTP pe care sa fie urcati giga de carti, softuri, tutoriale, samd, pe care sa le poti descarca mai usor, intr-o ora decat sa stai la free o saptamana pe rs, hotfile, fileserve, filesonic, megaupload...

    cam ca aici>

    http://rstcenter.com/forum/38795-pentru-cunoscatori-ceh-v7-sans-504-a.rst

    astept sa-i dai drumul...

  3. UPDATE

    1. SANS SECURITY 517 - Cutting-Edge Hacking Techniques

    SANS: Cutting-Edge Hacking Techniques

    2. SANS SECURITY 560 - Network Penetration Testing and Ethical Hacking

    SANS: Network Penetration Testing and Ethical Hacking

    3. SANS SECURITY 617 - Wireless Ethical Hacking, Penetration Testing, and Defenses

    SANS: Wireless Ethical Hacking, Penetration Testing, and Defenses

    4. DEF CON 18 Archive

    DEF CON® 18 Hacking Conference

    5. Trainsignal CWNA PW0-104 Exam - Wireless Networking, Administration and Security

    Certified Wireless Network Administrator (CWNA) Training, PW0-104 Exam, MOS Certification | Train Signal

    PM pt usr/psw

  4. Unauthorised Access: Physical Penetration Testing For IT Security Teams, 2009

    516UtV7lhCL._BO2,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA300_SH20_OU01_.jpg

    Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.

    Free File Hosting, Online Storage &amp File Upload with FileServe

  5. The University announced Friday that the names and Social Security numbers of 43,000 people affiliated with Yale have been available to Google search engine users for the past 10 months.

    Though Information Technology Services Director Len Peters said there is no indication that the information has been exploited, Yale has established a response center to answer questions from affected students, faculty, staff and alumni — all of whom were affiliated with the University in 1999 — and is offering them two years of free credit monitoring and identity theft insurance.

    Yale did not discover the breach until June 30, Peters said. While Google representatives told the University that the file is no longer available in searches, they would not say whether any Google users had actually accessed the file.

    “We immediately blocked that server from the Internet, removed the file and did a complete scan of the server to make sure there were no additional at-risk files,” Peters said.

    The information was stored on a file transfer protocol (FTP) server used primarily for open source materials. Peters said the file containing the names and Social Security numbers, mostly of people who worked for the University in 1999, was the only sensitive file to be made public. The file did not include addresses, birth dates or financial information.

    In September 2010, Google modified its search engine to be capable of finding and indexing FTP servers, Peters said, but ITS was not aware of this change. He added that since discovering that the file was accessible, ITS has confirmed that other search engines, such as Yahoo!, do not index FTP servers.

    Peters said that both file and the directory in which it was contained had innocuous names. A user who encountered the file in a Google search would not be able to determine what information the file held unless he or she opened it, he said.

    “It was pretty well-hidden, with a very inconspicuous file name,” Peters said.

    Google would not release information on how many times files have been accessed from its search engine, he added.

    Peters, who came to ITS from Columbia Business School at the end of last year, said he will take steps to improve information security during his first year as Yale’s Chief Information Officer. These measures will include better communication with Google, he said.

    Starting in September, Yale will outsource University e-mail to Google.

    sursa> Yale affiliates' SSNs were searchable on Google | Yale Daily News

    cine gaseste dbul sa posteze link aici.

    • Downvote 1
  6. We've had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm:Win32/Morto.A and you can see a detailed description of it at Worm:Win32/Morto.A.

    Morto attempts to compromise Remote Desktop connections in order to penetrate remote systems, by exploiting weak administrator passwords. Once a new system is compromised, it connects to a remote server in order to download additional information and update its components. It also terminates processes for locally running security applications in order to ensure its activity continues uninterrupted. Affected users should note that a reboot may be required in order to complete the cleaning process.

    This particular worm highlights the importance of setting strong system passwords. Using strong passwords can go a long way towards protecting your environment -- and the ability of attackers to exploit weak passwords shouldn't be underestimated. For example, Morto tries the following passwords:

    *1234

    0

    111

    123

    369

    1111

    12345

    111111

    123123

    123321

    123456

    168168

    520520

    654321

    666666

    888888

    1234567

    12345678

    123456789

    1234567890

    %u%

    %u%12

    1234qwer

    1q2w3e

    1qaz2wsx

    aaa

    abc123

    abcd1234

    admin

    admin123

    letmein

    pass

    password

    server

    test

    user

    sursa> New worm targeting weak passwords on Remote Desktop connections (port 3389) - Microsoft Malware Protection Center - Site Home - TechNet Blogs

  7. 41PaShBWPiL._BO2,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA300_SH20_OU01_.jpg

    A Guide to Kernel Exploitation: Attacking the Core, 2010

    Product Description

    The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.

    Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows

    Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions

    Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

    link: MEGAUPLOAD - The leading online storage and file delivery service

    pass: "ebooksclub . org"(fara spatii si ghilimele)

    • Upvote 1
  8. Practical-Packet-Analysis-Using-Wireshark-to-Solve-Real-World-Network-Problems-2nd-Edition.jpg

    Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition, 2011

    eBook Description:

    Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections

    Build customized capture and display filters

    Monitor your network in real-time and tap live network communications

    Graph traffic patterns to visualize the data flowing across your network

    Use advanced Wireshark features to understand confusing captures

    Build statistics and reports to help you better explain technical network information to non-techies

    With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency.

    Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition is a must for any network technician, administrator, or engineer. Stop guessing and start troubleshooting the problems on your network.

    This significantly revised and expanded second edition of Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition shows you how to use Wireshark to capture raw network traffic, filter and analyze packets, and diagnose common network problems.

    It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network?

    link- MEGAUPLOAD - The leading online storage and file delivery service

    pass: "ebooksclub . org"(fara spatii si ghilimele)

×
×
  • Create New...