Jump to content

Kabron

Active Members
  • Posts

    250
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Kabron

  1. Bun , vad ca este scanat builder-ul , server-ul nu ?
  2. L-am v?zut ?i eu , foarte mi?to Bogdan
  3. urat bre paxie ..
  4. Dupa cum vad eu tu nu ai ce face , omul a pus asa cu un motiv , bine ca este 2x pe url dar ma rog ..
  5. Daca gasesc khanwars pe acolo zic un multumesc
  6. Inainte de 'merge' da-i un 'edit' . "How to user Google for Hacking" nu e tocmai ok OFF : diacriticile tot nu merggggggggg !
  7. Na lol Bine ai venit, admin! MateArena admin : 'or 1=1# meahhhh
  8. NU are nici o legatura ce e in video ala cu ANONYMOUS
  9. Cryptography Professor Dan Boneh heads the applied cryptography group at the Computer Science department at Stanford University. Professor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, digital copyright protection, and cryptanalysis. He is the author of over a hundred publications in the field and a recipient of the Packard Award, the Alfred P. Sloan Award, and the RSA award in mathematics. Professor Boneh received his Ph.D from Princeton University and joined Stanford in 1997. Cryptography is an indispensable tool for protecting information in computer systems. This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two or more parties generate a shared secret key. We will cover the relevant number theory and discuss public-key encryption, digital signatures, and authentication protocols. Towards the end of the course we will cover more advanced topics such as zero-knowledge, distributed protocols such as secure auctions, and a number of privacy mechanisms. Throughout the course students will be exposed to many exciting open problems in the field. The course will include written homeworks and programming labs. The course is self-contained, however it will be helpful to have a basic understanding of discrete probability theory.
  10. Marf? a?a : Invitatia a expirat deoarece nu a fost activata la timp
  11. AnonOps Communications Nu e mai ok asa decat sa v-a certati ca niste idioti pe aici ? Cei de la Anon au spus clar ca nu vor avea treaba cu facebook , cel putin nu acum , au altele pe "cap"
  12. Remember remember the 5th of November Sa vedem ce iese zic
  13. Security+ Study Guide by Michael A. Pastore Publisher: Sybex Inc (February 21, 2003) | ISBN: 078214098X | Pages: 656 | CHM | 5.72 MB The Security+ certification was developed at CompTIA in response to both corporate and government requests for a certification that validates foundation-level IT security skills. Topics covered include access control, authentication, intrusion detection, malicious code, cryptography, physical security, disaster recovery, policies and procedures and more. The CD includes an advanced testing program with two bonus sample exams, as well as electronic flashcards for both PCs, Pocket PCs and Palm devices. Get 5653078214098X.chm on Wupload.com Download 5653078214098X.chm for free on Filesonic.com Enjoy
  14. Kabron

    help ? :)

    oh well , thx.
  15. Kabron

    help ? :)

    A?a , care ai un cont vip vplay de dat trimite un pm . P.S ( e clar ca nu intreb cine are de v
  16. NU este o eroare SQL NU mai practica offtopic-ul in SHOWOFF STERGETI DRACU POSTUL ca iar se fac 5-6 pagini!
  17. Mda , "un neuron" parc? te reprezint? . Mut? cineva topicul ?sta ?
  18. Veniti in Straja
  19. Defcon 17: Advanced Mysql Exploitation Description: his talk focuses on how MySQL SQL injection vulnerabilities can be used to gain remote code execution on the LAMP and WAMP environments. Attackers performing SQL injection on a MySQL platform must deal with several limitations and constraints. For example, the lack of multiple statements...read more in one query makes MySQL an unpopular platform for remote code execution compared to other platforms. This talk will show that arbitrary code execution is possible on the MySQL platform and explain the techniques. In this presentation, the author will release a new tool titled MySqloit. This tool can be integrated with metasploit and is able to upload and execute shellcodes using a SQL Injection vulnerability in LAMP or WAMP environments.
  20. Windows System Security Part I on Vimeo The fundamentals to Windows System Security. This video will cover: Account Management: NET USER / NET SESSION / GPEDIT.MSC Adding Accounts Deleting Accounts Modifying Accounts Viewing Account Settings Enforcing Account Settings through Group Policy Service Management: SERVICES.MSC / SC QUERY Starting Services Stopping Services Configuring Services Identifying Insecure Services (Telnet/FTP) Secure Alternatives Process Management: TASKMGR / TASKLIST / TASKKILL / WMIC PROCESS LIST FULL Viewing Processes Forcing Processes to Stop Killing Specific Processes (Malware) Starting Processes Group Policy Security: GPEDIT.MSC / GPUPDATE Audit Policy User Rights Assignment Security Options Account Policies (Covered in Account Management) Inspecting Your System:MSCONFIG / NETSTAT / NET VIEW / NET SHARE Tips and Tricks for looking for Malware Identifying Compromise Viewing open shares/connections Creating and Destroying shares Next Video Information: NETSH ROUTING IP / CACLS / EventVwr.msc / 3rd Party Tools Applying Packet Filters through NetSH File Permissions with CACLS Configuring Client Side Browsers Sysinternals and other 3rd party tools Logs and EventViewer © Devon Greene
  21. Kabron

    Analizare virus

    Dac? tot este offtopic ( nu in?eleg de ce dar nu e treaba mea ) Ceva cu ce am lucrat eu : Battery charger and battery analyzer experts - Cadex Electronics Inc. )
  22. Sursa nu stii sa dai ceva sau te pomeni ca e facut de tine
  23. 5 pagini despre nimic , comentati dracu pe site-ul celor de la mediafax sau alte site-uri de genul . Inchide cineva rahatu asta de topic ?!
  24. (perl) Backdoor - r00tsecurity mai misto
  25. //prea frumos explicat , pe intelesul tuturor si chiar te face sa citesti mai mult si mai mult This area is intended for everyone new to PHP. It opens with a series of informal, entertaining tutorials written by Vikram Vaswani, founder and CEO of Melonfire. These tutorials build on a previously-published 5-part series which has now been updated and extended to embrace PHP 5, making parts of it suitable for those of you who already have worked with PHP 4 in the past. If you came here to learn about elementary PHP 4 or basic PHP 5, this is for you. Enjoy! // link : PHP 101: PHP For the Absolute Beginner
×
×
  • Create New...