
dicksi
Active Members-
Posts
712 -
Joined
-
Last visited
-
Days Won
1
Everything posted by dicksi
-
Robocoin ATM No 2 in drum spre Romania. Se cauta locatie!! Fiti parte din fenomenul bitcoin si aduceti acest ATM in restaurantul, cafeneau, locatia Dvs. Va rog sa ne contactati la: contact Bitcoin RomaniaBitcoin Romania
-
ce fel de religie e cea islamica daca permite asa ceva http://www.barenakedislam.com/2014/08/19/james-foley-american-photojournalist-has-been-beheaded-by-the-islamic-state-isis-savages/
-
So, you're a Bitcoin sceptic. You wouldn't turn your life savings into some magic internet money anyone can steal. Well, I did. My life savings are safely stored in my bitcoin wallet. Call me crazy, but I even uploaded my wallet file here, so everyone can download and check how much money I have. You can have a copy of my wallet.dat file, but I am not giving out my encryption password. Can you actually steal and spend my bitcoin funds? My Wallet Stats: Address: 1DBhsqrTkDnaXpUX3AUxRhrrLfnUoRMEht Funds: 10.4634 BTC download wallet StealMyWallet.com - Steal My Bitcoin Wallet
-
ahaha si nologine-le deci honeypot
-
Hackers have managed to reroute raw internet traffic from numerous internet service providers (ISPs) in an attempt to steal bitcoins. Dell SecureWorks says it has identified a total of 19 ISPs affected. Data used by Amazon, DigitalOcean and OVH was compromised in the attack. Each incident lasted just 30 seconds, but the hacker managed to carry out the attack 22 times over the course of four months. The ultimate goal was to seize control of bitcoin miners, organised in mining pools. Stealing up to $9,000 a day The attacks appear to have been successful. Dell SecureWorks reports that up to $9,000 in bitcoin and altcoins such as dogecoin was stolen per day. During the attack, miners believed they were still mining for their pool, while the flow of cryptocurrency generated by their mining operations redirected elsewhere. Researchers believe the culprits employed BGP hijacking to redirect the traffic, using spoofed commands to redirect traffic from ISPs. The hackers used a staff user account belonging to a Canadian ISP, but the researchers do not know whether the hack was orchestrated by an ISP employee or someone from outside the company. A detailed description of the attack is available on the SecureWorks blog. Researcher Pat Litke said this sort of attack can easily grab a “large collection of clients” in next to no time. “It takes less than a minute, and you end up with a lot of mining traffic under your control,” he told Wired. Six-figure damages? The researchers concluded that around $83,000 worth of cryptocurrency was stolen in the attacks, though this is not the final tally. According to the research team, this particular type of attack is difficult to replicate as the attacker must have access to an ISP. Therefore, Dell SecureWorks does not expect such attacks to be widespread. This is not the first time Dell SecureWorks has tackled security threats related to bitcoin. Earlier this year the firm published a report identifying 146 strains of bitcoin malware. It also issued a number of warnings involving vulnerable browser extensions and other software. Hackers Reroute ISP Traffic to Steal $83,000 in Bitcoins
-
Get your free trial of FinSpy Mobile! Supporting Android, Blackberry, Windows Mobile, and Symbian FinFisher solutions are sold to governmental agencies only. They target individual suspects and can not be used for mass interception. BayFiles https://twitter.com/GammaGroupPR/status/497060420231114752
-
Simulator orice browser,hardware si sistem de operare
dicksi replied to dicksi's topic in Programe utile
nu ar trebui facut public...se vor introduce noi metode de fingerprint... -
Are we really surfing safe with the standard browser settings? Let's go to the next part of this guide where we will explain what needs to be done to really secure the browser. Browser Configuration First of all we are going to configure NoScript which is an extention that comes bundled with the Tor Browser Bundle. The reason for doing this is to block all scripts which are a danger if left enabled. Click on the NoScript icon. From the drop down menu click on Options. On the Whitelist tab go to the bottom and uncheck Scripts Globally Allowed (dangerous). On the Embeddings tab check Forbid Java, Forbid adobe flash, Forbid microsoft silverlight, Forbid other plugins, Forbid <AUDIO> / <VIDEO>, Forbid <IFRAME>, Forbid <FRAME>, Forbid @font-face. Check the rest of the options as shown and click Okay. NoScript is a good tool even for non Tor activies and it helps a lot to surf the net safely up to a certain extent. If you want to learn more about it you can go to its website and visit its forum for futher help. NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience! - what is it? - InformAction Extended Browser Configuration As you can see, besides the NoScript extention there is not much to configure in the browser, but there is more to block by entering about:config, like JavaScript, HTTP_Referer and Cookies. First thing to do here is to disable JavaScript completely because it is a risk to your security. We are not going to get too technical and explain how JavaScript works, but all we can say is that regardless what the Tor developers say, any browser, Tor or not Tor, is not safe with JavaScript enabled. That has been proven before where a vulnerabitlty in their browser and a code inserted on some sites led to many people having Tor bypassed and their real IP exposed. Because of that we will explain how to disable JavaScript. Let's start by typing about:config in the browser's address bar and hitting Enter. Click on I'll be careful, I promise!. On the search bar type javascript.enable. Right click on javascript.enabled and on the popup menu left click on Toggle to change the value from true to false to disable JavaScript completely. This is the way it's going to look after the change. Now we are going to disable HTTP_Referers because it also is a risk having them enabled. How do referers work? Let's say you are on a website and somebody posts a hyperlink to a picture. If you click on it, the browser will send a request to the server where the picture is, so they can send it back to you and display it in your browser. That request also sends a referer field to that server, telling it where you are coming from, which is the website where the hyperlink was posted. That doesn't sound too bad, but what if that website was private and only your family and closest friends knew about it? Well, not private anymore, since whoever controls the server where that picture is stored, can track you back to where you came from. On the search bar type network.http.sendRefererHeader. Right click on network.http.sendRefererHeader and in the popup menu left click on Modify. Right now the value of it is 2. Change that number to 0 and click Okay. This is the way it's going to look after the change. On the search bar type network.http.sendSecureXsiteReferrer. Right click on network.http.sendSecureXsiteReferrer and on the popup menu left click on Toggle to change the value from true to false. This is the way it's going to look after the change. On the search bar type extensions.torbutton.saved.sendSecureXSiteReferrer. Right click on extensions.torbutton.saved.sendSecureXSiteReferrer and on the popup menu left click on Toggle to change the value from true to false. This is the way it's going to look after the change. Cookies and referrers can be used to track your browsing habits, so they generally should be turned off. If a site really requires cookies (e.g. for a login) or referrers (e.g. to show pictures), you can always turn them back on temporarily if the site is worth it. On the search bar type network.cookie.cookieBehavior. Right click on network.cookie.cookieBehavior and on the popup menu left click on Modify. Right now the value of it is 1. Change that number to 2 and click Okay. This is the way it's going to look after the change. After all the changes are done, restart the browser and click on Test Tor Network Settings. That is going to show you a message saying Congratulations. This browser is configured to use Tor. along with the IP address of the exit node your are using at the moment. Another checker to test your Tor connection is:https://torcheck.xenobite.eu/index.php Notes Just some notes about what wasn't changed and what will happen after the changes to the browser and other stuff. By making the changes explained in this guide to the Tor Browser Bundle some sites will not work properly and others won't work at all. We wrote this guide to help you avoid leaking any personal information and safety comes with its downsides, but at the end it is up to you if you want to lower your defences to get to the pages or files you are after. The HTTP_User_Agent wasn't changed since the agent used in the browser is a generic one, that is, everybody shows the same spoofed variable and it didn't need to be changed since it doesn't show any personal information. It would be better to abstain from installing any add-ons to enhance your browsing experience. While some add-ons bring many useful features they could be a risk to your safety since they could bypass Tor completely and reveal your real IP. Plugins, like any other add-ons, should never be installed, simply because a plugin rarely obeys the proxy settings of the browser. People that run exit nodes could see the information going in and out of them, that is the way Tor works, and for that reason even when using Tor you should always be careful with the kind of personal information you are sharing on the Internet. Under no circumstances, never ever even give hints about your real name, country or any other personal details if you really want to stay anonymous. If you do so, even Tor couldn't help you to stay hidden. Don't rely just on Tor to be anomymous. Use common sense while surfing the net, be careful and remember that Tor wasn't created to be used in illegal activities, just like this guide wasn't written to encourage and help people to break the law or hurt anybody, but to help anonymous freedom of speech worldwide. For more information visit this site:https://www.torproject.org/docs/faq.html and with pics http://tutorneunixbasq6.onion/guide/tbb.html
-
- 1
-
-
Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing resources from innocent victims when there’s so much free processing power out there for the taking? At the Black Hat conference in Las Vegas next month Ragan and Salazar plan to reveal how they built a botnet using only free trials and freemium accounts on online application-hosting services—the kind coders use for development and testing to avoid having to buy their own servers and storage. The hacker duo used an automated process to generate unique email addresses and sign up for those free accounts en masse, assembling a cloud-based botnet of around a thousand computers. That online zombie horde was capable of launching coordinated cyberattacks, cracking passwords, or mining hundreds of dollars a day worth of cryptocurrency. And by assembling that botnet from cloud accounts rather than hijacked computers, Ragan and Salazar believe their creation may have even been legal. “We essentially built a supercomputer for free,” says Ragan, who along with Salazar works as a researcher for the security consultancy Bishop Fox. “We’re definitely going to see more malicious activity coming out of these services.” Companies like Google, Heroku, Cloud Foundry, CloudBees, and many more offer developers the ability to host their applications on servers in faraway data centers, often reselling computing resources owned by companies like Amazon and Rackspace. Ragan and Salazar tested the account creation process for more than 150 of those services. Only a third of them required any credentials beyond an email address—additional information like a credit card, phone number, or filling out a captcha. Choosing among the easy two-thirds, they targeted about 15 services that let them sign up for a free account or a free trial. The researchers won’t name those vulnerable services, to avoid helping malicious hackers follow in their footsteps. “A lot of these companies are startups trying to get as many users as quickly as possible,” says Salazar. “They’re not really thinking about defending against these kinds of attacks.” The Caper Ragan and Salazar created their automated rapid-fire signup and confirmation process with the email service Mandrill and their own program running on Google App Engine. A service called FreeDNS.afraid.org let them create unlimited email addresses on different domains; to create realistic-looking addresses they used variations on actual addresses that they found dumped online after past data breaches. Then they used Python Fabric, a tool that lets developers manage multiple Python scripts, to control the hundreds of computers over which they had taken possession. One of their first experiments with their new cloud-based botnet was mining the cryptocurrency Litecoin. (That second-most-used cryptocoin is better suited to the cloud computers’ CPUs than Bitcoin, which is most easily mined with GPU chips.) They found that they could produce about 25 cents per account per day based on Litecoin’s exchange rates at the time. Putting their entire botnet behind that effort would have generated $1,750 a week. “And it’s all on someone else’s electricity bill,” says Ragan. Ragan and Salazar were wary of doing real damage by hogging the services’ electricity or processing, however, so they turned off their mining operation in a matter of hours. For testing, however, they left a small number of mining programs running for two weeks. None were ever detected or shut down. Aside from Litecoin mining, the researchers say they could have used their cloudbots for more malicious ends—like distributed password-cracking, click fraud, or denial of service attacks that flood target websites with junk traffic. Because the cloud services offer far more networking bandwidth than the average home computer possesses, they say their botnet could have funneled about 20,000 PCs-worth of attack traffic at any given target. Ragan and Salazar weren’t able to actually measure the size of their attack, however, because none of their test targets were able to stay online long enough for an accurate reading. “We’re still looking for volunteers,” Ragan jokes. More disturbing yet, Ragan and Salazar say targets would find it especially tough to filter out an attack launched from reputable cloud services. “Imagine a distributed denial-of-service attack where the incoming IP addresses are all from Google and Amazon,” says Ragan. “That becomes a challenge. You can’t blacklist that whole IP range.” Law-Abiding Citizens Using a cloud-based botnet for that kind of attack, of course, would be illegal. But creating the botnet in the first place might not be, the two researchers argue. They admit they violated quite a few companies’ terms of service agreements, but it’s still a matter of legal debate whether such an action constitutes a crime. Breaking those fine print rules has contributed to some prosecutions under the Computer Fraud and Abuse Act, as in the case of the late Aaron Swartz. But at least one court has ruled that breaking terms of service alone doesn’t constitute computer fraud. And the majority of terms of service violations go unpunished—a good thing given how few Internet users actually read them. Ragan and Salazar argue that regardless of legal protections, companies need to implement their own anti-automation techniques to prevent the kind of bot-based signups they demonstrated. At the time of their Black Hat talk, they plan to release both the software they used to create and control their cloudbots, as well as defense software they say can protect against their schemes. Other hackers, after all, haven’t been as polite as Ragan and Salazar in their cloud computing experiments. In the time the two researchers spent probing the loopholes in cloud computing services, they say they’ve already seen companies like AppFog and Engine Yard shut down or turn off their free option as a result of more malicious hackers exploiting their services. Another company specifically cited botnets mining cryptocurrency as its reason for turning off its free account feature. “We wanted to raise awareness that’s there’s insufficient anti-automation being used to protect against this type of attack,” says Ragan. “Will we see a rise in this type of botnet? The answer is undoubtedly yes.” How Hackers Hid a Money-Mining Botnet in the Clouds of Amazon and Others | Threat Level | WIRED
-
in afara de show lesby de calitate si mclaren-ul asta nonstop parcat http://youtu.be/V-ihEa3ihE8?t=1m9s nimic impresionant la mamaia
-
Question: Should You Trust Tor? Answer: Not If Your Life Is At Stake By Bill Blunden, July 16, 2014 In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates at the Electronic Frontier Foundation openly claim that “Tor still works[1]” skepticism is warranted. In fact anyone risking incarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be illadvised to put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacy advocates have been soft-pedaling. The NSA Wants You To Use Tor Tor proponents often make a big deal of the fact that the NSA admits in its own internal documents that “Tor Stinks,” as it makes surveillance more work-intensive[2]. What these proponents fail to acknowledge is that the spies at the NSA also worry that Internet users will abandon Tor: “[A] Critical mass of targets use Tor. Scaring them away from Tor might be counterproductive” Go back and re-read that last sentence. Tor is a signal to spies, a big waving flag that gets their attention and literally draws them to your network traffic[3]. Certain aspects of Tor might “stink” but ultimately the NSA wants people to keep using Tor. This highlights the fact that security services, like the FBI[4], have developed sophisticated tools to remove the veil of anonymity that Tor aims to provide. For example, the Washington Post reports[5]: “One document provided by Snowden included an internal exchange among NSA hackers in which one of them said the agency’s Remote Operations Center was capable of targeting anyone who visited an al-Qaeda Web site using Tor.” It’s well known that Tor is susceptible to what’s called a traffic confirmation attack (AKA end-to-end correlation), where an entity monitoring the network traffic on both sides of a Tor session can wield statistical tools to identify a specific communication path. Keep in mind that roughly 90 percent of the world’s internet communication flows through the United States[6], so it’s easy for U.S. intelligence to deploying this approach by watching data flows around entry and exit points[7]. Another method involves “staining” data with watermarks. For example, the NSA has been known to mark network traffic by purchasing ad space from online companies like Google. The ads cause web browsers to create a cookie artifact on the user’s computer which identifies the machine viewing the ad8. IP addresses may change but the cookie and its identifiers do not. De-cloaking Tor users doesn’t necessarily require a federal budget either. According to a couple of researchers slated to speak at Black Hat in a few weeks[9]: “In our analysis, we've discovered that a persistent adversary with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months. The total investment cost? Just under $3,000.” Client Network Exploitation (CNE) Trumps Crypto Back in 2009 security researcher Joanna Rutkowska implemented what she dubbed the “Evil Maid” attack to foil TrueCrypt’s disk encryption scheme[10]. By compromising the Windows boot environment her team was able to capture the hard disk’s encryption passphrase and circumvent TrueCrypt’s protection. While users can [usually] defend against this sort of monkey business, by relying on a trusted boot process, the success of the Evil Maid attack underscores the capacity for subversion to trump encryption. This type of client-side exploitation can be generalized for remote network-based operations. In a nutshell, it doesn’t matter how strong your network encryption is if a spy can somehow hack your computer and steal your encryption passphrase (to decrypt your traffic) or perhaps just pilfer the data that they want outright. Enter the NSAs QUANTUM and FOXACID tag team. QUANTUM servers have the ability to mimic web sites and subsequently re-direct user requests to a second set of FOXACID servers which infects the user’s computer with malware[11]. Thanks to Ed Snowden it’s now public knowledge that the NSA’s goal is to industrialize this process of subversion (a system codenamed TURBINE[12]) so it can be executed on an industrial scale. Why go to the effort of decrypting Tor network traffic when spies can infect, infiltrate, and monitor millions of machine at a time? Is it any wonder that the Kremlin has turned to old-school typewriters[13] and that German officials have actually considered a similar move[14]? In the absence of a faraday cage even tightly configured airgapped systems can be breached using clever radio and cellular-based rootkits[15]. As one user shrewdly commented in an online post[16]: “Ultimately, I believe in security. But what I believe about security leaves me far from the cutting edge; my security environment is more like bearskins and stone knives, because bearskins and stone knives are simple enough that I can *know* they won't do something I don't want them to do. Smartphones and computers simply cannot provide that guarantee. The parts of their security models that I do understand, *won't* prevent any of the things I don't want them to do.” Software is hard to trust, there are literally thousands upon thousands of little nooks where a flaw can be “accidentally” inserted to provide a back door. Hardware is even worse. Denouement About a year ago John Young, the operator of the leaks site Cryptome, voiced serious concerns in a mailing list thread about the perception of security being conveyed by tools like Tor[17]: “Security is deception. Comsec a trap. Natsec the mother of secfuckers” Jacob Appelbaum, who by the way is intimately involved with the Tor project, responded: “Whatever you're smoking, I wish you'd share it with the group” Appelbaum’s cavalier dismissal fails to appreciate the aforementioned countermeasures. What better way to harvest secrets from targets en mass than to undermine a ubiquitous technology that everyone thinks will keep them safe? Who’s holding the shit-bag now? For activists engaged in work that could get them executed, relying on crypto as a universal remedy is akin to buying snake oil. John Young’s stance may seem excessive to Tor promoters like Appelbaum but if Snowden’s revelations have taught us anything it’s that the cynical view has been spot on. http://cryptome.org/2014/07/trusting-tor-not.pdf
-
Hackers can break Tor Network Anonimity with 3000$
dicksi replied to dicksi's topic in Stiri securitate
Based on our current plans, we'll be putting out a fix that relays can apply that should close the particular bug they found. The bug is a nice bug, but it isn't the end of the world. And of course these things are never as simple as "close that one bug and you're 100% safe". https://lists.torproject.org/pipermail/tor-talk/2014-July/033956.html -
Today I want to anticipate you that two hackers have announced to be able to de-anonymize Tor users easy, the two experts Alexander Volynkin and Michael McCord will present the results of their study at the next Black Hat 2014. In the presentation they have announced, titled “YOU DON’T HAVE TO BE THE NSA TO BREAK TOR: DEANONYMIZING USERS ON A BUDGET“, the experts will show how to identify Tor users with a very small budget, just $3,000. “There is nothing that prevents you from using your resources to de-anonymize the network’s users instead by exploiting fundamental flaws in Tor design and implementation. And you don’t need the NSA budget to do so. Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild…” “In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity,” are the statements used by the two researchers to describe their work. Stay tuned … if the discovery is confirmed, millions of Tor network users are at risk. Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs update Tor Project is working to fix the alleged critical bug discovered by researchers at Carnegie Mellon We were all waiting for the presentation when the organization of the BlackHat had been contacted by the university’s lawyers which informed it that the researchers will not participate in the event. Roger Dingledine, the expert known as one of the creators of Tor, explained that he has no idea on the reason of the decision made by the researchers, but he added that the Tor Project had been “informally” shown some of the materials that would have been presented. Christopher Soghoian, principal technologist with the American Civil Liberties Union, has speculated that the researchers might have feared to be sued by criminal prosecution for illegal monitoring of Tor exit traffic. We will never know why these researchers have cancelled their participation to the BlackHat, but the unique certainty is that government are spending a huge effort to track users on anonymizing network and probably they have exploited and are exploiting zero-day flaws in these systems. http://securityaffairs.co/wordpress/26982/hacking/tor-working-fix-flaw.html
-
Tor Project is NOT getting sued for enabling revenge porn site PinkMeth A Texas revenge-porn victim is suing the operators of revenge-porn site PinkMeth.com and was (until her lawyer figured out just what, exactly, the anonymising service Tor actually is) suing The Tor Project for helping PinkMeth to operate anonymously. Tor Project is NOT getting sued for enabling revenge porn site PinkMeth | Naked Security
-
"la mujer" pt ca sticla e femeia credincioasa barbatului:D
-
repeti primul an over&over stand la camin si-ti futi creierii petrecand,cand te-ai plictisit te muti in chirie si termini faculta:D
-
CryptoLocker, virusul care iti ia calculatorul ostatic.
dicksi replied to TheOne's topic in Stiri securitate
https://bitiodine.net/ -
da-i sa citeasca asta Româncele care v?d câ?tiguri fabuloase în videochat sunt cu capul în nori | VICE Romania ,e scrisa de un tip care a detinut niste studiouri de genul nu se mai castiga bani cum se castiga inainte,a devenit munca de chinezi
-
Simulator orice browser,hardware si sistem de operare
dicksi replied to dicksi's topic in Programe utile
merge cu idm dar max 20kb/s -
AntiDetect Patch 5 The AntiDetect © software will raise your income. Do you want to bypass ban/antifraud systems which can detect your hardware fingeprint or\and your browser fingerprint? If yes - buy our product. There is so many factors to do it: trusted product from 2007 year, a lot of positive feedbacks we have configured vmware/vbox prepared for your work (ideal for noobies) freshest versions of software directly from developer lifetime support (icq, jabber) technical support which can access your pc through teamviewer and help you videomanuals and english-language readmes we speak english, of course IMPORTANT: our software dont change IP, DNS and similar stuff, you need also to buy vpn\socks or whatever you like. We will give you a proxifier and will advice how to change your dns if you dont know. We have several packages of software: 1. Browser antidetect "FFTools" (FF based) The latest 5 version with many bugfixes, user asked features added. Browser generation extended functions: you can make your FF looks like: ff, chrome, ie, opera, android or macintosh. You can change useragent, OS, language, browser version, platform, flash (version, language, os, fonts, resolution), screen resolution, appname, codename, vendor, product and many other things, you can make thousands of unique browser fingerprints. One button generator? We have it! After you choose prefered options (random mode also available) you can click only one generate button and software will always generate an unique fingerprint for you. One button system cleaner? No problem If you dont like to click and click and click ccleaner checkboxes.. well.. we give you lesson how to clean you virtual machine with one button click always. You can use this software with online-shops, forums, betting and casino in browser, banks, also for anonymous registering anywhere and anytime with Firefox. 2. Browser antidetect "IETools" (IE based) Mostly the same thing as previous but for IE. What we can change here ? May be you just look at the screenshot and will see, how much information can be changed. Also there is a cookies functions (flash & IE), activeX components versions generator and of course you can change useragent, OS, language, browser version, platform, flash (version, language, os, fonts, resolution), screen resolution, appname, codename, vendor, product and many other things. Why we have same tool for FF and IE? It is very important difference between: you cannot imitate activeX in FF.. so on, for serious purposes it is better to have both tools. That's why. You can use this software with online-shops, forums, betting and casino in browser, banks, also for anonymous registering anywhere and anytime with Internet Explorer. 3. Hardware antidetect This software contains: windows XP ENG SP2-SP3 support hardware manager all names changing videocard (serial number, name) splicer HDD (serial, name) splicer network card (mac, name) splicer all windows registry splicer - you can just import registry from other windows and it will be shown in target application This program works like this: you generate the config, then type in exename which you want to fool (for example casino.exe), and then click start.. Three simple actions will help you to do multiple accounting, cheating, etc in poker, casino, itunes, steam, skype and many many other online softwares and games which works without browser. http://antidetect.net/ foloseste idm pt download: Download Antidetect5 rar - Unibytes.com http://www.share4web.com/get/byq7Y5S8CqkyXWgbp5sXAfL1u4lSKdAd http://www.gigabase.com/getfile/S9X9Cg_eOiHSPJ6lSFOuTQBB
-
The criminals attempting to sell the source code for Pony 2.0 advertise the bitcoin programs that are targeted in the updated version. Damballa has verified the following list of bitcoin software in Pony version 2.0: Electrum, MultiBit, Litecoin, Namecoin, Terracoin, Bitcoin Armory, PPCoin (Peercoin), Primecoin, Feathercoin, NovaCoin, Freicoin, Devcoin, Frankocoin, ProtoShares, MegaCoin, Quarkcoin, Worldcoin, Infinitecoin, Ixcoin, Anoncoin, BBQcoin, Digitalcoin, Mincoin, Goldcoin, Yacoin, Zetacoin, Fastcoin, I0coin, Tagcoin, Bytecoin, Florincoin, Phoenixcoin, Luckycoin, Craftcoin, Junkcoin and the original Bitcoin client. In addition, the sellers are marketing additional features and 'upgrades' as follows - Russian to English translation: [+] Implemented collection of Ya.Browser passwords, FTP Disk, new versions of Opera (code-based Chrome) [*] When the program on behalf of the user SYSTEM (service Windows) will now run the loader file as an active session (logged on) Users [*] Improved collect passwords Firefox, is no longer dependent on the availability of libraries SQLite3 [+] Optional redundant bootloader mode: if successfully loaded the first file – the rest will be skipped [+] Added option to disable the collection of passwords (just leave the loader) [-] Fixed processing SQLite3 files for Chrome / Firefox containing 48 bit integers [-] Fixed a serious bug in several functions, which could lead to errors in the collection of passwords and reach program Implemented instantaneous decoding of saved passwords for the following programs: .... See original postings on pastebin.com here: Pony 2.0 botnet - Pastebin.com Pony 2 stealer sell JID: pony2@swissjabber.ch articol complet
-
SRI vrea acces nelimitat în toate computerele din țară
dicksi replied to Open's topic in Stiri securitate
romanul are "reputatia" lui internationala normal ca au facut lobby amerikansky ca sa le fie usurata munca,fuckin' murika and our government slaves! -
Monetizare Adsense garantata (dar la mintea cocosului)
dicksi replied to wirtz's topic in Black SEO & monetizare
cand esti bat stai acasa