Jump to content

Search the Community

Showing results for tags 'software'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At the SyScan conference next month in Singapore, security researcher Jacob Torrey plans to present a new scheme he calls Hardened Anti-Reverse Engineering System, or HARES. Torrey’s method encrypts software code such that it’s only decrypted by the c
  2. Product Description It is frustrating: Even with the best cameras, one only gets ordinary results. It is obvious: the photos could clearly be better. Dreary colours could be pepped up, image could be sharpened and details could be highlighted. Especially, brightness has to be adjusted, as most of the photos are too dark. You also want to edit scanned photos? Wouldn’t it be great to have a software which deals with picture optimization and repair and which is at the same time easy to handle? Optimize your photos with one single click! Photomizer 2 makes the most out of your photos – with one s
  3. TJX hacking mastermind Albert Gonzalez scoffed at antivirus tools. He and his cohorts wrote malware specifically designed to evade their detection. One can imagine him laughing as his team of hackers broke into corporate networks using SQL injection attacks and gained administrative access. Then he probably guffawed, Bond villain-style, as he uploaded the malware directly into server memory, and when the corporate networks began happily delivering customer credit card data directly to his servers chuckled all the way to the bank. Gonzalez was perhaps the biggest cyber criminal in history. He w
  4. Software: Chrome Sitename: Login :: Torrents.Md - BitTorrent Tracker Moldova Login: snapple:paradox PC Name: PC-ÏÊ Date: 2015-01-09 10:33:33 ===================================== Software: Filezilla Sitename: 89.33.242.29 Login: root:mt2raul PC Name: LASTXP Date: 2015-01-09 12:55:56 ===================================== Software: Chrome Sitename: https://ro-ro.facebook.com/ Login: bucur_alexandru99@yahoo.com:calculator PC Name: ALEX-CE765768C7 Date: 2015-01-09 14:06:41 ===================================== Software: Chrome Sitename: https://www.facebook.com/ Login: bucur_alexandru99@yah
  5. The problem was discovered by the Allgemeiner Deutscher Automobil-Club (ADAC), a German motoring association, and was verified on several models of BMW cars. The attack took advantage of a feature that allows drivers who have been locked out of their vehicles to request remote unlocking of their car from a BMW assistance line. “They were able to reverse engineer some of the software that we use for our telematics,” said Dave Buchko , a BMW spokesman. “With that they were able to mimic the BMW server.” The auto maker has already started sending out software patches to the 2.2 million cars equip
  6. Software: Chrome Sitename: https://login.yahoo.com/config/login Login: just_smite@yahoo.ro:Ciorapi123 PC Name: BOMBY-PC Date: 2014-11-18 13:46:28 ===================================== Software: Chrome Sitename: https://login.yahoo.com/config/login Login: yo_kata93:Steaua1999 PC Name: JONTY-4F737EA78 Date: 2014-11-18 15:12:46 ===================================== Software: Y! Messenger Sitename: www.yahoo.com Login: mihai.george46: PC Name: PC-PC Date: 2014-11-19 07:22:07 ===================================== Software: Y! Messenger Sitename: www.yahoo.com Login: gabin73: PC Name: DELUXPC
  7. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect oneself from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of our recent research with the topic antivirus evasion show. In the recent past, there were several computer-based attacks against IT networks that became public and raised a lot of media attenti
  8. FreeBSD Is Now Available On DigitalOcean! Support for FreeBSD has been one of the most common requests from our customers, and we’re thrilled to be delivering it you today. FreeBSD is a Unix-like operating system that is the platform of choice for some developers because of the security and stability that it offers. Additionally, FreeBSD offers an easy way to customize software installation by using its unique Ports Collection to build software from source.
  9. Salutari tuturor. Cu siguran?? fiecare din voi, membri RST, folosesc produse Open Souce. De la Firefox, Pidgin pân? la BT sau alte distro. A? vrea s? aflu, deasemenea, dac? careva din voi particip?, direct sau indirect, la vre-un proiect Open Souce. Dac? da, care este acesta, ce v-a dat aceast? munc? "gratis" în folosul tuturor?
  10. Robotul invata singur sa mearga si se dezvolta pe masura ce ii sunt atasate noi membre Creaturile vii au avut nevoie de milioane de ani pentru a evolua de la stadiul de amfibii la cel de animale cu patru picioare, dar un nou robot dezvoltat de o echipa de cercetatori britanici poate face acest lucru in doar cateva ore. Software-ul cu care a fost dotat acest robot se mareste si devine tot mai complex in mod automat, pe masura ce oamenii de stiinta ii dezvolta masinariei corpul fizic. "Daca vrem sa realizam roboti humanoizi cu si mai multi senzori si un comportament cu adevarat complex este f
×
×
  • Create New...