Jump to content

Search the Community

Showing results for tags 'apple'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 25 results

  1. Apple has been fined 25 million euros (£21m, $27m) for deliberately slowing down older iPhone models without making it clear to consumers. The fine was imposed by France's competition and fraud watchdog DGCCRF, which said consumers were not warned. In 2017, Apple confirmed that it did slow down some iPhones, but said it only did so to "prolong the life" of the devices. Apple said in a statement that it had resolved the issue with the watchdog. Why does Apple slow down old iPhones? Many customers had long suspected that Apple slowed down older iPhones to encoura
  2. Anul trecut (Noiembrie) am cumparat un iphone 6s din marea britanie (aici locuiesc). De la inceput am avut probleme cu bateria, se descarca repede si daca ma uit pe youtube 5-10 minute deja incepe sa se incalzeasca. Din 2008 am avut diverse modele de iphone-uri, dar niciodata nu am avut probleme cu bateria pana la iphone 6s-ul. Am fost acum 2 luni la un apple store sa-mi inlocuieasca bateria, pentru ca inca e in garantie, dar mi-au zis ca testul lor indica ca bateria e okay. Pentru ca am probleme din ce in ce mai des am facut o noua programare pentru sambata, ce ma sfatuiti sa fac
  3. Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] (link is external) Description All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime for Windows. [1] (link is external) The Zero Day Initiative has issued advisories for two vulnerabilities found in QuickTime for
  4. La intrebarea "de ce da Google vps gratuit?" raspunsul e: are bani de la Apple ========================= Alphabet's Google has quietly scored a major coup in its campaign to become an enterprise cloud computing powerhouse, landing Apple as a customer for the Google Cloud Platform, multiple sources with knowledge of the matter told CRN this week. Since inking the Google deal late last year, Apple has also significantly reduced its reliance on Amazon Web Services, whose infrastructure it uses to run parts of iCloud and other services, said the sources, who all re
  5. APPLE <?php echo "<head> <style type=\"text/css\"><!-- body { background-color: #333333; font-size: 10pt; } body,td,th { color: #cccccc; } h2 { color: #FFCC00; } .business{ color:yellow; } .premier{ color:#00FF00; } .verified{ color:#006DB0; } body {font-family: 'Open Sans', sans-serif; font-size:12px} hr {border: 1px inset #E5E5E5} #form-container { border: 1px solid #ddd;
  6. Keychains raided, sandboxes busted, passwords p0wned, but Apple silent for six months Six university researchers have revealed deadly zero-day flaws in Apple's iOS and OS X, claiming it is possible to crack Apple's password-storing keychain, break app sandboxes, and bypass its App Store security checks. Attackers can exploit these bugs to steal passwords from installed apps, including the native email client, without being detected. The team was able to upload malware to Apple's app stores, and passed the vetting processes without triggering any alarms. That malware, when installed on a victi
  7. Apple iOS 9 users will be required to use six-digit passwords instead of four-digit codes when logging in to a device. The tech giant also announced it would be using two-factor authentication for users signing into Apple services from a new device or browser. The updates will apply to all Apple devices enabled with TouchID. With the new authentication process, users will receive a verification code sent to their device after submitting their password. They will then have to enter the code in the new device or browser in order to gain access to apps and services. Apple unveiled the new feature
  8. Today anywhere you go, you will come across Free or Public WiFi hotspots -- it makes our travel easier when we stuck without a data connection. Isn’t it? But, I think you’ll agree with me when I say: This Free WiFi hotspot service could bring you in trouble, as it could be a bait set up by hackers or cyber criminals to get access to devices that connects to the free network. This is why mobile device manufacturers provide an option in their phone settings so that the device do not automatically connects to any unknown hotspot and asks the owner for approval every time it comes across a compati
  9. Researchers at Wandera, a mobile security company, have alerted Apple to a potential security vulnerability in iOS that could be used by attackers to fool users into giving up their credit card data and personal information. The vulnerability, based on the default behavior of iOS devices with Wi-Fi turned on, could be used to inject a fake "captive portal" page that imitates the Apple Pay interface. The attack leverages a well-known issue Ars has reported on in the past: iOS devices with Wi-Fi turned on will attempt by default to connect to any access point with a known SSID. Those SSIDs are b
  10. Apple chief Tim Cook has made a thinly veiled attack on Facebook and Google for "gobbling up" users' personal data. In a speech, he said people should not have to "make trade-offs between privacy and security". While not naming Facebook and Google explicitly, he attacked companies that "built their businesses by lulling their customers into complacency". Rights activists Privacy International told the BBC it had some scepticism about Mr Cook's comments. "It is encouraging to see Apple making the claim that they collect less information on us than their competitors," Privacy International's tec
  11. Apple uses iOS (operating system) to power many of its mobile devices such as iPhone, iPad and so on. From the beginning, security has been placed at the core of iOS. There are many inherent features that secure the device and its resources at different levels. This article aims to provide answers to questions such as the following: What really happens when an iPhone is powered on? How is data at rest secured by iOS? If the device is lost or stolen, can the attacker view or modify my personal data? How are privacy controls enforced? For ease of understanding, we wil deal with each of these t
  12. Apple on Tuesday pushed out new versions of its Safari browser that address 17 security vulnerabilities in the WebKit engine. Safari 8.04, 7.14 and 6.24 patch multiple memory corruption issues in WebKit, Apple said. “These issues were addressed through improved memory handling,” Apple said in its advisory. The advisory is sparse in other details on individual CVEs; Apple said that users visiting a website hosting an exploit could put the browser at risk to remote code execution or a crash. A separate WebKit vulnerability affects the user interface and could open the door to phishing attacks. “
  13. Security researchers at the Central Intelligence Agency (CIA) have worked for almost decade to target security keys used to encrypt data stored on Apple devices in order to break the system. Citing the top-secret documents obtained from NSA whistleblower Edward Snowden, The Intercept blog reported that among an attempt to crack encryption keys implanted into Apple's mobile processor, the researchers working for CIA had created a dummy version of Xcode. CIA’s WEAPON TO HACK APPLE DEVICES Xcode is an Apple’s application development tool used by the company to create the vast majority of iOS apps
  14. A new SSL/TLS vulnerability has been discovered that makes it possible to decrypt the HTTPS encryption protocols used between websites and browsers on Apple and Android devices. The flaw has been dubbed Freak (Factoring attack on RSA-Export Keys) and information on the specifically created freakattack.com website explains that it works by forcing a mobile device browser to use an older, breakable encryption standard. “The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decr
  15. This method involves no credit card and just requires a small amount of social engineering. The turnaround time is around 6 weeks(Maximum) however this can be more or less(Done it in 2 weeks before). I have done this to the same drop a few times, however I wouldn’t recommend it. This method involves a posting stuff hence the long turnaround time. Around half the time, apple will refund you. Ok to get this done first thing you will need is an apple serial with a warranty, There are many methods of getting these, I personally just use the gumtree .co .uk or ebay .co .uk etc and send sellers a qu
  16. Apple has introduced two-step verification to the iMessage and FaceTime chat services in a bid to boost security. Apple's support page explains that the two-step verification process is triggered when Apple Mac or iOS users log-in to iMessage or FaceTime. The iMessage and FaceTime apps were previously accessed with only an Apple ID email address and standard password. The new verification process requires users to log-in to their Apple ID through the web which will generate an app-specific password to be used as a second layer of security. The process differs slightly from the verification ne
  17. Salut! Intrebare... Stie cineva linkul asta: https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/wa/validateAppleID?appleid=... era valabil intr-un timp, acum nu mai e... Aveti idee in ce s-a schimbat si cum pot sa gasesc acum daca o adresa de email este alocata unui apple id? Multumiri in avans, BizZaroO
  18. Update: OK Apple, your turn. After raising a ruckus with the disclosure of three unpatched Windows vulnerabilities, Google’s Project Zero research team did the same this week with a trio of security issues in Apple OS X. Project Zero imposes a 90-day deadline on vulnerabilities it reports to affected vendors; if a patch is not delivered inside that time frame, details are automatically made public via its external database. The respective OS X bugs were reported to Apple in late October and 90-day deadlines began expiring this week. The Project Zero disclosures also come with proof-of-concept
  19. Don't look now, but Google's Project Zero vulnerability research program may have dropped more zero-day vulnerabilities—this time on Apple's OS X platform. In the past two days, Project Zero has disclosed OS X vulnerabilities here, here, and here. At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine. What's more, the first vulnerability, the one involving the "networkd 'effective_audit_token' XPC," may already have been mitigated in OS X Yosemite, but if so the Google advisory doesn't make t
  20. Attackers living on any network are all about one thing: persistence. They want to get on quietly and stay on quietly. But what about moving stolen data off a network? How quiet can that be? Two researchers believe they’ve figured out a way to combine Siri, Apple iOS’ native voice-activated service, and tenets of steganography to sneak data from jailbroken iPhones and iPads to a remote server. Luca Caviglione of the National Research Council of Italy, and Wojciech Mazurczyk of Warsaw University of Technology published an academic paper called “Understanding Information Hiding in iOS” in which
  21. Salut Acum 3 luni mi-am achizitionat un iphone 3 , totul a fost ok pana i-am dat revenire la setarile din fabrica ... si a ramas blocat la logo-ul apple... Cand bag cablul usb in el imi arata asa : Sta cam 5 minute asa apoi incearca sa se aprinda dar ramane la logo-ul apple... Ma puteti ajuta va rog ? Raman dator...
  22. Apple Final Cut Pro X 10.0.8 with Motion 5 v5.0.7 Mac OSX Apple Final Cut Pro X 10.0.8 with Motion 5 v5.0.7 Mac OSX| 2.45 GB Description : Completely redesigned from the ground up, Final Cut Pro adds extraordinary speed, quality, and flexibility to every part of the post-production workflow. Make every effect special. A new interface designed especially for editors. Smart templates for making changes on the fly during editing. And easy-to-use motion graphics tools for creating eye-catching titles, transitions, and effects. Motion is the perfect companion to Final Cut Pro. Revolutionary Vide
  23. Apple Mavericks 10.9.0.Gold Master MACOSX-MONEY Apple Mavericks 10.9.0.Gold Master MACOSX-MONEY | 4.97 GB The Gold Master version of OS X Mavericks http://www.apple.com/uk/osx/preview/advanced-technologies.html INSTALLATION INFORMATION This is not a bootable disk , if you want to make it bootable there are unsupported ways via google, but the original is not bootable so nor is this Install as an upgrade is the best bet and how we tested, enjoy and give love to apple DOWNLOAD LINKS: http://u19822771.letitbit.net/download/53766.54c947f4c974978f239f5597a01e/Apple_Mavericks_10.9.0.Gold_Mas
  24. Recent au tot aparut diverse informatii cu privire la urmatorul model de iPhone. Ca inginerii si designerii de la Apple sunt extrem de secretosi cand vine vorba despre produsele la care lucreaza, nu mai incape nicio indoiala. Cu toate acestea, silueta mult-asteptatului iPhone 5 pare sa se contureze in ochii milioanelor de fani si pasionatilor de tehnologie. Daca urmatorul iGadget va arata insa asa cum este prezentat in imaginile de mai jos, cea mai admirata companie americana va inregistra vanzari record. Un designer independent, citat de Business Insider, a prezentat cateva fotografii in care
×
×
  • Create New...