Jump to content

Search the Community

Showing results for tags 'hacker'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 21 results

  1. Caut de vreo saptamana originea celor doua cantece devenite virale in ultimele 3 luni. Am aflat de la OP-ul de pe Youtube ca era o "haita" pe acest forum si ca mai sunt mult mai multe cantece. Am gasit username-ul lui Mossad, aelius, dar nu stiu cum as putea sa il contactez. Daca cineva are informatii despre Bunicul, daca mai traieste si unde sunt restul cantecelor sau un link la topicul in care au fost postate original, va rog sa anuntati in acest topic.
  2. Graphik

    Hacker 2015

    recent am gasit un film pe youtube, poate unii dintre voi l-ati vazut. Oricum merita vazut intr o seara de weekend, povestea e destul de faina, chiar daca nu mai e chiar realizabila in lumea de azi. Vizionare placuta O singura rugaminte as avea la voi, daca puteti identifica melodia de la minutul 41-43 ar fi super. Eu cu shazam ul nu am reusit
  3. |=-----------------------------------------------------------------------=| |=--------------------=[ The Fall of Hacker Groups ]=--------------------=| |=-----------------------------------------------------------------------=| |=--------------=[ Strauss <strauss@REMOVEME.phrack.org> ]=--------------=| |=-----------------------------------------------------------------------=| --[ Contents 1 - Introduction 2 - Background 3 - Nowadays 4 - Conclusion 5 - Shouts 6 - Bibliography 7 - Notes --[ 1 - Introduction The earlier, bigger part of hacking history often had congregations as protagonists. From CCC in the early 80s to TESO in the 2000s, through LoD, MoD, cDc, L0pht, and the many other sung and unsung teams of hacker heroes, our culture was created, shaped, and immortalized by their articles, tools, and actions. This article discusses why recently we do not see many hacker groups anymore, and why the ones we do, such as Anonymous and its satellite efforts, do not succeed in having the same cultural impact as their forefathers. --[ 2 - Background Hacking is, in its very essence, an underground movement. Those who take part on it have always been the ones who (ab)used technology in ways beyond the knowledge of the larger userbase. It is tightly linked to intense efforts in unveiling previously unknown information as well as in sharing these discoveries. These premises hold true for as long as we know hackers: since computers had barely no users up until the informatic massification of today. The nature of the hacker interests intrinsically poses difficulties: growing knowledge on anything is hard. It requires heavy research, experimentation, and can turn into an endless journey if objectives are not carefully set. Just like in any field of scientific studies, it calls for a good amount of colaboration, an attitude which, luckily for hackers, was greatly enabled by the advent of computer networks and, most notably, the Internet. Computer networks increasingly made it possible to transmit unlimited and uncensored information across their geographical extent with little effort, with little costs, and in virtually no time. From the communication development standpoint, one would expect that the events that followed the 80s to our days would lead to a geometric progression in the number of hacker communities. In effect, hacking has arguably grown. Hacker communities, definitely not. So what went wrong? --[ 3 - Nowadays We live in days of limited creativity. Moreover, as contraditory as it may seem, it looks particularly rare for creativity to arise from groups or teams. Communities, rather than individuals, should be more intellectually empowered to create, but lately we have been watching the force of the solo, the age of the ego. That, of course, when we do see anything that catches our attention for originality, which is an ever scarcer pleasure. In "Time Wars" [1], Mark Fisher explains that post-fordism has taken us to this catatonic inability to innovate. Our nearly obsessive compulsion for work consumes not only our time, in the literal form of labor hours, but our minds, by distracting us from everything else we could be doing otherwise. These distractions include our unceasing connection to ubiquous media (e.g. the frequent checks for new e-mail, or accesses to social networks on mobile devices) as well as an increased concern with financial stability and provisioning, a concern that grows as welfare is invariably trimmed by both the governments and the private sector. It is important to note that our capitalist worries are more deeply rooted in us than might seem at first, even in the most politically diverse people. Supporting oneself is not easy, it does not come for free. Getting some education, finding a job, staying up-to-date... regardless of what your aspirations are, whatever you feel obliged to do is probably a lot, already. And it likely involves a prevalence of "minding your own business". The unsettlement created in our thoughts affects intellectual solidarity in even more severe ways than it does individual creation. Simply put, if it is already so difficult for one person to focus away from these "distractions" and into inspired productivity, let alone for a group to join in a true collective mind. The ties that bind collective-minded parties together take dedication to build, and our egotistical concerns do not help (see note "A"). Not only is commitment required for the actual work to be accomplished, but also to identify the shared values and goals that enable true human connectivity. Notice this does not concern _collaboration_ as much as it does _collectiveness_. Collaboration typically breaks down the creative process in a way it can be incrementally achieved with very self-sufficient, individualistic contributions. Such is the case in most open-source software projects. Roles are very well segregated so that a minimum of human integration is required, as far as most modern software development processes go, anyway. A true "hive mind" [2] cannot exist without the support from a stronger, more unisonant cognitive bond. Funny enough, the popular variants of LOIC, the DDoS tool used by "Anonymous", contain a "hive mind" feature (i.e. getting a target automatically from a given IRC server and channel and firing your packets against it). You wish it was that easy. The concept of the "conscience collective" was first established by Emile Durkheim who, in his 1893 book "The Division of Labor in Society", expressed 'that the more primitive societies are, the more resemblances (particularly as reflected in primitive religion) there are among the individuals who compose them; inversely, the more civilized a people, the more easily distinguishable its individual members', as put by R. Alun Jones [3]. Well, following (or despite) the prosperous adoption of atheism and agnosticism as professed in the Internet and other popular media, it is understood that religious beliefs are in a low, taking a bit of what socities traditionally saw as a point of unity. In fact, there seems to be an ever growing search for uniqueness in the modern man, especially that from the apparently overpopulated metropolises (see note "B"). In this never-ending crowd of interesting, outstanding personas, we want to shine somehow, to prove ourselves different and original. In the end, it turns into a pointless battle, against God-knows-who, for apparent singularity. Instead of reaching for the fellow man, we want to set ourselves apart, and thus, remarkable. --[ 4 - Conclusion Modern life nearly conspires against the collective. We are tormented by a relentless flow of information as well as the daily worries of an eternally insecure, unwarranted life. Furthermore, we dread the thought of being alike, of sharing multiple views and opinions. As such, we are turning progressively judgemental of who we should be partnering with, on the basis that "they do not understand". In hacking, it yet implicates on the delicate subject of trust, which would require an essay on itself, given the undeniable importance the matter has acquired over the years. If our thoughts on creating hacker groups were to be summarized, this is how they would look: No one ever feels like we do. They are not to be trusted and we do not have the time for them. The only attitude consonant to our search for a comfortable, safe life is to constrain ourselves to our own limitations, ignore the intelligent life out there, and surrender to the mediocracy that our society has condemned our leisure time to. --[ 5 - Shouts My only acknowledgements go to whoever reads this through and puts his/her thoughts to it. I eagerly await for your comments. --[ 6 - Bibliography 1 - "Time Wars", Mark Fisher - (pagina’s niet in het hoofdmenu) | Gonzo (circus) | Muziek.Kunst.Meer. incubate-special-exclusive-essay-time-wars-by-mark-fisher/ 2 - "Collective Consciousness", Wikipedia - Collective consciousness - Wikipedia, the free encyclopedia 3 - Excerpt of "Emile Durkheim: An Introduction to Four Major Works", Robert Alun Jones - The Division of Labor in Society (1893) --[ 7 - Notes A) In respect to social networks, while they are a valid community-building mechanism in nature, selfishness prevails in common usage, by means of the indulgent pleasure that fuels chronic "pluggedness", at times voyeur, at times exhibitionist and needy. It is arguably the case, though, that the globalizing aspect of the Internet has brought the feeling of upsetting commonality to the citizens of even the more unpopulated places. Un articol interesant.
  4. Buna ziua, Am si eu nevoie de un hacker care sa-mi gaseasca un punct slab la un website la care vreau sa ii aflu datele de cPanel. websiteul este MINIMALIST foarte chiar, are vreo 5MB cu totul , e dala facut intr-o ora ceva de genu si pentru un hacker nu cred ca va fii cine stie ce provocare. Mai multe detalii ii voi da in privat celui care vrea, cine ma poate ajuta ii voi recompensa cu WMZ
  5. Cool reading The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. Sursa : http://www.stumbleupon.com/su/1rjdxV/:1ORi8sCQe:eSJ$ZbOx/www.mithral.com/~beberg/manifesto.html
  6. Ce inseamna sa fi hacker? Sa ai cunostinte in ce ?
  7. My working facebook account hacker blog: Hack facebook account password online De asemenea alt proiect Isis simulator preluat chiar de Pewdiepies :
  8. A south suburban police department paid a $500 ransom to an unidentified hacker to regain access to data from a police computer the hacker managed to disable, records show. Midlothian in January was hit with a form of computer virus called Cryptoware, said Calvin Harden Jr., an IT vendor who works with the village. The hacker demanded payment through bitcoin, a digital currency often used by individuals engaging in sophisticated or sometimes illegal activities on the Internet. "It didn't encrypt everything in the police department. It was just that computer and specific files," not the entire system, Harden said. The hacker didn't access the information on the computer but merely shut it down and made it inaccessible, Harden said. The Federal Trade Commission and the FBI issued a public warning last year to consumers and businesses about the virus, saying it's "essentially extortion." Midlothian's police force isn't the first government agency to fall victim to the cybercrime. The city of Detroit and a Tennessee sheriff's office both encountered Cryptoware hackers who sought ransoms in the past year, according to published reports. Fred Hayes, Elwood's top cop and president of the Illinois Association of Chiefs of Police, said this type of virus is becoming more common and that federal officials have been in touch about it. His advice to departments is to back up their data. "This is something that quite a few people recently, and when I say recently (I mean) over the last year or two, have been experiencing," Hayes said. At the Midlothian Police Department, someone opened an email that contained the virus, allowing the virus to lock down the computer, Harden said. A message popped up on the machine demanding money in exchange for a virtual code that would return access, Harden said. Midlothian Police Chief Harold Kaufman confirmed that the department had been hacked but otherwise declined to comment. Neither Kaufman, Midlothian's mayor, nor the village clerk returned further messages asking whether the village would pursue the hacker, but Harden said he believed officials would do so. An FBI spokeswoman wouldn't confirm whether the village made the FBI aware of the incident. Village officials released a copy of the town's invoice in response to an open records request by the Tribune. The invoice, "for MPD virus," shows the village sent a $606 money order to a bitcoin cafe in New York to transmit the money to the hacker. The payment included bank fees and surcharges. Officials tried to wire the money through Bank of America, Harden said, but couldn't. The village had to make a difficult decision whether to comply with the demand, Harden said, and chose to because a pursuit of the hacker might have been more trouble than it's worth. "Because the backups were also infected, the option was to pay the hacker and get the files unencrypted," Harden said, "which is what we decided to do." Harden said he believes the hacker's actions are criminal, which is why the hacker requested "pretty much untraceable" bitcoin as payment. The sheriff's office in Tennessee paid $572 to a hacker known as Nimrod Gruber to regain access to its files, according to reports. Detroit's mayor said in November that the database that was frozen there wasn't essential to government operations, and the city refused to pay a ransom of several hundred thousand dollars a hacker sought. Mike Alsup, co-chair of the Communications and Technology Committee for the Illinois Association of Chiefs of Police, said the issue of cyber security "weighs heavily" on police chiefs. "Chiefs across the entire nation are concerned with the growing trend of computer crime," Alsup said. "Hardly a day goes by that we don't see in both the print and audio media, we hear of instances of computer crime, computer hacking, large organized criminal groups internationally that are stealing through the use of computers." Harden, Midlothian's IT vendor, said he does work for a law firm that experienced a similar virus last year, and added that it's "happening to people every day." "When you tell someone this, it's sort of they're like, 'What?' It's sort of a crazy scenario," Harden said. "But it's happening." Midlothian cops pay bitcoin ransom to retrieve data from hacker - Chicago Tribune
  9. Topface, one of the world's largest dating websites, said it has paid a hacker an undisclosed sum to stop trying to sell about 20 million email addresses stolen from the Russian company. Topface Chief Executive Dmitry Filatov said the company located the hacker, who had published ads to sell the data but had not actually sold them. "We have paid him an award for finding a vulnerability and agreed on further cooperation in the field of data security," Filatov said in an email on Friday, declining to disclose the size of the reward. Topface says it has some 92 million users and 1.6 million daily visitors. Cybersecurity experts typically advise companies not to pay hackers to return stolen data, calling that a ransom and saying cybercriminals often break promises. But Filatov noted that the ads have already been removed and Topface has agreed not to pursue charges against the unidentified individual. "As we made an agreement with him we do not see any reason for him to break it," said Filatov. Atlanta-based fraud protection firm Easy Solutions disclosed the hack on Sunday, reporting on its blog that a hacker known as "Mastermind" was attempting to sell 20 million credentials from an unnamed dating site. Only email address had been stolen, Filatov said. "There was no access to other information - neither passwords, nor content of the accounts." Source
  10. Want to hack someone’s Facebook account? or Gmail account? or break into somebody’s network? But don’t have hacking skills to do so. There’s no need to worry at all. A new service is out there for you guys where you can search for professional hackers and hire them to accomplish any hacking task. Dubbed Hacker's List, a new service that offers to connect customers and "professional" hackers for hire. The service would made any tech-illiterate person capable to break into his boss' email address. This really sounds like something that happens mostly in movies. As if I’m hiring a hacker to accomplish crimes for me. Hacker’s List, the three-month old website — launched in November — has received over 500 hacking jobs so far and waiting for successful bidders. There are around 70 anonymous hacker profiles displayed on the website, but many of them are inactive at the moment. The website charges a fee on a project and payment is cleared on completion of the work, just like freelancing sites. Based on hours, prices of hackers range between $28 to $300 and full hacking projects range in prices of $100 to $5000. As you might expect, it's all done anonymously — collection of fees when tasks are completed, nobody knows the identity of those involved in doing the work. Several projects ranging from 'Hacking into Facebook account', 'Hacking into Gmail accounts', 'Hacking into websites' and 'Hacking into business accounts' are listed on the website. Surprisingly, many jobs listed on the website are for the customers pleading for hackers to break into school systems in order to change grades. You can have a look below to see the list of some jobs, together with the price customers are willing to pay: $300-$500: I need a hack for an Android Game called "Iron Force" developed by "Chillingo". It's a dynamic Server game, frequently updated. very hard to hack. I need a hack that give diamonds and cash on this game and if possible a auto-play robot system for my account. $10-$350: Need some info and messages from a Facebook account. Other jobs to come if successful. $300-$600: I need a hacker to change my final grade, it should be done in a week. $200-$300: Hack into a company email account. Copy all emails in that account. Give copies of the emails employer. Send spam emails confessing to lying and defamation of character to everyone in the email list. Hacker’s List, a website registered in New Zealand, has become the first website ever to provide "ethical hacking" services. While the activities listed on the site are clearly illegal in some cases, but the website asks users not to "use the service for any illegal purposes," as laid out in its 10-page long terms and conditions section. Source
  11. Please message me for more details, would write in marketplace but don't have enough posts
  12. As vrea si eu un hack functionabil pentru a intra in panou la forumuri (gratuite / platite )
  13. // Mue
  14. By Anna Leach After China, the world’s biggest source of global data theft comes from inside the European Union, said a report published Tuesday. Verizon Communications Inc.’s Data Breach Report 2013 found that more than a quarter of the world’s data thieves operated in Romania. Some 28% of the hackers behind 47,000 data breaches investigated by Verizon were working from Romania. That was second only to China with 30%. By contrast only 18% of data thieves were acting out of the U.S. said the company. In a wide-ranging report, Verizon found that the majority of data thieves are not high-tech espionage agents, but rather petty criminals hacking for money and using rudimentary skills. Three quarters of all data thefts analyzed were financially-motivated and less than 1% used techniques that Verizon classed as high-tech. The focus on cash not politics meant that private businesses, not government, were the main target, with under 5% of attacks analysed targeting the public sector. Data thieves took all sorts of corporate information, said Verizon’s global investigation manager Dave Ostertag. “Thieves steal corporate information for a variety of purposes,” he said. “If you steal quarterly earnings statements prior to announcement, that has value to someone. If you have a process that your competitors don’t have — that process makes you more efficient or you have a larger market share because of that process, that has value.” The theft of intellectual property has become an increasing problem, especially for small business in the technology and science sectors: “Smaller companies used to say ‘we don’t have to worry about a data breach’, that’s not true any more,” said Mr. Ostertag. “When we look at espionage, it’s not just defense contractors and the government, it’s boutique engineering firms that might specialize in say aerospace, or might specialize in undersea [engineering], with maybe a hundred employees or less. These type of companies are victims too. “It might be a small firm that’s got a piece of information that might be valuable to a competitor or to a state.” Even when hacking is state-affiliated — and 19% is according to the report — it may be targeting a private business for commercial purposes rather than state bodies. Verzion’s Data Breach Report 2013 is based on 47,000 incidents investigated by their security arm Verizon Risk for their clients in 2012. Some 621 breaches were analyzed in more detail. The report also draws in data from Verizon’s 19 partners on the report including the Danish Intelligence Service, Carnegie Mellon University, Deloitte and the U.S. Department of Homeland Security. The source: After China, Romania is Biggest Source of Data Theft Says Report - Tech Europe - WSJ Hai ca stiu ca poti. Inca putin si locul 1 e doar al tau. Romania nu duce lipsa de "baieti" si asta se vede!
  15. Mare stire de securitate nu este, dar are puncte comune, inclusiv cu RST fiind "coleg" cu noi Hackerul clujean cunoscut sub pseudonimul Iceman, cel care a spart serverele NASA in anul 2010, a scapat de inchisoare si si-a gasit chiar un nou loc de munca, in domeniul IT. Robert Butyka este un om liber, dupa ce Curtea de pel Cluj a respins cererea procurorilor, care solicitau reincarcerarea sa. Tanarul a fost condamnat la 3 ani de inchisoare cu suspendare conditionata, dupa ce a spart serverele NASA, in anul 2010. Atacul lui informatic a dus la autodistrugerea softului NASA, provocand astfel o paguba de 500.000 de dolari Agentiei Spatiale Americane, care a cerut si daune. La dosarul prezentat de Robert in instanta se afla si dovada ca acesta este acum angajat la o firma de IT, unde este agent de securitate. Fisa postului sau presupune supravegherea serverelor companiei, scrie Ora de Cluj. ? Sursa: Ora de Cluj Cine nu stie prima stire, poate intra aici sa faca "update": https://rstcenter.com/forum/48480-hackerul-rom-n-care-spart-serverele-nasa-pus-sub-acuzare-n-sua-el-risc-10-ani.rst
  16. Oky! Mods, RSTCenter Staff, a fost si va fi intotdeauna o placere sa fiu membru RST. Din lipsa de timp liber si faptul ca preferam sa bantui pe aici plus ca am am fost invitat sa moderez alte 2 forumuri IT din care fac parte de foarte mult timp, am decis sa nu continui cu forumul din realhacker. Poate ptr ca am fost prea lenes si am ales sa dau sfaturi si sa invat alaturi de membrii altor forumuri. Nu sunt prea multe de spus despre RealHacker.NET si nu ca e cazul sa ii fac reclama. Mai pe scurt, nu prea mult buzz, registrations open 100 members only: - Social Private Network 25 members only - Wuala Cloud Space - 500GB https - members only - CHATroll - in curand RumbleTalk - Make Money - work in progress - nu e cine stie ce, veniturile din trafic si ads vor fi impartite lunar intre membrii in functie de punctele care le au acumulat. - sugestii !? update: (+/- = adaugi/stergi) +/-1 reply = +/-1 point +/-1 comment = +/-1 point +/-1 post = +/-5 points +/zi = +1 point -Site-ul va avea la inceput maxim 25 membrii. -30 zile de inactivitate = pierzi toate punctele -Fiecare punct are valoare de 0.01$ si poti sa ceri banii incepand cu 5$(500c) si ii vei primi prin donatie paypal (in maxim 48h sau in aceasi zi). pe scurt: Orice faci pe site trebuie sa fie relationat cu "hacking", grupul din care faci parte, si sa respecti regulile. Nu o sa te imbogatesti din asta si nici nu vei primi vreo diploma, poate doar respectul celorlalti si dreptul sa iti promovezi ideile si site-ul tau. Daca vrei sa faci bani dintr-o metoda asemanatoare, recomand MyLot.com, Triond.com sau alte site-uri asemanatoare.
  17. "Un britanic risc? pân? la 70 de ani de închisoare pentru c?, spune el, a încercat s? caute dovezi despre existen?a extratere?trilor. Gary McKinnon, considerat cel mai periculos hacker din lume dup? ce a spart sistemul Pentagonului de securitate informatic?, urmeaz? a fi extr?dat în Statele Unite dup? ani de procese în Marea Britanie." relateaza Realitatea.net A spart nenumarate calculatoare ale NASA si ale Pentagonului si ei vor sa-l aresteze?? Eu i-as da un premiu, l-as angaja la Microsoft, l-as stimula sa lucreze astfel incat programele sa fie din ce in ce mai eficiente. Nu l-as aresta pentru 70 de ani... Stirea e de prin 2009. O sa ma documentez sa vad ce s-a intamplat pana la urma. :confused:
  18. Doresc o editare de un articol pe un site. Nu am ce face cu sqli-ul, xss-ul. Platesc direct editarea articolului. Platesc bine, pe primul care poate face asta. Detalii in mesaje personale.
×
×
  • Create New...