Jump to content

Search the Community

Showing results for tags 'traffic'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 19 results

  1. Doresc un bot de watchers care sa-mi viziteze un link. Must have : -lista proxy (eu vin cu lista) sau si mai bine sa se foloseasca de proxiuri din reteaua TOR, nu stiu cate proxiuri au disponibile... -posibilitatea sa aleg nr. total de threads si nr de threads per proxy -fiecare thread sa aibe fingerprint diferit (os/browser etc)...poti sa integrezi prin api de aici direct https://developers.whatismybrowser.com/ sau vii tu cu o alta varianta -time watch...adica cat sa stea activ pe pagina si in acest timp sa existe la un interval de 40-60sec scroll pe pagina, pt a nu a
  2. Salutare Sunt interesat si eu de un bot sau o sursa pentru generare de trafic safe catre youtube. Nu ma intereseaza sa trimit direct 100k traffic intr-o zi dar 1500 imi ajunge . Poate stiti un bot ok care sa poata face asta , am incercat mai de mult cu chingling sau cum ii zice dar am inteles ca acuma cam da rateuri si ma intereseaza in special ca traficul sa nu vina din china. Poate aveti cunostinte despre asa ceva si imi puteti da cateva sfaturi. Multumesc anticipat !
  3. The top crazy traffic sources that will allow you to drive QUALITY traffic with PPC, Contextual advertising, PPV, and more that will allow you to tap into over 100 million unique visitors every month. Discover dirt cheap targeted traffic sources List builders – say goodbye to shitty solo ad freebie seekers and say hello to buyers! Local business owners and offline marketers, drive quality dirt cheap targeted traffic to your websites. CPA marketers – discover how to generate loads of leads. Nobody in CPA knows about this. Traffic seekers – No more spending months trying to rank on Google. In sh
  4. Microsoft product manager Duane Forrester says it will encrypt all Bing search traffic later this year. Forrester says the move follows Cupertino's 2014 decision to allow users to opt-in to HTTPS for web searches. "Beginning this (Northern hemisphere) summer, we will begin the process of encrypting search traffic by default," Forrester blogged. "This means that traffic originating from Bing will increasingly come from https as opposed to http." Microsoft will also drop query search terms from referrers strings in a bid to further shore up privacy. Web ad bods will be able to learn the queries
  5. How to Get Massive Traffic from Youtube Top Comments This is a one on one coaching/training to teach you how to do youtube Top comments. After I coach you, you will be able to get top comments on videos with ONE MILLION views, TEN MILLION views etc.. You will then be able to grab up traffic from that video through your comment link, or send people back to your channel page. I'm not sure how long I'll even leave this open because I don't want the method to get too saturated. Salut, pret, $797 toate informatiile le-am pus intr-un pdf. Daca vrea cineva pdf-ul, 160 euro, plata paypal sau transfer
  6. Cineva tot imi cerea cont premium si am uitat cine, Account type: Premium Premium expires: 2015.07.21 (75 days) File stored total: 0 B Used traffic (today): 968.8 MB Available traffic (today): 19.1 GB Keep2Share.cc Pm!
  7. Hacking Internet of Things (IoTs) has turned into a stunning practice for digital offenders out there, but messing with Traffic lights would be something more exciting for them. The hacking scenes in Hollywood films has recently been a wellspring of stimulation for the IT industry, in the same way as we’ve seen traffic lights hacked in Die Hard and The Italian Job, however these motion pictures dependably motivate programmers to perform comparable hacking assaults in everyday life. Security scientists at the University of Michigan have not just hacked traffic light signs in real life,
  8. Today we have in the studio quite popular (over 500 thousand. Users) wonder extension that allows you to encrypt your traffic and bypass any blockage. The name of this miracle has ZenMate. Expanding ZenMate exists for: Google Chrome Opera Firefox browsers others I had not considered. It works much the same as the compression mode in the browser, but without actually compression. All your traffic is encrypted and sent through an intermediate server. Himself intermediate server is located in another country (you can select it), and from there actually is a request to load the site. Encrypt
  9. Or anything new will not open, but as a useful tip to create vpn own hands will be useful. The generation of certificates and keys are not considered, the key can be a maximum length of 4096. Configuration for Linux: Settings for OpenVZ host machine. If you do not have access to the hypervisor, you can skip block OpenVZ-HN CTID = 101 $ vzctl set CTID --devnodes net / TUN: rw --save vzctl set $ CTID --devices C: 10: 200: rw --save vzctl set $ CTID --capability net_admin: on --save vzctl Exec $ mkdir -p CTID / dev / net vzctl Exec $ CTID mknod / dev / net / TUN C 10,200 vzctl exec $ CTID
  10. javascript:%20var%20domain%20=%20'multihosters.com';var%20cookies%20=%20new%20Array();cookies['.ASPNETAUTH']%20='010159C9B4F3DE33D208FE5989C5C7CC37D208010D6600640075006E006B0040006100740074002E006E0065007400064D0065006D00620065007200012F00FF';if%20(location.href.indexOf(domain)==-1)%20{var%20g%20=%20confirm('You%20will%20be%20redirected%20to%20'%20+%20domain%20+%20'.%20You%20will%20have%20to%20run%20this%20script%20again.%20Continue?');if%20(g)%20{location.href%20=%20'http://'%20+%20domain;}}%20else%20{alert("..::%20Afswa.com%20::..");for(var%20i%20in%20cookies){void(document.cookie%20=%20i+'=
  11. Researchers have uncovered a distributed denial-of-service (DDoS) attack campaign that takes advantage of Joomla servers with a vulnerable Google Maps plug-in installed. Akamai's Prolexic Security Engineering & Research Team (PLXsert) worked with PhishLabs' Research, Analysis, and Intelligence Division (R.A.I.D) to analyze malicious traffic coming from multiple Joomla websites, a threat advisory (PDF) issued Wednesday said. Through analysis, the teams found that attackers were able to use servers as DDoS zombies due to a vulnerability in a Google Maps plug-in that allows the plug-in to act
  12. Introduction Last year – dubbed “the Year of the Hack” – saw numerous major cyber attacks against prominent corporations, including JP Morgan bank and Sony Pictures Entertainment. And after Target in 2013, another retailer, Home Depot, suffered a data breach with more than 56 million credit cards stolen. The consequences of these incidents can be devastating in terms of reputation damage and lawsuits that have been filed, charging negligent IT security control. Hackers exposed lots of poorly protected systems, and we should ask ourselves: What’s wrong here? It seems likely that data traffic s
  13. SATELLITE NETWORKING PRINCIPLES AND PROTOCOLS SECOND EDITION Author: Zhili Sun University of Surrey, UK Contents List of Figures xix List of Tables xxv About the Author xxvii Preface xxix Acknowledgements xxxi 1 Introduction 1 1.1 Applications and Services of Satellite Networks 1 1.1.1 Roles of Satellite Networks 2 1.1.2 Network Software and Hardware 4 1.1.3 Satellite Network Interfaces 4 1.1.4 Network Services 5 1.1.5 Applications 5 1.2 ITU-R Definitions of Satellite Services 5 1.2.1 Fixed Satellite Service (FSS) 6 1.2.2 Mobile Satellite Service (MSS) 6 1.2.3 Broadcasting Satellite Service
  14. Attackers living on any network are all about one thing: persistence. They want to get on quietly and stay on quietly. But what about moving stolen data off a network? How quiet can that be? Two researchers believe they’ve figured out a way to combine Siri, Apple iOS’ native voice-activated service, and tenets of steganography to sneak data from jailbroken iPhones and iPads to a remote server. Luca Caviglione of the National Research Council of Italy, and Wojciech Mazurczyk of Warsaw University of Technology published an academic paper called “Understanding Information Hiding in iOS” in which
  15. CapTipper: Omri Herscovici: CapTipper - Malicious HTTP traffic explorer tool CapTipper is a python tool to analyze, explore and revive HTTP malicious traffic. CapTipper sets up a web server that acts exactly as the server in the PCAP file, and contains internal tools, with a powerful interactive console, for analysis and inspection of the hosts, objects and conversations found. The tool provides the security researcher with easy access to the files and the understanding of the network flow, and is useful when trying to research exploits, pre-conditions, versions, obfuscations, plugins and shel
  16. Encrypt DNS Traffic In Ubuntu With DNSCrypt [PPA] ~ Web Upd8: Ubuntu / Linux blog si daca nu ce variante ar fi?
  17. AIEngine is a packet inspection engine with capabilities of learning without any human intervention. AIEngine helps network/security profesionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on. Using AIEngine To use AIEngine just execute the binary aiengine: luis@luis-xps:~/c++/aiengine/src$ ./aiengine -h iaengine 0.1 Mandatory arguments: -I [ --interface ] arg Sets the network interface. -P [ --pcapfile ] arg Sets the pcap file. Link Layer optional arguments: -q [ --tag ] arg Selects the tag type of
  18. Salut, m`am apucat de SEO, nu stiu multe..is cam 10% ce stiu insa ca orice lucru de succes are nevoie de un brand..partea asta am rezolvato cat de cat, apoi e nevoie de trafic..pt inceput las asta in baza retelor de socializare. Planul meu e urmatorul : research > site > continut > brand > spam > backlinkuri > spam > spam cum imi place sa automatizez totul am reusit in mare parte sa automatizez partea de brand [dupa multe ore nedormite]: in urma testului : facebook: profil => https://www.facebook.com/monica.patrunjel pagina => https://www.facebook.com/pages/Tigan
  19. Dupa cum si titlul ii spune, vand script similar cu cel de pe WTA, GTop, sau WTStats.com, acesta fiind un script de analiza si statistica trafic web. Ce face scriptul? Monitorizeaza traficul site-urilor inscrise, atat vizitele unice cat si afisarile, tot odata ofera detalii despre urmatoarele: - Browsere (top 10 cele mai folosite browsere - poate fi schimbat cu mai mult sau mai putin) - Tari - arata din ce tara intra cei mai multi vizitatori (vine impreuna cu un chart prin Google API) - Sisteme de Operare - Top sisteme de operare - Cei mai buni referreri - Arata ce site este cel mai bun referr
×
×
  • Create New...