Search:
Type: Posts; User: codelogman; Keyword(s):
Search:
Search took 0.02 seconds.
-
September 4th, 2006, 01:03 AM
I respect so much the work with slackware about www.remote-exploit.org in the tutorials section (http://remote-exploit.org/index.php/Tutorials). This simple man has understanding very good how the...
-
September 2nd, 2006, 02:50 PM
in agreement to nihil, the AV "industry" need food, need pay takes and employees.
where they i supose the "instant" worms appear?
the same AV enterprises free those codes on the net for make a...
-
August 31st, 2006, 10:06 AM
OK OK for not sound "like a spam" in my post i decide publish the code and a little explanation here:
Hello this a little MD5 functionally code in c++
[md5.c]
-
August 31st, 2006, 06:51 AM
http://img244.imageshack.us/img244/155/epsn10499dq9.jpg
i still thinking about publish a tutorial called " Introduction to unsecure a Wireless Network".
the only secure pass protection can...
-
August 31st, 2006, 05:27 AM
EDITED!!
i make a serious mistake trying to answer to this post, some users take that for "spam" my own web site, so, i found a "edit" button and erase the content.
thanks for the...
-
August 31st, 2006, 05:21 AM
Tonto, You can translate the DKEY2600 code published on my magazine and learn about that, i'm not able to "rewrite" the article here but you can read these article on:
www.crackenfind.net
any...
-
August 31st, 2006, 05:17 AM
I has been published the MD5 code for fr33dom web page:
yo ca see that here:
http://www.fr33d0m.net/ftopict-72.html
and if you have question related about MD5 process or SHA polinterpolation...
-
August 28th, 2006, 10:21 AM
Hi, i try to understand how i perform my sybase sql server machine server-client side.
My idea is: develop for myself a database server and client structure program for understand how it works.
...
-
August 28th, 2006, 08:36 AM
No only java: perl, php (c for girls), c++, C# (c for girls), and all web bassed object languajes are capable for do that.
This is a basic encoder using c for girls (C#)
public class...
-
August 28th, 2006, 08:01 AM
http ftp certification code, like HTRegz says: "punch that into google and I get this from a registry dump".
The cert is a essential registry for www transactions, one of my virus work attack...
-
July 18th, 2006, 03:55 PM
Windows sp provide only a "on demand" background process, i think personally, sp2 is a crashing bad malfunction code.
i give you a simple firewall if you decide boring sp2
for antionline...
-
July 14th, 2006, 06:59 AM
good!
this schema is the most near from penetration web reality, so, exist another methods or another software? the schema is good.
greetz
-
October 13th, 2005, 05:12 AM
hi i read all asked for your sql question
you can try run directly on "stored procedures" and don't claim for sql injection for a long time.
stored procedure like that
-
October 5th, 2005, 09:00 PM
keep alive? and HTTPVersion '1.0' i try with 1.1 and the results is good
good code and explanation ;)
AzRaEL
-
October 5th, 2005, 01:25 AM
a example for negotiation:
this is the communication method for www browsers
saludos
-
October 2nd, 2005, 10:18 AM
Hi,
I'm with you ic2 and this person need read more about reverse engineering. VB is not the best way, and his routines for cryp and decryp are so poor.
i recomend for my past post and ic2 post...
-
October 2nd, 2005, 09:54 AM
why you request for another person, do performance? o encoding this source?
you see:
i don't understand really where is the "cracking" section
-
October 1st, 2005, 09:22 AM
Hi, my hume opinion for this texts:
first:
think in server structure:
a) server rack (how you say)
-
September 27th, 2005, 04:04 AM
Yes, good question, i write a Creation Kit for polimorphic variants, assembler, c++ etc, but the problem with that is:
a virus writter is alone person, underground person, actually i don't. I...
-
September 26th, 2005, 04:56 AM
I'm a older virus writter, and some for my virus don't run actually, but i don't understand for malicious virus writters who send a virus only for molest or appear in papers.
Basically this area...
-
September 26th, 2005, 04:19 AM
Pk, yes, the idea is processing data, like a image render, database request processing or reconstruct data in a corrupt DB file.
Cracking passwords is a better idea but what is the best...
-
September 24th, 2005, 08:38 AM
like a data processing or not?
cracking passwords is a obfuscated task only for expertise coders, also data storage is a better idea for make and implemment a cluster scheme or not?
saludos
-
September 14th, 2005, 06:58 AM
Hi
this error is consequence of:
First, you can generate first the solution with a new web.config file? if yes, you try it..
-
September 11th, 2005, 09:11 AM
How can Microsoft destroy the internet?
Is the first and essential question for this article.....
Virus, Worms, Monopoly, Billi, Crash ICAAN, and some no importance task has passed for ask...
-
August 3rd, 2005, 11:52 PM
Hi iron,
i have a young friend, devian designer, this guy is excelent graphical designer, contact me and i introduce him.
my msn contact is w32mydoom@hotmail.com
he design the logo for...
|
|