Search:

Type: Posts; User: codelogman; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    17
    Views
    68,833

    I respect so much the work with slackware about...

    I respect so much the work with slackware about www.remote-exploit.org in the tutorials section (http://remote-exploit.org/index.php/Tutorials). This simple man has understanding very good how the...
  2. Replies
    11
    Views
    6,600

    in agreement to nihil, the AV "industry" need...

    in agreement to nihil, the AV "industry" need food, need pay takes and employees.

    where they i supose the "instant" worms appear?

    the same AV enterprises free those codes on the net for make a...
  3. Replies
    5
    Views
    3,821

    OK OK for not sound "like a spam" in my post i...

    OK OK for not sound "like a spam" in my post i decide publish the code and a little explanation here:


    Hello this a little MD5 functionally code in c++


    [md5.c]
  4. Replies
    28
    Views
    48,054

    http://img244.imageshack.us/img244/155/epsn10499dq...

    http://img244.imageshack.us/img244/155/epsn10499dq9.jpg


    i still thinking about publish a tutorial called " Introduction to unsecure a Wireless Network".


    the only secure pass protection can...
  5. EDITED!! i make a serious mistake trying to...

    EDITED!!


    i make a serious mistake trying to answer to this post, some users take that for "spam" my own web site, so, i found a "edit" button and erase the content.


    thanks for the...
  6. Replies
    3
    Views
    4,049

    Tonto, You can translate the DKEY2600 code...

    Tonto, You can translate the DKEY2600 code published on my magazine and learn about that, i'm not able to "rewrite" the article here but you can read these article on:

    www.crackenfind.net


    any...
  7. Replies
    5
    Views
    3,821

    I has been published the MD5 code for fr33dom web...

    I has been published the MD5 code for fr33dom web page:

    yo ca see that here:

    http://www.fr33d0m.net/ftopict-72.html

    and if you have question related about MD5 process or SHA polinterpolation...
  8. Replies
    0
    Views
    3,931

    i need help with database server develop

    Hi, i try to understand how i perform my sybase sql server machine server-client side.

    My idea is: develop for myself a database server and client structure program for understand how it works.
    ...
  9. Replies
    7
    Views
    12,538

    No only java: perl, php (c for girls), c++, C# (c...

    No only java: perl, php (c for girls), c++, C# (c for girls), and all web bassed object languajes are capable for do that.

    This is a basic encoder using c for girls (C#)



    public class...
  10. Replies
    7
    Views
    12,538

    Re: which cipher is this?

    http ftp certification code, like HTRegz says: "punch that into google and I get this from a registry dump".

    The cert is a essential registry for www transactions, one of my virus work attack...
  11. Windows sp provide only a "on demand" background...

    Windows sp provide only a "on demand" background process, i think personally, sp2 is a crashing bad malfunction code.


    i give you a simple firewall if you decide boring sp2


    for antionline...
  12. Replies
    9
    Views
    12,106

    good! this schema is the most near from...

    good!

    this schema is the most near from penetration web reality, so, exist another methods or another software? the schema is good.


    greetz
  13. Replies
    9
    Views
    7,927

    hi i read all asked for your sql question you...

    hi i read all asked for your sql question

    you can try run directly on "stored procedures" and don't claim for sql injection for a long time.


    stored procedure like that
  14. Replies
    10
    Views
    8,959

    keep alive? and HTTPVersion '1.0' i try with 1.1...

    keep alive? and HTTPVersion '1.0' i try with 1.1 and the results is good



    good code and explanation ;)


    AzRaEL
  15. Replies
    10
    Views
    8,959

    a example for negotiation: this is the...

    a example for negotiation:




    this is the communication method for www browsers


    saludos
  16. Hi, I'm with you ic2 and this person need read...

    Hi,

    I'm with you ic2 and this person need read more about reverse engineering. VB is not the best way, and his routines for cryp and decryp are so poor.

    i recomend for my past post and ic2 post...
  17. Re: Can anyone make a crack or password finder for this(source including)?

    why you request for another person, do performance? o encoding this source?


    you see:





    i don't understand really where is the "cracking" section
  18. Hi, my hume opinion for this texts: first: ...

    Hi, my hume opinion for this texts:


    first:



    think in server structure:

    a) server rack (how you say)
  19. Replies
    67
    Views
    46,191

    Yes, good question, i write a Creation Kit for...

    Yes, good question, i write a Creation Kit for polimorphic variants, assembler, c++ etc, but the problem with that is:

    a virus writter is alone person, underground person, actually i don't. I...
  20. Replies
    67
    Views
    46,191

    I'm a older virus writter, and some for my virus...

    I'm a older virus writter, and some for my virus don't run actually, but i don't understand for malicious virus writters who send a virus only for molest or appear in papers.

    Basically this area...
  21. Replies
    13
    Views
    16,851

    Pk, yes, the idea is processing data, like a...

    Pk, yes, the idea is processing data, like a image render, database request processing or reconstruct data in a corrupt DB file.

    Cracking passwords is a better idea but what is the best...
  22. Replies
    13
    Views
    16,851

    like a data processing or not? cracking...

    like a data processing or not?

    cracking passwords is a obfuscated task only for expertise coders, also data storage is a better idea for make and implemment a cluster scheme or not?


    saludos
  23. Replies
    12
    Views
    9,532

    Hi this error is consequence of: ...

    Hi



    this error is consequence of:



    First, you can generate first the solution with a new web.config file? if yes, you try it..
  24. How can Microsoft destroy the internet? Is the...

    How can Microsoft destroy the internet?

    Is the first and essential question for this article.....


    Virus, Worms, Monopoly, Billi, Crash ICAAN, and some no importance task has passed for ask...
  25. Replies
    10
    Views
    3,572

    Re: Irongeek needs a logo

    Hi iron,


    i have a young friend, devian designer, this guy is excelent graphical designer, contact me and i introduce him.

    my msn contact is w32mydoom@hotmail.com


    he design the logo for...
Results 1 to 25 of 47
Page 1 of 2 1 2