Type: Posts; User: codelogman; Keyword(s):
Search took 0.03 seconds.
September 4th, 2006 01:03 AM
I respect so much the work with slackware about www.remote-exploit.org in the tutorials section (http://remote-exploit.org/index.php/Tutorials). This simple man has understanding very good how the...
September 2nd, 2006 02:50 PM
in agreement to nihil, the AV "industry" need food, need pay takes and employees.
where they i supose the "instant" worms appear?
the same AV enterprises free those codes on the net for make a...
August 31st, 2006 10:06 AM
OK OK for not sound "like a spam" in my post i decide publish the code and a little explanation here:
Hello this a little MD5 functionally code in c++
August 31st, 2006 06:51 AM
i still thinking about publish a tutorial called " Introduction to unsecure a Wireless Network".
the only secure pass protection can...
August 31st, 2006 05:27 AM
i make a serious mistake trying to answer to this post, some users take that for "spam" my own web site, so, i found a "edit" button and erase the content.
thanks for the...
August 31st, 2006 05:21 AM
Tonto, You can translate the DKEY2600 code published on my magazine and learn about that, i'm not able to "rewrite" the article here but you can read these article on:
August 31st, 2006 05:17 AM
I has been published the MD5 code for fr33dom web page:
yo ca see that here:
and if you have question related about MD5 process or SHA polinterpolation...
August 28th, 2006 10:21 AM
Hi, i try to understand how i perform my sybase sql server machine server-client side.
My idea is: develop for myself a database server and client structure program for understand how it works.
August 28th, 2006 08:36 AM
No only java: perl, php (c for girls), c++, C# (c for girls), and all web bassed object languajes are capable for do that.
This is a basic encoder using c for girls (C#)
August 28th, 2006 08:01 AM
http ftp certification code, like HTRegz says: "punch that into google and I get this from a registry dump".
The cert is a essential registry for www transactions, one of my virus work attack...
Windows sp provide only a "on demand" background process, i think personally, sp2 is a crashing bad malfunction code.
i give you a simple firewall if you decide boring sp2
this schema is the most near from penetration web reality, so, exist another methods or another software? the schema is good.
October 13th, 2005 05:12 AM
hi i read all asked for your sql question
you can try run directly on "stored procedures" and don't claim for sql injection for a long time.
stored procedure like that
October 5th, 2005 09:00 PM
keep alive? and HTTPVersion '1.0' i try with 1.1 and the results is good
good code and explanation ;)
October 5th, 2005 01:25 AM
a example for negotiation:
this is the communication method for www browsers
October 2nd, 2005 10:18 AM
I'm with you ic2 and this person need read more about reverse engineering. VB is not the best way, and his routines for cryp and decryp are so poor.
i recomend for my past post and ic2 post...
October 2nd, 2005 09:54 AM
why you request for another person, do performance? o encoding this source?
i don't understand really where is the "cracking" section
October 1st, 2005 09:22 AM
Hi, my hume opinion for this texts:
think in server structure:
a) server rack (how you say)
September 27th, 2005 04:04 AM
Yes, good question, i write a Creation Kit for polimorphic variants, assembler, c++ etc, but the problem with that is:
a virus writter is alone person, underground person, actually i don't. I...
September 26th, 2005 04:56 AM
I'm a older virus writter, and some for my virus don't run actually, but i don't understand for malicious virus writters who send a virus only for molest or appear in papers.
Basically this area...
September 26th, 2005 04:19 AM
Pk, yes, the idea is processing data, like a image render, database request processing or reconstruct data in a corrupt DB file.
Cracking passwords is a better idea but what is the best...
September 24th, 2005 08:38 AM
like a data processing or not?
cracking passwords is a obfuscated task only for expertise coders, also data storage is a better idea for make and implemment a cluster scheme or not?
September 14th, 2005 06:58 AM
this error is consequence of:
First, you can generate first the solution with a new web.config file? if yes, you try it..
September 11th, 2005 09:11 AM
How can Microsoft destroy the internet?
Is the first and essential question for this article.....
Virus, Worms, Monopoly, Billi, Crash ICAAN, and some no importance task has passed for ask...
August 3rd, 2005 11:52 PM
i have a young friend, devian designer, this guy is excelent graphical designer, contact me and i introduce him.
my msn contact is email@example.com
he design the logo for...