Type: Posts; User: codelogman; Keyword(s):
Search took 0.01 seconds.
September 4th, 2006, 01:03 AM
I respect so much the work with slackware about www.remote-exploit.org in the tutorials section (http://remote-exploit.org/index.php/Tutorials). This simple man has understanding very good how the...
September 2nd, 2006, 02:50 PM
in agreement to nihil, the AV "industry" need food, need pay takes and employees.
where they i supose the "instant" worms appear?
the same AV enterprises free those codes on the net for make a...
August 31st, 2006, 10:06 AM
OK OK for not sound "like a spam" in my post i decide publish the code and a little explanation here:
Hello this a little MD5 functionally code in c++
August 31st, 2006, 06:51 AM
i still thinking about publish a tutorial called " Introduction to unsecure a Wireless Network".
the only secure pass protection can...
August 31st, 2006, 05:27 AM
i make a serious mistake trying to answer to this post, some users take that for "spam" my own web site, so, i found a "edit" button and erase the content.
thanks for the...
August 31st, 2006, 05:21 AM
Tonto, You can translate the DKEY2600 code published on my magazine and learn about that, i'm not able to "rewrite" the article here but you can read these article on:
August 31st, 2006, 05:17 AM
I has been published the MD5 code for fr33dom web page:
yo ca see that here:
and if you have question related about MD5 process or SHA polinterpolation...
August 28th, 2006, 10:21 AM
Hi, i try to understand how i perform my sybase sql server machine server-client side.
My idea is: develop for myself a database server and client structure program for understand how it works.
August 28th, 2006, 08:36 AM
No only java: perl, php (c for girls), c++, C# (c for girls), and all web bassed object languajes are capable for do that.
This is a basic encoder using c for girls (C#)
August 28th, 2006, 08:01 AM
http ftp certification code, like HTRegz says: "punch that into google and I get this from a registry dump".
The cert is a essential registry for www transactions, one of my virus work attack...
July 18th, 2006, 03:55 PM
Windows sp provide only a "on demand" background process, i think personally, sp2 is a crashing bad malfunction code.
i give you a simple firewall if you decide boring sp2
July 14th, 2006, 06:59 AM
this schema is the most near from penetration web reality, so, exist another methods or another software? the schema is good.
October 13th, 2005, 05:12 AM
hi i read all asked for your sql question
you can try run directly on "stored procedures" and don't claim for sql injection for a long time.
stored procedure like that
October 5th, 2005, 09:00 PM
keep alive? and HTTPVersion '1.0' i try with 1.1 and the results is good
good code and explanation ;)
October 5th, 2005, 01:25 AM
a example for negotiation:
this is the communication method for www browsers
October 2nd, 2005, 10:18 AM
I'm with you ic2 and this person need read more about reverse engineering. VB is not the best way, and his routines for cryp and decryp are so poor.
i recomend for my past post and ic2 post...
October 2nd, 2005, 09:54 AM
why you request for another person, do performance? o encoding this source?
i don't understand really where is the "cracking" section
October 1st, 2005, 09:22 AM
Hi, my hume opinion for this texts:
think in server structure:
a) server rack (how you say)
September 27th, 2005, 04:04 AM
Yes, good question, i write a Creation Kit for polimorphic variants, assembler, c++ etc, but the problem with that is:
a virus writter is alone person, underground person, actually i don't. I...
September 26th, 2005, 04:56 AM
I'm a older virus writter, and some for my virus don't run actually, but i don't understand for malicious virus writters who send a virus only for molest or appear in papers.
Basically this area...
September 26th, 2005, 04:19 AM
Pk, yes, the idea is processing data, like a image render, database request processing or reconstruct data in a corrupt DB file.
Cracking passwords is a better idea but what is the best...
September 24th, 2005, 08:38 AM
like a data processing or not?
cracking passwords is a obfuscated task only for expertise coders, also data storage is a better idea for make and implemment a cluster scheme or not?
September 14th, 2005, 06:58 AM
this error is consequence of:
First, you can generate first the solution with a new web.config file? if yes, you try it..
September 11th, 2005, 09:11 AM
How can Microsoft destroy the internet?
Is the first and essential question for this article.....
Virus, Worms, Monopoly, Billi, Crash ICAAN, and some no importance task has passed for ask...
August 3rd, 2005, 11:52 PM
i have a young friend, devian designer, this guy is excelent graphical designer, contact me and i introduce him.
my msn contact is email@example.com
he design the logo for...