? Skype has turned into a sad likeness and a product that allows you to get full access to your system? Is there any hope?

Sorry, boiling up! Today’s repeated incident of downloading 500+ MB of parasitic traffic in 15–20 minutes, which I did not order, was the final point when I seriously thought about demolishing the messenger, which I used almost from the very beginning of its creation and refuse to use it further. My entire limit of mobile LTE Internet access to 1 GB per day was successfully eaten by Skype, the operator limited the speed to 300 Kbps and you need to wait until the package is updated (you can’t pay and reorder before the deadline without changing the tariff, the 21st century is outside! ). But the ...
+ 0 -

Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a JavaScript botnet. Part 2

 
3r3-31. Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a jаvascript botnet. Part 1 3r33352.  
3r33352.  
This guy kept all the chats with those who are interested in the profile of this girl. This slide shows my favorite chat, kkbill1980 is the one who pretends to be a girl, and fiat176punt is his victim. “Kkbill1980: hello, sweetie! - fiat176punto: hello, my sweet mouse! ”, And so on, very cheerful chat. 3r33352.  
3r33352.  
Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a JavaScript botnet. Part 2 3r33352.  
3r33352.  
Further in the chat, they discuss ...
+ 0 -

As we hosting created

As we hosting createdI have long wanted to share our experience in creating a hosting company. And this day has come. The history of the main hosting project "N", which was created in 201? when it was 18 years old. Prior to this, there was experience with other hosting companies as a system administrator. With your partner, they came up with the names, twisted for a long time and came together on the name “N”, deciphered this Networking Engine (Network Engine). The names approved, then bought two servers FUJITSU, two unit, placed in DC, only in Dnepropetrovsk was then, and only built. Thought out the design of the ...
+ 0 -

We use free SSL certificates to protect Azure web sites

+ 0 -

These are the right bees: mechanical adaptation to dynamic effects

 3r33357. 3r3-31. These are the right bees: mechanical adaptation to dynamic effects 3r33333. 3r33337.  3r33357. 3r33337.  3r33357. 3r33333. The basis of the study [/b] 3r33337.  3r33357. 3r33337.  3r33357. At first glance, such a study seems a bit silly, because in essence it is the answer to the question “what would happen if you poke a stick at the hive?”. Well, firstly, this is not worth doing, as the bees are very touchy creatures (and stinging). Secondly, any living being, like any device, works according to a certain algorithm. In the case of bees, this algorithm is common to the entire swarm. From the point of view of mathematics, programming, and even the mechanics ...
+ 0 -

Facebook hacked: up to 90 million user accounts were attacked because of an error in the code, the company apologizes to

If you are logged out on Friday morning on Facebook - you are not alone.
 
 
Facebook suffered an attack, which was subjected to up to 90 million personal user accounts, the company said.
 
 
Facebook hacked: up to 90 million user accounts were attacked because of an error in the code, the company apologizes to  
 
Vulnerability in the social networking code allowed hackers to access at least 5? and possibly even 90 million users access to personal information through a gap in the "View as" function that allows you to view your own account as if you were someone else . Using this vulnerability, hackers managed to get tokens of access, providing security for users and then to penetrate into their accounts. ...
+ 0 -

Conference DEFCON 22. Adrian Crenshaw. What can "burn" users of TOR

Conference DEFCON 22. Adrian Crenshaw. What can "burn" users of TORHello, my name is Adrian Crenshaw. I'm a co-founder of Derbycon, the founder of Irongeek.com, interested in information security and working as a senior security consultant at Trusted Sec. I'll tell you how people place their original documents in Darknet and how it makes them easy to catch.
 
 
These are all well-known stories about people who used TOR or other anonymizers and were caught mainly due to neglect of OPSEC rules.
 
 
The story I assigned to number 0 is a bomb that was allegedly planted at Harvard University last year. One guy sent an e-mail to various departments of the university ...
+ 0 -

How did we kill ourselves in one click, placing the site and billing on the geocluster or once again we'll talk about the redundancy of

How did we kill ourselves in one click, placing the site and billing on the geocluster or once again we'll talk about the redundancy ofYes, I too am a moron. But this I did not expect from myself. It seems to be "not the first year married." It seems to be reading a bunch of smart articles on fault tolerance, redundancy, etc., something sensible once even wrote himself here. Over 10 years I am the CEO of the hosting provider working under the brand ua-hosting.company and providing hosting and server hosting services in the Netherlands, the US, and literally a week ago and in the UK (do not ask why the name ua, the answer can be found in our autobiographical article ...
+ 0 -

Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock

Cryptography, cipher machines, agencies, espionage things and yet behind it all stood and are ordinary, but unusual people. Who they are and how their fate has developed, why and for what purpose did they devote their lives to the difficult business of "cryptography".
 
 

Mavis Batey is a fearless burglar of the code


 
Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock  
The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? (options are available with RAID1 and RAID1? up to 24 cores and up to 40GB DDR4).
 
 
VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps ...[/h]
+ 0 -

Conference DEFCON 22. Andrew "Zoz" Brooks. Do not screw up! Part 1

So, our topic today is disobedience and disobedience. Disobedience is what makes hackers the way we are. Our lesson is to use things in such a way that they are not intended or that are not allowed. Sometimes the best way to show that some things can be done better is to break the rules. But there is a greater way - the violation of unjust laws.
 
 
Henry Thoreau wrote in his essay Civil Disobedience: "Unjust laws exist, whether we obediently obey them, or try to change them, while continuing to obey them, or violate them immediately"?
 
 
Conference DEFCON 22. Andrew "Zoz" Brooks. Do not screw up! Part 1 ...
+ 0 -