Jump to content

Highis

LinkManiac
  • Posts

    272
  • Joined

  • Last visited

Posts posted by Highis

  1. ASRock isi va dezvalui cea mai noua placa de baza, bazata pe seria 7 de chipset-uri Intel, la Annual Global Tour 2012. Placa ofera suport pentru procesoarele Intel® Core i7 / i5 / i3 de a doua si a treia generatie. Cu tehnologia unica XFast 555 (XFast RAM, XFast LAN, XFast USB), placa de baza ASRock din seria 7, permite utilizatorilor sa experimenteze adevarata imbunatatire de performanta (de pana la 5 ori mai mare) din punct de vedere al vitezei generale, LAN si transfer-ului USB. ASRock si-a format o reputatie prin fabricarea de placi de baza fiabile, cu pret foarte competitiv. La Annual Global Tour 2012, ASRock isi va expune mult asteptatele placi avand la baza chipset-uri Intel din seria 7.

    asrock-logo.jpg

    Dati-mi 5! Tehonologie Exclusiv? XFast 555

    Pe langa dezvoltarea unor componente hardware de foarte buna calitate, ASRock are grija sa furnizeze unelte software prietenoase pentru utilizatori. Toate functiile inovatoare ale Tehnologiei XFast 555 nu sunt specialitati ale celor mai noi placi de baza, dar pot fi implementate pe toate seriile placilor de baz? ASRock.

    XFast RAM va crea un disc virtual din memoria RAM, pentru a spori performantele sistemului. In Photoshop, poate lucra de 5 ori mai rapid ca inainte. XFast LAN poate micsora latenta din jocuri, dupa setarea la un nivel mai ridicat a prioritatii de joaca in retea si dezvolta de 5 ori mai multa performanta. XFast USB este cea mai rapida tehnologie de transfer USB din lume si ofera de pana la 5 ori mai multa performanta in transferul de date.

    Lucid Virtu Universal MVP

    Placa de baza ASRock din seria 7 ofera suport pentru tehnologia Lucid Virtu Universal MVP, ce imbunatateste imagistica PC-ului, cu timpi de reactie mai buni, procesare video imbunatatita si redare media constanta. Conceput exclusiv pentru gaming, Virtu Universal MVP™ atribuie in mod dinamic sarcinile catre cea mai buna placa grafica.

    De altfel, sunt doua tehnologii noi introduse aici:

    - HyperFormance - combina grafica integrata si cea atasata, pentru performante fara compromis, cu castig de performanta de 90%!

    - Virtual Vsync - rezolva dezbaterea eterna dintre calitate si performanta. Aduce performanta GPU, de la 60FPS Vsync la maximum posibil, in timp ce mentine calitatea imaginii Vsync si evita ruperea texturilor.

    ASRock OMG (Online Management Guard)

    OMG este o tehnlogie unica dezvoltata de ASRock! Aceasta permite utilizatorului sa stabileasca o sesiune Internet sau sa restrictioneze accesul, in anumite momente. Astfel, administratorii pot programa inceputurile si sfarsiturile sesiunilor de Internet al utilizatorilor. In plus, este un utilitar gratuit, care poate fi folosit si pe un singur PC. Parintii pot controla usor accesul la Internet al copiilor, folosind setarile din BIOS.

    ASRock Internet Flash

    Internet Flash este o unealta foarte prietenoasa, care cauta versiunile noi de BIOS UEFI, pe serverele ASRock. Tehnologia poate detecta ultima aparitie a unui BIOS UEFI si-l poate scrie in placa de baza, fara a fi nevoie de pornirea sistemului de operare.

    Sursa

  2. apple-logo.jpg?width=320

    Apple debuteaz? miercuri pe bursa de la Bucure?ti. Ac?iunile celei mai mari companii din lume se vor tranzac?iona doar dou? ore pe zi.

    Ac?iunile a cinci dintre cele mai cunoscute companii americane vor fi tranzac?ionate începând de miercuri, 18 aprilie, ?i pe sistemul alternativ de tranzac?ionare (ATS) al Bursei de Valori Bucure?ti.

    "Vedetele" vor fi ac?iunile produc?torului de telefoane inteligente ?i tablete Apple, care vor fi ?i cele mai scumpe ac?iuni tranzac?ionate la Bucure?ti. Pre?ul unei ac?iuni Apple a atins mar?i un nou maxim istoric, s?rind de 640 de dolari, iar miercuri se tranzac?ionau în apropierea nivelului de 630 de dolari. La acest pre?, o ac?iune Apple ar fi cotat? la Bucure?ti la circa 2.100 de lei. Apple este în prezent cea mai valoroas? companie din lume, cu o capitalizare de aproape 600 de miliarde de dolari.

    Tot joi vor debuta pe burs? ?i ac?iunile Coca-Cola, Intel, Visa ?i Bank of America. Firma de brokeraj Tradeville va fi market-maker pentru cele cinci ac?iuni.

    Ac?iunile se vor tranzac?iona în intervalul orar 16:30-18:30, adic? doar în cele dou?ore cât programul bursei de la Bucure?ti se suprapune peste programul burselor americane.

    Sursa: aici

  3. Hardware

    Partea hardware pentru acest proiect e destul de simpla. Banda magnetica e citita folosind un cap magnetic de la un vechi mono casetofon si cateva componente pentru a amplifica semnalul in vederea citirii mai usoare. Acesta e conectat la mufa pentru microfon a PC-ului. Puterea pentru amplificator e de asemenea luata din inputul pentru microfon, notebook-ul meu outputeaza cam 3V acolo. Pentru mai multe detalii, uitate la schema amplificatorului de AICI

    Poza cu cititorul :

    21o29ax.jpg

    Software

    .

    Prima oara am incercat softurile de Aici si AICI , dar nicicare dintre acestea doua nu au fost prea stabile (pentru mine), asa ca m-am decis sa imi scriu propriul decoder. Inainte sa citesti mai departe iti recomand sa inveti despre cum sunt datele codate pe banda magnetica

    Decoderul meu incearca prima oara sa masoare latimea pulsului bitilor initiali, apoi foloseste acea marime ca referinta pentru decodarile urmatoare.

    Asta se face masurand grosimea tuturor pulsurilor urmatoare si comparandule cu ultimul puls cu grosimea zero. Daca doua grosimi sunt mai aproape de pulsul zero decat de primul puls, pulsurile sunt decodate ca 1. Altfel primul puls e interpretat ca 0. In final, pulsul zero este schimbat folosind un factor dat la ultimul puls masurat pentru a lucra cu viteze diferite de lovire.

    Exemplu

    Sa spunem ca decoderul detecteaza urmatoarele grosimi ale pulsurilor : 91, 101, 90, 55, 44, 51, 45, 98, 48, 49, 91, 101

    1) Prima grosime (91) este folosita ca pulsul zero ( sa-l numim zp)

    2) Apoi zp-ul este comparat cu urmatorul puls (101; |91-101| = 10) si suma urmatorilor 2 (101+90 = 191; |91-191| = 100)

    3) Dupa cum se poate vedea, grosimea e mai aproape de zp (10<100) deci pulsul e decodat ca 0

    4) In cele din urma valoarea lui zp este ajustata la noua grosime de puls folosind un factor definit f (am ales 0.2 aici, dupa cateva teste initiale)

    zp_nou = zp - ((zp - grosime) * f)
    
    zp_nou = 91-((91-101)*0.2)=93
    5) Urmatorul puls e decodat tot ca acesta, deci nu voi explica din nou.
    zp_nou = 93-((93-90)*0.2)=92 (rotunjit la cea mai mica valoare)
    6) Apoi zp e comparat cu urmatoarea grosime (55; |92-55|=37) si suma urmatoarelor doua (55+44=99; |92-99|=7) 7) Acum suma urmatoarelor doua pulsuri e mai aproape de zp (7<37) deci cele doua pulsuri sunt decodate ca 1 8)
     zp_nou=92-((92-(55+44))*0.2)=93
    9) Acum totul continua ca inainte exceptand faptul ca trebuie sa folosesti 51 si 45 in loc de 44 si 51 (trebuie sa avansezi cu 2 numere in vector). Folosire Trebuie sa ai sox pentru a functiona. Decodeaza un fisier .wav inregistrat - track 1
    sox fisier.wav -r 48000 -t dat -q - | ./bifaze.pl 1
    Decodeaza un fisier live - track 2
     sox rec -r 48000 -t dat -q - | ./bifaze.pl 2
    Sursa decoderului meu - bifaze.pl
    #!/usr/bin/perl -w
    
    
    # Written by Hertz <ownage [dot] hertz [at] gmail.com>
    
    
    use strict;
    
    
    my $track = 2;
    
    $track = 1 if((scalar(@ARGV) == 1) && ($ARGV[0] eq '1'));
    
    
    my $threshold_1 = 0.2;
    
    my $maxlen_1 = 150;
    
    my $adoptrate_1 = 0.2;
    
    my $smalldiff_1 = 0.1;
    
    
    my $threshold_2 = 0.2;
    
    my $maxlen_2 = 350;
    
    my $adoptrate_2 = 0.2;
    
    my $smalldiff_2 = 0.1;
    
    
    my $dbg_lens = 0;
    
    my $dbg_dec = 0;
    
    
    ###############################################################################
    
    
    my $chars_1 = ' !"#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_';
    
    my $charlen_1 = 6;
    
    
    my $chars_2 = '0123456789:;<=>?';
    
    my $charlen_2 = 4;
    
    
    ###############################################################################
    
    
    $| = 1;
    
    
    my $threshold = $threshold_1;
    
    my $maxlen = $maxlen_1;
    
    my $adoptrate = $adoptrate_1;
    
    my $smalldiff = $smalldiff_1;
    
    my $chars = $chars_1;
    
    my $charlen = $charlen_1;
    
    
    if($track == 2) {
    
      $threshold = $threshold_2;
    
      $maxlen = $maxlen_2;
    
      $adoptrate = $adoptrate_2;
    
      $smalldiff = $smalldiff_2;
    
      $chars = $chars_2;
    
      $charlen = $charlen_2;
    
    }
    
    
    my $slope = 1;
    
    my $old = 0;
    
    my $data = 0;
    
    my $olddata = 0;
    
    my $init = 1;
    
    my $mode = 0;
    
    my $count = 0;
    
    my $len = 0;
    
    my $curlen = 0;
    
    my $oldlen = 0;
    
    my $bitmode = 0;
    
    my $chk = 0;
    
    my $complete = 1;
    
    
    my $celllen = 0;
    
    my $str = '';
    
    
    sub parity_ok
    
    {
    
      my $charlen = shift;
    
      my $c = shift;
    
    
      my $one = 0;
    
      for(my $j = $charlen - 1;$j >= 0;$j--) {
    
        $one++ if(substr($c, $j, 1) eq '1');
    
      }
    
      $one++ if(substr($c, $charlen, 1) eq '1');
    
    
      return ($one % 2) == 1;
    
    }
    
    
    sub xtract_char
    
    {
    
      my $charlen = shift;
    
      my $c = shift;
    
    
      my $x = 0;
    
      for(my $j = $charlen - 1;$j >= 0;$j--) {
    
        $x <<= 1;
    
        $x |= 1 if(substr($c, $j, 1) eq '1');
    
      }
    
    
      return $x;
    
    }
    
    
    sub decode_char
    
    {
    
      my $charlen = shift;
    
      my $chars = shift;
    
      my $str = shift;
    
    
      return ('x', 0) if(!parity_ok($charlen, $str));
    
    
      my $x = xtract_char($charlen, $str);
    
    
      return ('y', 0) if($x >= length($chars));
    
    
      return (substr($chars, $x, 1), $x);
    
    }
    
    
    while(<STDIN>) {
    
      chop;
    
      next if(/^;/);
    
      next unless(/([+-]?(?:\d+(?:\.\d*)?|\.\d+)(?:[eE][+-]?\d+)?) +([+-]?(?:\d+(?:\.\d*)?|\.\d+)(?:[eE][+-]?\d+)?)/);
    
    
      my ($t, $y) = ($1, $2);
    
    
      my $s = $slope;
    
      if($y > $threshold) {
    
        $s = 1;
    
      } elsif($y < (-1 * $threshold)) {
    
        $s = -1;
    
      }
    
    
      if($slope != $s) {
    
        $slope = $s;
    
        if($data) {
    
          $data = 0;
    
        } else {
    
          $data = 1;
    
        }
    
      }
    
    
      if($init) {
    
        $len = 0;
    
        $olddata = $data;
    
        $init = 0;
    
        $mode = 0;
    
        $bitmode = 0;
    
      } else {
    
        my $lenchange = 0;
    
        my $gotbit = 0;
    
    
        if($len > $maxlen) {
    
          $mode = 0;
    
          $bitmode = 0;
    
          $init = 1;
    
          if(!$complete) {
    
            print " TIMEOUT\n";
    
            $complete = 1;
    
          }
    
        } else {
    
          if($olddata != $data) {
    
            print "$len\n" if($dbg_lens);
    
            $oldlen = $len;
    
            $curlen = $len;
    
            $len = 0;
    
            $lenchange = 1;
    
          } else {
    
            $len++;
    
          }
    
        }
    
    
        if($lenchange) {
    
          if($mode == 0) {
    
            $count = 3;
    
            $mode++;
    
          } elsif($mode == 1) {
    
            if($count <= 0) {
    
              $str = '';
    
              $mode++;
    
            } else {
    
              $count--;
    
            }
    
          } elsif($mode == 2) {
    
            my $c = $oldlen;
    
            my $n = $curlen;
    
    
            my $d0 = abs($celllen - $c);
    
            my $d1 = abs($celllen - ($c + $n));
    
    
            my $d = 0;
    
    
            print abs($d0 - $d1) . " " . ($celllen * $smalldiff) . "\n" if($dbg_dec);
    
            if(abs($d0 - $d1) > ($celllen * $smalldiff)) {
    
              if($d0 < $d1) {
    
                $d = 0;
    
              } else {
    
                $d = 1;
    
              }
    
            } else {
    
              $d = 1;
    
            }
    
    
            $str .= $d;
    
            $gotbit = 1;
    
            print "$c $n $d0 $d1 $celllen $d\n" if($dbg_dec);
    
            if($d == 0) {
    
              $celllen -= int(($celllen - $c) * $adoptrate);
    
            } else {
    
              $celllen -= int(($celllen - ($c + $n)) * $adoptrate);
    
              $mode++
    
            }
    
            print "-> $celllen\n" if($dbg_dec);
    
          } elsif($mode == 3) {
    
            $mode--;
    
          }
    
        }
    
    
        if($gotbit) {
    
          if($bitmode == 0) {
    
            $complete = 0;
    
            if($str eq '1') {
    
              $bitmode++;
    
              $chk = 0;
    
            } else {
    
              $str = '';
    
            }
    
          } elsif($bitmode == 1) {
    
            if(length($str) >= ($charlen + 1)) {
    
              my $c = substr($str, 0, $charlen + 1);
    
              $str = substr($str, $charlen + 1);
    
    
              print "p" if(!parity_ok($charlen, $c));
    
    
              my ($ch, $x) = decode_char($charlen, $chars, $c);
    
              $chk ^= $x;
    
              print "$ch";
    
    
              $bitmode++ if($ch eq '?');
    
            }
    
          } elsif($bitmode == 2) {
    
            if(length($str) >= ($charlen + 1)) {
    
              my $c = substr($str, 0, $charlen + 1);
    
              $str = substr($str, $charlen + 1);
    
    
              print "p" if(!parity_ok($charlen, $c));
    
    
              my ($ch, $x) = decode_char($charlen, $chars, $c);
    
              $chk ^= $x;
    
    
              if($chk) {
    
                print " ERROR\n";
    
              } else {
    
                print " OK\n";
    
              }
    
              $complete = 1;
    
    
              $bitmode = 0;
    
            }
    
          }
    
        }
    
      }
    
    
      $olddata = $data;
    
      $old = $y;

    }

  4. Sper sa nu fiu sanctionat pentru double post .

    Continui cu cateva ghiduri interesante

    Parent Directory/ - Directory

    C++.rar 7.4K application/octet-stream

    Carte C++ in romana.rar 45.2K application/octet-stream

    Carte JAVA in romana.rar 176.2K application/octet-stream

    Carte MySQL Romana.rar 1.6M application/octet-stream

    Carte PHP Romana.rar 492.1K application/octet-stream

    Curs Java.rar 6.4M application/octet-stream

    HTML-_avansati_si_incepatori.rar 272.9K application/octet-stream

    Introducere in PHP.rar 324.9K application/octet-stream

    Lucrare JavaScript.rar 1.4M application/octet-stream

    Manual de programare C.rar 129.2K application/octet-stream

    Pascal.rar 884.9K application/octet-stream

    Programare Visual C++.rar 321.4K application/octet-stream

    Tutorial CSS [ Romana ].rar 8.9K application/octet-stream

    Tutorial PHP [ Romana ].rar 14.0K application/octet-stream

    Tutorial_HTML.rar 118.2K application/octet-stream

    XHTML__romaneste_.rar 73.2K application/octet-stream

    Parent Directory/ - Directory

    1_Principles of Programming Languages/ 2011-Dec-21 08:39:17 - Directory

    2_Theory of Computation/ 2011-Dec-21 08:39:36 - Directory

    3_Digital Signal Processing/ 2011-Dec-21 08:11:11 - Directory

    3_Graph Theory/ 2011-Dec-21 08:42:20 - Directory

    4_Compiler Design/ 2011-Dec-21 08:46:04 - Directory

    4_Hack/ 2011-Dec-21 08:22:52 - Directory

    4_Software Engineering/ 2011-Dec-21 04:37:24 - Directory

    5_Discrete Mathematics/ 2011-Dec-21 08:52:07 - Directory

    5_Operating Systems/ 2011-Dec-21 04:52:00 - Directory

    6_Multicore Programming/ 2011-Dec-21 09:02:10 - Directory

    7_Technical Papers/ 2011-Dec-21 09:03:04 - Directory

    7_Web Programming/ 2011-Dec-21 08:26:29 - Directory

    8_Design/ 2011-Dec-21 09:06:36 - Directory

    8_Misc/ 2011-Dec-21 08:32:54 - Directory

    Algorithms/ 2011-Dec-21 04:11:50 - Directory

    Android/ 2011-Dec-20 16:37:54 - Directory

    Apache guide, HTML, XHTML, JavaScript, XML Books/ 2011-Dec-20 00:44:24 - Directory

    Assembly/ 2011-Dec-21 04:11:38 - Directory

    C Sharp and .NET/ 2011-Dec-21 03:44:40 - Directory

    C\C++/ 2011-Dec-21 03:34:45 - Directory

    Computer Architecture/ 2011-Dec-21 04:35:55 - Directory

    Computer Security Enthusiast/ 2011-Dec-21 03:30:47 - Directory

    Cryptography/ 2011-Dec-20 02:45:53 - Directory

    DOCUMENTATION ON BODY LANGUAGE/ 2011-Dec-20 05:39:32 - Directory

    Electronica Digitala/ 2011-Dec-20 12:50:39 - Directory

    Electronics/ 2011-Dec-20 06:57:43 - Directory

    Game Dev/ 2011-Dec-20 21:53:13 - Directory

    Haskell/ 2011-Dec-21 03:48:50 - Directory

    Haskell Collection/ 2011-Dec-20 06:59:02 - Directory

    IPV6 IPV6 Ebooks Collection/ 2011-Dec-21 00:44:53 - Directory

    Introduction to Algorithms/ 2011-Dec-20 06:59:35 - Directory

    Java/ 2011-Dec-20 21:46:36 - Directory

    Linux/ 2011-Dec-20 16:37:59 - Directory

    Lisp/ 2011-Dec-21 03:49:43 - Directory

    Network/ 2011-Dec-21 08:06:26 - Directory

    New/ 2012-Apr-09 00:35:46 - Directory

    Objective-C/ 2011-Dec-21 03:50:57 - Directory

    Other/ 2011-Dec-21 09:06:45 - Directory

    Over 90 Professional Photoshop Tutorials – eBooks/ 2011-Dec-21 00:50:13 - Directory

    PHP/ 2011-Dec-20 15:30:43 - Directory

    Reverse Engineering/ 2011-Dec-20 10:36:51 - Directory

    Scripting/ 2011-Dec-21 03:55:27 - Directory

    Sex Ebooks/ 2011-Dec-20 21:50:06 - Directory

    Total Training For Website Design - Extreme Website/ 2011-Dec-20 20:18:46 - Directory

    VideoAndImage/ 2011-Dec-20 12:50:57 - Directory

    Windows Programming/ 2011-Dec-21 04:01:46 - Directory

    About.txt 2011-Dec-21 09:25:43 0.1K text/plain

    Download

  5. In primul rand vreau sa-mi cer scuze pentru inevitabilele greseli de ortografie deoarece sunt multe subiecte

    pe care vreau sa le acopar in acest articol si nu am timp sa mai si verific ce am scris deja.

    PARTEA I. Algoritmul de codare "yahoo64"

    Acest algoritm este folosit de Yahoo oriunde trebuie transformat un sir de caractere neprintabile intr-un

    sir de caractere printabil.

    Se numeste "codare" si nu "criptare" deoarece nu ofera absolut nici o protectie pentru sirul de caractere de

    codat. Fara a intra in aspecte criptografice trebuie metionat ca yahoo64 este foarte asemanator cu base64

    insa are un charset extins.

    Charsetul yahoo64 este urmatorul "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw xyz0123456789._"

    yahoo64 are cateva caracteristici distincte care trebuie mentionate:

    > toate caracterele din stringul codat fac parte din charsetul de mai sus

    > lungimea stringului este multiplu de 4

    > in functie de lungimea stringului initial, la sfarsitul stringului criptat ultimele caractere pot fi "-"

    sau "--".

    Pentru mai multe detalii studiati cele doua functii php(pentru codare si decodare) de la sfarsitul acestui

    articol.

    PARTEA II. Analiza tokenului Yahoo

    Din cate am observat pana acum tokenul Yahoo este o insumare a userului si parolei de Yahoo, unic pentru

    fiecare username in parte dar care se modifica (doar partial) la schimbarea parolei.

    In esenta posesia acest token exprima ca posesorul este fie userul fie o entitate care are permisiunea

    userului de a actiona in numele acestuia pe serverele Yahoo.

    Un user isi poate obtine acest token prin accesarea linkului urmator:

    https://login.yahoo.com/config/pwtok...c=ymsgr&login=[USERNAME]&passwd=[PASSWORD]
    
    
    unde [USERNAME] si [PASSWORD] sunt o combinatie username/parola Yahoo VALIDE.
    
    
    Utilitatea acestui token este ca poate oferi oricand un COOKIE valid de Yahoo.
    https://login.yahoo.com/config/pwtok...c=ymsgr&token=[TOKEN]
    Un exemplu de raspuns la un reqest catre "https://login.yahoo.com/config/pwtoken_get" poate fi acesta:
    0
    
    ymsgr=AGG6e0diD9m.3D4YlFPVcdBT1wFXKSBWP0Hl.gyQKd.qec8-
    
    partnerid=KSBWP0Hl.gyQKd.qec8-
    "ymsgr" este tokenul despre care am vorbit mai devreme si dupa cum se observa "partnerid" face parte din acest token (la sfarsit). Acest "partnerid" este unic pentru fiecare utilizator in parte si nu se modifica la schimbarea parolei, iar lungimea acestuia variaza in functie de lungimea username'ului. Dupa cum se poate observa lungimea tokenului este de 48 si se termina cu un "-" deci este evindent codat cu yahoo64. Dupa decodare obtinem urmatorul sir de caractere (unde fiecare 2 caractere reprezinta valoarea hexadecimala a unui singur caracter din tokenul decodat):
    
    00 61 BA 7B 47 62 0F D9 BE DC 3E 18 94 53 D5 71 D0 53 D7 01 57 29 20 56 3F 41 E5 FA 0C 90 29 DF AA 79 CF
    La toate tokenurile pe care le-am vazut pana acum primul caracter este intotdeauna "0x00" Urmatoarele 4 caractere reprezinta timestampul (numarul de secunde care au trecut din 1-1-1970) la care userul a fost creeat sau cand parola a fost schimbata, doar ca timestampul este inversat deci pentru exemplul de mai sus timestampul va fi 0x477BBA61 (decimal 1199290977) adica "Wed, 2 Jan 2008 16:22:57 GMT" Daca decodam "partnerid" vom obtine urmatorul string:
    29 20 56 3F 41 E5 FA 0C 90 29 DF AA 79 CF
    care dupa cum sa observa sunt ultimele 14 caractere de la sfarsitul tokenului. Daca din token eliminam primul caracter (00) timestampul (61 BA 7B 47) si parnerid'ul decodat vom ramane cu
    62 0F D9 BE DC 3E 18 94 53 D5 71 D0 53 D7 01 57
    Acest string rezultat are o lungime de 16 caractere ceea ce duce la concluzia ca este un hash MD5 (md5() produce un hash de 128 de biti adica 16 caractere intre 0x00 si 0xFF, a nu se confunda cu md5_he) care produce un string de 32 de caractere reprezentand valorile hexadecimale ale celor 16 caractere produse de md5() ) La schimbarea parolei se modifica doar timestampul si acest hash MD5 ceea ce ma face sa cred ca din stringul initial (care produce hashul) face parte fie timestampul fie parola fie ambele. Trebuie sa mentionez pentru cei care vor face teste ca acest token trebuie pastrat SECRET deoarece dupa cum am spus si mai sus cunoasterea tokenului poate duce la compromiterea contului (parola NU trebuie sa fie cunoscuta pentru a obtine un set de cookiuri) PARTEA III. Yahoo! Messenger "Remember my ID & password" Incepand cu versiunea 7.x.x.x Yahoo! Messnger NU mai memoreaza parola atunci cand optiunea "Remember my ID & password" este bifata. In schimb este memorat tokenul despre care am vorbit mai sus deoarece dupa cum o sa arat mai tarziu tokenul este suficient pentru logarea cu succes la serviciul messenger. Pentru memorare tokenul este criptat si stocat in registrii windows in cheia
    HKEY_CURRENT_USER\Software\Yahoo\Pager\ETS
    Userul este de asemenea salvat deoarece este necesar pentru decriptare
    
    HKEY_CURRENT_USER\Software\Yahoo\Pager\Yahoo! User ID
    Nu voi da un exemplu de astfel de string deoarece desi algoritmul de criptare imi este deocamdata necunoscut poate fi totusi decriptat si extras un token folosind functii din "YahooMessenger.exe". Analiza pe care am facut-o unui string ETS este destul de sumara: tokenul este criptat folosind o cheie formata din "MBCS sucks"+USERNAME. Stringul rezultat fiind apoi codat cu yahoo64 si stocat in registrii la cheia ETS. Pentru crackeri decriptarea se face in "YahooMessenger.exe" (8.1.0.421) la offsetul 0x004862AA unde functia locala de la offsetul 0x006FCEC0 primeste urmatorii 9 parametrii 1. Stringul ETS 2. Lungimea stringului ETS 3. Pointer catre tokenul decriptat 4. Pointer catre lungimea tokenului 5. Cheia de decriptare "MBCS sucks[uSERNAME]" 6. Lungimea cheii de decriptare 7. 0x00 8. 0x00 9. 0x00 PARTEA IV. Autentificarea YMSGR v15 In continuare voi presupune ca sunteti deja familiarizati cu protocolul Yahoo! Messenger(formarea pachetelor si parametrii unui pachet) Este de mentionat ca din motive de compatibilitate YMSGR15 accepta si logarea clasica user/password dar mult mai important este ca Yahoo! Messnger foloseste si logarea cu COOKIE. Pentru o logare cu succes Yahoo! Messnger face urmatorii pasi: -Daca optiunea "Remember my ID & password" este bifata decripteaza stringul ETS si obtine un token, daca nu va folosi userul si parola introduse pentru a face un request la "https://login.yahoo.com/config/pwtoken_get" pentru a obtine tokenul -Dupa conectarea la unul din serverele yahoo trimite un pachet VERIFY (0x4C) -Daca primeste un raspuns valid VERIFY de la server incepe procedura de autentificare -Trimite un pachet AUTH (0x57) cu parametrii: "1" - USERNAME -Primeste un pachet AUTHRESP (0x54) din care extrage valoarea parametrului "94" (CHALLENGE) -Avand un token valid al userului va face un request catre "https://login.yahoo.com/config/pwtoken_login" pentru a obtine valorile "Y" si "T" ale cookieului precum si valorea "crumb" (CRUMB) -Creeaza un string (STRING307) astfel yahoo64(md5(CRUMB+CHALLENGE)) -Trimite un pachet AUTHRESP (0x54) cu parametrii: "277" - parametrul Y "278" - parametrul T "307" - STRING307 "0" - USERNAME "2" - USRNAME "2" - "1" "1" - USERNAME "244" - un numar random (ex. "2097087") "98" - "us" "135" - versiunea clientului (ex. "8.1.0.421") "148" - "-120" -Daca totul e in regula userul este autentificat iar serverul trimite buddy listul si alte informatii cum ar mailuri noi, add buddy request etc. PARTEA V. Analiza si explicatia cookiurilor Yahoo Odata cu autentificarea la un serviciu Yahoo userul primeste cookiurile "Y" si "T" deci analiza mea a fost concentrata doar asupra acestor 2 cookiuri. Cookieul Y poate fi configurat sa expire dupa o valoare intre 15 minute si 24 de ore dar cookieul T expira de obicei la inchiderea browserului sau la logout. Pentru serviciile cu securitate scazuta cum ar fi pagina "My Yahoo" cookiul Y este suficient dar pentru cele mai importante cum ar fi mail,calendar etc.. cookieul T este obligatoriu. Dupa cum probabil ati observat un cookie Yahoo este format din perechi "parametru=valoare". In continuare voi analiza parametrii care formeaza fiecare cookie si voi incercat sa prezent o explicatie pentru prezenta sau scopul lor. -Cookieul Y: Exemplu:
    Y=v=1&n=9mioklmar8tku&l=glagla/o&p=m2509oh012000000&r=in&lg=en-US&intl=us&np=1
    Contine usernameul,un ID unic si cateva informatii demografice. De obicei acesta ramane neschimbat pentru un anumit user modificandu-se doar ID'ul unic (la schimbarea parolei) si informatiile demografice (la schimbarea adresei, limba utilizata, etc...) Dupa cum se observa este format din parametrii v,n,l,p,r,lg,intl si np dar nu toti sunt necesari pentru autentificarea cu succes al unui user. Parametrul "n" este un ID unic intern al utilizatorului (se modifica doar la schimbarea parolei) care este comparat cu o valoare interna yahoo la anumite requesturi pentru obtinerea de informatii sau pentru expirarea automata a tuturor cookiurilor vechi odata cu schimbarea parolei. Parametrul "l" este usernameul codat cu un algoritm simplu de substitutie unde fiecare caracter din user are un corespondent intr-un alt string dupa cum urmeaza:
    PLAINTXT=klmnopqrstuvwxyz0123457896abcdefghij._
    
    ENCODED=abcdefghijklmnopqrstuvxyzw0123456789._
    Astfel pentru cookiul de mai sus username'ul este "qvkqvk" Parametrul "p" contine diverse informatii despre utilizator cum ar fi sex, data nasterii, tara, etc. Restul parametrilor contin de asemenea diverse informatii despre limba, anumite setari, etc. -Cookieul T: Exemplu:
    T=z=Cr7eHBCxQfHBJkF/Bqb4dnUMzIwBjVPNDQzNDFOME8-&a=QAE&sk=DAAk3Lb2EiyEEM&ks=EAA3i37q0zwFhuCnF6cflaKHg--~A&d=c2wBTkRVM0FUSTRNek0wTXpZNU56Zy0BYQFRQUUBenoBQ3I3ZUhCZ1dBAXRpcAFzNkpUZEM-
    Contine un timestamp si o semnatura digitala simetrica. Acesta se modifica la modificarea timpului(oricate cookiuri generate intr-o singura secunda sunt identice) Este format din parametrii z,a,sk,ks si d dar pentru autentificare la serviciile web sunt necesari doar parametrii sk,ks si d. Pentru autentificare Yahoo! Messenger "z" este insa obligatoriu. Parametrul "z" exista pentru compatibilitate cu servicii mai vechi dar este de asemenea in stransa legatura cu valoarea CRUMB obtinuta pentru autentificarea Yahoo! Messenger. Acesta este un string criptat cu yahoo64 dar decodarea acestuia nu prezinta nici o informatie evidenta) Parametrul "a" (de obicei are valoarea "QAE") contine diverse flaguri pentru expirare si protectia minorilor. Parametrul "sk" reprezinta sesiunea (session key) si este calculat din username, ID unic si timestamp precum si dintr-un string cunoscut doar pe serverele Yahoo (Yahoo shared secret) Parametrul "ks" reprezinta (din observatiile mele) un hash al parolei utilizatorului sau un alt string care inlocuieste parola deoarece lipsa acestui este urmata de obligatia introducerii parolei(pe serverele web Yahoo). Daca ignoram primele 3 caractere care nu se schimba ("DAA") si ultimele 2 caractere care de asemenea nu se schimba ("~A") obtinem un string codat yahoo64 reprezentand cel mai probabil un hash MD5 (stringul decodat are 16 caractere) cel mai probabil de asemenea generat folosind un shared secret. Parametrul "d" contine sesiunea utilizatorului si cateva informatii pentru compatibilitate. Acesta este un string codat yahoo64. Dupa decodarea valorii "d" din exemplul de mai sus obtinem urmatorul string: (unde [sEP] este caracterul hexadecimal 0x01)
    sl[SEP]NDU3ATI4MzM0MzY5Nzg-[SEP]a[SEP]QAE[SEP]zz[SEP]Cr7eHBgWA[SEP]tip[SEP]s6JTdC
    Se poate observa ca acest string este de asemenea o insiruire de perechi "parametru=valoare" astfel:
    sl=NDU3ATI4MzM0MzY5Nzg-&a=QAE&zz=Cr7eHBgWA&tip=s6JTdC
    Valoarea parametrului "sl" este de asemenea un string criptat yahoo64:
    457[SEP]2833436978 (sau 457=2833436978)
    Acest numar este unic pentru fiecare username si nu se modifica la schimbarea parolei Parametrul "a" este acelasi cu parametrul "a" din cookiul "T" Parametrul "zz" reprezinta in esenta un contor de timp. Valorile pe care le poate lua un caracter facand parte din charsetul yahoo64 cu singura diferenta ca "_" este inlocuit de "/". Cea mai buna analogie pe care o pot face incercand sa explic acest parametru este aceea cu un kilometraj de masina, Adica fiecare caracter(de la stanga la dreapta) poate fi asemanata cu o rotita cu valorile din charset. atunci cand primul caracter termina o rotatie completa prin toate pozitiile, al doilea caracter creste cu o pozitie continuand in aclasi mod pana la al 6-lea caracter. Stiind ca primul caracter creste cu o pozitie pe secunda se poate afla timestampul la care un anumit cookie a fost generat. (cand userul s-a logat serviciul respectiv) Parametrul "tip" este acelasi pentru toti utilizatorii Yahoo dar se schimba periodic (nu stiu intervalul exact) Cam atat cu acest articol si felicitari pentru cei care au avut rabdarea sa-l citeasca pana la capat. Astept pareri sau adaugiri cu privire la aceste subiecte. Algoritmul de codare yahoo64:
    <?php
    
    //yahoo64 encode/decode functions by SlicK [slick@rstcenter.com]
    
    
    function yahoo64_encode($source)
    
    {
    
      $yahoo64="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._";
    
      $limit=strlen($source)-(strlen($source)%3);
    
      $dest="";
    
      for($i=0;$i<$limit;$i+=3)
    
      {
    
        $dest.=$yahoo64[ord($source[$i])>>2];
    
        $dest.=$yahoo64[((ord($source[$i])<<4)&0x30) | (ord($source[$i+1])>>4)];
    
        $dest.=$yahoo64[((ord($source[$i+1])<<2)&0x3C) | (ord($source[$i+2])>>6)];
    
        $dest.=$yahoo64[ord($source[$i+2])&0x3F];
    
      }
    
    
      switch(strlen($source)-$limit)
    
      {
    
        case 1:
    
        {
    
          $dest.=$yahoo64[ord($source[$i])>>2];
    
          $dest.=$yahoo64[(ord($source[$i])<<4)&0x30];
    
          $dest.='--';
    
        } break;
    
    
        case 2:
    
        {
    
          $dest.=$yahoo64[ord($source[$i])>>2];
    
          $dest.=$yahoo64[((ord($source[$i])<<4)&0x30) | (ord($source[$i+1])>>4)];
    
          $dest.=$yahoo64[((ord($source[$i+1])<<2)&0x3c)];
    
          $dest.='-';
    
        } break;
    
      }
    
      return($dest);
    
    }
    
    
    function Index($string,$chr)
    
    {
    
      for($i=0;$i<64;$i++) { if($string[$i]==$chr) { return($i); } } return(-1);
    
    }
    
    
    function yahoo64_decode($source)
    
    {
    
      $yahoo64="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._";
    
      $len=strlen($source);
    
      if($source[$len-1]=='-') { $plus=2; }
    
      if($source[$len-2]=='-') { $plus=1; }
    
      if($plus>0) { $len-=4; };
    
    
      $dest="";
    
      for($i=0;$i<$len;$i+=4)
    
      {
    
        $chr1=Index($yahoo64,$source[$i]);
    
        $chr2=Index($yahoo64,$source[$i+1]);
    
        $chr3=Index($yahoo64,$source[$i+2]);
    
        $chr4=Index($yahoo64,$source[$i+3]);
    
        $dest.=chr(($chr1<<2)|($chr2>>4));
    
        $dest.=chr((($chr2&0xF)<<4)|($chr3>>2));
    
        $dest.=chr((($chr3&0x3)<<6)|($chr4&0x3F));
    
      }
    
      switch($plus)
    
      {
    
        case 1:
    
        {
    
          $chr1=Index($yahoo64,$source[$i]);
    
          $chr2=Index($yahoo64,$source[$i+1]);
    
          $dest.=chr(($chr1<<2)|($chr2>>4));
    
        } break;
    
    
        case 2:
    
        {
    
          $chr1=Index($yahoo64,$source[$i]);
    
          $chr2=Index($yahoo64,$source[$i+1]);
    
          $chr3=Index($yahoo64,$source[$i+2]);
    
          $dest.=chr(($chr1<<2)|($chr2>>4));
    
          $dest.=chr((($chr2&0xF)<<4)|($chr3>>2));
    
        } break;
    
      }
    
      return($dest);
    
    }
    
    
    //usage example
    
    
    $string="any string";
    
    print("Original string=$string
    
    \n");
    
    
    $encoded=yahoo64_encode($string);
    
    print("Encoded string=$encoded
    
    \n");
    
    
    $decoded=yahoo64_decode($encoded);
    
    print("Decoded string=$decoded
    
    \n");
    
    ?>
    
    
    

  6. Carti, cursuri, tutoriale...

    Aplicatii_de_retea_in_internet.doc

    Size: 478 KB

    http://rapidshare.com/files/183113482/Aplicatii_de_retea_in_
    
    internet.doc
    Arhitectura_Calculatoarelor.rar Size: 3528 KB
    
    http://rapidshare.com/files/183113929/Arhitectura_Calculatoarelor.rar
    
    Arhitecturi_de_Retea.doc
    Size: 1416 KB
    http://rapidshare.com/files/183114236/Arhitecturi_de_Retea.doc
    
    Aspecte_de_securitate__n_retele_de_calculatoare.doc
    Size: 168 KB
    http://rapidshare.com/files/183114379/Aspecte_de_securitate__n_retele_de_calculatoare.doc
    
    AutoCad.doc
    Size: 219 KB
    http://rapidshare.com/files/185415598/AutoCad.doc
    
    Automatica.rar
    Size: 2208 KB
    http://rapidshare.com/files/185416057/Automatica.rar
    
    Capitolul_5_-_Criptografie.pdf
    Size: 302 KB
    http://rapidshare.com/files/185416740/Capitolul_5_-_Criptografie.pdf
    
    Cibernetica.rar
    Size: 1037 KB
    http://rapidshare.com/files/185417228/Cibernetica.rar
    
    Cine_sau_ce_este_root.doc
    Size: 37 KB
    
    http://rapidshare.com/files/185417437/Cine_sau_ce_este_root.doc
    
    Codul_hackerului.doc
    Size: 41 KB
    http://rapidshare.com/files/185419116/Codul_hackerului.doc
    
    Compresie_Video.doc
    Size: 247 KB
    http://rapidshare.com/files/185424068/Compresie_Video.doc
    
    Configurare_Bios_.doc
    Size: 64 KB
    http://rapidshare.com/files/185424247/Configurare_Bios_.doc
    
    Configurarea_unei_retele.pdf
    Size: 797 KB
    http://rapidshare.com/files/185424582/Configurarea_unei_retele.pdf
    
    Curs_ECDL.rar
    Size: 11937 KB
    http://rapidshare.com/files/185426456/Curs_ECDL.rar
    
    Curs_Flash.rar
    Size: 2398 KB
    
    http://rapidshare.com/files/185427133/Curs_Flash.rar
    
    Curs_Linux.doc
    Size: 276 KB
    
    http://rapidshare.co.../Curs_Linux.doc
    Curs_Retele.rar Size: 534 KB
    http://rapidshare.com/files/185427982/Curs_Retele.rar
    Curs_Word.rar Size: 4415 KB
    
    http://rapidshare.com/files/185429092/Curs_Word.rar
    Fibre_optice.doc Size: 2225 KB
    http://rapidshare.com/files/185429780/Fibre_optice.doc
    Curs de la facultatea de automatica si calculatoare. Explicatii ASM de la nivel de circuit de adunare pana la diferente intre arhitecturi.
     http://fisierulmeu.ro/46X5IHVEWK29/Cursuri-automatica-rar.html
    active directory bible.pdf addison wesley - a programmer's guide to java certification. second edition.chm addison wesley - an introduction to parallel computing, second edition.chm addison wesley - building solutions with the mi*****ft .net compact framework.chm addison wesley - code reading. the open source perspective.chm addison wesley - database design for mere mortals.chm addison wesley - designing storage area networks. 2nd edition.chm addison wesley - eclipse modeling framework.chm addison wesley - hypertransport system architecture.chm addison wesley - ip storage networking. straight to the core.chm addison wesley - java development on pda's. building applications for pocket pc and palm devices.chm addison wesley - managing software requirements, second edition.chm addison wesley - mda explained. the model driven architecture.chm addison wesley - moving to linux. kiss the blue screen of death goodbye!.chm addison wesley - open source web development with lamp.chm addison wesley - pci express system architecture.chm addison wesley - perl medic. transforming legacy code.chm addison wesley - pocket pc network programming.chm addison wesley - principles of the business rule approach.chm addison wesley - rational unified process made easy.chm addison wesley - real 802.11 security. wi-fi protected access and 802.11i.chm addison wesley - rtp. audio and video for the internet.chm addison wesley - software architecture in practice, second edition.chm addison wesley - text processing in python.chm addison wesley - understanding and deploying ldap directory services, 2nd edition.chm addison wesley - xml data management. native xml and xml-enabled database.chm addison-wesley - software engineering and computer games.chm addison-wesley - wi-foo. the secrets of wireless hacking.chm Administering Cisco QoS.pdf a-list publishing - advanced 3ds max 5 modeling and animating.chm a-list publishing - pc hardware tuning and acceleration.chm a-list publishing - windows .net server 2003 domains & active directory.chm a-list publishing - windows server 2003 registry.chm alm os programming bible.pdf Apache Server 2 Bible - HUNGRY MINDS.pdf apress - professional php4.chm artech house - gprs for mobile internet.chm artech house - lans to wan's the complete management guide.chm artech house - mission-critical network planning.pdf artech house - voice over 802.11.pdf artech house - wireless ip and building the mobile internet.pdf autocad 2002 bible bonus_appd.pdf autocad 2002 bible bonus_appe.pdf autocad 2002 bible.pdf beginning php4.zip Bluetooth Application Developers Guide.pdf Building an Intranet with Windows NT 4.zip Building Cisco Networks for Windows 2000.pdf Building Cisco Remote Access Networks.pdf c++ footprint and performance optimization.chm c++ standard library, the a tutorial and reference.chm C++ByDissection.pdf CCIE Routing and Switching Exam Certification Guide.pdf Cisco AVVID & IP Telephony.pdf cisco ccip mpls study guide.rar cisco press - ccnp 642-811 bcmsn exam certification guide, second edition.pdf cisco press - ccnp bcmsn exam certification guide.pdf cisco press - ccsp secur exam certification guide (ccsp self-study, 642-501).pdf cisco press - cisco lan switching fundamentals.chm cisco press - cisco router firewall security.chm cisco press - cisco wireless lan security.chm cisco press - integrated cisco and unix network architectures.chm cisco press - lan switching first-step.chm cisco press - mpls vpn security.chm cisco press - optical network design and implementation.chm cisco press - self study ccsp cisco secure vpn exam certification guide.pdf cisco press - wireless networks first-step.chm cisco security specialist's guide to pix firewall.pdf cisco&checkpoint.zip cmp books - network tutorial, fifth edition.chm concrete mathematics - a foundation for computer science.pdf config.chm Configuring and Troubleshooting Windows XP Professional.pdf Configuring Cisco AVVID.pdf Configuring Citrix Metaframe for Windows 2000.pdf Configuring Exchange 2000 Server.pdf Configuring ISA Server 2000.pdf Configuring Windows 2000 Without Active Directory.pdf crc press - analog bicmos design. practices and pitfalls.pdf crc press - cyber crime investigator's field guide.pdf crc press - drug abuse handbook.pdf crc press - forensic engineering investigation.pdf crc press - handbook of lasers.pdf crc press - handbook of multisensor data fusion.pdf crc press - introduction to forensic sciences. -2nd edition.pdf crc press - statistics for environmental engineers, second edition.pdf crc press - wireless technology. protocols, standards and techniques.pdf cyberage books - the extreme searcher's internet handbook.pdf cyfrovoe texturirovanie i zuvopis'.pdf Deploying Windows 2000 with Support Tools.pdf Designing a Wireless Network.pdf Designing SQL Server 2000 Databases for Net Enterprise Servers.pdf devidbush_cifrovayafotografiyairrabotasizobrazheni em.pdf digital press - call center operation.chm digital press - mi*****ft exchange server 2003.chm digital press - oracle sql. jumpstart with examples.pdf digital press - oracle sql. jumpstart with examples.rar digital press - unix for openvms users, third edition.chm digital press - wireless operational security.chm divxprooggvorbismanual.chm dreamweaver MX developer ertification.zip dreamweaver mx weekend crash course.pdf dreamweaver_rus.chm E-mail Virus Protection Handbook.pdf F1307_167_CNET_book.pdf F1330_ASP.pdf F1330_hack_book.pdf F1331_ecomm_book.pdf F1331_hackapps_book.pdf F1334_w2kServer_book.pdf F1342_vb_net_book.pdf F1344_hack_sun_book.pdf F1349_asp_book.pdf flash 5 bible.pdf focal press - timing for animation.chm freebsd. administrirovanie iskustvo dostizenia ravnovesiya. encyklodediya polzovatelia .djvu Hack Proofing Your Network Second Edition.pdf how to cheat at installing, configuring and troubleshooting active directory and dns.pdf hungry minds - debian gnu linux bible.pdf hungry minds - java data access - jdbc, jndi, and jaxp.pdf Hungry Minds - Red Hat Linux 7.2 Bible Unlimited Ed.pdf hungry minds - tablet pc's for dummies.chm hungryminds - 3d studio max 4 bible.pdf hungryminds - zope bible.pdf idea group - architectural issues of web-enabled electronic business.pdf idea group - current security management & ethical issues of information technology.chm intellect - crash cultures. modernity, mediation and the material.pdf Internet Routing Architectures 2nd Edition.pdf Intranets Unleashed.zip java precisely.pdf javascript bible 4th edition + jsb gold chapters.pdf javascript programmer's reference.pdf john wiley & sons - 250 html and web design secrets.zip john wiley & sons - 3ds max 6 bible.zip john wiley & sons - adobe acrobat 6 bible.pdf john wiley & sons - adobe illustrator cs for dummies.chm john wiley & sons - adobe photoshop cs in 10 simple steps or less.pdf john wiley & sons - alan simpson's windows xp bible, desktop edition.zip john wiley & sons - alan simpson's windows xp bible, second edition.zip john wiley & sons - auditing information systems.chm john wiley & sons - autocad 2004 bible.pdf john wiley & sons - beginning linux programming, third edition.zip john wiley & sons - beginning php, apache, mysql web development.zip john wiley & sons - broadband powerline communications. network design.pdf john wiley & sons - buying a computer for dummies, 2004 edition.pdf john wiley & sons - coldfusion mx bible.pdf john wiley & sons - convergence technologies for 3g networks.zip john wiley & sons - digital video for dummies, third edition.pdf john wiley & sons - dreamweaver mx 2004 bible.pdf john wiley & sons - dreamweaver mx 2004 in 10 steps or less.zip john wiley & sons - ethernet networks. design, implementation, operation, management. 4th edition.pdf john wiley & sons - excel 2002 power programming with vba.pdf john wiley & sons - firewalls for dummies, second edition.pdf john wiley & sons - hacking for dummies.zip john wiley & sons - home networking bible.pdf john wiley & sons - html, xhtml, and css bible, 3rd edition.zip john wiley & sons - implementing backup and recovery.chm john wiley & sons - implementing ssh. strategies for optimizing the secure shell.pdf john wiley & sons - incident response. computer forensics toolkit.zip john wiley & sons - interpretation and application of international accounting standards 2003.chm john wiley & sons - ip-based next-generation wireless networks.pdf john wiley & sons - javascript bible, 5th edition.zip john wiley & sons - javascript in 10 steps or less.zip john wiley & sons - leap! a revolution in creative business strategy.pdf john wiley & sons - linux for dummies, 6th edition.zip john wiley & sons - linux timesaving techniques for dummies.zip john wiley & sons - mastering javaserver faces.zip john wiley & sons - mi*****ft office 2003 in 10 simple steps or less.zip john wiley & sons - mi*****ft office 2003 super bible.pdf john wiley & sons - mi*****ft office excel 2003 bible.zip john wiley & sons - mission-critical security planner.pdf john wiley & sons - mms. technologies, usage and business models.zip john wiley & sons - mobile and wireless design essentials.chm john wiley & sons - mobile telecommunications protocols for data networks.pdf john wiley & sons - mysql enterprise solutions.pdf john wiley & sons - mysql_php database applications, second edition.pdf john wiley & sons - parallel computing on heterogeneous clusters.chm john wiley & sons - pc upgrade and repair bible. desktop edition.pdf john wiley & sons - photoshop cs all-in-one desk reference for dummies.pdf john wiley & sons - php 5 for dummies.zip john wiley & sons - php and mysql for dummies, second edition.zip john wiley & sons - php5 and mysql bible.zip john wiley & sons - principles of network and system administration.pdf john wiley & sons - programming with object-oriented programming.chm john wiley & sons - red hat linux 9 professional secrets.chm john wiley & sons - red hat linux bible. fedora and enterprise edition.chm john wiley & sons - reversing. secrets of reverse engineering.zip john wiley & sons - securing wireless lan's.pdf john wiley & sons - smart card handbook.zip john wiley & sons - sql bible.chm john wiley & sons - the internet encyclopedia. volume 2.zip john wiley & sons - the internet encyclopedia. volume 3.zip john wiley & sons - universal meta data models.zip john wiley & sons - unix for dummies, 5th edition.chm john wiley & sons - vsat networks.zip john wiley & sons - web server programming.zip john wiley & sons - windows server 2003 for dummies.chm john wiley & sons - windows xp for power users. power pack.zip john wiley & sons - wireless home networking for dummies.pdf john wiley & sons - xml 1.1 bible, third edition.zip john wiley & sons - xml programming bible.zip kde 2.qt programming bible.pdf lightwave 6-7.pdf linux_book.pdf linux+ certification bible.pdf Macromedia Dreamweaver MX Bible.pdf macromedia press - macromedia dreamweaver mx dynamic applications.chm Managing Cisco Network Security.pdf manning - java development with ant.pdf manning - web development with javaserver pages, 2nd edition.pdf manning - windows forms programming with c.pdf marcel dekker - watermarking systems engineering.pdf mastering jakarta struts.pdf mcgraw hill - sun certified solaris 9.0 system and network administrator all-in-one exam guide.chm mcgraw-hill - ccsp - cisco certified security professional certification all-in-one exam guide (exams secur,cspfa, csvpn, csids, and csi).pdf mcgraw-hill - citrix metaframe for windows server 2003. the official guide.chm mcgraw-hill - hacknotes linux and unix security portable reference.zip mcgraw-hill - hacknotes network security portable reference.zip mcgraw-hill - hacknotes web security pocket reference.zip mcgraw-hill - hacknotes windows security portable reference.zip mcgraw-hill - iis 6 the complete reference.chm mcgraw-hill - perl. the complete reference. second edition.pdf mcgraw-hill - wi-fi handbook. building 802.11b wireless networks.chm mcgraw-hill - wi-fi security.pdf mcgraw-hill - windows server 2003 clustering and load balancing.pdf mcgraw-hill - windows server 2003 pocket administrator.pdf mcgraw-hill - windows server 2003. best practices for enterprise deployments.pdf mcgraw-hill - windows server 2003. the complete reference.zip MCSE Training Kit-Mi*****ft Windows XP Professional.CHM mcse-networking-essentials.zip metody animacii lica.pdf mi*****ft press - mi*****ft windows server 2003 terminal services.chm mi*****ft sql server 2000 weekend crash course.pdf mi*****ft visual c (core reference).rar mi*****ft windows xp professional spravochnik administratora [stanek u.r.].zip Mission Critical Internet Security.pdf Mission Critical! Windows 2000 Server Administration.pdf mit press - beowulf cluster computing with linux, second edition.chm mit press - modernity and technology.pdf mit press - molecular computing.chm mit press - virtual art. from illusion to immersion.pdf modern analytic chemistry.pdf morgan kaufmann - data quality. the accuracy dimension.chm morgan kaufmann - real-time shader programmingi.chm muska & lipman premier-trade - maya 6 revealed.zip muska & lipman premier-trade - pinnacle studio 9 ignite!.zip muska and lipman premier-trade - adobe photoshop elements 3.0. photographers' guide.pdf mysql and php database applications.pdf mysql bible.zip new riders - building dynamic web sites with macromedia studio mx 2004.chm new riders - designing virtual worlds.chm new riders - jerry hofmann on final cut pro 4.chm new riders - macromedia flash communication server mx.chm new riders publishing - chris crawford on game design.chm new riders publishing - maya 5 fundamentals.chm no starch press - absolute openbsd. unix for the practical paranoid.chm no starch press - how linux works.chm no starch press - steal this computer book 3.chm nokia network security solutions handbook.pdf NTServer-Unleashed.zip oracle press. oracle 9i - the complete reference.pdf Oracle4pros.pdf o'reilly - learning red hat enterprise linux and fedora, 4th edition.chm o'reilly - access cookbook, second edition.chm o'reilly - actionscript cookbook.chm o'reilly - active directory cookbook for windows server 2003 and windows 2000.chm o'reilly - active directory, second edition.chm o'reilly - ado.net in a nutshell.chm o'reilly - amazon hacks. 100 industrial-strength tips and tools.chm o'reilly - ant - the definitive guide.pdf o'reilly - asp.net in a nutshell, second edition.chm o'reilly - basic local alignment search tool (blast).chm o'reilly - building embedded linux systems.chm o'reilly - building secure servers with linux.chm o'reilly - building wireless community networks, second edition.chm o'reilly - c sharp in a nutshell.chm o'reilly - cisco cookbook.chm o'reilly - cisco ios access lists.pdf o'reilly - cocoa in a nutshell.chm o'reilly - content syndication with rss.chm o'reilly - cpp in a nutshell.chm o'reilly - digital photography hacks.chm o'reilly - dns on windows server 2003.chm o'reilly - ebay hacks. 100 industrial-strength tips and tools.chm o'reilly - essential blogging.chm o'reilly - essential cvs.chm o'reilly - fixing windows xp annoyances.chm o'reilly - flash hacks. 100 industrial-strength tips & tools.chm o'reilly - flash remoting. the definitive guide.chm o'reilly - html & xhtml. the definitive guide, 5th edition.chm o'reilly - java and soap.pdf o'reilly - java data objects.chm o'reilly - java extreme programming cookbook.chm o'reilly - java performance tuning. second edition.chm o'reilly - java script and dhtml cookbook.chm o'reilly - java web services in a nutshell.chm o'reilly - javaserver pages. - 2nd edition.pdf o'reilly - ldap system administration.chm o'reilly - learning perl objects, references and modules.chm o'reilly - learning red hat linux, 3rd edition.chm o'reilly - learning uml.chm o'reilly - learning xml, second edition.chm o'reilly - linux device drivers - 2nd edition.dpf o'reilly - linux in a nutshell, 4th edition.chm o'reilly - linux security cookbook.chm o'reilly - mac os x hacks.chm o'reilly - mac os x unwired.chm o'reilly - macosx for java geeks.chm o'reilly - managing nfs and nis - 2nd edition.pdf o'reilly - managing security with snort and ids tools.chm o'reilly - mastering perl for bioinformatics.chm o'reilly - mastering visual studio .net.chm o'reilly - mysql pocket reference.chm o'reilly - network security assessment.chm o'reilly - network security hacks.chm o'reilly - oracle pl.sql language pocket reference, 2nd edition.chm o'reilly - paypal hacks. 100 industrial-strength tips and tools.chm o'reilly - pc hardware in a nutshell, 2nd edition.chm o'reilly - pc hardware in a nutshell, 3rd edition.chm o'reilly - pdf hacks. 100 industrial-strength tips and tools.chm o'reilly - peer to peer harnessing - the power of disruptive technologies.pdf o'reilly - perl 6 essentials.chm o'reilly - perl and xml.pdf o'reilly - perl cookbook, second edition.chm o'reilly - practical mod_perl.chm o'reilly - practical resource description framework (rdf).chm o'reilly - practical unix & internet security, 3rd edition.chm o'reilly - programming .net security.chm o'reilly - programming c.sharp. 3rd edition.chm o'reilly - python in a nutshell.chm o'reilly - real world web services.chm o'reilly - secure coding. principles and practices.chm o'reilly - secure programming cookbook for c and c++.chm o'reilly - securing windows server 2003.chm o'reilly - sendmail cookbook.chm o'reilly - sendmail, 3rd edition.chm o'reilly - snort cookbook.chm o'reilly - sql in a nutshell, second edition.chm o'reilly - sql tuning.chm o'reilly - squid. the definitive guide.chm o'reilly - tcpip network administration. 3rd edition.chm o'reilly - tivo hacks. 100 industrial-strength tips & tools.chm o'reilly - tony bourke. server load balancing.pdf o'reilly - understanding the linux kernel.pdf o'reilly - upgrading to php 5.chm o'reilly - using samba, second edition.chm o'reilly - web database applications with php & mysql, second edition.chm o'reilly - windows server 2003 in a nutshell.chm o'reilly - windows server hack.chm o'reilly - windows xp hacks.chm o'reilly - windows xp unwired.chm o'reilly - xforms essentials.chm o'reilly - xml hacks. 100 industrial-strength tips and tools.chm o'reilly - xml in a nutshell. second edition.chm oreilly.c.in.a.nutshell.dec.2005.happy.new.year.ch m oreilly.php.hacks.tips.and.tools.for.creating.dyna mic.websites.dec.2005.happy.new.year.chm oreilly.running.linux.5th.edition.dec.2005.chm oreilly.voip.hacks.tips.and.tools.for.internet.tel ephony.dec.2005.chm o'rielly_reference_library(ggrax).chm paraglyph publishing - jeff duntemann's drive-by wi-fi guide.chm peachpit press - c.sharp web development with asp.net. visual quickstart guide.chm peachpit press - macromedia flash mx 2004 actionscript. training from the source.chm peachpit press - mi*****ft windows xp.visual quickstart guide.chm photorealisticheskaya rabota v 3d.pdf php.and.mysql, 2e.zip php4 rus.pdf phpsql.rar Platinum Edition Using Windows NT Server 4_.zip platinum_edition_using_windows_nt_server_4-sams.zip postgresql - introduction and concepts.pdf premier press - beginning direct3d game programming, second edition.zip premier press - lindows fast and easy.chm premier press - mi*****ft windows xp professional administrator's guide.chm premier press - php.mysql programming for the absolute beginner.chm prentice hall - core servlets and javaserver pages (jsp).zip prentice hall - essential guide to semiconductors.chm prentice hall - ip in wireless networks.chm prentice hall - ipsec. the new security standard for the internet, intranets, and vpn. second edition.chm prentice hall - mobile location services.the definitive guide.chm prentice hall - personal firewalls for administrators and remote users.chm prentice hall ptr - a field guide to wireless lan's for administrators and power users.chm prentice hall ptr - advanced dba certification guide and reference.chm prentice hall ptr - biometrics and network security.chm prentice hall ptr - core php programming, third edition.chm prentice hall ptr - db2 version 8.the official guide.chm prentice hall ptr - home networking basis.chm prentice hall ptr - how secure is your wireless network.chm prentice hall ptr - java for coldfusion developers.chm prentice hall ptr - ldap in the solaris operating environment.chm prentice hall ptr - linux on the mainframe.chm prentice hall ptr - migrating to the solaris operating system.chm prentice hall ptr - openoffice.org 1.0 resource kit.chm prentice hall ptr - oracle dba guide to data warehousing and star schemas.chm prentice hall ptr - prentice hall ptr - network management, mibs and mpls.chm prentice hall ptr - unix systems programming, second edition.chm prentice hall ptr - wireless communication systems.chm programming - xml by example.pdf python 2.1 bible.pdf que - upgrading and repairing laptop computers.chm que publishing - absolute beginner's guide to upgrading and fixing your pc.chm que publishing - absolute beginner's guide to wi-fi wireless networking.chm que publishing - easy mi*****ft office access 2003.chm que publishing - easy mi*****ft office outlook 2003.chm que publishing - easy mi*****ft office powerpoint 2003.chm que publishing - easy mi*****ft windows xp home edition, second edition.chm que publishing - how to use adobe photoshop 7.chm que publishing - java 2 programmer exam cram (310-035).chm que publishing - mcse windows 2000 network infrastructure exam cram 2 (70-216).chm que publishing - security plus exam cram 2 (syo-101).chm que publishing - special edition using mac os x v10.3 panther.chm que publishing - special edition using mi*****ft office 2003.chm que publishing - special edition using mi*****ft office access 2003.chm que publishing - special edition using mi*****ft office excel 2003.chm que publishing - special edition using mi*****ft word 2003.chm que publishing - upgrading and repairing networks, 4th edition.chm que publishing - using mac os x v10.2, special edition.chm R.Tomlinson MI-6 Rus.pdf rds press - loosely coupled. the missing pieces of web services.chm Red Hat Linux Networking and System Administration.pdf Red Hat Linux Security and Optimization.pdf reestr mi*****ft windows xp - spravochnik profesionala.djvu Running_A_Perfect_Intranet.zip RussianPrisonersTatooArt.chm sams - borland c++ builder 6 developer's guide.zip sams - lotus notes and domino 6 development, second edition.chm sams - mac os x maximum security.chm sams - maximum security, fourth edition.chm sams - maximum wireless security.chm sams - mi*****ft iis 6 delta guide.chm sams - mi*****ft sql server 2000 unleashed, 2nd edition.chm sams - mi*****ft windows server 2003 delta guide.chm sams - mysql tutorial.chm sams - mysql. second edition.chm sams - postgresql.chm sams - sams teach yourself adobe premiere 6.5 in 24 hours.chm sams - sams teach yourself crystal reports 9 in 24 hours.chm sams - sams teach yourself internet and web basics all in one.chm sams - sams teach yourself mi*****ft office access 2003 in 24 hours.chm sams - sams teach yourself mi*****ft office excel 2003 in 24 hours.chm sams - sams teach yourself office 2003 in 24 hours.chm sams - sams teach yourself php, mysql and apache in 24 hours.chm sams - sams teach yourself powerpoint 11 in 24 hours.chm sams - sams teach yourself tcp-ip in 24 hours, third edition.chm sams - sams teach yourself visual studio .net in 21 days.chm sams - sams teach yourself windows xp computer basics all in one.chm sams - toad handbook.chm sams - unix shell programming, third edition.chm sk1 001 server plus certification bible.pdf Special Edition Using Windows NT Server 4.0.zip sybex - active directory best practices 24 seven.zip sybex - c.sharp database programming.chm sybex - ccsp securing cisco ios networks study guide.zip sybex - cisco ccip mpls study guide.pdf sybex - dreamweaver mx 2004 savvy.zip sybex - ground-up java.chm sybex - java foundations.zip sybex - linux power tools.chm sybex - mac os x power tools.chm sybex - mastering delphi 7.chm sybex - mastering excel 2003 programming with vba.zip sybex - mastering mi*****ft exchange server 2003.pdf sybex - maya 4.5 savvy.chm sybex - maya. secrets of the pros.pdf sybex - mcsa mcse windows xp professional study guide 2nd.pdf sybex - network security foundations.zip sybex - ocp. oracle 10g new features for administrators.zip sybex - oracle database foundations.zip sybex - pc disaster and recovery.chm sybex - setting up lamp. getting linux, apache, mysql and php working together.zip sybex - tcp.ip foundations.zip sybex - the hidden power of photoshop elements 3.zip syngrass- managing cisco network security 2nd edition (pwd.4574).pdf syngress - how to cheat at securing windows 2000 server tcp-ip connections.pdf syngress - best damn firewall book period.pdf syngress - building dmzs for enterprise networks.pdf syngress - cisco security professional's guide to secure intrusion detection systems.pdf syngress - configuring and troubleshooting windows xp pro - (pwd.4574).pdf syngress - configuring symantec antivirus corporate edition.pdf syngress - cya securing exchange server 2003 and outlook web access.zip syngress - cya securing iis 6.0.zip syngress - check point next generation with application intelligence security.chm syngress - inside the spam cartel. trade secrets from the dark side.chm syngress - mcsa_mcse exam 70-292 study guide.pdf syngress - mcsa_mcse exam 70-296 study guide.pdf syngress - mcse exam 70-293. planning and maintaining a windows server 2003 network infrastructure.pdf syngress - mcse exam 70-294. planning, implementing and maintaining a windows server 2003 active directory infrastructure.pdf syngress - programming lego mindstorms with java.pdf syngress - security assessment case studies for implementing the nsa iam.pdf syngress - sniffer pro network optimization & troubleshooting handbook.pdf syngress - snort 2.1 intrusion detection, second edition.zip syngress - stealing the network how to own the box.pdf syngress - the best damn cisco internetworking book period.pdf syngress - the mezonic agenda hacking the presidency.pdf syngress - wardriving. drive, detect, defend. a guide to wireless security.chm syngress - wireless hacking. projects for wi-fi enthusiasts.rar syngress- google hacking for penetration testers.rar Teach Yourself TCPIP in 14 Days, Second Edition.zip Testkiller 640-503 Ed2.pdf TestKiller 640-504 Ed2.pdf TestKiller 640-505 Ed1.pdf TestKiller 640-506 Ed1.pdf TestKiller 70-219 Ed2.pdf TestKiller 70-224 Ed2.pdf Text - Building an Intranet with Windows NT4.zip the american bar association family legal guide.pdf Troubleshooting Windows 2000 TCPIP.pdf Troytec 70-210 Ed6.pdf Troytec 70-215 Ed4.pdf understanding ipv6.chm vkladimirov a.a.wi-fu.pdf Webmasters Guide to the Wireless Internet.pdf wiley - fireworks mx bible.pdf wiley & sons - 3g handset and network design.pdf wiley & sons - 50 fast dreamweaver mx techniques.pdf wiley & sons - about face 2.0. the essentials of interaction design.chm wiley & sons - building pda databases for wireless and mobile development.pdf wiley & sons - building secure wireless networks with 802.11.pdf wiley & sons - mastering web services security.pdf wiley & sons - mobile vpn. delivering advanced services in next generation wireless systems.chm wiley & sons - more java pitfalls. 50 new time-saving solutions and workarounds.pdf wiley & sons - mysql and java developer's guide.pdf wiley & sons - private equity.pdf wiley & sons - professional photoshop 6. the classic guide to color correction (rus).pdf wiley & sons - project management methodologies.chm wiley & sons - publishing 50 fast dreamweaver mx techniques.pdf wiley & sons - sap netweaver for dummies.chm wiley & sons - secure php development - building 50 practical applications.pdf wiley & sons - secure_communications.zip wiley & sons - software testing fundamentals.chm wiley & sons - ssl & tls essentials. securing the web.pdf wiley & sons - the art of software architecture.chm wiley & sons - the cisa prep guide. mastering the certified information systems auditor exam.pdf wiley & sons - unix filesystems - evolution, design and implementation.pdf wiley publishing - 2005 - 3ds max 7 bible - isbn 0764579711 - 1297s - lotb.pdf wiley publishing - dreamweaver mx e-learning toolkit.pdf wiley publishing - suse linux 9 bible.zip wiley publishing - the cissp prep guide. gold edition.zip wiley-interscience - tools and environments for parallel and distributed.pdf win2kpro.chm Windows 2000 Accelerated.chm Windows 2000 Active Directory Second Edition.pdf Windows 2000 Active Directory Services.chm Windows 2000 Configuration Wizards.pdf Windows 2000 Network Infrastructure Administration.chm Windows 2000 Server System Administration Handbook.pdf Windows 2000 Server.chm windows security.chm wordware publishing - 3ds max lighting.pdf wordware publishing - ado .net programming.chm wordware publishing - directx 9 audio exposed. interactive audio development.chm wordware publishing - filemaker pro 6 developer's guide to xml_xsl.chm wordware publishing - java 1.4 game programming.chm wordware publishing - lightwave 3d 8 lighting.pdf wordware publishing - lightwave 3d 8 texturing.pdf wordware publishing - lightwave 3d 8. 1001 tips & tricks.zip wordware publishing - lightwave 3d character animation.pdf wordware publishing - memory management.chm wordware publishing - wireless game development in c_cpp with brew.chm wrox - beginning mysql.zip wrox - beginning php5, apache and mysql web development.zip wrox - beginning programming.zip wrox - beginning regular expressions.zip wrox - beginning unix.zip wrox - professional infopath 2003.chm wrox press - beginning asp.net 1.1 with visual c sharp .net 2003.pdf wrox press - beginning vb.net 2003.chm wrox press - c.sharp threading handbook.chm wrox press - expert one-on-one mi*****ft access application development.chm wrox press - professional asp.net 1.1.chm wrox press - professional c#, 3rd edition.zip wrox press. - asp.net website programming, visual basic .net edition.chm wrox press. - beginning access 2002 vba.chm wrox press. - beginning dreamweaver mx.chm wrox press. - beginning red hat linux 9.pdf wrox press. - beginning visual basic .net database programming.pdf wrox press. - expert one-on-one j2ee design and development.chm wrox press. - professional portal development with open source tools.zip wrox press. - professional xml databases.pdf click Serviciul_IRC_-_Internet_Relay_Chat.pdf Size: 350 KB
    http://rapidshare.com/files/185435383/Serviciul_IRC_-_Internet_Relay_Chat.pdf
    Sisteme_cu_Microprocesoare.doc Size: 629 KB
    http://rapidshare.com/files/185435566/Sisteme_cu_Microprocesoare.doc
    Sisteme_Operare_MS-DOS.doc Size: 268 KB
    http://rapidshare.com/files/185435681/Sisteme_Operare_MS-DOS.doc
    Studiu_asupra_sistemelor_de_autentificare_cu_baze_ criptografice.pdf Size: 121 KB
    http://rapidshare.com/files/185435762/Studiu_asupra_sistemelor_de_autentificare_cu_baze_criptografice.pdf
    
    
    Switchul_de_retea.doc Size: 170 KB
    http://rapidshare.com/files/185435858/Switchul_de_retea.doc
    Totul_despre_Office_si_Visual_Basic.rar Size: 1271 KB
    http://rapidshare.com/files/185436128/Totul_despre_Office_si_Visual_Basic.rar
    Tutorial_IT.pdf Size: 4924 KB
    http://rapidshare.com/files/185436892/Tutorial_IT.pdf

    Continuati si voi :)

  7. salut Momyimontv , daca vrei componente bune pentru pc-ul tau viziteaza emag

    pentru bugetul tau te sfatuesc .

    Placa de baza Asrock H61M-VS, socket 1155

    ATENTIE: Memoria ta RAM trebuie sa aiba o frecventa de 1066Mhz sau 1333Mhz !

    Placa video HIS Radeon HD5750 iCooler IV 1GB DDR5 128-bit HDMI

    sau

    Placa video Gigabyte Radeon HD5670 1GB DDR5 128-bit HDMI

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...