Jump to content

Ken

Inactive Member
  • Posts

    726
  • Joined

  • Last visited

  • Days Won

    44
  • Feedback

    0%

Everything posted by Ken

  1. The packet mechanism is calculating the struct size with sizeof() function. Ohm, if you have any error like that, you should check the static packets. Also, you can find the packet with using breakpoint in visual studio. Best Regards Ken
  2. I don't know which guide you followed it. If you can show what you have done, it could be easy for us. Best Regards Ken
  3. Public Wi-Fi, Of course, it's the best thing to hack big companies. If we're talking about big things, FBI is crying about that at the moment. It depends on your skills. If you're really professional, FBI don't even catch you. They can't trace bitcoins too. (The newest one is Decred as far I know). The main goal is you have to be more intelligence than your victim. The picture explains everything. It reminds me this Best Regards Ken
  4. It was an example. Most people can't control themselves. Their enjoys and so on. Most hacker are choosing those places because of that. It's like a vulnerability or send a naked girl to your victim. (You probably put your virus and encrypt it). Those things are already easy but everything is up to you. If you click everything all the time, you will get this sooner or later or he can blackmailing you with a few information. It's depend on your brain If the hacker already knew you well, it will be easy for him. Social engineering and informations about you. Of course, you can call FBI for that if you want ^^ That's a bad thing but the main goal is how to trick the victim. That explains why social engineering is the best power in this world. Best Regards Ken
  5. If you're using bruteforce, you could crack it easily. (Just use Python or something like that. If you don't use kali linux or something like that) import itertools res = itertools.product('abc', repeat = 3); for i in res: print ''.join(i) Also, it's up to you. Most people are saying don't use specific things about yourself when you create a password. That's a reason but If that hacker or someone else know you well or sniffing, it could be easy too. If you want to try hard, you could use specific words (which one is not from english). It just depends on your brain. Protect yourself and be cool. That explains, why vanilla said the hacker could use a bruteforce attack. If you're watching 18+ stuffs on the internet and click every advertisement, you probably get that and everything will be dangerous for ya. Also, it's depend on the hacker's social engineering skills. You can hack people whenever you want. (That's a rule). http://resources.infosecinstitute.com/social-engineering-a-hacking-story/ Best Regards Ken
  6. As I said, it depends on your brain. If you're good with remembering something, you don't have to save your password in your computer. Otherwise, you have to save your passwords in your computer. It's not about password's length or something like that. It's about combination. If you give a combination someone, they probably solve it sooner or later. https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength
  7. The worst password.. It depends on your brain also your knowledge about the internet too. Most people don't care about the password because they're thinking there is nothing to steal or something like that. Don't be sure.
  8. Some things online can never change like -- Terrible Passwords by Humans. When it's about various security measures to be taken in order to protect your Internet security, like installing a good anti-virus or running Linux on your system doesn’t mean that your work gets over here, and you are safe enough from online threats. However, even after countless warnings, most people are continuously using deadly-simple passwords, like '123456' or 'password,' to safeguard their most sensitive data. Evidence suggests that weak passwords are as popular now as they ever were, and the top 25 passwords of 2015 are very easy to guess. Password management firm SplashData on Tuesday released its annual "Worst Passwords List". The 2015 list almost resembled the 2014 list of the worst password, but there are some interesting new entries, including the Star Wars-inspired 'solo,' and 'starwars.' Hard to believe, but '123456' once again topped the list, just like last year, and again followed by the truly terrible 'password.' Sport remains popular among online users as 'football' and 'baseball' are both on the top 10 list of worst passwords. Top 25 Worst Passwords of 2015 SplashData analyzed over 2 Million leaked passwords in 2015, and the results are as follow: 123456 password 12345678 qwerty 12345 123456789 football 1234 1234567 baseball welcome 1234567890 abc123 111111 1qaz2wsx dragon master monkey letmein login princess qwertyuiop solo passw0rd starwars The importance of online security around personal data has increased due to the rise in data breaches and cyber attacks over recent years. Last year was the year of data breaches. According to an estimate, around 480 Million personal data records were leaked online, which included high-profile breaches at the United States Office of Personnel Management (OPM) and the extramarital affair site Ashley Madison. So remember: "God helps those who help themselves," likewise nobody can secure you online unless and until you are not willing to. How to Create a Strong Password Always create different passwords for different sites. So that if one site is breached, your other online accounts on other sites are secure from being hacked. These are some useful tips that will help you make password strength secure and easier to remember: Use a combination of lowercase, uppercase, numbers, and special characters of 8 characters long or more like s9%w^8@t$i. Use short passphrases with special characters separating to make it difficult for crackers and could be easily remembered like cry%like@me (cry like me). Avoid using the same combination of passwords for different websites. If it is difficult for you to remember different passwords for different websites, then use Password Manager applications like RoboForm, 1Password, LastPass. Stay Safe! Stay Secure!
  9. Rejoice for Privacy Lovers! Facebook today took a surprising move by announcing that it is bringing the free anonymizing software TOR support to its Android app, almost two years after the social network planned to make Facebook available directly over Tor network. Yes. Believe it or not, the Android version of the popular Facebook application now supports the Tor anonymity network. In October 2014, Facebook launched a .onion website on TOR in order to let its users around the world access its service more securely. Access Facebook over TOR via Orbot This latest move to expand that access to the Android app opens up the option to millions more users to maintain their privacy when they visit the world's most popular social network. Facebook says "a sizeable community of people" are already accessing the site over TOR, so the company is bringing this feature to Android via the free Orbot proxy app, which is available on the Google's Play Store. "We commonly receive requests for additional platform support beyond the browser,"reads the announcement, "...we are now offering experimental support for using Facebook over Tor via the Orbot proxy app for Android devices." How to Use Facebook Over TOR? In order to access Facebook over TOR, Download Orbot proxy app from the Play Store. Now open Facebook app and Select "Use Tor via Orbot" in the app's Settings menu. That's it. Now you are connected to Facebook's Tor hidden service that will mask your real IP address and will stop your internet service provider (ISP) from seeing when you visit Facebook. Moreover, this new feature could potentially allow users to access the social network site even if it is blocked in their country, like China and Iran. Facebook says that the company is releasing this new feature "over the next few days," so do not expect to see the pop-up right now. And as the feature is currently in the experimental stage, flaws and other issues may occur.
  10. If you can't give point to your skills, that means something is wrong in skill_proto. Every source is working fine on Windows. I don't think there is a problem just like that in the whole source files. Best Regards Ken
  11. There is a define flag for both platform. For windows, the compiler is using different define type for mysql functions . Best Regards Ken
  12. At first, your syserr file hasn't contained any critical error. Maybe you just need to check your skill proto file. Best Regards Ken
  13. If you're using stripped db file, you can't see what's going on because strip command is removing the symbols in the file. If you want to see what's going on, you must use unstripped db file. Best Regards Ken
  14. You can't use them without scale even If you set the model in the right bone index. There are two ways to do something about it. You can replace that models for each character or you will code the system will read item_scale.txt and scale them. Best Regards Ken
  15. You must define RegisterMysqlFunctionTable in somewhere. 'DWORD' to 'BYTE', possible loss of data If you're trying to convert DWORD to BYTE or assign it, compiler will give this warning to you. It often see with my_ulong (MySQL defined types) Best Regards Ken
  16. A 'Serious' security vulnerability has been discovered and fixed in OpenSSH – one of the most widely used open-source implementations of the Secure Shell (SSH) Protocol. The critical vulnerability could be exploited by hackers to force clients to leak their secret private cryptographic keys, potentially exposing users to Man-in-the-Middle (MITM) attacks. What Causes the Flaw to occur? The serious bug was actually the result of a code that enables an experimental "roaming" feature in the OpenSSH versions 5.4 to 7.1 in order to let users resume connections. However, The roaming feature contains two different vulnerabilities: An information sharing flaw (CVE-2016-0777) A less harmless buffer overflow flaw (CVE-2016-0778) The vulnerability does not have any catchy name like some previous OpenSSH flaws. Impact of the Vulnerability This new feature can be exploited by hackers, who could use a malicious OpenSSH server to trick an affected client to give up the SSH keys when they try to log in. Cyber crooks with one compromised server can secretly grab SSH private keys required to log into other systems from a user's PC, allowing them to jump from server to server. The vulnerability, which is said to be years old, was uncovered by researchers from Qualys' security team on 11 January and the issue was fixed within three days by the OpenSSH team with the release of a patch. Here's what OpenSSH officials said in an advisory published Thursday: Who is Affected by the Serious Flaw? The flaw resides in the versions 5.4 to 7.1 of the OpenSSH client, which end users use to connect to servers and not resides in versions used by servers. The issue affects users running OpenSSH client on most modern operating systems includingLinux, FreeBSD and Mac OSX, as well as it may also affect users running OpenSSH for Windows. However, users running PuTTY on Windows are safe. So, users don't have to update OpenSSH on the server side (Droplet), but should update the OpenSSH client on their local computer. How to Fix the Flaw? The OpenSSH team patched the security flaw in version 7.1p2 on Thursday. So, users and organisations are strictly advised to patch their OpenSSH implementations immediately, as well as regenerate their SSH private keys as a precaution. The latest builds of FreeBSD and OpenBSD have also been patched, as have Debian, Ubuntu, and RedHat Enterprise Linux (RHEL). Since security patches and updates are being released for the affected distributions, the client-side roaming feature causing this security bug can be disabled manually in order to resolve the issue. On OS X, Linux and BSD variants, disabling roaming feature can be done by adding a line of code to your SSH configuration. On FreeBSD and Linux Run the given command to add the new line to your configuration: On Mac OSX Run the given command to add the new line to your configuration: Once this is done, you need to close any open SSH session in order for the change to be effective. Proof-of-Concept Exploit OpenSSH said they are not aware of attacks in wild exploiting this flaw, but Qualys said this issue may have already been exploited in the wild by sophisticated attackers. Later on Thursday, Qualys published a post, including a proof-of-concept exploit code, effectively lighting a fire under every affected OpenSSH client. The vulnerability is thought to be one of the most severe vulnerabilities discovered in the open-source software in years, and it's difficult to say how big the impact will be. Patch Now! Patch Fast! Be Safe!
  17. if (pkNewItem->GetVnum() == 16209) { for (BYTE i = 0; i < ITEM_ATTRIBUTE_MAX_NUM; ++i) pkNewItem->SetForceAttribute(i, 0, 0); } Best Regards Ken
  18. At first, the item pointer is the old pointer. You have to choose the new one. (pkNewItem) for (BYTE i = 0; i < ITEM_ATTRIBUTE_MAX_NUM; ++i) pkNewItem->SetForceAttribute(i, 0, 0); You should add this command before add item to character. Best Regards Ken
  19. @BackPlayer I fixed the error. You can now use it. Best Regards Ken
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.