This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Messages - Tsar
« on: January 21, 2012, 05:57:29 pm »
How much time is left until they will take down Rapidshare , Mediafire , fileflyer , Zippy
and much more?
Megaupload wasn't taken down because they "had illegal content on their servers", but rather because:
1. Some of their servers were hosting in the US and other places where DMCA take down notices must be compliant with
2. Upon receiving DMCA take down requests, staff would only delete the link to the content, instead of the actual content hosted on their servers
3. At one point they were paying people to upload illegal content to Mega Upload
4. The owners themselves were knowingly using the site to download illegal content (Which on their knowledge should of been removed by them)
EDIT: Almost forgot 5. At one point they downloaded(stole) and stored about 30% of youtube user's content on their servers.
Assuming sites like rapidshare aren't ran by dumb shady people they will continue to stay online.
SOPA\ACTA\PIPA states that every file which has any legal copyrights and you as a user which is not part of the file(lets say its a movie , you had nothing to do with it)
its a crime.
That isn't even a sentence...
« on: December 30, 2011, 08:00:50 am »
1. Hacking is simply using something in a way that it was not originally intended for. Today the term is bastardized however and is often used to describe the act of breaking into computer systems.
2. The process is a mixture of both security and computer knowledge. The rest is just using this knowledge to think analytically.
3. Ande summed it up good, but ill recant; it is programming that creates software, it is programming that makes software insecure or secure, by understanding programming, you will understand computer security. It is much like becoming an expert on locks; a locksmith with a strong understanding of how locks work and the different types and systems locks use, is more likely to be able to analyze a lock and open or break into a lock that is insecure than a regular every day person would.
Most movies are far from the real deal indeed.
On a side note: I recently watched "The Girl With The Dragon Tattoo" and hacking is portrayed pretty well, I didn't see anything that was unrealistic and as someone in computer security I think I picked up on a lot of the stuff they were doing in the film that they didn't explain that others would not have.
« on: December 27, 2011, 12:16:57 am »
Try Data Drow, it's free.
Looks cool, I'm going check this out.
« on: December 22, 2011, 05:41:46 am »
« on: December 22, 2011, 05:38:20 am »
I will give it a try hoping that i will make something.
I found Safe Engine Protector v22.214.171.124 There arer some info about it. Safengine Protector provides a powerful virtual machine to protect your applications against reverse engineering or unwanted modifications. During the virtualization process, your original code flow will be redirected with logical obfuscation, there will be no more than a NAND operation in the virtual machine to emulate logical operations such as AND, OR, NOT and XOR, while most arithmetical operations will be implemented via ADD so that it is very hard for a reverse engineer to tell how the original code works. Also, there will be no “conditional jump” instructions after virtualization, which makes crackers have no place to manipulate the execution flow.
First time i see this ****. At least its a good reason that i have a hard time.
Sounds like it will be pretty hard to do, but not impossible. Good research though. I would search more on how to crack Safengine Protector, I wasn't able to find much on it.
Here are some threads of people cracking similar products by the same companyhttp://forum.tuts4you.com/topic/21974-unpackmesafengine-licensor-v1720/http://forum.tuts4you.com/topic/24677-a-very-cool-crackme-with-strong-anti-debugger/
The people on tuts4you might have better answers for us about reversing Safengine Protector.
« on: December 21, 2011, 11:51:56 pm »
People aren't going to go through the process of decompiling it because they are too lazy and don't care about cracking this. So if you want help you will have to meet us half way.
My suggestion is to decompile the main exe only, cause that is probably where you will have to crack. If you want us to see it I suggest posting the assembly here using a service like PasteBin.
Lastly this is how I would go about cracking it:
In order to crack this program, you are going to need to understand how its verification process is working
1. See if it connects to the internet when ran, if it does it is most likely because its being authenticated with a server somewhere
2. It says on the site it will work the first 24 hrs as a trial, look for a way to make it so this 24hrs never runs out, it may even store the time left on a file somewhere in your system.
3. If it is using a server to authenticate each time, try replacing this authentication/server connection and hardcoding in a way so it automatically lets you in or skips authentication.
« on: December 21, 2011, 11:26:23 pm »
program is called pgrind. all i need is a registration key. I know that is checked when i start it and there are not any string references. Also i try to find GetserialdriveA API call to change the values but i cant find it. You can freely sk me for any details you need. Its first time i write about these things and my vocabulary is not very well.
Does the key get registered or checked by some kind of server externally ever?
Also post the assembly code perhaps? People can only direct you based on how much information you give, so far you have given very little
« on: December 21, 2011, 08:15:25 pm »
Welcome to EZ
Why not Python instead of Perl?
Why not Perl instead of Python?
« on: December 21, 2011, 12:50:48 am »
Hi there mates...
I'm Darío (Unbr0ken in the network), i'm from South America, i'm 18 years old, and... i came here for just one reason: LEARN KERNEL PROGRAMMING.
I hope get it before 2013, so... that's it, I love kernel coding, and... i wish learn it as well here.
Btw: Good forum, you f**k me for a while with the equation in the registration area. xD
P.S.: I don't speak/write english as well, so... forgive me for any spell mistakes.
Interesting, welcome to the forums. My question is why kernel programming? I've modified the linux kernel a time or two, but I didn't enjoy it lol.
« on: December 20, 2011, 12:20:53 am »
Yours is a tail recursion.
It is, but it doesn't really show the principle of it. It is a bad example to demonstrate both linear and tail recursion, because it doesn't return.
« on: December 20, 2011, 12:13:29 am »
Last warning - English only in all forums. You can talk your own language in the International section.
Welcome to the Forum sm0king.
« on: December 17, 2011, 08:52:04 pm »
Looks like you are basically just generating a number?
« on: December 17, 2011, 08:45:16 pm »
Like already mentioned, unless this is completely polymorphic. This is going to be not so FUD in a few weeks.
And even then if the code is out, there are ways to detect polymorphic code.
« on: December 17, 2011, 08:39:33 pm »
Java is slower but most people just rehash stuff they hear from elitest professors and people on the net that then say C is better, then there is a whole other group of even more elitest people who say that functional languages are better. The fact is unless you are doing something that needs to be heavily optimized, you won't see the difference between a program written Java and one written in C/C++, Java is faster to write, and more portable as well. If you don't believe me try writing client/server code that passes heavily encrypted messages through a socket in C. Now do the same in Java; it will be about 200 lines less and take a quarter of the time to write. Basically it all comes down to using the right tool for the first job.
Welcome to the forum.