Search the Community

Showing results for tags 'register'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 9 results

  1. Register of firms and organizations of Ukraine. 04.16.2019. 1.681 kk Records: 1 681 836 Format: Cronos Date: 16/04/2019 Language: Ukrainnian Field: State EDRPOU code Name Short name Location Main activity (KVED) Name of the head Head's surname The name of the head The patronymic of the head Date of verification of the record Link: [HIDE][Hidden Content]]
  2. CPM : With Good Proxies +500 Proxy : YES Fake Good = NO You can Check Balance with Main login Config [HIDE][Hidden Content]]
  3. Joomla DT Register component version 4.0.3 suffers from a remote SQL injection vulnerability. View the full article
  4. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Update Log: - Added more hosting services and url shorteners Download: [hide][Hidden Content]] Virus Scan: [hide][Hidden Content]]
  5. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Download [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  6. Brand Integrator is a tool to register brand names in diferent service providers. Currently it can register brand names in blogs services, subdomains services, hosting services and url shorteners. Download [hide][Hidden Content]] Virus Scan [hide][Hidden Content]]
  7. WordPress Pie Register plugin version 3.0.17 suffers from a cross site scripting vulnerability. View the full article
  8. WordPress Pie Register plugin version 3.0.15 suffers from a cross site scripting vulnerability. View the full article
  9. If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before. The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids. The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment. The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.