elhacker.net cabecera Bienvenido(a), Visitante. Por favor Ingresar o Registrarse
¿Perdiste tu email de activación?.

 

 


Tema destacado: Arreglado, de nuevo, el registro del warzone (wargame) de EHN


  Mostrar Mensajes
Páginas: 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 [63] 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 172
621  Comunicaciones / Redes / Re: Compartir carpeta en red con Servidor de Archivos Windows Server 2008 en: 13 Julio 2011, 17:19 pm
Por lo que nos estás contando, con lo que te ha dicho el usuario l337*, con un acceso directo debería bastar.

Para acceder a mi NAS tengo un acceso directo en el escritorio:

622  Programación / Desarrollo Web / Re: BBcode to HTMl me faltan cosas... en: 13 Julio 2011, 09:13 am
[glow] - No hace más que ponerle un fondo rojo a una etiqueta <span>
Código:
 <span style="background-color: red;">Text con Glow</span>
[shadow] - Agrega una sombre (la etiqueta que se usa no es crossbrowser).
Código:
<span style="text-shadow: red left">Text con Shadow</span>

[pre ] - Usa las etiquetas HTML <pre>

[code ] - Agrega un <div> + <pre>
Código:
<div class="code">
<pre style="margin-top: 0; display: inline;"><span style="text-shadow: red left">Text con Code</span></pre>
</div>

[ftp ] - Un enlace FTP:
Código:
<a target="_blank" href="ftp://ruta_hacia_el_ftp">Enlace al FTP</a>

[list ]
[li ][/li][/list]
[li ][/li][/list]
[/list ]


Eso genera una simple lista HTML:
[/list]
Código:
<ul style="margin-top: 0; margin-bottom: 0;">
<li></li>
<li></li>
</ul>
623  Comunicaciones / Redes / Re: Hacer que un programa muestre imagenes guardadas en un servidor en: 12 Julio 2011, 22:33 pm
Lee la documentación de LoadImage() y prueba el código de ejemplo:

Código:
; LoadImage and DrawImage example

; Declare a variable to hold the graphic file handle
Global gfxPlayer

; Set a graphics mode
Graphics 640,480,16

; Set drawing operations for double buffering
SetBuffer BackBuffer()

; Load the image and assign its file handle to the variable
; - This assumes you have a graphic called player.bmp in the
; same folder as this source code
gfxPlayer=LoadImage("player.bmp")

; Let's do a loop where the graphic is drawn wherever the
; mouse is pointing. ESC will exit.
While Not KeyHit(1)
Cls ; clear the screen
DrawImage gfxPlayer,MouseX(),MouseY() ; Draw the image!
Flip ; flip the image into view and clear the back buffer
Wend 

Podrías descargarla primero en un directorio normal y luego cargarla desde Blitz.
 
624  Comunicaciones / Redes / Re: Como dejo pasar utorrent? en: 12 Julio 2011, 22:21 pm
En las reglas IPTables que mencionas, estás denegando, es imposible que funcione si deniegas el tráfico que pasa por el rango de puertos.

Cabe destacar, que las reglas son escalares. También se podría hacer con una redirección NAT estilo:

< el tráfico que viene por estos puertos (los del utorrent) redirigirlos a mi IP >
625  Foros Generales / Dudas Generales / Re: ¿Teneis una lista de webs de Antivirus, scanners online,y seguridad informatica? en: 12 Julio 2011, 20:40 pm
Rescatado de la caché de Google:

Citar
Good Spyware Resource Site
The current spyware/adware/scumware plague is reaching near epidemic proportions. This free site offers an excellent set of protection/removal tools and many other resources.
http://www.mvps.org/inetexplorer/Darnit.html

Good Malware Prevention and Removal Site
Here you can find excellent advice on how to configure your system to reduce the chance of spyware infection plus detailed information how to remove an existing infection. Most of this information is available elsewhere but the site owner Shanmuga has done an excellent job compiling the information and making it accessible. Well worth visiting and bookmarking.
http://www.malwarehelp.org/

How to Remove Spyware (And Other Nasties) from Your PC
This practical guide is as good as I've seen but it's not suitable for newbies.
http://www.michaelhorowitz.com/removespyware.html

Help for Spyware You Can't Remove
Some spyware just keeps on re-appearing on your PC no matter how many times you remove it. When this happens, download HijackThis from this page and follow the instructions. The page also shows you how to post the output from HijackThis to the Tom Coyote web forums. These folks should be able to help you permanently get rid of the problem. It won't cost you a cent either.
http://www.tomcoyote.org/hjt/

Check Your Browser Defenses
I just discovered this site operated by security company Scanit and its set of tests is quite comprehensive. Given the current scumware plague, I strongly recommend you go to this site and test out your browser. It's free and only takes a couple of minutes.
http://bcheck.scanit.be/bcheck/

Run Online Virus Scan from Both Internet Explorer and FireFox
I've mentioned elsewhere the excellent Trend Micro online virus scanning service but lamented the fact that the service utilized ActiveX and consequently could only be accessed through Internet Explorer. Thanks to Terry Smith who sent me a non-ActiveX link where you can run the Trend scan using FireFox or indeed any browser that supports Java. It's well worth bookmarking as this is one of the few online scans that will also remove infections rather than just detect them.
http://fr.trendmicro-europe.com/consumer/products/housecall_launch.php

Spyware Removal Utilities That Are Actually Spyware
A few issue back I mentioned a number of bogus spyware removal utilities, many with names deceptively similar to well known legitimate products. This site has a more complete list with over 100 entries. Many of the "free" apps generate large numbers of fake "infections" to alarm users into purchase. Others are simply spyware applications. Proof positive that scumware comes from scums.
http://www.spywarewarrior.com/rogue_anti-spyware.htm

Free Service Tests a Suspicious File
Got a program you'd like to run but not sure if it's kosher? Then upload it to this site where they'll run it through 13 different virus scanners and let you know the results.
http://virusscan.jotti.org

How to Test Your Email Security
A while back I mentioned these two sites that will send you a series of email messages, each of which tests for a specific known email vulnerability. The messages are quite safe so don't be alarmed if your virus scanner gives a warning. In fact, only get alarmed if your virus scanner doesn't give a warning!
http://www.gfi.com/emailsecuritytest/
http://www.jasons-toolbox.com/TestEmai

How to Improve Your Internet Security
This site offers some excellent security advice for experienced users. I particularly liked the suggested settings for enhancing thesecurity of Internet Explorer.
http://surfthenetsafely.com

Home of the Hacks
Trying to keep track of the security problems with various software products? This page will help you. While visiting, check out their user survey of the top security tools.
http://www.insecure.org/

Computer Security Tips
The International Computer Security Association has a Web site with lots of papers, pointers and other useful information for anyone involved in IT security issues. Well worth a browse.
http://www.icsa.net/

Popup Stopper Wars
How well does your popup stopper rate? Find out by running the tests at this site. The site also rates a range of freeware and commercial popup stoppers. The top performing free product was EMS Free Surfer, a product I'd never heard of.
http://www.popuptest.com
http://www.kolumbus.fi/eero.muhonen/FS/ <= EMS Free Surfer

 

Excellent Free Cryptography Resource
This site offers an excellent Cryptography FAQ. Well, it's more than an FAQ, it's practically a textbook. And you can download it.
http://www.rsasecurity.com/rsalabs/faq/index.htm

How Good is Your Password?
Check out the security of your passwords using this free service:
http://www.securitystats.com/tools/password.php

Great Security Resource for End-users
If you haven't the patience to answer beginners’ questions about computer security, you can refer them to this excellent resource site. Experienced users should check it out, too.
http://www.cert.org/homeusers/HomeComputerSecurity/

Comprehensive Vulnerability Database
OSVDB is an independent security vulnerability database that is free for all to use. It's large, up-to-date and comprehensive in its operating system coverage.
http://www.osvdb.org/

Scan Your In-house Software for Security Flaws
An increasing number of software products are appearing that analyze other software applications for security flaws and loopholes prior to implementation.
http://www.fortifysoftware.com/company.htm


Spam Haters Unite
The coalition against unsolicited commercial email has a site where you can find tips and techniques for blocking spam.
http://www.cauce.org/


Fuente.
626  Media / Diseño Gráfico / Re: Alguien sabe donde puedo encontrar esta imagen en: 12 Julio 2011, 20:36 pm
@madpitbull_99, WTF?

Si usaras más de tres palabras tal vez entendería lo que me quieres decir. Lo que te he pasado es un 3D de Photoshop de la tierra.

Puede servirte, si quieres dejarlo como el de la imagen que pones al principio.
627  Media / Diseño Gráfico / Re: Alguien sabe donde puedo encontrar esta imagen en: 12 Julio 2011, 18:54 pm


Te dejo el link del .psd del de arriba: Link.
628  Comunicaciones / Redes / Re: Ataque SYN flood en: 12 Julio 2011, 18:49 pm
No me digas que le estás haciendo un ping of death al router? ¿Que herramientas estás usando?

La clave de porque no funciona, la encontrarás en este post.


629  Seguridad Informática / Hacking / Re: Anonymous Manual Super Secreto [pdf] en: 12 Julio 2011, 18:24 pm
Trata de nociones básicas, aunque interesantes.

Dejo el índice del documento:

  • Índice [ind2]
  • Prólogo [pro1]
  • Índice [ind2]
  • Introducción [int3]
  • Protección Personal [prs4]
    • Protección Física [fis5]
    • Protección en Internet [int6]
  • Seguridad en Internet [isc7]
    • VPNs [vpn8]
    • I2P [i2p9]
    • Proxies [prx0]
    • TOR Onion Router [tor1]
  • Comunicaciones [cmm2]
  • nformación Adicional [add3]
    • Emails Temporales [eml4]
    • Plugins para Firefox [ffx5]
    • Paquete de Protección Anonymous [pkg6]

Sería bueno promover la distribución de este documento, lo he subido a un par de hostings más: MultiUpload | MirrorCreator.
630  Programación / PHP / Re: buscar por nombre y apellido en: 12 Julio 2011, 00:13 am
Código
  1. SELECT CONCAT(nombre,' ', apellidos) AS Nombres
  2. FROM usuarios

El tercer valor ' ' es para que haya un espacio en blanco, entre el nombre y el apellido.
Páginas: 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 [63] 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 172
WAP2 - Aviso Legal - Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines