Sari la conținut

Reclame plătite


  • Număr conținut

  • Înregistrat

  • Ultima Vizită

Reputație Comunitate

15 Incepator

2 Urmăritori

Despre Angrry™

  • Rang
  • Dată Naștere Octombrie 20

Contact Methods

  • Facebook

PC Specs & Gear

  • GPU
    AMD RX 460 4GB GDDR5
  • CPU
    AMD A 10 5800K
  • RAM
    12 GB 1600 MHz
  • Memory
    1x SSD 256GB, 1x HDD 500 GB, 1x HDD 1 TB, 1x WD Blue 2 TB
  • Power
    620 W
  • Case
  • Monitor
  • Keyboard
  • Mouse
  • Headset
  • OS
    Windows 10 Pro & Ubuntu 16.04
  1. Contra, cam vorbesti aiurea (injuraturi uneori) si faci spam. Nu ar fii frumos sa faci la fel si cand esti admin.
  2. Pro
  3. Nume: CosminVârsta: 21Nick: AngrrySteamID: STEAM_0:1:57641905Profil steam: jucate pe server: o ora si ceva (™/ intrat în grupul de steam al serverului?: Cred ca da.Ai citit regulamentul?: nu (chestia e ca initial chiar voiam sa raspund cu nu :)) ca n-am avut chef sa ma uit )
  4. Security researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting almost all Wi-Fi devices—including in our homes and businesses, along with the networking companies that build them. Dubbed KRACK—Key Reinstallation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected Wi-Fi networks and can be abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos. Since the weaknesses reside in the Wi-Fi standard itself, and not in the implementations or any individual product, any correct implementation of WPA2 is likely affected. According to the researchers, the newly discovered attack works against: Both WPA1 and WPA2, Personal and enterprise networks, Ciphers WPA-TKIP, AES-CCMP, and GCMP In short, if your device supports WiFi, it is most likely affected. During their initial research, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by the KRACK attacks. The researchers say their key reinstallation attack could be exceptionally devastating against Linux and Android 6.0 or higher, because "Android and Linux can be tricked into (re)installing an all-zero encryption key (see below for more info)." However, there's no need to panic, as you aren't vulnerable to just anyone on the internet because a successful exploitation of KRACK attack requires an attacker to be within physical proximity to the intended WiFi network. Source.