Showing posts with label PTx Wiki. Show all posts
Showing posts with label PTx Wiki. Show all posts

Crackers – Wikipedia

 

  1. ultimate-cracking-softwareCrackers software : Term used to designate programmers and decoders that make reverse engineering of a particular program, or alter the contents of a particular program to run correctly, many hackers alter the expiry dates of a particular program to make it work more than 30 days, or modify the trial mode to use as if it were a legitimate copy, or make an inner shift in the registration routine of the program so that it passes to accept any devices, such sofwares changed are known aswarez .
  2. Developers viruses , worms , trojans and other malware : software developers that create small to cause damage to the user.

Crackers are not considered people as distributors of warez and crackz , webmasters who provide on its pages, software without authorization from copyright owners or people who copy software pirates. The cracabiker is essentially a qualified professional in reengineering or reverse engineering of software or hardware. A hacker takes advantage of caractísticas systems in order to modify them. The hackers are self-taught (and hackers) and without any knowledge of the system revert hacks necessary to understand the systems back and forth a few times. Your changes are also made ​​because they are hacks upon hacks in general.

Crackers are confused with:

Digital graffiti: they act primarily for the purpose of being recognized. Want to become famous in the universe for both cyberpunk and alter web pages, a behavior very similar to the graffiti wall, leaving always signed his pseudonyms. Some leave messages of political content which should not be confused with cyber-terrorism.

Revanchist: employee or former employee of a company that for whatever reason decides to sabotage it clear goal of revenge. Usually worked in the computer industry company which greatly facilitates their work since they are well informed of system vulnerabilities.

Vandals: they act for the sake of causing harm to the victim. This damage may consist of simple server crash (leaving the machine briefly disconnected from the Internet) or even the total destruction of stored data.

Spies: they act to acquire sensitive information stored on the victim's computer. The data may have commercial content (a chemical formula a) or political (e-mails between consulates) or military (military programs).

Cyber-terrorists: terrorists are digital. Their motivations are often policies and their weapons are many, from the theft of confidential information to the local phone system crash or other actions of its kind.

Thieves: they have clear financial goals and usually attack banks in order to divert money to their accounts.

Robbers, also with financial goals, in general, seek to acquire credit card numbers stored in large commercial sites. Generally use a technique called "Phishing Scam", by sending an e-mail program that is run by a user, having access to your information.

Cracking

The act of breaking the security of a system often requires brilliance and ability to perform to explore ( exploiter ) known vulnerabilities of the target system with creativity.However some, 'mistakenly' defined as crackers, make use of known solutions to recurring problems in vulnerable systems, thereby copying or exploiting flaws discovered by others without any effort.

The Story of the Android ...

Man dreams, the work was born and ... Google bought!

It was nearly 8 years it all started. In fact, there are only roughly two years is that its existence was noted, and since then, its growth has been abrupt.

The division of the company's Android developers [x] cubeLABS built an infographic, intuitive, full of interesting information that indicates all the points determining the life of this mobile OS. Take a look!

android

 

There are several controversies suggest that influences the direction that Google took this OS, especially from Apple. The appearance of the first iPhone, no physical keyboard, occurred before a prototype Android be known with the same look. Coincidence or not, there is no doubt that the path that took smartphones goes against the concept.

Consider the history of the Android ... until now. Note the vertical bar, far right, which will indicate the market share in a given period.

androidhistory_info1

The year 2010 was crucial in propelling the Android. The continuity of version 2.0 (Eclair) and the appearance of version 2.2 (Froyo) were crucial for the market share had that year, a growth of around 400%.

Not everything "roses" and, together with the success, come up dragging several problems both in terms of stability (Honeycomb recently in version 3.0) or the general level of fragmentation (due to the wide range of devices that hold this OS).

androidhistory_info2

The distribution of the versions shown above is not a surprise. The brands that did not distribute the obligation to maintain the support of the products they sell, in order to update them, so there are about 20% of users with versions lower than 2.2 (to May/2010) with serious problems of compatibility with several applications in the Market.

Hopefully the Google in the past month of May in the event Google I / O, announced the mandatory support of at least 18 months from the date of release of its terminal.

The next version 4.0 was announced and named Ice Cream Sandwich, is scheduled for later this year and promises to correct some blemishes on this OS. Be able to function and adapt to either the tablet orsmartphones (like the Apple iOS), thanks to a single framework, and promises not have the minimum hardwarerequirements so you can work properly on any device.

What do you think the future of Android? Will be able to dominate the mobile market?

IPTV

microsoft_iptv

Internet Protocol television (IPTV) is a system through which Internet television services are delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats.
IPTV services may be classified into three main groups:
live television, with or without interactivity related to the current TV show;
time-shifted programming: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning);
video on demand (VOD): browse a catalog of videos, not related to TV programming.
IPTV is distinguished from general Internet-based or web-based multimedia services by its on-going standardization process (e.g., European Telecommunications Standards Institute) and preferential deployment scenarios in subscriber-based telecommunications networks with high-speed access channels into end-user premises via set-top boxes or other customer-premises equipment.

 

Definition

Historically, many different definitions of IPTV have appeared, including elementary streams over IP networks, transport streams over IP networks and a number of proprietary systems.
The official definition approved by the International Telecommunication Union focus group on IPTV (ITU-T FG IPTV) is as follows:
"IPTV is defined as multimedia services such as television/video/audio/text/graphics/data delivered over IP based networks managed to provide the required level of quality of service and experience, security, interactivity and reliability."
Another official and more detailed definition of IPTV is the one given by Alliance for Telecommunications Industry Solutions (ATIS) IPTV Exploratory Group on 2005:
"IPTV is defined as the secure and reliable delivery to subscribers of entertainment video and related services. These services may include, for example, Live TV, Video On Demand (VOD) and Interactive TV (iTV). These services are delivered across an access agnostic, packet switched network that employs the IP protocol to transport the audio, video and control signals. In contrast to video over the public Internet, with IPTV deployments, network security and performance are tightly managed to ensure a superior entertainment experience, resulting in a compelling business environment for content providers, advertisers and customers alike."
One definition for consumer IPTV is for single or multiple program transport streams (MPTS) which are sourced by the same network operator that owns or directly controls the "last mile" to the consumer's premises[citation needed]. This control over delivery enables a guaranteed quality of service (QoS), and also allows the service provider to offer an enhanced user experience such as better program guide, interactive services etc.
In commercial environments IPTV is widely deployed for distribution of live TV, video playout channels and Video on Demand (VOD) material across LAN or WAN IP network infrastructures, with a controlled QoS.

The First Google Logo

first_google_logoThis is the first colorful logo of Google. Google’s first name was Backrub. Backrub’s logo was simply a scan Larry Page’s hand from a flatbed scanner. Larry and Sergey decide that the BackRub search engine needs a new name. After some brainstorming, they go with Google – a play on the word “googol,” a mathematical term for the number represented by the numeral 1 followed by 100 zeros. The use of the term reflects their mission to organize a seemingly infinite amount of information on the web. After the name change, the new logo is designed. The first logo looks like a ‘Wordart’.

The screenshot below shows how Google was in 1997.

Google_in_1997-1024x640

Men Fight ( Homens da Luta )

ng1502265 

Men Fight revolutionaries are two musicians Portuguese , Vasco Duarte (Falâncio) and Nuno Duarte "Jel" (Neto). His songs are a parody of songs of the time of intervention PREC , and the characters that represent the group's members are caricatures of singers composite intervention at the time, since the slogans on clothing. One of his most popular songs is "And the people, man?".

Edited in 2010 an album called "The song is a weapon consisting of 14 titles.

Website : http://www.homensdaluta.com/

Translate Website

ShareThis