Jump to content
Facebook Twitter Youtube

Destroid™

Members
  • Posts

    605
  • Joined

  • Last visited

  • Country

    Albania

Everything posted by Destroid™

  1. Name of the oponent: Olee Theme of work: Type of work (signature, banner, avatar, Userbar, logo, Large Piece): Avatar Size: 150x250 *Text: Battle Watermark: csbd or csblackdevil Working time: 12h Only me and olee.
  2. Hello, This happend to me also , but you can still check your notifications . Click on "My settings" , then "My Notifications" .
  3. At 7-foot-6, 15-year-old Robert Bobroczkyi is already taller than New York Knicks sensation Kristaps Porzingis -- or any other current NBA player. He has a nice shooting touch and solid passing skills, too. So it's no wonder that Bobroczkyi is generating buzz among youth league scouts in Europe. What the Romanian lacks, though, are any traces at all of muscle on his 184-pound frame. He runs awkwardly, and tires easily. That's why the Rome academy where Bobroczkyi is based -- the same youth club that produced Brooklyn Nets player Andrea Bargnani -- has decided to dedicate this season exclusively to fitness and strength. This being Italy, the recipe is simple: pasta, pasta and more pasta. Following an individual nutrition plan created for him by specialists at the National Institutes of Health (NIH) in Bethesda, Maryland, Bobroczkyi is eating more than 2 pounds of pasta per day. "We're not interested in basketball right now. The top priority is his health," Stellazzurra Basketball Academy general manager Giacomo Rossi said in a recent interview with the Associated Press. "For someone with his physical stature, the usual practice sessions are just not enough. He needs individual attention." Having helped Stellazzurra to the under-15 national title in Italy last season, Bobroczkyi is sitting this season out and playing in only select tournaments. "We've got to make sure that five years from now not only can he play basketball but that he's also a fairly normal person," Rossi said. "This is going to be a long and difficult season for him but it's also going to be the most important season of his life. Because every day, all day, he's following an individual project created specifically for him with a staff of physicians." Bobroczkyi is living with a host family in Frosinone -- about an hour drive south of Rome -- near a fully equipped physical therapy and rehabilitation center. His nutritionist also works for the Frosinone soccer club in Italy's top division. "He eats seven times per day," said physiotherapist Daniele Comandini, who is looking after Bobroczkyi. "He's not eating McDonald's or kebabs. That's banned." Since he arrived in Rome last year, Bobroczkyi has gained 30 pounds. And he is still getting taller. In August, Bobroczkyi visited with Child Health and Human Development specialist Lyssikatos Charalampos and other physicians at the NIH. "They performed every possible exam on him," Comandini said. "He's in perfect health." Bobroczkyi runs awkwardly because his hips are slanted. "The problem with his hips is normal for someone of his height," Comandini said. "He grew so rapidly that his hips don't correspond with the other bones yet." The hope is that once he stops growing and develops some muscles, Bobroczkyi will run normally. "The conclusion at the NIH was that there is nothing wrong and it's all genetics," Comandini said. That makes perfect sense considering that Bobroczkyi's father is 7-foot-1 and played on Romania's national team with Gheorghe Muresan -- the 7-foot-7 giant who was the tallest NBA player in history. Bobroczkyi's mother is also tall and was an accomplished handball player. And his four-year-old sister Arianna was nearly an inch longer than him at birth. Bobroczkyi started playing basketball at the age of 5, and his idol was Yao Ming. "Now I have two," Bobroczkyi said. "Anthony Davis and Kristaps Porzingis." Stellazzurra is being highly protective of Bobroczkyi, although the team did let him sit in on an interview with team officials. He speaks five languages -- Romanian, Italian, English, Serbian and Hungarian. Asked where he would like to play in the [CENSORED]ure, Bobroczkyi responded "Euroleague." Team officials say Bobroczkyi has a high basketball IQ, and that's evident on videos of him circulating on the Internet. As you would expect, he blocks shots and easily shoots over shorter players. But he also shows strong passing skills, hitting cutting players who can easily finish layups as the defense concentrates on Bobroczkyi. "I think his greatest talent is his passing skills," Rossi said. "On defense, he intimidates. But he needs to have the body that can stand up over the course of an entire game. He's never going to be someone who can play all 40 minutes but he's got to be able to make an impact in the 20 minutes that he does play." Bobroczkyi is scoring six to seven points per game.
  4. Name of the oponent: GFX Team Theme of work: http://www36.zippyshare.com/v/yJGYdUsC/file.html Type of work (signature, banner, avatar, Userbar, logo, Large Piece): Signature Size: 500x300 *Text: Battle Watermark: csblackdevil Working time: 2days
  5. Slovenia rejected on Sunday a law that would give same-sex couples the right to marry and adopt children in its second vote on *ay rights in four years. About 63.4 percent of voters rejected the law in a referendum while 36.6 percent supported it, a preliminary result of the State Electoral Commission showed after 99 percent of votes were counted. Parliament passed a law in March giving same-sex couples the right to marry and adopt children but the measures have not been enforced because a civil society group called For Children appealed to the top court, calling for a referendum. In another referendum in 2012, almost 55 percent of voters in the European Union member state and ex-Yugoslav republic opposed giving more rights to same-sex couples. "I personally am disappointed but I still believe that Slovenia is generally moving towards a more inclusive society and I am sure that a similar law will be enforced at some point in the [CENSORED]ure," Roman Kuhar, a male sociologist who has been living with his male partner for 11 years, told Reuters. "The problem is that only people who are strongly against the law or strongly in its favor vote in a referendum. If most other people would cast a vote, as well, I believe the law would be enforced," he added. Turnout on Sunday was 36.2 percent. The government supported the new law but did not participate in the referendum campaign. The main opposition party, the Slovenian Democratic Party (SDS), was against the law. "We are against the law that would deny the basic right of a child to have a mother and a father," For Children said on its website. The small Alpine state of 2 million citizens is relatively tolerant of gay couples who have been able to formally register their relationship since 2006 and are also allowed to adopt children from a partner's previous relationship - though not other children. A number of EU states have legally recognized same-sex marriages, including Britain, France and Spain, but the issue remains contentious in many other EU states.
  6. Greece is set to recognize the state of Palestine in a parliamentary vote to be attended by Palestinian Authority President Mahmoud Abbas, a government source says. A solemn ceremony will accompany the vote on Tuesday as Greece joins dozens of other countries that accord recognition to Palestine, the source says. Abbas in Athens will meet President Prokopis Pavlopoulos and Prime Minister Alexis Tsipras. Last week, the Greek parliament’s foreign affairs committee unanimously approved a motion to recognize Palestine.
  7. As part of Reddit’s annual Secret Santa, which 120,650 users of the website signed up for this year, Bill Gates got his Kris Kringle on, giving one lucky Reddit user the gift of getting a gift from Gates himself. According to Business Insider, Gates gave user NayaTheNinja a bunch of new outdoor gear, including a mosquito net, a tent and a camping chair along with a Gates-picked playlist and a book called “Thing Explainer.” But the cherry on top was something less tangible: a donation to the charity Malaria No More, which works toward eradicating the disease. On her Reddit gift page, NayaTheNinja explained why the donation to the charity was so special to her: Last year I had the opportunity to visit a friend finishing up her Peace Corps service in Zambia. I spent a few days in her rural village with her and then we traveled around for a few weeks. Because I prefer to talk to locals rather than spend all my time traveling with other tourists, we did a lot of chatting with people. A topic that came up more frequently than one might like if they were looking to keep the conversation light and cheerful is the prevalence of malaria. A man I talked to in Zambia told me that it had been years since he’d had it and he was pretty stoked about that. Someone I talked to on Zanzibar thought the USA as a whole is the best thing ever because some program (an NGO? The government? I’m not sure) helped facilitate insecticide spraying, which brought down the malaria rates (and therefore deaths) considerably. PC volunteers I talked to shared the experiences they had with malaria when they stopped taking their anti-malarial meds and said it was really miserable even with readily available and top of the line medical care. Gates has been fighting Malaria through the Bill and Melinda Gates Foundation for years so it’s not a surprise that he would be privy to how important the issue is. “You and I have something in common: We both hate mosquitos!” Gates wrote in his Secret Santa note. “One of my Secret Santa presents to you is a donation in your name to Malaria No More, because no child should ever die of a mosquito bite.” Gates has participated in Reddit’s Secret Santa for the last few years, so sign up next year and, who knows, he may just grant your wish.
  8. Costa Rica is a small country with not more than 5 million. The country has recently made headlines by operating 100% on renewable energy for 285 days. The Costa Rican Electricity Institute(ICE) released a statement that 99% of the electricity came from renewable sources this year in 2015. Fossil fuels provided the rest 1% . The Costa Rican government announced on March that the country had been running fully on renewable energy for the first 75 days of 2015..It also placed a target to run 97.1 percent on geothermal, wind, biomass and solar sources for the rest of the year. Its has become a race among countries for utilizing renewable energy to its full extent. Uruguay is another country that is generating 95% of its electricity from renewable energy. Iceland almost gets all its electricity from clean sources. Recently, Denmark generated almost 140% of its electricity demand from wind turbines. The [CENSORED]ure of renewable energy seems promising. According to a recent analysis by the Renewable Electricity [CENSORED]ures Study , Renewable Energy Can Provide 80 Percent of U.S. Electricity by 2050. Out of the 80%, almost 49–55% of electricity could be provided by wind and solar.
  9. ENCRYPTION BACKDOORS HAVE been a hot topic in the last few years—and the controversial issue got even hotter after the terrorist attacks in Paris and San Bernardino, when it dominated media headlines. It even came up during this week’s Republican presidential candidate debate. But despite all the attention focused on backdoors lately, no one noticed that someone had quietly installed backdoors three years ago in a core piece of networking equipment used to protect corporate and government systems around the world. On Thursday, tech giant Juniper Networks revealed in a startling announcement that it had found “unauthorized” code embedded in an operating system running on some of its firewalls. The code, which appears to have been in multiple versions of the company’s ScreenOS software going back to at least August 2012, would have allowed attackers to take complete control of Juniper NetScreen firewalls running the affected software. It also would allow attackers, if they had ample resources and skills, to separately decrypt encrypted traffic running through the Virtual Private Network, or VPN, on the firewalls. “During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections,” Bob Worrall, the companies’ CIO wrote in a post. “Once we identified these vulnerabilities, we launched an investigation into the matter, and worked to develop and issue patched releases for the latest versions of ScreenOS.” Juniper released patches for the software yesterday and advised customers to install them immediately, noting that firewalls using ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20 are vulnerable. Release notes for 6.2.0r15 show that version being released in September 2012, while release notes for 6.3.0r12 show that the latter version was issued in August 2012. The security community is particularly alarmed because at least one of the backdoors appears to be the work of a sophisticated nation-state attacker. “The weakness in the VPN itself that enables passive decryption is only of benefit to a national surveillance agency like the British, the US, the Chinese, or the Israelis,” says Nicholas Weaver, a researcher at the International Computer Science Institute and UC Berkeley. “You need to have wiretaps on the internet for that to be a valuable change to make [in the software].” But the backdoors are also a concern because one of them—a hardcoded master password left behind in Juniper’s software by the attackers—will now allow anyone else to take command of Juniper firewalls that administrators have not yet patched, once the attackers have figured out the password by examining Juniper’s code. Ronald Prins, founder and CTO of Fox-IT, a Dutch security firm, said the patch released by Juniper provides hints about where the master password backdoor is located in the software. By reverse-engineering the firmware on a Juniper firewall, analysts at his company found the password in just six hours. “Once you know there is a backdoor there, … the patch [Juniper released] gives away where to look for [the backdoor] … which you can use to log into every [Juniper] device using the Screen OS software,” he told WIRED. “We are now capable of logging into all vulnerable firewalls in the same way as the actors [who installed the backdoor].” But there is another concern raised by Juniper’s announcement and patches—any other nation-state attackers, in addition to the culprits who installed the backdoors, who have intercepted and stored encrypted VPN traffic running through Juniper’s firewalls in the past, may now be able to decrypt it, Prins says, by analyzing Juniper’s patches and figuring out how the initial attackers were using the backdoor to decrypt it. “If other state actors are intercepting VPN traffic from those VPN devices, … they will be able to go back in history and be able to decrypt this kind of traffic,” he says. Weaver says this depends on the exact nature of the VPN backdoor. “If it was something like the Dual EC, the backdoor doesn’t actually get you in, … you also need to know the secret. But if it’s something like creating a weak key, then anybody who has captured all traffic can decrypt.” Dual EC is a reference to an encryption algorithm that the NSA is believed to have backdoored in the past to make it weaker. This factor, along with knowledge of a secret key, would allow the agency to undermine the algorithm. Matt Blaze, a cryptographic researcher and professor at the University of Pennsylvania, agrees that the ability to decrypt already-collected Juniper VPN traffic depends on certain factors, but cites a different reason. “If the VPN backdoor doesn’t require you to use the other remote-access [password] backdoor first,” then it would be possible to decrypt historical traffic that had been captured, he says. “But I can imagine designing a backdoor in which I have to log into the box using the remote-access backdoor in order to enable the backdoor that lets me decrypt intercepted traffic.” A page on Juniper’s web site does appear to show that it’s using the weak Dual EC algorithm in some products, though Matthew Green, a cryptography professor at Johns Hopkins University, says it’s still unclear if this is the source of the VPN issue in Juniper’s firewalls. Juniper released two announcements about the problem on Thursday. In a second more technical advisory, the company described two sets of unauthorized code in the software, which created two backdoors that worked independently of one another, suggesting the password backdoor and the VPN backdoor aren’t connected. A Juniper spokeswoman refused to answer questions beyond what was already said in the released statements. Regardless of the precise nature of the VPN backdoor, the issues raised by this latest incident highlight precisely why security experts and companies like Apple and Google have been arguing against installing encryption backdoors in devices and software to give the US government access to protected communication. “This is a very good showcase for why backdoors are really something governments should not have in these types of devices because at some point it will backfire,” Prins says. Green says the hypothetical threat around NSA backdoors has always been: What if someone repurposed them against us? If Juniper did use Dual EC, an algorithm long-known to be vulnerable, and this is part of the backdoor in question, it underscores that threat of repurposing by other actors even more. “The use of Dual EC in ScreenOS … should make us at least consider the possibility that this may have happened,” he told WIRED. The first backdoor Juniper found would give an attacker administrative-level or root privileges over the firewalls—essentially the highest-level of access on a system—when accessing the firewalls remotely via SSH or telnet channels. “Exploitation of this vulnerability can lead to complete compromise of the affected system,” Juniper noted. Although the firewall’s log files would show a suspicious entry for someone gaining access over SSH or Telnet, the log would only provide a cryptic message that it was the “system” that had logged on successfully with a password. And Juniper noted that a skilled attacker would likely remove even this cryptic entry from log files to further eliminate any indication that the device had been compromised. The second backdoor would effectively allow an attacker who has already intercepted VPN traffic passing through the Juniper firewalls to decrypt the traffic without knowing the decryption keys. Juniper said that it had no evidence that this vulnerability had been exploited, but also noted that, “There is no way to detect that this vulnerability was exploited.” Juniper is the second largest maker of networking equipment after Cisco. The Juniper firewalls in question have two functions. The first is to ensure that the right connections have access to a company or government agency’s network; the other is to provide secured VPN access to remote workers or others with authorized access to the network. The ScreenOS software running on Juniper firewalls was initially designed by NetScreen, a company that Juniper acquired in 2004. But the versions affected by the backdoors were released under Juniper’s watch, eight years after that acquisition. The company said it discovered the backdoors during an internal code review, but it didn’t say if this was a routine review or if it had examined the code specifically after receiving a tip that something suspicious was in it. Speculation in the security community about who might have installed the unauthorized code centers on the NSA, though it could have been another nation-state actor with similar capabilities, such as the UK, China, Russia, or even Israel. Prins thinks both backdoors were installed by the same actor, but also notes that the hardcoded master password giving the attackers remote access to the firewalls was too easy to find once they knew it was there. He expects the NSA would not have been so sloppy. Weaver says it’s possible there were two culprits. “It could very well be that the crypto backdoor was [done by] the NSA but the remote-access backdoor was the Chinese or the French or the Israelis or anybody,” he told WIRED. NSA documents released to media in the past show that the agency has put a lot of effort into compromising Juniper firewalls and those made by other companies. An NSA spy tool catalogue leaked to Der Spiegel in 2013 described a sophisticated NSA implant known as FEEDTROUGH that was designed to maintain a persistent backdoor in Juniper firewalls. FEEDTROUGH, Der Spiegel wrote, “burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers…..” It’s also designed to remain on systems even after they’re rebooted or the operating system on them is upgraded. According to the NSA documents, FEEDTROUGH had “been deployed on many target platforms.” FEEDTROUGH, however, appears to be something different than the unauthorized code Juniper describes in its advisories. FEEDTROUGH is a firmware implant—a kind of “aftermarket” spy tool installed on specific targeted devices in the field or before they’re delivered to customers. The unauthorized code Juniper found in its software was embedded in the operating system itself and would have infected every customer who purchased products containing the compromised versions of the software. Naturally, some in the community have questioned whether these were backdoors that Juniper had voluntarily installed for a specific government and decided to disclose only after it became apparent that the backdoor had been discovered by others. But Juniper was quick to dispel those allegations. “Juniper Networks takes allegations of this nature very seriously,” the company said in a statement. “To be clear, we do not work with governments or anyone else to purposely introduce weaknesses or vulnerabilities into our products… Once this code was discovered we worked to produce a fix and notify customers of the issues.” Prins says the larger concern now is whether other firewall manufacturers have been compromised in a similar manner. “I hope that other vendors like Cisco and Checkpoint are also now starting a process to review their code to see if they have backdoors inserted,” he said.
  10. v2 - Text , Blur , Border , Texture , Brush.
  11. Name of the oponent: m3llo Theme of work: Type of work (signature, banner, avatar, Userbar, logo, Large Piece):Avatar Size: 150x250 *Text: Skate Watermark: csbd or csblackdevil Working time: 24h
  12. Welcome To Csblackdevil , Nicolas!

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links