Jump to content

*CaRtoo'N™

Members
  • Posts

    1,765
  • Joined

  • Last visited

  • Country

    Guatemala

Everything posted by *CaRtoo'N™

  1. HAHAHA WTF ! @[N]audy

     

    1. [N]audy

      [N]audy

      hahhahah ese eres tu comiendo bananas    @*CaRtoo'N™

    2. *CaRtoo'N™

      *CaRtoo'N™

      hhhhhhhhhh nop !

  2. *CaRtoo'N™

    need help

    This is no problem men If you have a problem for a warning in the forum! Ask the person who warned but you not to do these nonsense posts !
  3. memories :'v

    <11:24:42> "THE TURIST": sethh my hero :3
    <11:24:54> "[Devolz] Devolz": hh
    <11:25:05> "[Sethhh.] Sethhh.": im not ur hero
    <11:25:20> "THE TURIST": :v

  4. hhhhhhhhh @XAadii  <_<

    <08:50:35> "*CaRtoo'N@CsBlackDevil.Com": fuc* my life
    <08:50:40> "XAadii": hahahahahaha
    <08:50:41> "XAadii": always
    <08:50:46> "*CaRtoo'N@CsBlackDevil.Com": -....-'
    <08:50:47> "XAadii": invite me for fuc* xD
    <08:50:58> "*CaRtoo'N@CsBlackDevil.Com": accepted  :v

    <22:53:19> "XAadii": lol
    <22:53:22> "XAadii": wow thanks

     

  5. An unknown number of Vine users may have had their email addresses and phone numbers exposed for up to a day, it’s been revealed. Twitter, which owns the video-looping site, has been contacting users to inform them of the breach. Vine fans will recall all too well how Twitter ended users’ ability to upload content to the app at the start of 2017, replacing it with the Vine Camera app that lets users create videos for Twitter or simply save them to a phone. The Vine website now acts as an archive for the millions of videos created by its users over the service’s three-year lifespan, and it’s this site which appears to have been at the center of the breach. In a message sent directly to Vine account holders, the social media company said it’d recently discovered that users’ email addresses and phone numbers had been exposed. No passwords or other personal data are thought to have been involved It reassured users that the information “can’t directly be used to access your account, and we have no information indicating that it has been misused,” adding that it fixed the bug within 24 hours of its discovery. As a result of the incident, Twitter urged Vine account holders to be “cautious if you receive emails or text messages from unknown senders. Please keep in mind that Vine will only send you communications from @twitter.com, and we will never send emails with attachments or request your password by email.” Twitter later posted a public message on Medium containing essentially the same information it sent to users. It’s not clear how or where the data may have been viewed, and it’s quite possible nothing will come of it, but Twitter deemed the incident serious enough to inform users and warn them to be wary of suspicious-looking emails..
  6. #RoomForManchester  ._.

  7. Nineteen people have been killed and about 50 injured in a suspected terror attack at Manchester Arena. Police were called to reports of an explosion at the venue at about 22:35 BST following a pop concert by the US singer Ariana Grande. The cause of the blast is unknown but North West Counter Terrorism unit is treating it as a possible terrorist incident, sources have told the BBC. Greater Manchester Police is working to set up a contact number for relatives. Officers have told the BBC there is a second suspect device near where the first explosion occurred. Reporters were moved away from the scene and a controlled explosion has taken place. BBC Home Affairs Correspondent Daniel Sandford said senior counter-terrorism officers were assembling in London and liaising with the Home Office. British Transport Police say the explosion was in the foyer area of Manchester Arena. Manchester Victoria station, which is close to the concert venue, has been closed and all trains cancelled. Manchester explosion: Latest updates 'Screaming and running' The BBC's Tim Ashburner, who is at the scene, spoke to some volunteer paramedics who treated the injured for "shrapnel-like injuries". A number of eyewitnesses have described the confusion in the aftermath. Andy Holey, who had gone to the arena to pick up his wife and daughter who had been at the concert, said: "As I was waiting, an explosion went off and it threw me about 30ft from one set of doors to the other set of doors. "When I got up I saw bodies lying on the ground. My first thought was to go into the arena to try to find my family. "When I couldn't find them, I went outside with the police and fire and looked through some of the bodies to try and find my wife and daughter. "I managed to find them eventually and they're OK. "It was definitely an explosion and it was some force. It happened near the box office at the entrance to the Arena." The police activity around the arena has been huge. There are blue flashing lights and cordons seemingly on almost every street corner. A wide area around the venue itself has been completely taped off, and the crime scene appears to be widening, with police pushing people further and further back. I've spoken to people who are shaken, scared and often tearful. One thing that's apparent is there are many, many young people, some of them with parents or guardians. One mother told me her priority was simply to get her daughters home. Other people have been more candid and have described seeing people covered in blood, or being treated by paramedics. There's still a huge sense of confusion and people are constantly searching for information while letting their families know they're safe. Robert Tempkin, 22, from Middlesbrough, said: "Everyone was screaming and running, there were coats and people's phones on the floor. People just dropped everything. "Some people were screaming they'd seen blood but other people were saying it was balloons busting or a speaker had been popped. "There were lots of ambulances. I saw somebody being treated. I couldn't tell what had happened to him." Josh Elliott, speaking to BBC Radio 5 Live, said he was shocked by news of the fatalities. "A bang went off and everyone stopped and screamed... we basically hit the deck," he said "It was bedlam… it was horrific. "We got up when we thought it was safe and got out as quickly as possible. "People were just crying and in tears... police cars were everywhere. "We just wanted to get out as quickly as possible because we didn't know what was going on." The background - Ian Youngs, BBC News entertainment reporter Manchester Arena, formerly known as the MEN Arena, is the biggest indoor venue in the city with a capacity of around 18,000 for concerts. The arena foyer connects with Victoria train and tram station, a major hub on the northern edge of the city centre. The arena regularly hosts concerts by major stars like Ariana Grande - a 23-year-old American TV teen actress-turned-pop star. She's a big draw for young fans, with hits including Problem, featuring Iggy Azalea, which hit number one in the UK in 2014; and Side To Side, featuring Nicki Minaj, which reached number four last year. She's currently on a European tour - she's already played Birmingham and Dublin and is due to be at the O2 Arena in London on Wednesday and Thursday. Michelle Sullivan, from Huddersfield, was attending the concert with her daughters, aged 12 and 15. "It was really scary," she said. "Just as the lights have gone down we heard a really loud explosion... Everybody screamed. "When we got out they just said 'keep on running, keep on running'." Pat Carney, Manchester City Council's spokesman for the city centre, said the city's thoughts were with the families of those killed and injured. "It's a very easy target - a concert hall where young people are enjoying music," he said. "The public are really co-operating by staying away from what is basically now a crime site. "The world we live in, police and the council have emergency procedures that we practise all the time. "Obviously everyone in the city is shocked, having seen how young some of these people are "The police are treating it as a live site, we don't know if this is the end or there are other incidents in that area... we don't know at the moment." Within an hour of reports of the incident emerging, people began offering spare rooms and beds to people stranded in the city using the hashtag #RoomForManchester. Hundreds of tweets offering places to stay are being shared and re-tweeted thousands of times.
      • 1
      • I love it
  8. Start voting <3 v1 v2
  9. Name of the oponent: @Zeus™ Theme of work: Type of work (signature, banner, avatar, Userbar, logo, Large Piece):AVATAR Size: 150 x 250 *Text: Neymar Watermark: - Working time: 6 Hours
  10. <15:53:51> "Otaku.-": I AM CARTOON 

    <3

  11. Accepted Good luck bro :3
  12. Real Madrid is champion but messi I leave a memory
    #Messi  ;)B)

     

    1. ʋσʀтεx™♛

      ʋσʀтεx™♛

      Video Unavailable !

      Cartoona -_-

    2. *CaRtoo'N™
  13. Hhhhhhhhhh Real Madrid #CHAMPIONS!!!!!!!
    congrats ¬¬

    1. maykel.

      maykel.

      hhhhhhhhhhhh lel

      #HALA MADRID!

    2. fL HPS

      fL HPS

      #HALAMADRID :yuhu:

    3. Crastto
  14. Welcome back mate

    It's an honor to see you again =))
     

  15. Happy Birthday ugly <3
  16. Bye friends
    I hope to come back soon <3 

    After my studies :3


    #Always_thunder!
     

  17. ._. @[N]audy @indio @Ace.

    <11:35:16> "Ace": otaku+guns=oatkugus
    <11:35:23> "Otaku.-": hAHA
    <11:35:26> "Otaku.-": wtf
    <11:35:27> "[[N]audy] [N]audy": lol
    <11:35:27> "Otaku.-": Xd
    <11:35:50> "indio": ._.
    <11:36:01> "[[N]audy] [N]audy": otaku+xaadi=otakugay :V
    <11:36:05> "indio": XDDDD
    <11:36:10> "SouL's Phone": hhhh
    <11:36:11> "Ace": )))
    <11:36:11> "indio": gayku
    <11:36:16> "indio": like dragon ball
    <11:36:22> "Otaku.-": ))))))

  18. Welcome back dude Enjoy.
  19. Friday saw the largest global ransomware attack in internet history, and the world did not handle it well. We’re only beginning to calculate the damage inflicted by the WannaCry program — in both dollars and lives lost from hospital downtime — but at the same time, we’re also calculating blame. There’s a long list of parties responsible, including the criminals, the NSA, and the victims themselves — but the most controversial has been Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it’s become painfully clear that patch didn’t reach all users. Microsoft was following the best practices for security and still left hundreds of thousands of computers vulnerable, with dire consequences. Was it good enough? For some, the answer is an obvious no. Writing in The New York Times over the weekend, sociologist Zeynep Tufecki placed the blame squarely on Microsoft for its decision to stop supporting older Windows versions. “Companies like Microsoft should discard the idea that they can abandon people using older software,” Tufecki wrote. “Industry norms are lousy to horrible, and it is reasonable to expect a company with a dominant market position, that made so much money selling software that runs critical infrastructure, to do more.” ZDNet was even harsher. “The real problem here is that for decades the IT industry as a whole has been selling rubbish products,” a post argued. “It's become fabulously wealthy by making products that are broken to begin with, and often, directly or indirectly, charging customers to fix them.” he core of the issue is Microsoft’s tiered support system. The vulnerability targeted last week doesn’t exist in systems released since Windows 8 (which introduced SMBv3), so the main targets were Windows 7 and Windows XP. Windows 7 users are still receiving patches, but XP has been unsupported since April 2014. Users can still pay for updates through Microsoft’s Custom Support service, but the company isn’t deploying patches publicly, even though the system is still widely used in Africa and Asia. The company published an emergency XP patch over the weekend to protect against the ransomware, but it was too late for NHS and countless other victims. That may sound technical, but the upshot is simple: there are still millions of computers using Windows XP, and without custom support, they’re all vulnerable — not just to this latest ransomware, but to dozens of other vulnerabilities unearthed in the last three years. They’re easy prey for botnets, spyware, and dozens of other criminal schemes, a persistent problem for anyone trying to secure the web. Microsoft’s best defense is that XP is very, very old. Released in 2001, XP stopped appearing on most new computers in 2008, and large clients like the NHS had ample warning to switch over before the sunset in 2014. Windows 10 was free, making it as easy as possible for users to switch over. Most of the networks hit on Friday had good reasons for not upgrading — often complex embedded systems that could barely survive a patch, let alone a new operating system — but as long as software has bugs, systems like that will be vulnerable. The broader problem is software upgrades outrunning their hardware, and it’s a problem that’s much bigger than Microsoft. A computer sold in 2007 likely isn’t equipped to run Windows 10 and millions of those old machines are still in use, which is why XP has remained neck and neck with Windows 8.1 in market share, despite Microsoft’s best efforts to dislodge it. SOFTWARE UPGRADES ARE OUTRUNNING THEIR HARDWARE Android is already facing a similar problem at higher velocity. Google puts out a new version of the operating system roughly every 10 months, but hardware makers can’t keep up, leading to a now-infamous fragmentation problem. Only 7 percent of Android users are on the latest version, and more than one in 10 are using an unsupported version from more than four releases ago. Part of the blame goes to carriers and OEMs for not updating software — but part of it has to do with the hardware itself. A two-year-old phone often doesn’t have the processor power to keep up with the latest features, which too often means falling behind on security updates. That became particularly urgent in 2015, when a particularly bad string of bugs in Android’s Webview system required rebuilding the process from the ground up, leaving anything older than KitKat effectively unprotected. The underlying problem is a weakness in the patching process itself. Some bugs are more patchable than others, and often a quick patch will only paper over a more profound weakness in how a system is built. The result is a profound tension between robust patching and building systems that are secure in the first place. A major bug like Stagefright or Heartbleed can be exploited dozens of different ways, making it nearly impossible to block all of them at once. You can protect against one exploit, but it’s only a matter of time before someone finds another one — and they may not tell you when they do. From a coder’s perspective, the best fix is to tear the whole system down and build it back stronger, letting everyone know to stop doing things the old way as soon as possible. That kind of ground-up rebuilding is what Google did after its Webview problems, and it’s what Microsoft did with SMBv3. If you have the newest hardware, it’s unquestionably the best protection — but if you’re stuck on Windows XP or Android Jelly Bean, it can look an awful lot like you’re being hung out to dry. Still, it can be hard to tell exactly who’s at fault. Was it Microsoft’s fault for ceasing support? Or the NSA’s fault for finding the bug in the first place? Was it a kind of software entropy, revealing bugs and shredding programs as fast as we can code them? When the problem is a larger disconnect between software upgrades and hardware release cycles, it’s often too big for any single actor to fix -- a prospect that’s even scarier than ransomware.
  20. If you want I'll give you my steam account and  you buy me csgo  :3 hehe :lol:

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.