Jump to content
Facebook Twitter Youtube

robila

Members
  • Posts

    3,233
  • Joined

  • Last visited

  • Days Won

    3
  • Country

    France

Everything posted by robila

  1. Who play Raimbow Six Siege?

  2. gay pride GIF

    1. Show previous comments  3 more
    2. robila

      robila

      NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

    3. YaKoMoS

      YaKoMoS

      yeah there're place for you too after robila @Bandolero

      P.S: don't come with bitches please,no place for them!

    4. robila

      robila

      Bando can we run? ?

  3. xO78YpV.png

     

    Still waiting ? 

    1. Show previous comments  1 more
    2. robila

      robila

      Jocu sau cat timp mai e? :))

    3. Mr.Love

      Mr.Love

      Jocul, jocul.

    4. robila

      robila

      Am luat versiunea deluxe, reducere la 10 euro

  4. Counter-Strike 1.6 Counter-Strike: Global Offensive Rocket League Raimbow Six Siege Hitman Absolution Fifa 12 Fifa 14 Fifa 15 Fifa 16 Pes 2013
  5. Cererea pe steam e a mea 

    1. myCro

      myCro

      si a ta*

      era si a lu ala

       

      sal

    2. robila
  6. ba esti nebun cu melodia aia till you drop o ascult nonstop !!!!!!!!!!!!!

     

    @PulSen ❤️ 

    1. Bandolero -

      Bandolero -

      relaxează-te sau o să trag cu pistoale

  7. Saudi Crown Prince Mohammed bin Salman reportedly hacked Amazon CEO Jeff Bezos' phone in 2018, an infiltration that is said to have resulted in large amounts of data being covertly stolen from the tech executive's phone over the course of months. The incident was revealed in a forensic investigation conduced by FTI consulting that was first reported by The Guardian earlier this week. The United Nations has since called on the United States and other relevant authorities to conduct an investigation. The Saudi government denied the allegations against it and called them "absurd." While reports suggest the Bezos hack was a specific and targeted attack, security experts say that the critical amount of sensitive data stored on today's smartphones means mobile devices will continue to be high-value targets for state-sponsored attackers and black market hackers alike. It also illustrates that anyone, even prominent CEOs with vast resources, can be vulnerable to cybersecurity threats. "It's ultimately a fact of life at this point," Paul Lipman, CEO of cybersecurity firm BullGuard, said to Business Insider. "As more of what we do relies on technology, [devices] become a target." Although it may be impossible to completely prevent and detect some cyber attacks before they occur, there are certain measures that both high-profile figures like Bezos and average smartphone users can take to mitigate the risks, experts say. The first thing people need to do to protect themselves is understand how they might be vulnerable to attacks. The data theft that affected the Amazon CEO is said to have occurred after Bezos received a video file through the po[CENSORED]r Facebook-owned messaging app WhatsApp from the Saudi crown prince's account. The file was sent with an encrypted downloader, according to the technical report from FTI Consulting, which Vice's motherboard published on Wednesday. Bezos' phone reportedly began leaking data within hours of the encrypted downloader being received, and it continued to do so for months, FTI Consulting's report said. In its statement calling for an investigation, the United Nations said that spyware tools believed to have previously been used by Saudi officials, such as the NSO Group's Pegasus-3 malware, may have been used to execute the attack. Malware attacks can generally be difficult to prevent because, in some cases, the target doesn't even need to click on a link or download a file to become infected. A previous vulnerability in WhatsApp, for example, made it possible to inject spy software on a user's smartphone simply by calling them, even if the victim didn't answer. That exploitation was carried out using software from NSO Group, as the financial times reported. What's more, once malware infiltrates your phone and begins leaking data, there's a slim chance you'll be able to find it. Malicious actors employ a range of techniques to mask data extraction, such as sending emails from the infected phone and then deleting them afterwards, or trickling out small pieces of information over a long period of time, according to Lipman. "Malware wants to remain under the radar," said Etay Maor, chief security officer at Intsights. "And usually once it's in, it's extremely hard to identify that something is wrong." That's why Bogdan Botezatu, director of threat research and reporting at cybersecurity firm Trend Micro, suggests that high-profile targets like Bezos use two phones: one with no valuable personal information stored on it for browsing social media and using apps like WhatsApp, and a separate highly-secure phone with limited access to the Internet and apps for storing sensitive information. Maor similarly suggests leaving your primary mobile device in a secure location when traveling and bringing a burner phone instead to mitigate the risk of an attack. "There's no such thing as 'this device cannot be hacked,'" Maor said. "And we've seen this over and over again. So at the end of the day, it's a game of risk management." Such measures may be practical and worthwhile for public-facing figures like Bezos, one of the world's richest men who runs one of the world's most valuable companies and owns The Washington Post. But most people will probably be able to adequately protect themselves by following best practices when it comes to digital security, like keeping software up to date, avoiding downloading files from unknown sources, and only installing apps and programs from official app stores managed by Apple and Google. "The reality is that these kinds of attacks are highly targeted, not attacks that the average person is going to fall prey to," Lipman said. "And the reality is that anyone can be hacked, with enough time, motivation, and resources."
  8. @Crimson :x I told you ❤️ 

     

    R.I.P. Little simo

  9. I'm waiting ?

  10. Last month, Hyundai teased a “flying car” concept that it was bringing to the Consumer Electronics Show in Las Vegas. The full-scale prototype is now on display at CES this week, but today, the South Korean automaker upped the ante. Not only will Hyundai mass produce these electric vertical takeoff and landing (eVTOL) aircraft, but it will also deploy them for Uber’s promised air taxi network. You’ll recall that Uber announced its aerial ambitions back in 2016 with a white paper that outlined a future “Uber Elevate” project. The ride-hailing company has said it wants to perform its own test flights in 2020, and plans to launch some version of an air taxi service in 2023, starting in Dallas, Texas, and Los Angeles, California. Uber also recently announced that it will offer helicopter rides in New York from lower Manhattan to John F. Kennedy International Airport. Now Hyundai is along for the ride (flight?). It’s noteworthy because Hyundai is in essence lending its manufacturing credibility to Uber’s ambitious (if dubious) plan to launch an urban air taxi system by the mid-2020s. Based on the specs, though, Hyundai’s Personal Air Vehicle (PAV) won’t be some Sonata in the sky. With two tilt-rotors on the tail, and 10 other rotors distributed around the egg-shaped cabin, the aircraft is designed to take off vertically, transition to wing-borne lift in cruise, and then transition back to vertical flight to land. The five-person vehicle will have a cruising speed of 180 mph (290 km/h) and a cruising altitude of around 1,000–2,000 feet (300–600 meters) above ground. Hyundai says by using smaller, electric-powered rotors, the vehicle will produce less noise than a combustion engine helicopter, which is crucial for cities worried about noise pollution. During peak hours, it will require only about five to seven minutes for recharging. And Hyundai says it will have a range of 60 miles (100 kilometers) between charging. And that’s not all. Hyundai also unveiled concepts for a landing hub and an eco-friendly “Purpose Built Vehicle” (PBV) for ground transportation to and from the station. The PBV resembles a beige rectangle and will utilize AI to find optimal routes and travel in platoons, Hyundai says. Each PBV will be able to serve various functions, such as transit, coffee shop, or medical clinic. It all sounds great and fantastically futuristic on paper, but Hyundai has yet to conduct any test flights, piloted or otherwise, nor has it said how much all this will cost. There have been a handful of small-scale test flights of eVTOL aircraft around the world, but none are currently in commercial operation. The technology is still in its very early days, and Uber and Hyundai, as well as a variety of other players in the field, face enormous regulatory and technical challenges in getting their respective air taxi services off the ground. Still, Hyundai is the first global automaker to join forces with Uber. The automaker will produce and deploy the electric aircraft, while Uber will provide airspace support, ground operations, and, of course, the app through which customers can book flights. Uber released images of its own concept aircraft over a year ago, though it said it’s looking for partners that can meet its technology specifications — electric-powered, minimal noise, and vertical takeoff and landing capabilities — as well as a company that can scale production to build tens of thousands of vehicles to meet the demand of on-demand service. Uber has struck similar arrangements with seven other aerospace companies: Joby, Jaunt, Embraer, Pipistrel, Karem Aircraft, Aurora Flight Sciences, and Bell.
  11. #cleanorcheat?

    You got banned unfairly on a server? You consider yourself clean and want to convince that server administrative team that they are wrong?

    Or

    You have a colleague that cheats? You registred some gaming moments on a player and can't decide if it's clean or cheat?

     

    Post the .demo or video link here! NOW

    https://csblackdevil.com/forums/forum/13961-analyze-gaming-moments/

  12. Hello In my opinion the problem is the activity, but much users want to learn but they don't know how to do it. You can do a section with some "courses" about doing an avatar or a signature
  13. I like your "spam" 

     

    I follow you only for this ?

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links