Jump to content
Facebook Twitter Youtube

Hellwalks

Members
  • Posts

    1,849
  • Joined

  • Last visited

  • Days Won

    14
  • Country

    Ecuador

Everything posted by Hellwalks

  1. If you are a Microsoft’s Windows user, you may have encountered the infamous Blue Screen of Death (BSOD). The Blue Screen of Death generally appears when Windows encounters any critical error due to software or hardware issues, displaying a sad face and no information other than "Your PC ran into a problem." However, now the company is apparently giving its infamous Blue Screen of Death a makeover. With the Microsoft's Anniversary Update, the company is making the Blue Screen of Death a little helpful for its users. Microsoft is adding QR code to its Blue Screen of Death (BSOD) in Windows 10 that will make it easier for users to identify potential issues with their devices. The new QR codes are featured in the Redmond's latest Windows 10 Preview, Build 14316, which will debut this summer as the Windows 10 Anniversary Update. Must Read: Step-by-Step Tutorial to Run Ubuntu on latest Windows 10 Preview Build. Now, when your operating system fails, you will see not just a sad face, but a QR code that would be helpful in two ways: You would be able to scan this code with your smartphone and be directed to a Web page that could include the details on the encountered error. You could also call Microsoft support to figure out the problem by determining the source of the bug based on the specific QR code and even help you troubleshoot or fix it. Though the change is not groundbreaking one, it will surely benefit millions of Windows 10 users whose hearts stop for a while when their screen goes blue. The BSOD QR codes are expected to come out this summer when Microsoft releases the Windows 10 Anniversary Update. Microsoft's Anniversary Update for Windows 10 will bring a lots of new features, including Ubuntu file system that will allow you to use Bash to run command-line Linux applications without a virtual machine.
  2. Do you know there is a huge encryption backdoor still exists on the Internet that most people don't know about? I am talking about the traditional Digital Certificate Management System… the weakest link, which is completely based on trust, and it has already been broken several times. To ensure the confidentiality and integrity of their personal data, billions of Internet users blindly rely on hundreds of Certificate Authorities (CA) around the globe. In this article I am going to explain: The structural flaw in current Digital Certificate Management system. Why Certificate Authorities (CA) have lost the Trust. How Certificate Transparency (CT) fixes issues in the SSL certificate system. How to early detect every SSL Certificates issued for your Domain, legitimate or rogue? First, you need to know Certificate Authority and its role: Certificate Authority and its Role A Certificate Authority (CA) is a third-party organization that acts as a central trusted body designed to issue and validate digital SSL/TLS certificates. There are hundreds of such trusted organizations that have the power to issue valid SSL certificate for any domain you own, despite the fact you already have one purchased from another CA. ...and that's the biggest loophole in the CA system. SSL Chain-of-Trust is Broken! Last year, Google discovered that Symantec (one of the CAs) had improperly issued a duplicate certificate for google.com to someone else, apparently mistakenly. This was not the first time when the power of CA was abused or mistakenly used to issue forged digital certificates that put millions of Internet users' privacy at risk. In March 2011, Comodo, a po[CENSORED]r Certificate Authority, was hacked to issue fraudulent certificates for po[CENSORED]r domains, including mail.google.com, addons.mozilla.org, and login.yahoo.com. In the same year, the Dutch certificate authority DigiNotar was also compromised and issued massive amounts of fraudulent certificates. Since the chain of trust has been broken, millions of users were subject to the man-in-the-middle attack. Also Read: How CT Monitoring Tool Helped Facebook to Early Detect Fake SSL Certs Further, the documents leaked by Edward Snowden revealed that the NSA (National Security Agency) intercepted and cracked massive numbers of HTTPS encrypted web sessions, indicating that some so-called trusted CAs are widely suspected to be controlled or under the authority of Governments. What if, Government asks any of these ‘trusted-turn-evil’ certificate authorities to issue duplicate SSL certificates for secure and po[CENSORED]r websites like, Facebook, Google or Yahoo? That's not just my speculation; it has already happened in the past when Government organizations and state-sponsored hackers have abused trusted CAs to get fake digital certs for po[CENSORED]r domains to spy on users. Examples of Incidents that involved Governments 1.) In 2011, forged digital certificates issued by DigiNotar CA were used to hack Gmail accounts of approximately 300,000 Iranian users. 2.) In late 2013, Google discovered fake digital certificates for its domains were being used by the French government agency to perform man-in-the-middle attacks. 3.) In mid-2014, Google identified another incident: National Informatics Centre (NIC) of India was using unauthorized digital certificates for some its domains. You can see here, how easy it is to compromise the security of HTTPS websites protected by other well-behaved CAs. Do you still Blindly Trust CA Organizations? The DigiNotar and Comodo incidents worked as a wake-up call, ending an era of blindly trusting CAs to issue digital certificates. Problem: How are you supposed to check whether a rogue certificate for your domain has been issued to someone else, probably a malicious attacker? Solution: Certificate Transparency or CT, a public service that allows individuals and companies to monitor how many digital security certificates have been issued secretly for their domains. In 2013, Google started an industry-wide initiative, called Certificate Transparency (CT), an open framework to log, audit, and monitor certificates that CAs have issued. What is Certificate Transparency system? The Certificate Transparency (CT) framework includes: Certificate Logs Certificate Monitors Certificate Auditors Certificate Transparency requires CAs to publicly declare (to Certificate Log) every digital certificate they have generated. Certificate Log offers users a way to look up all of the digital certificates that have been issued for a given domain name. It is worth noting that Certificate Transparency model does not replace traditional CA-based authentication and verification procedure though it is an additional way to verify that your certificate is unique. Certificate logs have three important qualities: 1. Append-only: Certificates records can only be added to a log. They can not be deleted, modified, or retroactively inserted into a log. 2. Cryptographically assured: Certificates Logs use a special cryptographic mechanism known as ‘Merkle Tree Hashes’ to prevent tampering. 3. Publicly auditable: Anyone can query a log and verify its behavior, or verify that an SSL certificate has been legitimately appended to the log. In CT, Digital Certificate contains a Signed Certificate Timestamp (SCT), which proves that it has been submitted to the log before being issued. Google, DigiCert, Symantec, and a few other CAs are currently hosting public logs. Although CT does not prevent CA from issuing forged certificates, it makes the process of detecting rogue certificates much easier. Such transparency offers them the ability to quickly identify digital certificates that have been issued mistakenly or maliciously and help them mitigate security concerns, such as man-in-the-middle attack. Earlier this year, Certificate Transparency system and monitoring service helped Facebook security team to early detect duplicate SSL certificates issued for multiple fb.com subdomains. In a separate article, I have provided details about Facebook’s Certificate Transparency Monitoring Service that is designed to discover SSL issues instantly and automatically. Facebook confirmed to The Hacker News (THN) that it will soon make its experimental Certificate Transparency Monitoring Service available for free to the broader community in the coming months. Certificate Transparency Search tool Sounds interesting? Comodo has launched a Certificate Transparency Search tool that lists all issued certificates for any given domain name. Or, try Google's Certificate Transparency Lookup Tool to check all certificates present in public Certificate Transparency logs that have been issued for a given hostname If you find a fraud certificate issued for your domain, report respective CA and address it immediately.
  3. Update bois Revan can attend this time, somebody wants to join? :dd
  4. More than 135 Million modems around the world are vulnerable to a flaw that can be exploited remotely to knock them offline by cutting off the Internet access. The simple and easily exploitable vulnerability has been uncovered in one of the most po[CENSORED]r and widely-used cable modem, the Arris SURFboard SB6141, used in Millions of US households. Security researcher David Longenecker discovered a loophole that made these modems vulnerable to unauthenticated reboot attacks. He also released his "exploit" after Arris (formerly Motorola) stopped responding to him despite a responsible disclosure. The Bug is quite silly: No Username and Password Protection. Arris does not provide any password authentication set up on the modem’s user interface, thus allowing any local attacker to access the administration web interface at 192.168.100.1 without the need to enter a username and password. This issue allows a local attacker to 'Restart Cable Modem' from the 'Configuration page' of the administrative interface at http://192.168.100.1/, as shown. This is nothing but a Denial of Service (DoS) attack. Bingo! By clicking 'Restart Cable Modem' manually will disable victim's modem for 2 to 3 minutes and every device on that network will lose access to the Internet. However, three minutes of no Internet connectivity is bearable, but the same administrative panel provides an option to Factory Reset the modem as well i.e. wipe out modem's configuration and settings. If an attacker clicks this option, your modem will go offline for 30 minutes as re-configuration process takes as long as an hour to complete. Though, sometimes you need to call your Internet Service Provider (ISP) to reactivate the modem. How to Perform DOS Attack Remotely? David revealed that an attacker can also reset your modem remotely, as the application doesn't verify whether the reboot or reset the modem command comes from the UI interface or an external source. This remote attack is known as a Cross-Site Request Forgery (CSRF) attack that allows an attacker to use social engineering techniques to trick users into clicking on a specially crafted web page or email. For example: A web page including <img src="http://malicious_url/"> tag could call any of the following URLs: http://192.168.100.1/reset.htm (for restart) http://192.168.100.1/cmConfigData.htm?BUTTON_INPUT1=Reset+All+Defaults (for factory reset) "Did you know that a web browser does not care whether an 'image' file is really an image?," Longenecker explains. "Causing a modem to reboot is as simple as including an 'image' in any other web page you might happen to open." "Of course, it is not a real image, but the web browser does not know that until it requests the file from the modem IP address – which of course causes the modem to reboot." Are the flaws easy to Patch? However, these flaws are easily patchable that only requires Arris to create a firmware update such that: The UI requires authentication (username and password) before allowing someone to reboot or reset the modem. The UI validates that a request originated from the application and not from an external source. However, the bad news is that there's no practical fix for the flaws. Since cable modems are not consumer-upgradable, even if Arris releases a fix, you would need to wait for your ISPs to apply the fix and push the update to you. Arris has recently addressed the flaws with a firmware update. "There is no risk of access to any user data, and we are unaware of any exploits. As a point of reference, the 135 million number is not an accurate representation of the units impacted. This issue affects a subset of the ARRIS SURFboard devices."
  5. ... And I thought I was perfectly playing with my 6 mb download speed...
  6. Model Battle ¤ Name of the oponent: WereN. , DASTIN Theme of work: http://s5.postimg.org/y86b8p6k7/d3v0u_TT_Anime_Render_6.png Type of work : Signature(smudge) Size: 600 x 320 Text: CSBLACKDEVIL Watermark: - Working time: As you wish, u can even make a sandwich before it.
  7. Platinum boi here, how can I help you? Kappa
  8. V4 Background goes well with the render, simple design but effective. Pd: would have voted v1, but I don't like the text.
  9. After two surprising weeks of competition, the 2015 World Championship Group Stage has come to an end, making way for the Knockout Stage. Now, the remaining eight teams that have tasted international glory will continue their journey towards the 2015 World Championship Finals. Here are the top eight League of Legends teams in the world right now: Group A: Flash Wolves (LMS), KOO Tigers (LCK) Group B: SKTelecom T1 (LCK), Edward Gaming (LPL) Group C: Fnatic (EU LCS), ahq e-Sports Club (LMS) Group D: KT Rolster (LCK), Origen (EU LCS) Read on to find out more about the Knockout Stage format, how the bracket was determined, and when you can catch all of the matches. THE KNOCKOUT STAGE FORMAT The Knockout Stage is broken up into three parts: the Quarterfinals in London, England; the Semifinals in Brussels, Belgium; and the Finals in Berlin, Germany. Each match in the Knockout Stage is a Best of 5. The winner of each match moves on, while the loser of each match is eliminated from Worlds 2015. The Quarterfinals bracket is po[CENSORED]ted with the top two teams from each Group from the Group Stage. Each Quarterfinal match will feature one No. 1 seed and one No. 2 seed from the Group Stage; however, no two teams from the same Group can be placed in the same half of the bracket. This organization rewards higher seeds for their performance in the Groups, and prevents rematches before the Finals. The winner of each Quarterfinals match will move on to the Semifinals. The teams were paired with opponents randomly, live during the Quarterfinals Group Draw at the end of the Group Stage. The Semifinals will feature two Best of 5 matches between the Quarterfinals winners. The winners of the Semifinals will then move on to compete against one another in the Finals of the 2015 World Championship! WHAT’S ON THE LINE IN THE KNOCKOUT STAGE? Teams will earn prize money based on the position they finish in the Knockout Stage. The breakdown is as follows: World Champion - $1,000,000 USD 2nd place - $250,000 USD 3rd / 4th place - $150,000 USD 5th - 8th place - $75,000 USD WHEN CAN I WATCH THE KNOCKOUT STAGE?The Knockout Stage will take place over three weeks in London, Brussels, and Berlin. QuarterfinalsDate: October 15-18 Location: London, England SSE Arena Wembley, Arena Square, Engineers Way, London HA9 0AA, United Kingdom October 15: Flash Wolves vs. Origen - 6:00 PM CEST / 17:00 BST / 9:00 AM PT October 16: SKTelecom T1 vs. ahq e-Sports Club - 6:00 PM CEST / 17:00 BST / 9:00 AM PT October 17: Fnatic vs. Edward Gaming - 3:00 PM CEST / 14:00 BST / 6:00 AM PT October 18: KT Rolster vs. KOO Tigers - 3:00 PM CEST / 14:00 BST / 6:00 AM PT SemifinalsDate: October 24-25 Location: Brussels, Belgium Expo, Place de Belgique 1, 1020 Ville de Bruxelles, Belgium October 24: Opening ceremony: 16:00 CEST / 7:00 AM PT Game Start: 16:30 CEST / 7:30 AM PT October 25: 14:00 CET / 6:00 AM PT (European Daylight Savings Time) FinalsDate: October 31 Location: Berlin, Germany Mercedes-Benz Arena, Mercedes-Benz Arena Berlin, Mercedes-Platz 1, 10243 Berlin, Germany Start of show: 12:00 PM CET / 4:00 AM PT Opening ceremony: 12:30 PM CET / 4:30 AM PT Game start: 13:00 PM CET / 5:00 AM PT
  10. Hellwalks

    Need help

    Hello, It might be a localization problem from this forum function, by the way, Why do u "need" it to show your real ip? you can search from it in many websites, is not a big deal.
  11. Rules 2015 World Championship rules Format All games are on patch v5.18 16 Teams - 4 groups of 4 Group Stage (Bo1) Double Round Robin tournament Groups will be decided through a live Group Draw Show Knockout Stage (Bo5) Top two teams from each group will advance to the Knockout Stage #1 vs. #2 teams from each groups will face each other in the bracket. For more details, CLICK HERE Prize PoolTotal: $2,130,000 (Approx. €1,907,194.31) Prize Pool Breakdown Place ≈Prize (USD) ≈Prize (EUR) 1st $ $ 1,000,000 € € 895,174 2nd $ 250,000 € 223,801 3rd - 4th $ 150,000 € 134,280 5th - 8th $ 75,000 € 67,137 9th - 12th $ 45,000 € 40,282 13th-16th $ 25,000 € 22,379 Locations/Venues Date/s Venue Location Group Stage Oct 1 - 4 Oct 8 - 11 Le Dock Pullman Paris Quarterfinals Oct 15 - 18 SSE Arena Wembley London Semifinals Oct 24 - 25 Brussels Expo Brussels Finals Oct 31 Mercedes-Benz Arena Berlin Qualified Teams North America Seed Qualification Team 1st Winner of Summer Split Counter Logic Gaming 2nd Highest Championship Points Team SoloMid (180) 3rd Winner of Regional Qualifiers Cloud9 Europe Seed Qualification Team 1st Winner of Summer Split Fnatic 2nd Highest Championship Points H2k-Gaming (120) 3rd Winner of Regional Qualifiers Origen Korea Seed Qualification Team 1st Winner of Summer Split SK Telecom T1 2nd Highest Championship Points KOO Tigers () 3rd Winner of Regional Qualifiers kt Rolster China Seed Qualification Team 1st Highest Championship Points LGD Gaming (650) 2nd Winner of Regional Qualifiers Edward Gaming (WB) 3rd Winner of Regional Qualifiers Invictus Gaming (LB) Taiwan/Hong Kong/Macau Seed Qualification Team 1st Winner of Summer Split ahq e-Sports Club 2nd Winner of Regional Qualifiers yoe Flash Wolves Wildcard Regions Seed Qualification Team Winner of IWC - Turkey Bangkok Titans Winner of IWC - Chile paiN Gaming ---------------------------------------------------------- WATCH LIVE!!!
  12. Hellwalks

    Need Help

    You need to rasterize the layer you want to edit (Cause you have it with "Smart object").
  13. Hellwalks

    Hello CSBD

    Hello, I do not think you should worry about a conspiratorial or xenophobia act. Administrators, together with the people involved (As you say) who was removed, will have their reasons. If reasons were not made public, it is because it was not necessary to know. I don't think your "security" does not run "danger" somehow. This is a community. -My point of view
  14. This post cannot be displayed because it is in a password protected forum. Enter Password
  15. I don't like any of the texts used. V1 , blur + border.
  16. This post cannot be displayed because it is in a password protected forum. Enter Password
  17. I will quote the same words you told me once: I will never forget those words, hope you don't either, You have done the best things you could for the community, and you will be remembered for this, forever. Good luck in your life, and hope this is not a good bye Unk0wn.

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links