ICT_student_TZ
JF-Expert Member
- Jun 27, 2018
- 392
- 175
bro kuna kitu hawa IT expert hawakielewi...My personal opinion of the IT security arena is that it should be formally separated into two distinct fields “Defensive Security” and “Offensive
Security” sasa hawa jamaa huwa wanafeli hapo tu.. yaani wako too Defensive na hawaelewi lolote kuhusu Offensive security.
intelinside Thefreedom
jamaa yupo kishule shule sana..anasahu hizo technologies kabla hazijaingia shuleni zinagunduliwa ijne ya mfumo wa shuleee.Na ndichooo nilichoongea juu kwamba hawa wanafanya programming katika njia sahihi ambazo zinafunzwa class ila sisi tunafanya programming hata kama ni non sense ila kikubwa tuweze pita kwenye system
Na ndo kitu nilichoposhana na huyooo jamaaa wa juuu kule ...anabisha wakat hii kitu ipo 100% inawork
Mimi nashangaaa ulipoteza time yako kujibizana nae Thefreedom , inaonekana jamaaa yeye ni mzuri but inforward way na inreverse way hayuko vizuri.... By the way was good challenge to youu..... Endelea kukaza mzee na tuzidi kuelimishana..... HAKUJA KWA LENGO LA KUKUWEKA SAWA, ALIKUJA KUKUDISTURB MIND MZEE.... ILA NIMEKUBALI WEWE ULISIMAMA.. YEYE AKALALA CHALINa ndichooo nilichoongea juu kwamba hawa wanafanya programming katika njia sahihi ambazo zinafunzwa class ila sisi tunafanya programming hata kama ni non sense ila kikubwa tuweze pita kwenye system
Na ndo kitu nilichoposhana na huyooo jamaaa wa juuu kule ...anabisha wakat hii kitu ipo 100% inawork
mkuu uyu jamaa hakuja kwa lengo la kukuelimisha ,amekurupuka huko na mihemko yake na ma ego yake kaanza kukutusi,usipoteze mda kubishana nae ,piga block asipate access ya uzi wako wowote hana analoweza kusaidia, amevimba libichwa na kujifanya yeye peke yake ndo anajua kila kitu kuliko Watanzania wote kumbe mpumbavu tu.!Imenibidi ni cheke tu. Pamoja na maneno ya dharau ila ngjoa nikujibu mimi siko vizur kwenye uandishii na ndo maana nime-attach hio pdf . Kasome hio pdf kama ukitaka then ndo uje unikosoe, alafu aliyekuambia hio md5 hashes mtu huwez kupata original data ni nan? Hata ikiwa salted bado ni mavi tu ingekuwa hivo tusingekuwa tuna-hack databases za ajabu maana nyingi hutumia hizo Md5 umesikia mzeee wa dharau? Hash ambazo ziko tyte ni wapi na bycrpt hizo ndo huwa ni pasua kichwa kurudisha data yake kwenye original state.
Hio kitu juuu hapo nilichooomanisha ni how to encrypt ur private stub ndo maana nikaconvert exe kwenda md5 hashes encrypted by password according to hio program ambayo niliyotumia
Pitia hio pdf hapo juuu alafu uje na hizi dharau zako .......
mkuu uyu jamaa hakuja kwa lengo la kukuelimisha ,amekurupuka huko na mihemko yake na ma ego yake kaanza kukutusi,usipoteze mda kubishana nae ,piga block asipate access ya uzi wako wowote hana analoweza kusaidia, amevimba libichwa na kujifanya yeye peke yake ndo anajua kila kitu kuliko Watanzania wote kumbe mpumbavu tu.!
Thats your personal stupid opinion hujui chochote kuhusu online security, kabla ya kuanza defense nilikua offense, nimehack hadi cryptocurrencies nikapiga hela za watu, I know exactly what I'm talking about, we hujui hata kinachoongelewa nini unajifanya unajua kuchangia, unasupport kureverse hash functions? hahaha stupid people keep on being stupid, ingia google soma.bro kuna kitu hawa IT expert hawakielewi...My personal opinion of the IT security arena is that it should be formally separated into two distinct fields “Defensive Security” and “Offensive
Security” sasa hawa jamaa huwa wanafeli hapo tu.. yaani wako too Defensive na hawaelewi lolote kuhusu Offensive security.
intelinside Thefreedom
Thats your personal stupid opinion hujui chochote kuhusu online security, kabla ya kuanza defense nilikua offense, nimehack hadi cryptocurrencies nikapiga hela za watu, I know exactly what I'm talking about, we hujui hata kinachoongelewa nini unajifanya unajua kuchangia, unasupport kureverse hash functions? hahaha stupid people keep on being stupid, ingia google soma.
Thats your personal stupid opinion hujui chochote kuhusu online security, kabla ya kuanza defense nilikua offense, nimehack hadi cryptocurrencies nikapiga hela za watu, I know exactly what I'm talking about, we hujui hata kinachoongelewa nini unajifanya unajua kuchangia, unasupport kureverse hash functions? hahaha stupid people keep on being stupid, ingia google soma.
Haya mkuu Graph tuma hash huyu mwamba Thefreedom areverse tunampa dk tano me ntashika hiyo milion atakaye shinda atanipa ya pombe ya wazee 50k
Sent using Jamii Forums mobile app
Ngoja niseme kitu, sitaki kuwa shabiki coz wengi wanakoment kwa ushabiki kama huyu Rog chimera
Thefreedom ulichoongelea kwenye uzi huu kuna mahala uko sahihi na kuna mahala kiukweli umezingua. Hashing inatumika tu kuhakikisha kama file au contents fln bado zipo kwenye original state. Nikupe mfano, nenda kwenye download page ya Java for windows utakuta umewekewa pale hash ya hilo file. Hio inasaidia ww kuhakikisha kama file ulodownload ndio lilelile au limefanyiwa modifications ambazo hazitakiwi coz hashing hata ukibadilisha nukta tu kwenye original contents basi utapata kitu tofauti kabisa.
Mkuu Graph yuko sahihi kwa point zote alizoongelea kama vile md5, gzip etc... so ingekua vema tu kama ungetumia alichosema kujazia uzi wako ili uwe bora zaidi.
Matusi, kejeli, lugha ya kihuni haifai kudiscuss vitu professional kama hivi. Ukweli ni ukweli tu siku zote "Huwezi pata original content kutoka kwa hash hata siku moja. Kama vipi nikupe hash basi ya iso file ya parrot then unitengenezee hilo og file la parrot kutoka kwenye hash"
Any way, Long time no see mkuu Thefreedom
mkuu je md6 nayo vipi kwenye security upande wa hashing?Aisee sijawahi ona mtu anayejifanya anajua kumbe hajui chochote kama wewe duh. Yaani umeandika ujinga mtupu hadi nimetikisa kichwa. Ushauri tu, anza kujifunza programming from scratch, alafu soma concepts mbalimbali za operating systems, anza kujua how memory works na imetengenezwaje, networking, cpu, kuna mambo kibao ya kusoma hapo utakutana nayo, jipanue akili kwanza alafu urudi miaka ya mbele ukiwa umeiva utaona ulichoandika hapa ni total rubbish.
Kwanza kuna tofauti kubwa sana kati ya encryption na hashing, encryption algorithms zinachofanya ni kuchukua data flani, zinabadilisha hiyo data isiweze kutambulika kwa kutumia key flani, na kwa kutumia the same key unaweza decrypt kurecover data yako in original form. Zipo encryption algorithms kibao sitoingia in details zinafanyeje kazi unaweza jisomea mwenyewe, popular ni kama RSA inayotumika kuficha data yako isionekane wakati inapita kwenda na kutoka kwenye server.
Hashing algorithms zenyewe zinavyofanya kazi ni unachukua data flani alafu inaproduce hash, hata kama una seed huwezi kupata original data kutoka kwenye hash hiyo isingekua hashing tena tungeiita tu encryption algorithm. Hizi zinatumika sehemu ambazo huna haja ya kua na the original data, mfano kwenye kutunza password za wateja kwenye database badala ya kutunza password ya mtu in clear text, unaichukua unaihash alafu unatunza hash, mteja akihitaji kulogin unachukua password yake unajaribu kuproduce hash ili uone kama ni same hash then unajua password ni sahihi, ili hata mtu akifanikiwa kuhack database akiona password hazitomsaidia kulogin coz hawezi pata the original password hata afanyeje.
Sasa turudi kwenye mambo uliyoandika wewe, in short umekosea kila kitu ulichoandika.
MD5 sio encryption algorithm, MD5 ni hashing algorithm, huwezi chukua md5 hash ukapata the original information, na MD5 siku hizi haitumiki sana kwa sababu ina flaw moja kubwa, ni rahisi kutumia information tofauti na zika-collide kuproduce the same hash, sifa ya hashing function nzuri ni kuproduce unique hashes kwa kila input unayoweka.
Gzip sio encryption algorithm pia, Gzip ni compression algorithm, inachofanya ni kuchukua data yako ikacompress into smaller size, haihitaji password wala nini, mtu yeyote anaweza ku-unzip na kupata original data, so sio encryption pia coz haihitaji key.
Sasa kama umeshindwa kujua vitu simple namna hii ambavyo ni commonly used kila siku, mfano gzip inatumika kwenye browser zote unazotumia, website nyingi karibia zote siku hizi zinatumia gzip kucompress data, kama hujui kitu simple namna hiyo kuna haja yoyote ya mtu kuamini unachokiandika? hujui unachokiandika umecopy na kupaste ulivyoelewa kumbe ulivyoelewa ni uongo mtupu.
Algorithm converter ndo kiumbe gani hicho? we jamaa unakuja na vitu ambavyo havipo, hakuna kitu kinaitwa algorithm converter, naomba usiweke post nyingine tena kuhusu haya mambo aisee, nenda kasome miaka 5 rudi tena ukiwa umeelimika. Kama una post nyingine za hivi naomba ufute zote usipotoshe watu.
Na hiyo code uliyoandika kutokua detected na antivirus sio accomplishment, hiyo code sio virus, toka lini code ya kuhash data ikawa virus seriously?
Wakati unamsubiri mr. Mkalimkuu je md6 nayo vipi kwenye security upande wa hashing?