lol how about test it on jamdeal.com i bet u can get alot of cc from JA lol
lol how about test it on jamdeal.com i bet u can get alot of cc from JA lol
Cyber Criminal
This kid again?
Anyways, dealing with the fallout from online financial fraud can be a hassle. It depends on how the financial institution treats such matters. I figure that there is not a lot of maturity in those processes in Jamaica.
LAWD GOD, and them want start give everybody credit scores now.
Jamaicans always want what others have and never prepared to pay the full price.
Now when some idiot mess up my CC and also my credit score what recourse do I have?
THANK GOD
What steps can be used to secure an online database against someone using a tool like this?
.:] ^ [:..:] Game IDs: xfire_ropy | BC:BC2_ropy | BC: 2142_ropy29 | BF3_ | steam_ropy09 | LoL_ropy09 | Origin_ropy29 [:.
dang everybody acting as if SQL is simple
and the tools are not as free as you think
i'd be careful about messing with tools such as those they might just end up making you a new host for someone in the US or God knows where
Kuff Kaff Kweff! Fi all di haters! 2009 My Time 2 Shine!
Ropy believe what jason is saying it that simple to exploit SQL........thats all im saying
watch this video
no one or nothing is secure
Being naive is an easy way to get taken by these things. "It can't be that easy" wont work
This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use. © 2006 Azix Solutions.
All rights reserved.
Dropbox: http://db.tt/8qVS35lo
The FBI also "leaks" similar applications on the net, the credit card numbers and databases are fake and these applications like to "phone home" every once and a while.
even the U.S. Secret Service ran several fictitious websites that provided credit card data to "hackers"...what the "hackers" didn't know was that these credit card and social security numbers were setup as part of a elaborate sting operation, you wouldn't believe how many coders the FBI has at it's disposal
Stay away from these applications even if you are supposedly just "testing" them to learn about the vulnerabilities.
Here is a great example of FBI malware:
http://en.wikipedia.org/wiki/Magic_L...%28software%29