Jump to content

Recommended Posts

Posted

Kalispera pedia.. katevasa ena programma kai exei mesa ena arxeio me name: Register.key

alla den mporw na to aniksw dioti den exw to katalilo programma.. kserei kaneis ti programa 8elei kai pou mporw na to vrw?

Posted

.key εισαι σιγουρος? δεν εχω ξαναδει τετοιο format ποτε μου. Τραβα μια φωτο να δουμε το αρχειο.

Posted

.key εισαι σιγουρος? δεν εχω ξαναδει τετοιο format ποτε μου. Τραβα μια φωτο να δουμε το αρχειο.

330fbj5.jpg

 

Μηπως λεγοταν Register-Kye.bat?

Λεγεται Register.key

Posted

Δεξί click, άνοιγμα με notepad και πες μας τι σου λέει.

Ε4ΛAΠ}C%Όƒ9Ϊ±&=ί»Qu#ΉCΆAΫ[ρΙΠ­S»wpΡυ Sq Α>.0ƒ-dWTγΓΎl2Tζήήδ—…ψ®3Δ…ΎO+_…8ζb•|/¨lϊ

Posted

Τι ακριβώς έχεις κατεβάσει;

Υπάρχει περίπτωση να είναι license για κάποιο πρόγραμμα...

 

δες εδώ: http://www.fileinfo.com/extension/key

είναι license για πρόγραμμα αλλά το λινκ που μου έστηλες  δεν με βοηθάει και πολύ...

Posted

Λογικά θα αντικαταστήσεις κάποιο αρχείο που έχεις ήδη στον φάκελο εγκατάστασης του προγράμματος.

Posted

αυτό το αρχείο ανοίγει στο regedit, το θέμα είναι πως δεν είναι ASCII και δεν μπορείς να δείς το περιεχόμενο με το notepad οπότε δεν είσαι 100% σίγουρος τι κάνει. Εγώ συνήθως τα περνάω με το χέρι

Posted

1)Πρεπει να το αντικαταστησεις με το αλλο αρχειο σε εναν φακελο

2)Ή π.χ αμα ειναι Licence απο anti-virus τοτε πρεπει να το εντοπισεις με το προγραμμα!

Guest
This topic is now closed to further replies.


  • Posts

    • A widespread proxy service, operating through hijacked devices, has been shut down in a cross-industry effort led by Google. The network, known as IPIDEA, functioned by secretly converting millions of personal devices into proxies for malicious actors. The Mechanism of the Scheme The operation distributed hidden code within seemingly legitimate free apps and VPN services. Once installed, this code enrolled the user’s device into a pool of residential IP addresses. These addresses were then sold anonymously, primarily to cybercriminal and state-sponsored groups, to mask the origin of attacks, fraud, and espionage. Key impacts of the network included: Facilitating operations for more than 550 identified threat actors. Exposing unsuspecting device owners to potential legal and security risks by associating their IP addresses with criminal traffic. The Takedown Strategy Google and its partners disrupted the service by: Seizing core operational domains. Using Google Play Protect to detect and remove malicious applications. Coordinating with infrastructure providers to prevent the network from reestablishing itself. The action highlights the necessity of continuous user awareness, developer diligence in code reviews, and proactive industry cooperation to maintain cybersecurity. Front Companies Associated with IPIDEA IPIDEA masked its activities under various brand names, such as: Proxy Brands: 360 Proxy, 922 Proxy, Luna Proxy, IP2World, ABC Proxy. VPN Brands: Door VPN, Radish VPN, Galleon VPN. SDK Brands: PacketSDK, HexSDK (the toolkits used to embed proxy code).   Choosing Ethical Proxy Services Alternatives For lawful purposes like market research, ad verification, or data aggregation, selecting a transparent and consensual provider is essential. Reputable services obtain explicit user permission for their networks and enforce strict compliance measures. Examples of Established Providers: Bright Data: A leading, consent-based residential proxy network. Oxylabs: Provides large-scale proxy solutions for enterprise needs. MoMoProxy: Maintains a large pool of residential IPs for tasks like web scraping.   Only $850/1TB.  https://momoproxy.com   Identifying a Legitimate Provider: A trustworthy service will typically demonstrate: Informed Consent: Networks are built with the clear agreement of participants. Robust Compliance: Proactive systems to prevent abuse and respect website terms. Operational Transparency: Public-facing policies, identifiable corporate structure, and genuine customer support. Conduct thorough due diligence. Opt for providers that are clear about their IP sources and maintain strong anti-abuse policies, ensuring your legitimate activities do not inadvertently support harmful operations.
    • Lineage 2 Interlude Developer – Cliente + Datapack Hola, soy developer especializado en Lineage 2 Interlude con experiencia tanto en cliente como datapack/core. ✔ Desarrollo datapack (Java, scripts, quests, balance PvP/PvE) ✔ Fixes core / geodata / exploits ✔ Sistemas custom (events, Olympiad, instancias, mods PvP) ✔ Cliente: interface mods, system patches, .dat edits, UI personalizada ✔ Optimización y estabilidad de servidor ✔ Trabajo freelance o colaboración fija Si necesitáis soporte dev o mejoras para vuestro servidor Interlude, podéis contactarme por DM. Portfolio y ejemplos disponibles bajo petición.
    • Lineage 2 Interlude Developer – Cliente + Datapack Hola, soy developer especializado en Lineage 2 Interlude con experiencia tanto en cliente como datapack/core. ✔ Desarrollo datapack (Java, scripts, quests, balance PvP/PvE) ✔ Fixes core / geodata / exploits ✔ Sistemas custom (events, Olympiad, instancias, mods PvP) ✔ Cliente: interface mods, system patches, .dat edits, UI personalizada ✔ Optimización y estabilidad de servidor ✔ Trabajo freelance o colaboración fija Si necesitáis soporte dev o mejoras para vuestro servidor Interlude, podéis contactarme por DM. Portfolio y ejemplos disponibles bajo petición.
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..