"2014"^^ . "Sub7\u060C \u0623\u0648 SubSeven \u0623\u0648 Sub7Server\u060C \u0647\u0648 \u0627\u0633\u0645 \u0644\u0628\u0631\u0646\u0627\u0645\u062C \u0645\u063A\u0645\u0648\u0631 \u0627\u0644\u0634\u0639\u0628\u064A\u0629.\u0648\u063A\u0627\u0644\u0628\u0627 \u0645\u0627 \u064A\u0633\u062A\u0639\u0645\u0644 \u0645\u0646 \u0623\u062C\u0644 \u0627\u0644\u062A\u0633\u0628\u0628 \u0641\u064A \u0627\u0644\u0623\u0630\u0649\u060C \u0645\u062B\u0644 \u0627\u0644\u0627\u062E\u062A\u0628\u0627\u0621 \u0641\u064A \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631\u060C \u0648\u062A\u063A\u064A\u064A\u0631 \u0625\u0639\u062F\u0627\u062F\u0627\u062A \u0627\u0644\u0646\u0638\u0627\u0645 \u0623\u0648 \u062A\u062D\u0645\u064A\u0644\u0647\u0627 \u0641\u0648\u0642 \u0645\u0648\u0627\u0642\u0639 \u0648\u0645\u0639 \u0630\u0644\u0643\u060C \u0641\u0625\u0646\u0647 \u064A\u0645\u0643\u0646 \u0623\u0646 \u064A\u0633\u062A\u062E\u062F\u0645 \u0623\u064A\u0636\u0627 \u0644\u0645\u0632\u064A\u062F \u0645\u0646 \u0627\u0644\u062A\u0637\u0628\u064A\u0642\u0627\u062A \u0627\u0644\u062C\u0646\u0627\u0626\u064A\u0629 \u0627\u0644\u062E\u0637\u064A\u0631\u0629\u060C \u0645\u062B\u0644 \u0633\u0631\u0642\u0629 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0648\u062A\u0641\u0627\u0635\u064A\u0644 \u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646.\u0648 \u0627\u0633\u0645\u0647\u0627 \u0645\u0634\u062A\u0642 \u0645\u0646 \u0647\u062C\u0627\u0621 NetBus \u0625\u0644\u0649 \u0627\u0644\u0648\u0631\u0627\u0621 (\"suBteN\") \u0628\u0645\u0628\u0627\u062F\u0644\u0629 \u00AB\u0639\u0634\u0631\u0629\u00BB \u0628\u0639\u0628\u0627\u0631\u0629 \u00AB\u0633\u0628\u0639\u0629\u00BB. \u0643\u0627\u0646 \u0645\u0635\u0645\u0645\u0627 \u0623\u0635\u0644\u0627 \u0645\u0646 \u0642\u0628\u0644 \u0634\u062E\u0635 \u0628\u0645\u0624\u0634\u0631 'mobman'\u060C \u0627\u0644\u0630\u064A \u0644\u0627 \u064A\u0639\u0631\u0641 \u0645\u0643\u0627\u0646\u0647 \u062D\u0627\u0644\u064A\u0627.\u0648\u0644\u0645 \u064A\u062D\u062F\u062B \u0623\u064A \u062A\u0637\u0648\u0631\u0627\u062A \u0645\u0646\u0630 \u0639\u062F\u0629 \u0633\u0646\u0648\u0627\u062A \u0648\u0647\u0630\u0627 \u0627\u0644\u0645\u0648\u0642\u0639 \u062A\u0645 \u062A\u062D\u062F\u064A\u062B\u0647 \u0645\u0624\u062E\u0631\u0627 \u0628\u0627\u0644\u0625\u0639\u0644\u0627\u0646 \u0639\u0646 \u0646\u0633\u062E\u0629 \u062C\u062F\u064A\u062F\u0629 \u0642\u0631\u064A\u0628\u0627 \u0645\u0646 mobman.\u0648\u0645\u0646\u0630 \u0630\u0644\u0643 \u0627\u0644\u062D\u064A\u0646 Sub7 \u0638\u0644\u062A \u0643\u0627\u0645\u0646\u0629 \u0644\u0645\u062F\u0629 \u0623\u0643\u062B\u0631 \u0645\u0646 6 \u0633\u0646\u0648\u0627\u062A \u062D\u062A\u0649 \u0639\u0648\u062F\u062A\u0647\u0627 \u0641\u064A \u062A\u0645\u0648\u0632 / \u064A\u0648\u0644\u064A\u0648 2009\u060C \u0628\u0645\u0646\u0627\u0633\u0628\u0629 \u0645\u0631\u0648\u0631 10 \u0623\u0639\u0648\u0627\u0645 \u0628\u0639\u062F \u062A\u0623\u0633\u064A\u0633\u0647\u0627 \u0627\u0644\u0623\u0635\u0644\u064A \u0641\u064A \u0639\u0627\u0645 1999.\u0648 \u0641\u064A \u064A\u0648\u0644\u064A\u0648 2009 \u0639\u0644\u0649 \u0645\u0648\u0642\u0639 mobman www.subseven.org \u0648\u0627\u0644\u0630\u064A \u064A\u0628\u062F\u0648 \u0623\u0646 \u0647\u0630\u0627 \u0647\u0648 \u0627\u0644\u0645\u0648\u0642\u0639 \u0627\u0644\u0631\u0633\u0645\u064A\u060C \u0648\u0623\u0646 SubSeven \u0642\u062F \u062F\u062E\u0644\u062A \u0645\u0631\u062D\u0644\u0629 \u062F\u0648\u0631\u0629 \u062D\u064A\u0627\u0629 \u0623\u062E\u0631\u0649 \u0648\u0645\u0632\u064A\u062F \u0645\u0646 \u0627\u0644\u062A\u0637\u0648\u064A\u0631 \u0641\u064A \u0623\u0634\u063A\u0627\u0644 \u0647\u0630\u0627 \u0627\u0644\u0645\u0634\u0631\u0648\u0639 \u0643\u0645\u0627 \u0623\u0639\u0644\u0646 \u0627\u0644\u0645\u0648\u0642\u0639 \u0623\u0646 2.3 \u064A\u0645\u0643\u0646 \u0623\u0646 \u064A\u0643\u0648\u0646 \u0627\u0644\u0625\u0635\u062F\u0627\u0631 \u0627\u0644\u062A\u0627\u0644\u064A\u060C \u0648\u0644\u0643\u0646 \u0644\u0645 \u064A\u0639\u0637 \u062A\u0627\u0631\u064A\u062E \u0627\u0644\u0625\u0639\u0644\u0627\u0646 \u0639\u0646\u0647.\u0648\u0646\u0638\u0627\u0645 \u0627\u0644\u0645\u062D\u0627\u062F\u062B\u0629 \u0627\u0644\u0641\u0648\u0631\u064A\u0629 \u0623\u064A\u0636\u0627 \u0627\u0639\u0637\u0649 irc.subseven.org \u0648\u0627\u0644\u062A\u064A \u064A\u0628\u062F\u0648 \u0623\u0646\u0647\u0627 \u062A\u0645\u062A\u0644\u0643 \u0628\u0639\u0636 \u0643\u0628\u0627\u0631 \u0627\u0644\u0633\u0646 \u0645\u0646 \u0623\u0639\u0636\u0627\u0621 \u0637\u0627\u0642\u0645 sub7 \u0648\u0627\u0644\u0630\u064A \u064A\u0631\u062C\u0639 \u0644\u0639\u0627\u0645 1999. \u0648 \u0628\u064A\u0646 \u0642\u062F\u0631\u0627\u062ASub7 \u0627\u0644\u0643\u0627\u0645\u0644\u0629 \u0647\u064A \u0627\u0644\u0648\u0642\u062A \u0627\u0644\u062D\u0642\u064A\u0642\u064A \u0648\u0636\u063A\u0637 \u0645\u0641\u062A\u0627\u062D \u062A\u0633\u062C\u064A\u0644.\u0648\u0647\u0630\u0647 \u0627\u0644\u0642\u062F\u0631\u0629 \u0627\u0644\u0623\u062E\u064A\u0631\u0629 \u062A\u062C\u0639\u0644 \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0644Sub7 \u0623\u0646 \u064A\u0633\u062A\u062E\u062F\u0645 \u0644\u0633\u0631\u0642\u0629 \u0643\u0644\u0645\u0627\u062A \u0627\u0644\u0645\u0631\u0648\u0631 \u0648\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646.\u0643\u0645\u0627 \u0623\u0646\u0647 \u064A\u062B\u0628\u062A \u0646\u0641\u0633\u0647 \u0641\u064A \u0645\u0644\u0641 WIN.INI \u0648\u062A\u0634\u063A\u064A\u0644 \u00AB\u0627\u0644\u0645\u0641\u062A\u0627\u062D\u00BB \u0644\u0633\u062C\u0644 \u0627\u0644\u0648\u064A\u0646\u062F\u0648\u0632\u060C \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0625\u0636\u0627\u0641\u0629 runner) \"\" \u0644\u0634\u0631\u0643\u0629 \u0634\u0644 \u0648\u064A\u0646\u062F\u0648\u0632.\u0648\u0644\u0642\u062F \u0642\u0627\u0644 \u062E\u0628\u064A\u0631 \u0623\u0645\u0646 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0633\u062A\u064A\u0641 \u062C\u064A\u0628\u0633\u0648\u0646 \u0630\u0627\u062A \u0645\u0631\u0629 \u0627\u0646\u0647 \u0645\u0639 \u0647\u0630\u0647 \u0627\u0644\u0645\u064A\u0632\u0627\u062A \u0644Sub7 \u064A\u0633\u0645\u062D \u0644\u0644\u0647\u0627\u0643\u0631 \u0625\u0644\u0649 \u0627\u062A\u062E\u0627\u0630 \u00AB\u0627\u0644\u0633\u064A\u0637\u0631\u0629 \u0627\u0644\u0643\u0627\u0645\u0644\u0629 \u062A\u0642\u0631\u064A\u0628\u0627\u00BB \u0639\u0644\u0649 \u062C\u0647\u0627\u0632 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631.\u0648Sub7 \u0645\u0646\u062A\u0634\u0631 \u062C\u062F\u0627\u060C \u0648\u0642\u0627\u0644: \u0627\u0646 \u0623\u064A \u0634\u062E\u0635 \u0645\u0639 \u0627\u0644sub7 \u0648\u0647\u0648 \u0639\u0644\u0649 \u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0627\u0644\u062E\u0627\u0635\u0629 \u0628\u0647 \u00AB\u0642\u062F \u064A\u0643\u0648\u0646 \u0627\u0644\u0642\u0631\u0627\u0635\u0646\u0629 \u064A\u0642\u0641\u0648\u0627 \u0641\u064A \u0627\u0644\u062C\u0627\u0646\u0628 \u0627\u0644\u0635\u062D\u064A\u062D \u0644\u0647\u0645\u00BB \u0648\u0647\u0645 \u064A\u0633\u062A\u062E\u062F\u0645\u0648\u0627 \u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0627\u0644\u062E\u0627\u0635\u0629 \u0628\u0647\u0645. \u0648 \u0642\u062F \u062A\u0648\u0642\u0641 Sub7 \u0628\u0648\u0627\u0633\u0637\u0629 \u0628\u0631\u0627\u0645\u062C \u0645\u0643\u0627\u0641\u062D\u0629 \u0627\u0644\u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0648\u062C\u062F\u0627\u0631 \u0627\u0644\u062D\u0645\u0627\u064A\u0629 \u0627\u0644\u0645\u0646\u062A\u0634\u0631 \u0645\u0639 \u0646\u0638\u0627\u0645 \u0627\u0644\u062A\u0634\u063A\u064A\u0644 \u0644\u062A\u0648\u0641\u064A\u0631 \u0647\u0630\u0647 \u0627\u0644\u0645\u064A\u0632\u0627\u062A \u0648\u0642\u062F \u064A\u0635\u0628\u062D \u0623\u0642\u0644 \u0645\u0646 \u0645\u0634\u0643\u0644\u0629 \u0623\u0645\u0646 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0648\u0645\u0639 \u0630\u0644\u0643\u060C \u0641\u0627\u0630\u0627 \u0643\u0627\u0646 \u0645\u0636\u063A\u0648\u0637 \u064A\u0643\u0648\u0646 \u0642\u0627\u0628\u0644 \u0644\u0644\u062A\u0646\u0641\u064A\u0630\u060C \u0645\u062B\u0644 \u0627\u0644\u062A\u064A \u064A\u062C\u0631\u064A \u0648\u0636\u0639\u0647\u0627 \u062F\u0627\u062E\u0644 \u0623\u0631\u0634\u064A\u0641 \u0645\u0636\u063A\u0648\u0637 \u0648\u0639\u0646\u062F\u0647\u0627 \u0642\u062F \u062A\u0643\u0648\u0646 \u0628\u0639\u0636 \u0628\u0631\u0627\u0645\u062C \u0645\u0643\u0627\u0641\u062D\u0629 \u0627\u0644\u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0627\u0644\u0642\u062F\u064A\u0645\u0629 \u063A\u064A\u0631 \u0642\u0627\u062F\u0631\u0629 \u0639\u0644\u0649 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0630\u0644\u0643 \u0643\u0645\u0627 \u0623\u0646 \u0623\u062D\u062F\u062B \u062A\u0637\u0628\u064A\u0642\u0627\u062A \u0645\u0643\u0627\u0641\u062D\u0629 \u0627\u0644\u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0642\u062F \u062F\u0639\u0645\u062A \u0644\u0644\u0628\u062D\u062B \u062F\u0627\u062E\u0644 \u0627\u0644\u0645\u062D\u0641\u0648\u0638\u0627\u062A\u060C \u0648\u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u062D\u062A\u0649 \u0627\u0644\u0622\u0646 \u0623\u0642\u0644 \u0623\u0647\u0645\u064A\u0629 \u0645\u0646 \u0630\u064A \u0642\u0628\u0644\u0648\u0645\u0639 \u0630\u0644\u0643 \u0644\u0627 \u064A\u0632\u0627\u0644 \u0628\u0631\u0646\u0627\u0645\u062C sub7 \u0646\u0634\u0637 \u062C\u062F\u0627 \u0648\u0645\u0644\u0642\u0645\u0627\u062A \u0643\u0627\u0646 \u0644\u0627 \u064A\u0645\u0643\u0646 \u0627\u0643\u062A\u0634\u0627\u0641\u0647\u0627 \u0627\u0641\u0635\u062D \u0639\u0646\u0647\u0627 \u0645\u0631\u0629 \u062A\u0644\u0648 \u0627\u0644\u0623\u062E\u0631\u0649 \u0648\u0644\u0643\u0646 \u0641\u064A \u0627\u0644\u063A\u0627\u0644\u0628 \u0644\u0644\u0623\u0634\u062E\u0627\u0635\u0627\u0644\u0630\u064A\u0646 \u0627\u0628\u062A\u0639\u062F\u0648\u0627 \u0639\u0646 \u0627\u0644\u0623\u0636\u0648\u0627\u0621 \u0648\u0644\u0627 \u062A\u0633\u0645\u062D \u0628\u0627\u0644\u0646\u0632\u0648\u0644 \u0639\u0644\u0649 \u0627\u0644\u0645\u0644\u0623\u0641\u064A \u062D\u064A\u0646 \u0623\u0646 \u0645\u0639\u0638\u0645 \u0628\u0631\u0627\u0645\u062C \u0645\u0643\u0627\u0641\u062D\u0629 \u0627\u0644\u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0633\u064A\u062F\u0651\u0639\u0648\u0627 \u0623\u0646 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0627\u0645\u0646 \u0648\u0627\u0644\u062D\u0642\u064A\u0642\u0629 \u0647\u064A \u0623\u0646\u0647 \u064A\u0645\u0643\u0646 \u0623\u0646 \u064A\u0635\u0627\u0628 \u0628\u0627\u0644\u0639\u062F\u0648\u0649 \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u0628\u0627\u0631\u0639\u064A\u0646.\u0637\u0631\u0642 \u0645\u0644\u0641 \u0627\u0644\u0633\u064A\u0631\u0641\u0631 \u064A\u0645\u0643\u0646 \u0623\u0646 \u064A\u062E\u062A\u0628\u0626 \u0643\u0646\u0648\u0631\u062A\u0648\u0646 360 \u0627\u0644\u062A\u064A \u0627\u0643\u062A\u0634\u0641\u062A \u0641\u064A \u0645\u0627\u064A\u0648 2008. \u0645\u062B\u0644 \u063A\u064A\u0631\u0647 \u0645\u0646 \u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0628\u0627\u0628 \u0627\u0644\u062E\u0644\u0641\u064A\u060C Sub7 \u064A\u062A\u0645 \u062A\u0648\u0632\u064A\u0639\u0647 \u0645\u0639 \u0627\u0644\u0633\u064A\u0631\u0641\u0631 \u0648\u0627\u0644\u0639\u0645\u064A\u0644.\u0641\u0627\u0644\u0633\u064A\u0631\u0641\u0631 \u0647\u0648 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C \u0627\u0644\u0630\u064A \u064A\u062C\u0628 \u0623\u0646 \u064A\u063A\u0631\u0649 \u0636\u062D\u0627\u064A\u0627\u0647 \u0644\u0644\u062A\u0634\u063A\u064A\u0644 \u0645\u0646 \u0623\u062C\u0644 \u0646\u0642\u0644 \u0627\u0644\u0639\u062F\u0648\u0649 \u0625\u0644\u0649 \u0622\u0644\u0627\u062A\u0647\u0645\u060C \u0648\u0627\u0644\u0639\u0645\u064A\u0644 \u0647\u0648 \u0628\u0631\u0646\u0627\u0645\u062C \u0628\u0648\u0627\u062C\u0647\u0629 \u0645\u0633\u062A\u062E\u062F\u0645 \u0631\u0633\u0645\u064A\u0629 \u064A\u0634\u063A\u0644\u0647\u0627 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0639\u0644\u0649 \u0627\u0644\u062C\u0647\u0627\u0632 \u0627\u0644\u062E\u0627\u0635 \u0644\u0644\u0633\u064A\u0637\u0631\u0629 \u0639\u0644\u0649 \u0627\u0644\u0633\u064A\u0631\u0641\u0631.\u064A\u0633\u0645\u062D Sub7 \u0644\u0644\u0645\u0641\u0631\u0642\u0639\u0627\u062A \u0644\u0648\u0636\u0639 \u0643\u0644\u0645\u0629 \u0633\u0631 \u0639\u0644\u0649 \u0627\u0644\u0633\u064A\u0631\u0641\u0631\u060C \u0648\u062D\u062A\u0649 \u0645\u0646 \u0627\u0644\u0646\u0627\u062D\u064A\u0629 \u0627\u0644\u0646\u0638\u0631\u064A\u0629 \u0628\u0645\u062C\u0631\u062F \u0623\u0646 \u0627\u0644\u0622\u0644\u0629 (\u062A\u0635\u0627\u0628)\u060C \u0641\u0644\u0627 \u0645\u0641\u0631\u0642\u0639\u0627\u062A \u0623\u062E\u0631\u0649 \u064A\u0645\u0643\u0646\u0647\u0627 \u0627\u0644\u0633\u064A\u0637\u0631\u0629 \u0639\u0644\u064A\u0647\u0627. \u0648\u0628\u0627\u0644\u0631\u063A\u0645 \u0645\u0646 \u0623\u0646 \u0627\u0644\u0627\u0635\u062F\u0627\u0631\u0627\u062A \u0627\u0644\u0633\u0627\u0628\u0642\u0629 \u0623\u0639\u0644\u0646\u062A \u0639\u0646 \u062A\u0648\u0627\u0641\u0631\u0647\u0627 \u0645\u0646 \u062E\u0644\u0627\u0644 \u0627\u0644\u0627\u0646\u0636\u0645\u0627\u0645 \u0625\u0644\u0649 \u0627\u0644\u0633\u0631\u064A \u0644\u062E\u062F\u0645\u0629 \u0627\u0644\u062F\u0631\u062F\u0634\u0629 \u062D\u064A\u062B \u062A\u0631\u0633\u0644 \u0643\u0644 \u0627\u0644\u062A\u0641\u0627\u0635\u064A\u0644 \u0627\u0644\u0644\u0627\u0632\u0645\u0629 \u0644\u0627\u0633\u062A\u062E\u062F\u0627\u0645\u0647\u0627. \u0643\u0645\u0627 \u0623\u0646\u0647\u0627 \u0646\u0634\u0631\u062A \u0646\u0641\u0633 \u0627\u0644\u062A\u0641\u0627\u0635\u064A\u0644 \u0641\u064A \u0645\u062C\u0645\u0648\u0639\u0629 \u0623\u062E\u0628\u0627\u0631. \u0641sub7 \u0644\u0647\u0627 \u0645\u064A\u0632\u0627\u062A \u0623\u0643\u062B\u0631 \u0645\u0646 \u062D\u064A\u062B (\u0643\u0627\u0645\u064A\u0631\u0627 \u0627\u0644\u062A\u0642\u0627\u0637 \u0645\u062A\u0639\u062F\u062F\u0629\u060C \u0645\u064A\u0646\u0627\u0621 \u062A\u0648\u062C\u064A\u0647 \u0648\u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062A\u0639\u0645\u0627\u0644 \u0645\u062D\u0631\u0631 \u0627\u0644\u062A\u0633\u062C\u064A\u0644\u060C \u062F\u0631\u062F\u0634\u0629 \u0648\u063A\u064A\u0631\u0647)\u060C \u0648\u0644\u0643\u0646\u0647 \u062F\u0627\u0626\u0645\u0627 \u064A\u062D\u0627\u0648\u0644 \u062A\u062B\u0628\u064A\u062A \u0646\u0641\u0633\u0647 \u0641\u064A \u0627\u0644\u0646\u0648\u0627\u0641\u0630 \u0648\u0627\u0644\u062F\u0644\u064A\u0644 \u0623\u0646\u0647 \u0644\u064A\u0633 \u0644\u062F\u064A\u0647 \u0646\u0634\u0627\u0637. \u0648 Sub7 \u0647\u0648 \u0623\u064A\u0636\u0627 \u0623\u0642\u0644 \u0627\u0633\u062A\u0642\u0631\u0627\u0631\u0627 \u0645\u0646 Netbus. \u0648\u0645\u0639 \u0630\u0644\u0643 \u0627\u0644\u0625\u0635\u062F\u0627\u0631\u0627\u062A \u0627\u0644\u0642\u062F\u064A\u0645\u0629 \u0645\u0646 \u0633\u064A\u0631\u0641\u0631 Sub7 \u0623\u064A\u0636\u0627 \u064A\u0643\u0648\u0646 \u0644\u0647\u0627 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u0631\u0626\u064A\u0633\u064A\u0629\u060C \u0648\u0627\u0644\u0633\u0645\u0627\u062D \u0644\u0645\u0646 \u064A\u0639\u0631\u0641 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u0631\u0626\u064A\u0633\u064A\u0629 \u0644\u0644\u0633\u064A\u0637\u0631\u0629 \u0639\u0644\u0649 \u0627\u0644\u062C\u0647\u0627\u0632. \u0641\u064A \u0628\u0639\u0636 \u0627\u0644\u0625\u0635\u062F\u0627\u0631\u0627\u062A \u0627\u0644\u0642\u062F\u064A\u0645\u0629 \u0643\u0627\u0646\u062A \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u0631\u0626\u064A\u0633\u064A\u0629 14438136782715101980 \u0648\u0644\u0643\u0646 \u0647\u0630\u0647 \u0627\u0644\u0645\u064A\u0632\u0629 \"\" \u0627\u0644\u063A\u062A \u0641\u064A \u0648\u0642\u062A \u0644\u0627\u062D\u0642. \u0648 \u0628\u0639\u0636 \u0627\u0644\u0625\u0635\u062F\u0627\u0631\u0627\u062A \u0644\u0644\u0639\u0645\u064A\u0644 \u062A\u062D\u062A\u0648\u064A \u0639\u0644\u0649 \u0645\u062D\u0631\u0643 \u0627\u0644\u0623\u0642\u0631\u0627\u0635 \u0627\u0644\u0635\u0644\u0628\u0629 \u0627\u0644\u0642\u0627\u062A\u0644 \u0627\u0644\u0630\u064A \u064A\u0647\u062F\u0641 \u0625\u0644\u0649 \u062A\u062F\u0645\u064A\u0631 \u0627\u0644\u0642\u0631\u0635 \u0627\u0644\u0635\u0644\u0628 \u0644\u0644\u0627\u0639\u062F\u0627\u0621 \u0645\u0646 \u0627\u0644\u0645\u0624\u0644\u0641\u064A\u0646. \u0641\u064A\u062C\u0628 \u0641\u062D\u0635 \u0627\u0644\u0643\u0648\u062F \u0644\u0645\u0639\u0631\u0641\u0629 \u0645\u0627 \u0625\u0630\u0627 \u0643\u0627\u0646 \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0644\u062F\u064A\u0647 icq \u0648\u062E\u0627\u0635\u0629 \u0625\u0630\u0627 \u0643\u0627\u0646 \u062D\u0633\u0627\u0628 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u064A\u0637\u0627\u0628\u0642 \u0639\u062F\u062F \u0645\u062D\u062F\u062F (7889118\u060C \u0648\u0647\u0648 \u0631\u0642\u0645 icq \u0644\u0633\u064A\u0646 \u0647\u0627\u0645\u0644\u062A\u0648\u0646\u060C \u0648\u0647\u0648 \u0645\u0646\u0627\u0641\u0633 \u0643\u0627\u062A\u0628 \u062D\u0635\u0627\u0646 \u0637\u0631\u0648\u0627\u062F\u0629)\u060C \u0648\u0625\u0630\u0627 \u0643\u0627\u0646 \u0627\u0644\u0623\u0645\u0631 \u0643\u0630\u0644\u0643 \u0648\u0647\u0646\u0627\u0643 \u0642\u0646\u0627\u0628\u0644 \u0641\u064A \u0645\u062D\u0631\u0643 \u0627\u0644\u0623\u0642\u0631\u0627\u0635. \u0625\u0630\u0627 \u064A\u062D\u0643\u0649 \u0623\u0646 \u0627\u0644\u0647\u062F\u0641 \u0627\u0644\u0645\u0642\u0635\u0648\u062F \u062F\u0645\u0631 \u0645\u0633\u0639\u0627\u0647."@ar . . . "SubSeven est un outil d'administration \u00E0 distance utilis\u00E9 comme cheval de Troie de type porte d\u00E9rob\u00E9e. Il est un des chevaux de Troie (en anglais, trojans) les plus connus, et il est d\u00E9tect\u00E9 par presque tous les logiciels anti-virus du monde. SubSeven, aussi connu sous le nom de Sub7, a \u00E9t\u00E9 d\u00E9velopp\u00E9 par le programmeur Gregory Hanis, dit Mobman, alors \u00E9tudiant au Key West college o\u00F9 il obtient un bachelor of sciences en 2002. Entre 1999 et 2003, il produit diff\u00E9rentes versions du logiciel : SubSeven, en plus de la documentation, se pr\u00E9sente g\u00E9n\u00E9ralement en trois parties :"@fr . . . . . . "SubSeven"@de . . "Sub7\u060C \u0623\u0648 SubSeven \u0623\u0648 Sub7Server\u060C \u0647\u0648 \u0627\u0633\u0645 \u0644\u0628\u0631\u0646\u0627\u0645\u062C \u0645\u063A\u0645\u0648\u0631 \u0627\u0644\u0634\u0639\u0628\u064A\u0629.\u0648\u063A\u0627\u0644\u0628\u0627 \u0645\u0627 \u064A\u0633\u062A\u0639\u0645\u0644 \u0645\u0646 \u0623\u062C\u0644 \u0627\u0644\u062A\u0633\u0628\u0628 \u0641\u064A \u0627\u0644\u0623\u0630\u0649\u060C \u0645\u062B\u0644 \u0627\u0644\u0627\u062E\u062A\u0628\u0627\u0621 \u0641\u064A \u0627\u0644\u0643\u0645\u0628\u064A\u0648\u062A\u0631\u060C \u0648\u062A\u063A\u064A\u064A\u0631 \u0625\u0639\u062F\u0627\u062F\u0627\u062A \u0627\u0644\u0646\u0638\u0627\u0645 \u0623\u0648 \u062A\u062D\u0645\u064A\u0644\u0647\u0627 \u0641\u0648\u0642 \u0645\u0648\u0627\u0642\u0639 \u0648\u0645\u0639 \u0630\u0644\u0643\u060C \u0641\u0625\u0646\u0647 \u064A\u0645\u0643\u0646 \u0623\u0646 \u064A\u0633\u062A\u062E\u062F\u0645 \u0623\u064A\u0636\u0627 \u0644\u0645\u0632\u064A\u062F \u0645\u0646 \u0627\u0644\u062A\u0637\u0628\u064A\u0642\u0627\u062A \u0627\u0644\u062C\u0646\u0627\u0626\u064A\u0629 \u0627\u0644\u062E\u0637\u064A\u0631\u0629\u060C \u0645\u062B\u0644 \u0633\u0631\u0642\u0629 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0648\u062A\u0641\u0627\u0635\u064A\u0644 \u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646.\u0648 \u0627\u0633\u0645\u0647\u0627 \u0645\u0634\u062A\u0642 \u0645\u0646 \u0647\u062C\u0627\u0621 NetBus \u0625\u0644\u0649 \u0627\u0644\u0648\u0631\u0627\u0621 (\"suBteN\") \u0628\u0645\u0628\u0627\u062F\u0644\u0629 \u00AB\u0639\u0634\u0631\u0629\u00BB \u0628\u0639\u0628\u0627\u0631\u0629 \u00AB\u0633\u0628\u0639\u0629\u00BB. \u0648\u0628\u0627\u0644\u0631\u063A\u0645 \u0645\u0646 \u0623\u0646 \u0627\u0644\u0627\u0635\u062F\u0627\u0631\u0627\u062A \u0627\u0644\u0633\u0627\u0628\u0642\u0629 \u0623\u0639\u0644\u0646\u062A \u0639\u0646 \u062A\u0648\u0627\u0641\u0631\u0647\u0627 \u0645\u0646 \u062E\u0644\u0627\u0644 \u0627\u0644\u0627\u0646\u0636\u0645\u0627\u0645 \u0625\u0644\u0649 \u0627\u0644\u0633\u0631\u064A \u0644\u062E\u062F\u0645\u0629 \u0627\u0644\u062F\u0631\u062F\u0634\u0629 \u062D\u064A\u062B \u062A\u0631\u0633\u0644 \u0643\u0644 \u0627\u0644\u062A\u0641\u0627\u0635\u064A\u0644 \u0627\u0644\u0644\u0627\u0632\u0645\u0629 \u0644\u0627\u0633\u062A\u062E\u062F\u0627\u0645\u0647\u0627. \u0643\u0645\u0627 \u0623\u0646\u0647\u0627 \u0646\u0634\u0631\u062A \u0646\u0641\u0633 \u0627\u0644\u062A\u0641\u0627\u0635\u064A\u0644 \u0641\u064A \u0645\u062C\u0645\u0648\u0639\u0629 \u0623\u062E\u0628\u0627\u0631."@ar . . "3604189"^^ . . "\u0633\u06287"@ar . . . "SubSeven"@fr . . . . "SubSeven (auch: Sub7) ist ein Fernwartungsprogramm f\u00FCr Microsoft Windows, das illegal eingesetzt werden kann und welches die M\u00F6glichkeit bereitstellt, die Programmdatei mit einer anderen Datei zu verbinden, so dass sich der gef\u00E4hrliche Code hinter harmlos scheinendem Code versteckt (sogenannte Trojanische Pferde). SubSeven l\u00E4sst sich auf dem installierten Rechner w\u00E4hrend der Laufzeit aktualisieren. Der Verfasser dieses Programmes agiert unter dem Pseudonym mobman und arbeitet inzwischen f\u00FCr Unternehmen in der IT-Branche. SubSeven kann unter anderem auch Webcams steuern, um das Opfer zu beobachten oder den Computer des Opfers einfach herunterfahren."@de . . . . . "mobman"@en . . . . "0.9" . . . "Sub7"@it . . . . "Sub7, o SubSeven, \u00E8 una popolare backdoor. Serve principalmente per infastidire, ad esempio nascondendo il puntatore del mouse, cambiando le impostazioni di sistema o aprendo siti web a carattere pornografico. Ma pu\u00F2 benissimo essere usato con finalit\u00E0 criminali, come rubare numeri di carta di credito, in tal caso esso agisce da keylogger. Il suo nome deriva dalla parola \"NetBus\" (altro famoso trojan) letta al contrario (\"suBteN\") e dalla sostituzione del dieci (\"ten\") con il sette (\"seven\").\u00C8 stato rilevato per la prima volta il 6 giugno 1999."@it . "Sub7"@en . . . . . . . . . . "SubSeven (auch: Sub7) ist ein Fernwartungsprogramm f\u00FCr Microsoft Windows, das illegal eingesetzt werden kann und welches die M\u00F6glichkeit bereitstellt, die Programmdatei mit einer anderen Datei zu verbinden, so dass sich der gef\u00E4hrliche Code hinter harmlos scheinendem Code versteckt (sogenannte Trojanische Pferde). SubSeven l\u00E4sst sich auf dem installierten Rechner w\u00E4hrend der Laufzeit aktualisieren. Der Verfasser dieses Programmes agiert unter dem Pseudonym mobman und arbeitet inzwischen f\u00FCr Unternehmen in der IT-Branche. SubSeven kann unter anderem auch Webcams steuern, um das Opfer zu beobachten oder den Computer des Opfers einfach herunterfahren. SubSeven wird seit April 2005 nicht weiterentwickelt. Die letzten ver\u00F6ffentlichten Versionen waren nicht von mobman erstellte Neuerungen, sondern meist nur von der Sub7crew (Gruppe von sympathisierenden Anwendern) f\u00FCr aktuelle Betriebssysteme angepasste Varianten. Im Januar 2014 wurde sub7 immer noch von dieser Gruppe weiterentwickelt, die nach eigenen Angaben die Software regelm\u00E4\u00DFig pflegt. Weniger bekannt als Back Orifice, waren zeitweise weitaus h\u00F6here Anzahlen von Systemen mit SubSeven infiziert. Scans bestimmter AOL-IP-Bereiche ergaben Infektionsraten von etwa 10 %."@de . . . . . "1099737623"^^ . "Sub7, o SubSeven, \u00E8 una popolare backdoor. Serve principalmente per infastidire, ad esempio nascondendo il puntatore del mouse, cambiando le impostazioni di sistema o aprendo siti web a carattere pornografico. Ma pu\u00F2 benissimo essere usato con finalit\u00E0 criminali, come rubare numeri di carta di credito, in tal caso esso agisce da keylogger. Il suo nome deriva dalla parola \"NetBus\" (altro famoso trojan) letta al contrario (\"suBteN\") e dalla sostituzione del dieci (\"ten\") con il sette (\"seven\").\u00C8 stato rilevato per la prima volta il 6 giugno 1999."@it . "0.9"^^ . "Sub7"@es . . . . . "Sub7"@pl . . . . . . . . . . . . . . . . "SubSeven est un outil d'administration \u00E0 distance utilis\u00E9 comme cheval de Troie de type porte d\u00E9rob\u00E9e. Il est un des chevaux de Troie (en anglais, trojans) les plus connus, et il est d\u00E9tect\u00E9 par presque tous les logiciels anti-virus du monde. SubSeven, aussi connu sous le nom de Sub7, a \u00E9t\u00E9 d\u00E9velopp\u00E9 par le programmeur Gregory Hanis, dit Mobman, alors \u00E9tudiant au Key West college o\u00F9 il obtient un bachelor of sciences en 2002. Entre 1999 et 2003, il produit diff\u00E9rentes versions du logiciel : \n* SubSeven 1.0 \n* SubSeven 1.1 \n* SubSeven 1.2 \n* SubSeven 1.3 \n* SubSeven 1.4 \n* SubSeven 1.5 \n* SubSeven 1.6 \n* SubSeven 1.7 \n* SubSeven 1.8 \n* SubSeven 1.9 \n* SubSeven Apocalypse \n* SubSeven 2.0 \n* SubSeven 2.1.0 \n* SubSeven 2.1.1 Gold \n* SubSeven 2.1.2 Muie \n* SubSeven 2.1.3 Bonus \n* SubSeven 2.1.4 DEFCON8 \n* SubSeven 2.2.0 \n* SubSeven 2.1.5 Legend (\u00E9dition 4e anniversaire) \n* SubSeven 2.3 SubSeven, en plus de la documentation, se pr\u00E9sente g\u00E9n\u00E9ralement en trois parties : \n* Le client (sub7.exe) est le programme utilis\u00E9 pour manipuler l'ordinateur sur lequel le serveur a \u00E9t\u00E9 install\u00E9. \n* Le serveur (server.exe) est le fichier qui ouvre la porte d\u00E9rob\u00E9e (port) sur laquelle le client se connecte. \n* L'\u00E9diteur de serveur (editserver.exe) est le fichier qui sert \u00E0 configurer un server.exe personnalis\u00E9. Les versions 2.1.0 \u00E0 2.1.2 contiennent un mot de passe universel, 14438136782715101980, qui a \u00E9t\u00E9 r\u00E9v\u00E9l\u00E9 publiquement, ce qui laisse supposer que toutes les versions sont susceptibles de contenir un mot de passe universel permettant au programmeur, mobman, de se connecter \u00E0 n'importe quel serveur SubSeven. M\u00EAme s'il peut \u00EAtre utilis\u00E9 pour des raisons l\u00E9gitimes, par exemple pour acc\u00E9der du bureau aux fichiers de l'ordinateur \u00E0 la maison, SubSeven est g\u00E9n\u00E9ralement utilis\u00E9 \u00E0 l'insu de l'utilisateur de l'ordinateur sur lequel le serveur a \u00E9t\u00E9 install\u00E9. SubSeven doit sa popularit\u00E9 du d\u00E9but des ann\u00E9es 2000 aux nombreuses fonctions in\u00E9dites qu'il a introduit dans le monde des chevaux de Troie, par exemple la surveillance par cam\u00E9ra (Webcam Capture), la surveillance en temps r\u00E9el du bureau Windows (Desktop Capture), le vol de mots de passe (Recorded Password) par lequel SubSeven d\u00E9tecte les \u00E9crans de demande de mot de passe (Windows, Navigateurs Web, etc.) qu'il enregistre pour transmettre ult\u00E9rieurement au client. SubSeven permet aussi la capture clavier (enregistreur de frappe ou Keylogger) ce qui permet \u00E0 un utilisateur malveillant de trouver des num\u00E9ros de carte de cr\u00E9dit et autres informations personnelles."@fr . "Sub7"@en . "11184"^^ . . . . "Sub7, o SubSeven, es el nombre de un software de administraci\u00F3n remota para sistemas Microsoft Windows a trav\u00E9s del Internet, es tambi\u00E9n categorizado como troyano o Puerta trasera por ciertas caracter\u00EDsticas similares a las de un Virus inform\u00E1tico. Es usado para acceder y controlar de forma remota una computadora sin el consentimiento del usuario, en donde es el usuario que mantiene en su poder al Cliente del software por medio del Servidor que permite que el sistema comprometido sea controlado de forma remota. Tambi\u00E9n puede ser usado para actividades de espionaje, Hacking, y a veces hasta criminales o robo de informaci\u00F3n sensible. El nombre del software deriva de otro software de la misma categor\u00EDa llamado NetBus cuya escritura a la inversa es suBteN en la que sustituyendo la s\u00EDlaba ten p"@es . . . . . . . . . . . "Sub7, or SubSeven or Sub7Server, is a Trojan horse program originally released in 1999. Its name was derived by spelling NetBus backwards (\"suBteN\") and swapping \"ten\" with \"seven\". As of June 2021, the development of Sub7 is being continued. Because its typical use is to allow undetected and unauthorized access, Sub7 is usually described as a trojan horse by security experts. Starting with version 2.1 (1999) it could be controlled via IRC. As one security book phrased it: \"This set the stage for all malicious botnets to come.\" Additionally Sub7 has some features deemed of little use in legitimate remote administration like keystroke logging. Sub7 worked on the Windows 9x and on the Windows NT family of operating systems, up to and including Windows 8.1."@en . "Sub7, or SubSeven or Sub7Server, is a Trojan horse program originally released in 1999. Its name was derived by spelling NetBus backwards (\"suBteN\") and swapping \"ten\" with \"seven\". As of June 2021, the development of Sub7 is being continued. Sub7 worked on the Windows 9x and on the Windows NT family of operating systems, up to and including Windows 8.1."@en . . . "Sub7 lub SubSeven to nazwa popularnego backdoora. Jest g\u0142\u00F3wnie u\u017Cywany przez tzw. script kiddies \u2013 niedo\u015Bwiadczonych cracker\u00F3w do tworzenia szk\u00F3d, takich jak chowanie kursora, zmiana ustawie\u0144 systemowych czy wczytywanie stron pornograficznych. Mo\u017Ce by\u0107 jednak wykorzystany do powa\u017Cniejszych dzia\u0142a\u0144 przest\u0119pczych, takich jak kradzie\u017Ce danych o kartach kredytowych dzi\u0119ki keyloggerowi. Nazwa tego programu powsta\u0142a przez odwr\u00F3cenie s\u0142owa NetBus \u2192 (\"suBteN\") i zmian\u0119 \"ten\" na \"seven\". Sub7 jest zazwyczaj zatrzymywany przez oprogramowanie antywirusowe czy zapory sieciowe oraz dzi\u0119ki wbudowanym cechom system\u00F3w operacyjnych dzi\u0119ki czemu nie stanowi wielkiego zagro\u017Cenia dla bezpiecze\u0144stwa. Jednak\u017Ce je\u015Bli jest spakowany np. w archiwum zip niekt\u00F3re starsze antywirusy mog\u0105 go nie wykry\u0107 (nowsze antywirusy mog\u0105 przegl\u0105da\u0107 archiwa, wi\u0119c nie jest to dla nich zagro\u017Ceniem). Autorem tego oprogramowania jest Mobman (miejsce jego pobytu i inne dane s\u0105 nieznane). Projekt ten nie by\u0142 uaktualniany od kilku lat, podobnie jak jego strona internetowa (ostatnia modyfikacja jest datowana na 6 kwietnia 2004 roku). Jak ka\u017Cdy program typu backdoor, Sub7 jest udost\u0119pniany w dw\u00F3ch wersjach: na serwer i na klienta. Aby wykona\u0107 atak trzeba zach\u0119ci\u0107 ofiar\u0119 do instalacji wersji serwer na swoim komputerze (jest to niezb\u0119dne do ataku). Klient jest programem z interfejsem graficznym, kt\u00F3ry script kiddie uruchamia na swoim komputerze, \u017Ceby przej\u0105\u0107 kontrol\u0119 nad ofiar\u0105. Sub7 pozwala crackerom na ustawienie has\u0142a na serwerze, dzi\u0119ki czemu teoretycznie zdobytej maszyny nie b\u0119dzie m\u00F3g\u0142 przej\u0105\u0107 inny cracker. Sub7 posiada wi\u0119cej ciekawych cech ni\u017C Netbus (np. pozwala na przejmowanie kamer internetowych, wielokrotne przekierowywanie port\u00F3w, \u0142atwy do u\u017Cycia edytor rejestru itd.), zawsze stara si\u0119 zainstalowa\u0107 w katalogu windows. Sub7 jest troch\u0119 mniej stabilny od Netbusa. Starsze wersje Sub7 (wersja serwer) posiada\u0142y has\u0142o g\u0142\u00F3wne, pozwalaj\u0105c tym samym ka\u017Cdemu kto zna to has\u0142o na przej\u0119cie kontroli nad systemem. W niekt\u00F3rych wersjach has\u0142o to brzmia\u0142o: 14438136782715101980, ale ta w\u0142a\u015Bciwo\u015B\u0107 zosta\u0142a usuni\u0119ta. Niekt\u00F3re wersje klienta zawiera\u0142y Hard Drive Killer Pro code, kt\u00F3ry ma na celu zniszczenie dysku wroga Mobmana. Sprawdza on czy na komputerze jest zainstalowane ICQ i je\u015Bli numer konta si\u0119 zgadza (7889118, numer ICQ Seana Hamiltona, autora konkurencyjnego trojana) niszczy dysk twardy."@pl . . . . "Sub7, o SubSeven, es el nombre de un software de administraci\u00F3n remota para sistemas Microsoft Windows a trav\u00E9s del Internet, es tambi\u00E9n categorizado como troyano o Puerta trasera por ciertas caracter\u00EDsticas similares a las de un Virus inform\u00E1tico. Es usado para acceder y controlar de forma remota una computadora sin el consentimiento del usuario, en donde es el usuario que mantiene en su poder al Cliente del software por medio del Servidor que permite que el sistema comprometido sea controlado de forma remota. Tambi\u00E9n puede ser usado para actividades de espionaje, Hacking, y a veces hasta criminales o robo de informaci\u00F3n sensible. El nombre del software deriva de otro software de la misma categor\u00EDa llamado NetBus cuya escritura a la inversa es suBteN en la que sustituyendo la s\u00EDlaba ten por seven que formar\u00EDa la palabra SubSeven."@es . . . . . . . . "Sub7 lub SubSeven to nazwa popularnego backdoora. Jest g\u0142\u00F3wnie u\u017Cywany przez tzw. script kiddies \u2013 niedo\u015Bwiadczonych cracker\u00F3w do tworzenia szk\u00F3d, takich jak chowanie kursora, zmiana ustawie\u0144 systemowych czy wczytywanie stron pornograficznych. Mo\u017Ce by\u0107 jednak wykorzystany do powa\u017Cniejszych dzia\u0142a\u0144 przest\u0119pczych, takich jak kradzie\u017Ce danych o kartach kredytowych dzi\u0119ki keyloggerowi. Nazwa tego programu powsta\u0142a przez odwr\u00F3cenie s\u0142owa NetBus \u2192 (\"suBteN\") i zmian\u0119 \"ten\" na \"seven\"."@pl . . . . . "Sub7"@en . . . . . . . . . . .