{"id":3531,"date":"2022-03-19T17:33:03","date_gmt":"2022-03-19T16:33:03","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-72\/"},"modified":"2024-02-04T22:14:07","modified_gmt":"2024-02-04T21:14:07","slug":"hakeri-crni-sesiri-epizoda-3","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/","title":{"rendered":"Hakeri: Crni \u0161e\u0161iri (Epizoda 3)"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><!-- [if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:TrackMoves\/>  <w:TrackFormatting\/>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:DoNotPromoteQF\/>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>   <w:SplitPgBreakAndParaMark\/>   <w:EnableOpenTypeKerning\/>   <w:DontFlipMirrorIndents\/>   <w:OverrideTableStyleHps\/>   <w:UseFELayout\/>  <\/w:Compatibility>  <w:DoNotOptimizeForBrowser\/>  <m:mathPr>   <m:mathFont m_val=\"Cambria Math\"\/>   <m:brkBin m_val=\"before\"\/>   <m:brkBinSub m_val=\"&#45;-\"\/>   <m:smallFrac m_val=\"off\"\/>   <m:dispDef\/>   <m:lMargin m_val=\"0\"\/>   <m:rMargin m_val=\"0\"\/>   <m:defJc m_val=\"centerGroup\"\/>   <m:wrapIndent m_val=\"1440\"\/>   <m:intLim m_val=\"subSup\"\/>   <m:naryLim m_val=\"undOvr\"\/>  <\/m:mathPr><\/w:WordDocument><\/xml><![endif]--><!-- [if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"false\" DefSemiHidden=\"false\" DefQFormat=\"false\" DefPriority=\"99\" LatentStyleCount=\"371\">  <w:LsdException Locked=\"false\" Priority=\"0\" QFormat=\"true\" Name=\"Normal\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 9\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 9\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footnote text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"header\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footer\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index heading\"\/>  <w:LsdException Locked=\"false\" Priority=\"35\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"caption\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"table of figures\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"envelope address\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"envelope return\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footnote reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"line number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"page number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"endnote reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"endnote text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"table of authorities\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"macro\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toa heading\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"10\" QFormat=\"true\" Name=\"Title\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Closing\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Signature\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Default Paragraph Font\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Message Header\"\/>  <w:LsdException Locked=\"false\" Priority=\"11\" QFormat=\"true\" Name=\"Subtitle\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Salutation\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Date\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text First Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text First Indent 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Note Heading\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Block Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Hyperlink\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"FollowedHyperlink\"\/>  <w:LsdException Locked=\"false\" Priority=\"22\" QFormat=\"true\" Name=\"Strong\"\/>  <w:LsdException Locked=\"false\" Priority=\"20\" QFormat=\"true\" Name=\"Emphasis\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Document Map\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Plain Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"E-mail Signature\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Top of Form\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Bottom of Form\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal (Web)\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Acronym\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Address\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Cite\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Code\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Definition\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Keyboard\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Preformatted\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Sample\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Typewriter\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Variable\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal Table\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation subject\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"No List\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Contemporary\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Elegant\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Professional\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Subtle 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Subtle 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Balloon Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"Table Grid\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Theme\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Placeholder Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" QFormat=\"true\" Name=\"No Spacing\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Revision\"\/>  <w:LsdException Locked=\"false\" Priority=\"34\" QFormat=\"true\" Name=\"List Paragraph\"\/>  <w:LsdException Locked=\"false\" Priority=\"29\" QFormat=\"true\" Name=\"Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"30\" QFormat=\"true\" Name=\"Intense Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"19\" QFormat=\"true\" Name=\"Subtle Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"21\" QFormat=\"true\" Name=\"Intense Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"31\" QFormat=\"true\" Name=\"Subtle Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"32\" QFormat=\"true\" Name=\"Intense Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"33\" QFormat=\"true\" Name=\"Book Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"37\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Bibliography\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"TOC Heading\"\/>  <w:LsdException Locked=\"false\" Priority=\"41\" Name=\"Plain Table 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"42\" Name=\"Plain Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"43\" Name=\"Plain Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"44\" Name=\"Plain Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"45\" Name=\"Plain Table 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"40\" Name=\"Grid Table Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 6\"\/> <\/w:LatentStyles><\/xml><![endif]--><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ono \u0161to Crne \u0161e\u0161ire razlikuje od ostalih hakera i najlak\u0161e identifikuje su njihove namjere. Ova grupa hakera ostvaruje li\u010dnu dobit na ra\u010dun drugih kra\u0111om novca, kopiranjem korisni\u010dkih podataka, ugro\u017eavaju\u0107i privatnost drugih ljudi i nanose\u0107i \u0161tetu poslovnim organizacijama i korisnicima. Iako su njihovi napadi prete\u017eno finansijski motivisani, to nije uvijek glavni motiv. Nekada se radi o razli\u010ditim ideologijama, prosto, jer drugi ljudi imaju druga\u010dija uvjerenja. Njihov na\u010din rada je obi\u010dno individualan, ali nije rijetka pojava da djeluju kao grupa. <\/span><\/span><\/p>\n<div id=\"attachment_3710\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3710\" class=\"size-full wp-image-3710\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy.jpg\" alt=\"Black hat\" width=\"1024\" height=\"561\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3710\" class=\"wp-caption-text\">Hakeri: Crni \u0161e\u0161iri; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Sadr\u017eaj<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#CRNI_SESIRI\" >CRNI \u0160E\u0160IRI<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Anonimnost\" >Anonimnost<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Hardver\" >Hardver<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Softver_i_programiranje\" >Softver i programiranje<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Racunarske_mreze\" >Ra\u010dunarske mre\u017ee<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Linux\" >Linux<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Virtuelizacija\" >Virtuelizacija<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Zlonamjerni_softver\" >Zlonamjerni softver<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Kriptografija\" >Kriptografija<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Obrnuti_inzinjering\" >Obrnuti in\u017einjering<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Mracni_internet_i_Hakaton\" >Mra\u010dni internet i Hakaton<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#Vjestine_rjesavanja_problema\" >Vje\u0161tine rje\u0161avanja problema<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/#OZLOGLASENI\" >OZLOGLA\u0160ENI<\/a><\/li><\/ul><\/nav><\/div>\n\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Zbog ove grupe hakera dolazi do izjedna\u010davanja pojmova haker i napada\u010d, \u0161to je pogre\u0161no. Samo po sebi hakovanje nije kriminalna aktivnost. Me\u0111utim, hakovanje na na\u010din koji to rade Crni \u0161e\u0161iri i rezultati koji dobijaju svojim postupcima se smatraju sajber kriminalom, \u0161to samo po sebi Crne \u0161e\u0161ire \u010dini kriminalcima. Naj\u010de\u0161\u0107e se radi o pristupanju ra\u010dunarskim i mre\u017enim sistemima bez dozvole, uz ubacivanje zlonamjernog softvera, kra\u0111i podataka, \u0161pijuna\u017ei i drugom zlonamjernom djelovanju.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"CRNI_SESIRI\"><\/span><span style=\"font-size: 14pt;\"><strong>CRNI \u0160E\u0160IRI<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Da bi neko postao Crni \u0161e\u0161ir mora da posjeduje razli\u010dite setove vje\u0161tina, pa krenimo redom:<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">[<em><strong>NAPOMENA: <\/strong>Ovaj tekst nije namijenjen za bilo kakvu ilegalnu upotrebu, ve\u0107 je \u010disto informativnog karaktera. Cilj ovog teksta je da \u010ditaoce upozna sa opasnostima u sajber prostoru kroz jednostavno upoznavanje pona\u0161anja \u201clo\u0161ih\u201d momaka i na\u010dina na koje djeluju<\/em><i>.<\/i>]<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Anonimnost\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Anonimnost<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Jedna od najva\u017enijih stvari za nekoga ko se odlu\u010di da zloupotrebljava svoje vje\u0161tine u sajber prostoru je anonimnost. To je jedina stvar koja mo\u017ee da spasi od hap\u0161enja i omogu\u0107i uspje\u0161no djelovanje Crnog \u0161e\u0161ira. To podrazumijeva da niko ne bi trebalo da zna da je osoba u mogu\u0107nosti da izvr\u0161i uspje\u0161an upad u ra\u010dunarski sistem ili mre\u017eu. Posebno je potrebno razvijati vje\u0161tine sakrivanja tragova i manipulacije tragovima navode\u0107i istra\u017eitelje na pogre\u0161an trag.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Hardver\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Hardver<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Svaki haker koji \u017eeli biti uspje\u0161an bi morao da zna kako hardver funkcioni\u0161e. Postojanje svesti o pona\u0161anju hardvera dok izvr\u0161ava programske komande, dovodi do spoznaje kako se programi smje\u0161taju u kompjuterskoj memoriji i kako stvarno rade. Tu je potrebno znanje o elektri\u010dnoj struju, integralnim kolima, tranzistorima, frekvenciji, binarnom kretanju kroz procesorsku jedinicu (<em>CPU<\/em>) ili unutar tastature, mi\u0161a, zvu\u010dnika ili mikrofona.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<div id=\"attachment_3711\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3711\" class=\"size-full wp-image-3711\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers.jpg\" alt=\"Hacker's operation in progress\" width=\"1500\" height=\"900\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers.jpg 1500w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers-300x180.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers-1024x614.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers-768x461.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp6845779-hideout-wallpapers-18x12.jpg 18w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><p id=\"caption-attachment-3711\" class=\"wp-caption-text\">Hakerska operacija u toku; Source: <a href=\"https:\/\/wallpapercave.com\/w\/wp6845779\" target=\"_blank\" rel=\"noopener\"><em>Wallpapercave<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Softver_i_programiranje\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Softver i programiranje<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Prvo mora postojati znanje o tome kako hardver i softver komuniciraju me\u0111usobno, pa je zato potrebno znati sve o jezgru operativnih sistema (eng. <em>kernel<\/em>) i softveru ugra\u0111enom u hardver (eng. <em>firmware<\/em>). Nakon toga je potrebno razumijevanje binarnog k\u00f4da i asemblerskih jezika, da bi se moglo prije\u0107i na programske jezike kao \u0161to su\u00a0 <em>Python, BASH, C++\/C, Java, Perl\u2026<\/em> Poslije se prelazi na u\u010denje baza podataka i razvoja platformi kao \u0161to su <em>Androidi<\/em> <em>iOS<\/em>.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Racunarske_mreze\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Ra\u010dunarske mre\u017ee<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ra\u010dunarske mre\u017ee su jezgro komunikacije ure\u0111aja u sajber prostoru, bilo da se radi o lokalnim ra\u010dunarskim mre\u017eama ili o Internetu. Poznavanje kako ure\u0111aji me\u0111usobno komuniciraju, omogu\u0107ava spoznaju o tome kako se podaci kre\u0107u. Ovdje je potrebno dobro znanje koje podrazumijeva poznavanje <em>TCP <\/em>i <em>IP<\/em> protokola, be\u017ei\u010dnih mre\u017ea, <em>DNS<\/em>-a i <em>Firewall<\/em>-a, rutera, svi\u010deva, kao i poznavanje <em>OSI<\/em> modela komunikacije ure\u0111aja preko mre\u017ee.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Linux\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Linux<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Da bi neko bio haker nema potrebe da ima svoj operativni sistem. Tu je <em>Linux<\/em> i njegove distribucije, a neke od najpopularnijih za hakovanje su <em>Kali Linux<\/em> i <em>Ubuntu<\/em>. <em>Linux<\/em> je izuzetno bogat sa alatima otvorenog k\u00f4da koji se mogu iskoristiti za pokretanje napada, tako da nema potrebe i\u0107i dalje, pa ga zato Crni \u0161e\u0161iri \u010desto zloupotrebljavaju.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Virtuelizacija\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Virtuelizacija<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Znanje o virtuelnim ma\u0161inama je veoma va\u017eno, zato \u0161to omogu\u0107ava da se podizanjem nekoliko njih izvr\u0161i simulacija napada i testiranje zlonamjernog softvera prije stvarnog napada kako bi se utvrdilo da li \u0107e sve da funkcioni\u0161e kako treba. <\/span><\/span><\/p>\n<div id=\"attachment_3699\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3699\" class=\"size-full wp-image-3699\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp9612807-hacking-desktop-wallpapers-copy.jpg\" alt=\"hacking\" width=\"1024\" height=\"819\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp9612807-hacking-desktop-wallpapers-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp9612807-hacking-desktop-wallpapers-copy-300x240.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp9612807-hacking-desktop-wallpapers-copy-768x614.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp9612807-hacking-desktop-wallpapers-copy-15x12.jpg 15w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3699\" class=\"wp-caption-text\">Hakerske tehnike i alati; Source: <a href=\"https:\/\/wallpapercave.com\/w\/wp10862198\" target=\"_blank\" rel=\"noopener\"><em>Wallpapercave<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Zlonamjerni_softver\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Zlonamjerni softver<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Da bi neko mogao uspje\u0161no da hakuje neki ure\u0111aj mora da dobro razumije pojam <a href=\"https:\/\/sajberinfo.com\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"noopener\">zlonamjernog softvera<\/a> (eng. <em>malware<\/em>), a posebno bi trebalo da bude sposoban da izradi svoj zlonamjerni softver. Dobro poznavanje razli\u010ditih vrsta zlonamjernog softvera kao \u0161to su <a href=\"https:\/\/sajberinfo.com\/2021\/09\/26\/trojan\/\" target=\"_blank\" rel=\"noopener\">trojanci<\/a>, <a href=\"https:\/\/sajberinfo.com\/2021\/09\/26\/worm\/\" target=\"_blank\" rel=\"noopener\">crvi<\/a>, <a href=\"https:\/\/sajberinfo.com\/2021\/10\/01\/spyware\/\" target=\"_blank\" rel=\"noopener\">\u0161pijunski programi<\/a> \u0107e olak\u0161ati napad na ciljani ure\u0111aj. Sposobnost pisanja svog sopstvenog zlonamjernog softvera ne treba shvati olako, jer je potrebno da bude toliko dobro napisan da uspje\u0161no izbjegava otkrivanje od strane odbrambenih mehanizama napadnutog ure\u0111aja, sistema ili organizacije.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Kriptografija\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Kriptografija<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Poznavanje kriptografije omogu\u0107ava prislu\u0161kivanje \u0161ifrirane komunikacije izme\u0111u korisnika napadnute organizacije. Nije potrebno da neko bude ekspert u kriptografiji, ve\u0107 je potrebno da ima dovoljno znanja kako bi mogao da de\u0161ifruje razli\u010dite \u0161ifrirane podatke kako bi mu napad bio uspje\u0161an. Pored toga, potrebno je obezbijediti da izme\u0111u napadnute organizacije napada\u010da komunikacija bude \u0161ifrirana, kako bi se u slu\u010daju otkrivanja napada izbjeglo da se otkrije ko je napada\u010d.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Obrnuti_inzinjering\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Obrnuti in\u017einjering<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Danas niko ne pi\u0161e softver za iskori\u0161tavanje ranjivosti od po\u010detka, zato \u0161to to zahtjeva mnogo vremena i kompleksno je. Zato se koristi obrnuti in\u017einjering kako bi se bilo koji softver dekodirao i ponovo izradio, \u0161to spada u veoma va\u017ene hakerske vje\u0161tine. To zna\u010di da neko mo\u017ee uzeti ne\u010diji softver, dekodirati, razumjeti kako radi i ponovo ga izgraditi po potrebi sa nekim svojim izmjenama.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Mracni_internet_i_Hakaton\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Mra\u010dni internet i Hakaton<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Odlazak na Mra\u010dni Internet omogu\u0107ava kontakte sa drugim hakerima, razmjenu znanja ili kupovinu i prodaju zlonamjernog softvera. Ovdje je mogu\u0107e ponuditi svoje usluge hakovanja ili pak iznajmiti usluge nekog Crnog \u0161e\u0161ira. Pojedinci koji se doka\u017eu znanjem mogu da dobiju poziv da u\u010destvuju na Haktonu (eng. <em>hackathon<\/em>), tako\u0111er poznatom kao dan hakovanja. To je doga\u0111aj koji mo\u017ee da traje i po nekoliko dana, na kome se sastaju programeri i hakeri, razli\u010ditog djelovanja i uvjerenja, i razmjenjuju znanje.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Vjestine_rjesavanja_problema\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Vje\u0161tine rje\u0161avanja problema<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Za kraj mo\u017eda i najva\u017enija i najkompleksnija vje\u0161tina. Sajber prostor je pun izazova sa stalnim napredovanjem tehnologije, \u0161to zna\u010di da i odbrambeni mehanizmi postaju kompleksniji. Ako neko \u017eeli da postane vrhunski haker, mora da ima dosta strpljenja i da ne gubi vjeru u sebe, jer ako se problem ne rije\u0161i iz prvog poku\u0161aja, tu je drugi, pa tre\u0107i i tako dalje. U\u010denje iz svojih gre\u0161aka i primjene novih prilaza rje\u0161avanju problema je ono \u0161to odvaja obi\u010dne od vrhunski hakera. Zbog toga je potrebno da osoba ima dobre analiti\u010dki i kriti\u010dke vje\u0161tine rezonovanja kako bi bila spremna da odgovori na sve izazovnije okru\u017eenje.<\/span><\/span><\/p>\n<div id=\"attachment_3712\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3712\" class=\"size-full wp-image-3712\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp10862180-hacker-cool-chromebook-wallpapers-copy.jpg\" alt=\"Data Breach\" width=\"1024\" height=\"680\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp10862180-hacker-cool-chromebook-wallpapers-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp10862180-hacker-cool-chromebook-wallpapers-copy-300x199.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp10862180-hacker-cool-chromebook-wallpapers-copy-768x510.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/wp10862180-hacker-cool-chromebook-wallpapers-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3712\" class=\"wp-caption-text\">Kra\u0111a podataka; Source: <a href=\"https:\/\/wallpapercave.com\/w\/wp10862180\" target=\"_blank\" rel=\"noopener\"><em>Wallpapercave<\/em><\/a><\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">U pro\u0161lom vijeku problem je bila upotreba nuklearnog oru\u017eja izme\u0111u velikih svjetskih sila. Po\u010detkom 21. vijeka sa razvojem sajber prostora, nuklearno oru\u017eje pada u drugi plan i dolazi do pojave sajber ratovanja. Mnoge visoko razvijene zemlje svijeta obu\u010davaju svoje gra\u0111ane i spremaju ih da postanu vrhunski hakeri. Njihov cilj je napad na odre\u0111ene sisteme drugih dr\u017eava sa ciljem \u0161pijuna\u017ee, kra\u0111e podataka ili sabota\u017ee. Ovo je bila jasna ideja i mapa puta za hakere da postanu Crni \u0161e\u0161iri. Duh je pu\u0161ten iz boce i sada nema povratka. Previ\u0161e je komplikovano i dosta te\u0161ko zaustaviti Crne \u0161e\u0161ire, jer su oni danas globalni problem. Snage zakona imaju mnogo izazova, pogotovo \u0161to ova grupa hakera ne ostavlja puno tragova i zloupotrebljava ure\u0111aje drugih korisnika. Njihove namjere tako\u0111er dosta variraju. Jedni te\u017ee da instaliraju zlonamjerni softver i dobiju upori\u0161te unutar napadnute organizacije kako bi do\u0161li u situaciju da ucjenjuju ili izvr\u0161e kra\u0111u poslovnih tajni. Drugi \u017eele da izvr\u0161e kra\u0111u podatka da bi ih prodali na Mra\u010dnom Internetu ili da bih koristili za dalje prevare. Ostali samo da naprave haos ili pometnju. Bez obzira na njihove namjere, jasno je da korisnici i organizacije moraju da primjene najbolje prakse iz sajber bezbjednosti kako bi se za\u0161titili od Crnih \u0161e\u0161ira.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"OZLOGLASENI\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>OZLOGLA\u0160ENI<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Neki od najpoznatijih zloglasnih Crnih \u0161e\u0161ira su:<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>D\u017eonatan D\u017eejms<\/strong> (<em>Jonathan James<\/em>) poznat pod nadimkom \u201c<em>cOmrade<\/em>\u201d je sa petnaest godina hakovao sisteme ameri\u010dke svemirske agencije (<em>NASA<\/em>) i ministarstva odbrane SAD-a preuzimaju\u0107i softver ameri\u010dke svemirske agencije vrijedan <em>$<\/em>1,7 miliona u trenutku hakovanja. Uhap\u0161en je 2000. godine i osu\u0111en na ku\u0107ni pritvor u trajanju od \u0161est mjeseci uz zabranu kori\u0161tenja ra\u010dunara. Da je bio punoljetan, po va\u017ee\u0107im zakonu bi najvjerovatnije dobio 10 godina zatvora. Zbog kr\u0161enja uslovne kazne, dobio je \u0161est mjeseci zatvora i tako postao najmla\u0111a osoba osu\u0111ena zbog kr\u0161enja zakona o sajber kriminalu. Tokom 2007. godine dolazi do serije hakovanja prodavnica na Floridi za koje ga vlasti sumnji\u010de uprkos nedostatku dokaza. Ubrzo nakon toga, 2008. godine, D\u017eejms je izvr\u0161io samoubistvo u strahu da \u0107e biti osu\u0111en za zlo\u010din koji nije po\u010dinio. \u201c<em>Ne vjerujem u pravosudni sistem<\/em>\u201d napisao je u opro\u0161tajnoj poruci.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Adrian Lamo<\/strong> (<em>Adri\u00e1n Alfonso Lamo Atwood<\/em>)\u00a0 poznat pod nadimkom \u201c<em>Homeless Hacker<\/em>\u201d, jer je bio bez stalne adrese stanovanja, obi\u010dno lutao ulicama sa ruksakom na le\u0111ima i koristio kafi\u0107e i biblioteke kao lokacije sa kojih je izvr\u0161avao hakovanja. Postao je poznat 2002. godine po hakovanju velikih kompanija kao \u0161to su <em>The New York Times, Google, Yahoo!<\/em> i <em>Microsoft<\/em>. Sljede\u0107e godine je uhap\u0161en i osu\u0111en na ku\u0107ni pritvor, nakon \u010dega je po\u010deo karijeru stru\u010dnjaka za informati\u010dku za\u0161titu i novinara koji se bavi temama informati\u010dke sigurnosti. Poznat je jo\u0161 po tome \u0161to je prijavio ameri\u010dkog vojnika Bredlija Meninga (<em>Bradley Edward Manning<\/em>) ameri\u010dkoj vojsci da je strogo povjerljive informacije dostavio organizaciji <em>WikiLeaks<\/em>. Preminuo je u 37. godini \u017eivota.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Kevin Mitnik <\/strong>(<em>Kevin Mitnick<\/em>)\u00a0 poznat pod nadimkom \u201c<em>The Condor<\/em>\u201d. Postao je poznat hakovanjem kompanija kao \u0161to su <em>Nokia, IBM<\/em> i <em>Motorola<\/em>. Nakon hap\u0161enja 1995. godine, sudija zadu\u017een za njegov slu\u010daj ga je osudio na boravak u samici zbog, kao je ustanovio, mogu\u0107nosti da izazove nuklearni rat koriste\u0107i zatvorske telefone. Nakon izlaska iz zatvora nastavlja sa hakovanjem i 1999. godine postaje najtra\u017eeniji haker u SAD. <em>FBI<\/em> je imao pomo\u0107 Bjelog \u0161e\u0161ira <em>Tsutomu Shimomure<\/em>, koji je i sam bio \u017ertva hakovanja od strane Mitnika. <em>Shimomura<\/em> je uspio uz pomo\u0107 posebne antene za telefonski spektar frekvencija spojene na laptop i podr\u0161ke tehni\u010dara telefonske kompanije da odredi lokaciju na kojoj se nalazi Mitnik. <em>FBI<\/em> ga je uhapsio odmah po dobijanju ove informacije od <em>Shimomure<\/em>. Interesantan je detalj da je Mitnikova stru\u010dnost spada vi\u0161e u domen manipulacije (eng. <em>social engineering<\/em>), nego vje\u0161tine rada na ra\u010dunaru. Danas je Mitnik konsultant za informacione tehnologije, autor nekoliko knjiga i govornik.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Kevin Poulsen<\/strong> (<em>Kevin Lee Poulsen<\/em>)\u00a0 poznat pod nadimkom \u201c<em>Dark Dante<\/em>\u201d. Sa 17 godina, 1983. godine je hakovao <em>ARPANET<\/em>, ra\u010dunarsku mre\u017eu Pentagona. Iako je uhva\u0107en, vlada je odlu\u010dila da pokre\u0107e sudski postupak i izvukao se kao maloljetnik sa upozorenjem. Upozorenje nije imalo efekta, pa je hakovao federalnu bazu za istrage. Nakon \u0161to je otkriven, <em>FBI<\/em> pokre\u0107e istragu, a Kevin se po\u010dinje sakrivati u podzemlju. Dodatno motivi\u0161e <em>FBI <\/em>nakon \u0161to je hakovao federalne ra\u010dunare u potrazi za informacijama o prislu\u0161kivanju. Agencije za sprovo\u0111enje zakona ga nazivaju \u201c<em>Hanibalom Lektorom komjuterskog kriminala<\/em>\u201d. Po\u010detkom devedesetih je postao poznat hakovanjem telefonskih linija. Tako je sebi osigurao da bude 102. osoba koja je pozvala radio Los An\u0111elesa i dobije automobil Por\u0161e. Uskoro nakon toga je uhap\u0161en i dobio je 5 godina zatvora, a po izlasku iz zatvora 3 godine zabrane kori\u0161tenja Interneta. Danas radi kao novinar.<\/span><\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%; text-align: center;\">\n<p><div id=\"attachment_3705\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3705\" class=\"wp-image-3705 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-300x164.jpg\" alt=\"ethical hackers or white hats\" width=\"300\" height=\"164\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-18x10.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3705\" class=\"wp-caption-text\">Hakeri: Eti\u010dki hakeri (Epizoda 2)<\/p><\/div><\/td>\n<td style=\"width: 50%; text-align: center;\">\n<p><div id=\"attachment_3718\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/2022\/03\/30\/hakeri-sivi-sesiri-epizoda-4\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3718\" class=\"wp-image-3718 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hackers-sivi-copy-300x164.jpg\" alt=\"Gray hats hackers\" width=\"300\" height=\"164\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hackers-sivi-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hackers-sivi-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hackers-sivi-copy-18x10.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hackers-sivi-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3718\" class=\"wp-caption-text\">Hakeri: Sivi \u0161e\u0161iri (Epizoda 4)<\/p><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Ono \u0161to Crne \u0161e\u0161ire razlikuje od ostalih hakera i najlak\u0161e identifikuje su njihove namjere. Ova grupa hakera ostvaruje li\u010dnu dobit na ra\u010dun drugih kra\u0111om novca, kopiranjem korisni\u010dkih podataka, ugro\u017eavaju\u0107i privatnost drugih ljudi i nanose\u0107i&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3710,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[187,180,178,186,188,185,141,93,64],"class_list":["post-3531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-info","tag-android","tag-black-hats","tag-hacker","tag-ios","tag-kali-linux","tag-kernel","tag-linux","tag-malware","tag-sajber-prijetnja"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3531"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3710"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}