Jump to content

preciousroy

Active Members
  • Posts

    24
  • Joined

  • Last visited

Everything posted by preciousroy

  1. Depending on how your company is set up and how secure you have to be a good idea might be to keep the company phone directory handy, tell them to give you their full name and return to their desk and call them BACK at their extension. Don't let them give you their extension, take it from the directory. Also, if each user has a PC with an asset tag number that's associated with their name, you can base it on that. Have them read the tag number over the phone. There's a question about exactly this on a Microsoft certification prep that tells you the correct answer is to remote in and set the password for what they want on their say so. Goes to show you that not everyone is thinking about security.
  2. See, what we need is a Jasager themed Fon sticker.
  3. Darren, the last time you did this weren't you fueled by painkillers? If so, do you feel it gave you an unfair advantage over your competition? Do you feel Vicadin is a pwnage enhancing substance?
  4. oh HO! I can connect and play by myself to the noob server, but nobody else is around. People need to get on that shit STAT!
  5. CURSES! My lack of broadband ruins me yet again.
  6. Sure, you could use any OCR software to take your notes and convert them to editable text. Handwriting is seldom easy to convert though. What we're talking about is snapping a photo of a barcode on a product in a store and having the software do internet queries with it.
  7. Well, the windows version of cut won't let me use " as a delimiter, but this should work in theory: .\bin\djpeg.exe -pnm -grayscale temp.jpg temp.pbm .\bin\gocr.exe -m 4 temp.pbm | .\bin\grep.exe code | .\bin\cut.exe -d " -f 6 which should spit out your UPC. I can get it to work with -d = -f 4, but that gives me something like "BARCODE" crc Waitaminute. Does that thing produce a valid block of XML?
  8. Imagine if you will a bot that could not only add the item to a wishlist, but could ALSO get your location from your iPhone, read the barcode, and respond with a message that says "Hey, you're standing in FYE and that movie is $25 here, but at the Virgin Records two blocks down it's only $20." Actually, their was a service that you could use with a cell phone that worked like a moblog, only you send in your image and it responded with like the top five lowest prices for the item. I forget the name of it though, I believe it's defunct. What you need in there Darren is a little grep and cut ninja action to pull the barcode out. Lemme play with the output here and getcha some commands.
  9. I do believe sir, that it's Dev5 2, Electric Boogaloo, This time it's personal. If anything comes along that I'd be able to help with, I'm happy to lend a hand boss.
  10. Fear and Loathing in Las Vegas, Strange Brew, Blazing Saddles and Grandma's Boy.
  11. Noir was a great series with, I believe, a sub-par stateside release. Bought the first two DVDs, found a lot of transfer artifacts in it, was disappointed that every volume seems to have identical special features. didn't buy the rest.
  12. I'm surprised people still use litestep.
  13. For the three people who still run 98.
  14. Try Ctrl+"break", it's usually in the upper right island of keys on a 101 key keyboard.
  15. Make sure you're running 8.04 or some of that software isn't in the repositories.
  16. Ubuntu and Gnome make changing the themes super easy. System > Preferences > Appearance to change and install new theme files, right click on the user changer to the top right corner of the screen and pick "configure login manager" to change the GDM style. hit up http://art.gnome.org/ for some great styles, login managers, window decorations, titlebar styles and icon sets. More advanced users are going to want to turn on the extra ubuntu repositories in the package manager and install the following packages compizconfig-settings-manager (More compiz settings than you can shake a stick at) avant-window-navigator (OSX Style Dock for Gnome) Screenlets or Gdesklets (Dashboard style widgets for Gnome) Super linux hackers will want to look into the .bashrc .profile and .bash_profile files in your home directory and customizing their USplash bootsplash configuration. http://en.wikipedia.org/wiki/Usplash
  17. So once I'm aware their's a Jasager around, could I then bombard it with bogus requests and cause Karma or some other component of the Fon to crash? Essentially say NEIN!
  18. Interesting. So it's not totally bulletproof out of the box but your average user will be fooled.
  19. Has anyone thought about ways to detect Jasager? I had nothing better to do for a few hours today and came up with a couple possibilities: Do all the fake networks share a common MAC address? Do all the fake networks share a common forward facing IP address? Is their a page on the hacked Fon that you can grab without authorization? If every router has the same exact page that's a dead giveaway. Does network-manager on Linux see multiple copies of the same router when you're near a legit and illegitimate router? If you have a directional antenna, of course, all of the networks would appear and disappear in Kismet when you point the antenna towards/away from the Fon. If any/all of these are true (with exception of the kismet test) it'd be easy enough to cook a bash script that would tell you if the skies are clear or Jasager is on the prowl.
  20. Emacs in Linux, Sub Etha Edit in MacOS, Notepad++ on windows.
  21. Standard Serial Experiments Lain disclaimer: you'll wanna watch it twice and you'll want the first time to be in english. You don't want to miss anything in subtitle reading, and there's a TON of stuff to figure out.
  22. I'm shocked nobody mentioned Serial Experiments Lain or Gunslinger Girl.
×
×
  • Create New...