Jump to content

preciousroy

Active Members
  • Posts

    24
  • Joined

  • Last visited

Posts posted by preciousroy

  1. Depending on how your company is set up and how secure you have to be a good idea might be to keep the company phone directory handy, tell them to give you their full name and return to their desk and call them BACK at their extension. Don't let them give you their extension, take it from the directory. Also, if each user has a PC with an asset tag number that's associated with their name, you can base it on that. Have them read the tag number over the phone.

    There's a question about exactly this on a Microsoft certification prep that tells you the correct answer is to remote in and set the password for what they want on their say so. Goes to show you that not everyone is thinking about security.

  2. jjhappypants I like the ACTUAL SIZE sticker lol.

    My stickers have arrived now, but I don't have any bloomin room for them;

    2992266152_af170e0007.jpg

    Shame they don't have smaller sized ones too. I'm still tryina think where I can put 'um.

    See, what we need is a Jasager themed Fon sticker.

  3. Please correct me if I am wrong, but GOCR is used to convert images, jpeg, to text. So I could take my class note and scan then, then use GOCR to convert them to odt?

    ALSO

    Can some one post an example screenshot of what is being discussed? Please, I still do not understand fully what is being discussed.

    Sure, you could use any OCR software to take your notes and convert them to editable text. Handwriting is seldom easy to convert though. What we're talking about is snapping a photo of a barcode on a product in a store and having the software do internet queries with it.

  4. Well, the windows version of cut won't let me use " as a delimiter, but this should work in theory:

    .\bin\djpeg.exe -pnm -grayscale temp.jpg temp.pbm
    .\bin\gocr.exe -m 4 temp.pbm | .\bin\grep.exe code | .\bin\cut.exe -d " -f 6

    which should spit out your UPC. I can get it to work with -d = -f 4, but that gives me something like

    "BARCODE" crc

    Waitaminute. Does that thing produce a valid block of XML?

  5. Imagine if you will a bot that could not only add the item to a wishlist, but could ALSO get your location from your iPhone, read the barcode, and respond with a message that says "Hey, you're standing in FYE and that movie is $25 here, but at the Virgin Records two blocks down it's only $20."

    Actually, their was a service that you could use with a cell phone that worked like a moblog, only you send in your image and it responded with like the top five lowest prices for the item. I forget the name of it though, I believe it's defunct.

    What you need in there Darren is a little grep and cut ninja action to pull the barcode out. Lemme play with the output here and getcha some commands.

  6. Noir was a great series with, I believe, a sub-par stateside release. Bought the first two DVDs, found a lot of transfer artifacts in it, was disappointed that every volume seems to have identical special features. didn't buy the rest.

  7. Ubuntu and Gnome make changing the themes super easy.

    System > Preferences > Appearance to change and install new theme files, right click on the user changer to the top right corner of the screen and pick "configure login manager" to change the GDM style.

    hit up http://art.gnome.org/ for some great styles, login managers, window decorations, titlebar styles and icon sets.

    More advanced users are going to want to turn on the extra ubuntu repositories in the package manager and install the following packages

    compizconfig-settings-manager (More compiz settings than you can shake a stick at)

    avant-window-navigator (OSX Style Dock for Gnome)

    Screenlets or Gdesklets (Dashboard style widgets for Gnome)

    Super linux hackers will want to look into the .bashrc .profile and .bash_profile files in your home directory and customizing their USplash bootsplash configuration. http://en.wikipedia.org/wiki/Usplash

  8. Not really, it would be hard to make it undetectable without stopping it doing its job of replying to every request. Anyone looking for it would be aware enough to know if there was a real AP around with the SSID that they received, i.e. getting their home SSID sitting in an airport should be a give away.

    So once I'm aware their's a Jasager around, could I then bombard it with bogus requests and cause Karma or some other component of the Fon to crash? Essentially say NEIN!

  9. It is easier than that, just send out a batch of probe requests for random SSIDs, if most or all come back then you can be pretty sure that it is some version of Karma replying.

    If you want to be stealthier with Jasager you could use white listing to restrict the SSIDs that you respond to. I reckon that if you did tmobile, linksys and whatever your local coffee shop uses then you'd still get a good connection rate.

    Interesting. So it's not totally bulletproof out of the box but your average user will be fooled.

  10. Has anyone thought about ways to detect Jasager? I had nothing better to do for a few hours today and came up with a couple possibilities:

    Do all the fake networks share a common MAC address?

    Do all the fake networks share a common forward facing IP address?

    Is their a page on the hacked Fon that you can grab without authorization? If every router has the same exact page that's a dead giveaway.

    Does network-manager on Linux see multiple copies of the same router when you're near a legit and illegitimate router?

    If you have a directional antenna, of course, all of the networks would appear and disappear in Kismet when you point the antenna towards/away from the Fon.

    If any/all of these are true (with exception of the kismet test) it'd be easy enough to cook a bash script that would tell you if the skies are clear or Jasager is on the prowl.

  11. Standard Serial Experiments Lain disclaimer: you'll wanna watch it twice and you'll want the first time to be in english. You don't want to miss anything in subtitle reading, and there's a TON of stuff to figure out.

    And just when you think you've got it all figured out, that's when the FUCKING ALIEN shows up.

×
×
  • Create New...