Jump to content

Machstorm

Active Members
  • Posts

    247
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Machstorm

  1. Norton is without a doubt the most failure of a pay-for antivirus I've ever seen. I'd take AVG free over Norton any day, but in the end Common Sense is the best damn antivirus I've ever seen and used.

    How? I have had no issue with Norton ever since I started back in 2004. Then Again I do know more about Norton than most people due to the nature of my profession. I just don't see how you can call it "most failure of a pay-for antivirus" although one should note that when most users install Norton (or instert Anti Virus name here) they due tend to click past the install window that list the incompatible software and most don't have the knowledge on how to work around subjects such as adding exceptions.

    The only reason why people get that angry at software is because they did something with it that they did not understand or were not supposed to or They ignored the install software installation screen that takes about two miles to scroll down to view known issues and compatibility report.

    Oh and lets not forget the people that complain about Norton, McAfee, etc.. not finding anything. Such absolutes are not credible, maybe if you were talking in a group that would work, but not with everyone. What didn't it find? The spy ware and or Trojan that was made at 8:00 in the morning which was about the time you might have been visiting a questionable website.

  2. One thing Truecrypt is not bullet proof. I have taken encrypted drives and mounted them in another system and used an open source forensic tool to decrypt them. I had to do this for a research paper my Forensics class. Although it sounds easy the software it self is not user friendly.

    In any case if anyone has physical access to your Portable (Notebook) they own your information.

  3. I am incline to agree for the most part. I have had experience with multitudes of free anti-Virus such as AVG and there is a reason why it's free. Next time an end user needs a virus removed and calls up again for example AVG for help guess how much they are going to be charged. Some cases I have seen it's on upward of $150+ dollars. Some cases the user just bought a copy of McAfee and was lucky enough that that had resolved the issue.

    In any case you can argue that you are a cheap skate and that you don't feel like paying $30 to $40 for an anti virus or that you don't have the money, but is that really the issue? Don't get me wrong that some protection is better than none. In the end it's up to you how much your data is worth. Is it worth nothing or is it worth something?

    http://tech.blorge.com/Structure:%20/2009/...free-antivirus/

  4. Vako, Vako, Vako we're all adults here so to say 'We need to stop" is out of the question. You like a poor marksman continues miss the mark. You can't just stop this or that it is not feasible. the infrastructure that is built in the United States is built around oil which makes it cheap. You like many other s forget this fact when you go around spouting half truths like "We need to stop burning fossil fuels". Are you going to pay the billions if not trillions of dollars we don't have in the U.S. to convert our infrastructure? No!

    Yes, I am focusing on the U.S. because we cannot take care of the worlds environmental problems if we cannot take care of ours first.

    "You keep talking about jobs being lost and costs rising, why will jobs be lost? If America gets off its arse and uses the huge lead in technology it built up after Great Wars"

    If the cap and trade bill is passed jobs will be lost and our economy will suffer and the more our economy suffers the less money we will have to build things with our "huge lead in technology"

    Debunking global warming

    http://icecap.us/index.php/go/joes-blog/co...global_warming/

    http://www.dailymail.co.uk/news/article-48...ay-experts.html

    http://www.csmonitor.com/2007/0927/p13s03-sten.html

    http://wnd.com/index.php?fa=PAGE.view&pageId=64734

    http://www.examiner.com/x-1586-Baltimore-W...cording-to-NASA

  5. Thanks VaKo...,

    People always says "the earth goes from hot periods to cold all the time." Atmospheric tests made a link between greenhouse gasses and those hot and cold periods. Carbon dioxide is a greenhouse gas, and there is far more in our atmosphere than would be naturally. Even if we are in a natural warming period, we're accelerating it to a level the earth may not be able to handle.

    Ironically, many of the folk that say "the earth goes from hot periods to cold all the time" frequently also say that the earth is 6000 years old. Very contradictory.

    VaKo made an interesting point about it's only a debate in America..., purely speculative, but I'd like to think it's because corporations are pumping money into politicians/news organizations/fake science companies/etc to cloud the field, create controversy, and spread lies...

    Oh well.

    There is not a definite link between CO2 and global warming. The study that you guys imply but do not refer to was inconclusive because when the CO2 was up sometimes the earth was in fact cooler. so don't believe everything you are told by the liberals. Also you people also forget that the Sun (yes the Sun) also contributes to global warming. Just look at what happens when the Sun goes through it's 11 year cycle. The earth gets warmer because of the Sun for the most part. There is no proof that we are accelerating it and I would like to see your proof or logical explanation that it is other than someone told you or reading bad journalism.

    I am not against cleaning up the environment, but I will not buy into half truths.

    For your viewing pleasure:

    http://www.pjtv.com/video/PJTV_Daily/Globa..._Meltdown/1608/

    http://www.pjtv.com/video/PJTV_Daily/Globa...onference/1510/

    I'll upload a link to the report when I can find an internet link

  6. Well, while I see your point on that (yes there are A LOT of dumb users out there) I live in Southern MS. There are NO hills here. Matter of fact, the only hills over 30ft tall are few and far between (and most man made). I have seen many phone carriers, including At&t, and cingular that have HORRIBLE reception here, while I can cruise with perfect signal all the time. Fact is, I am on a coastline, so if you don't have towers down here to cover properly, or poor telco/transiever equiptment, then that's the only reason why you should have bad reception or dropped calls. Louisiana is even worse, and nope... no hills.

    I live right beside the Tower service power lines *ya know the big ass power lines that go from tower to tower* and my signal is always intact.

    Also, I should note that humidity has a lot to do with it to. Water just loves to absorb and scatter radio waves. Speaking of water; trees are culprits too. take Cedar trees or example a good sized Cedar tree will have about 33 gallon of water. Good luck getting a signal with them or any area with a relatively dense tree population.

    I do agree that towers make the difference to. It's just that people don't want them in their back yard much less the coast.

    You got that right about some customers some of them are just plain dumb " Why can't I get a signal on a plane while driving through a tunnel" (Paraphrasing a House quote)

  7. Everybody I know in the southern and central U.S. hates AT&T. Their plans are crap and their service is crap. Alot of you that get good service, that's probably because your in very big cities or very close to them, so AT&T gives all new updates and fixes to your areas first.

    @ the same time though, Boost mobile seems to get excellent service from everyone I know that has them.

    They actually pay more for their service with boost mobile, overall. The problem is that some people don't know how cell phones and radio wave work. So they bitch about service when they are in a forrested area or going into a tunnel or decide to live between two hills or make a call underneath powerlines. Or they dont look at the coverage area before they their phone.

  8. You make it sound like a crime, or that it's a bad thing.

    Really, most of us iPhone users are good, well meaning people.

    As long as you're happy with the device, isn't that all that matters?

    Relax, I was trying to be funny. I have posted before about resisting the urge to buy one, because everyone else had wanted one. If I thought it had been "crime or that it was a bad thing" I would have kept my hypocrisy silent. Besides my iPhone has the secret of eternal life

    iPhone! Disappear me.

  9. AT&T has horrid service on the east coast, US, so I'm waiting til it comes to Verizon or T-mobile... Currently have a Centro. I've been hearing good and bad about the Pre, so I might/might not switch early when that comes to Verizon.

    That's one of the plus's for living out in Oklahoma the service her is pretty good. Then again they upgrade service out here faster than most of the states. Come to think of it, if I remember right, I think Verizon owns most of the east coast.

    Now I just need to create an app to control my evil robot army, muwahahaha!

  10. agreed, BYO (build your own) and hit up computer mags. The best computer mag for aussie's is atomic, they do some kick arse reviews of hardware. I always consult atomic prior to a custom build/case mod.

    Agreed, you can spend far less by building your own and you will learn a new skill in the process (If you didn't have it already)

  11. I actually just took this test, and I must admit, it's worthless. I would say go for the anything non-comptia.

    I can tell you are lying because you are using an absolute with no explanation. however, if you do please elaborate.

    I am Sec+ certified too and I found nothing "Worthless" about it.

  12. Anything the OEM manufacturer installs beyond Windows and the appropriate drivers should be labeled bloatware. If it doesn't come on the windows CD and it's not there to enable unique hardware, you don't have a clean install.

    Bloatware is the correct term in my opinion.

    Still wrong:

    Software bloat, also known as bloatware, is a term used in both a neutral and disparaging sense, to describe the tendency of newer computer programs to be larger, or to use larger amounts of system resources (mass storage space, processing power or memory) than necessary for the same or similar benefits from older versions to its users. Additionally, the term bloatware is used in common language for pre-installed, huge software bundles, mostly consisting of demos and trial ware.

    Technically by your definition anything including programs you install is bloatware

  13. You should never have it installed unless a support technician is helping you. Why?...

    a) Why do you need it on the computer if you are not in need of support?

    B) When you recieve support that requires the use of dell remote access the technician helping you well have you go and install it anyway first thing, even if you've already installed it, so its pointless having it installed ahead of time.

    c) Its basically bloatware when not in use. So is a lot of other additional software they pre-load on there such as Dell support or url assitant.

    A, it's not bloatware it's actually about 33MB so its not that bad at all

    B, You do not not know what you are talking about, because when he needs help it be that much less time and

    stress that tech and the user has to go through when support is provided. Also the Dell support tool has some pretty

    useful functions. Also, the Citrix connect that they use is a seperat piece of software that is downloaded and installed while the tech is attempting to remote access into your system

  14. in-ear also ruins your hearing a whole lot quicker. I like my cans (Technics RP-DH1200) a whole lot better. Granted they look like hockey pucks strapped to my head, but hey that's the cost of having a good set of headphones. I pay it gladly :D

  15. Here's my analogy. I dont rightly give a shit what everyone else thinks about this and neither should you.. Why? Because your not changing me, I am not changing you and we are not changing ANYONE else's opinion on this subject.. We might as well talk about religion or politics. Point blank. I do not agree with the laws. Why? Because it is easier to can someone who is completely innocent, that's why. Yes If I hack something, sure I broke the law. I am not trying to deny that, and truthfully that is not why I feel the way I do about it. The reason why I feel the way I do about it is because of the good old what if, which is what these laws were based on. What if someone uses my open AP to connect to the internet and hack something? That's why these laws were made. Now on the other side of the coin, what if I were to be driving by some smartasses house, my laptop has the wifi card on, and connects to their network, they see me as I pass by, get my tag #, find my mac address on their dhcp server, and then blame ME for hacking something that they did? This is something that could definitely happen.

    Think about this scenario a bit.

    Some guy hacks a bank, leaves his AP open, waits for someone with a laptop to pass by and connect momentarily (how many girls just close the laptop, throw it in the backseat and forget it's on? or guys for that matter as well), get's their mac address off the DHCP server, and then blames the innocent bystander for using his AP to hack into something that the owner of the AP did? If you say yah but.. No. No buts. He contacts the authorities, cleans his computers prior to the investigation, maybe tweaks his mac tables a bit, if it collects timed data for connections, and OH LOOK! It's your mac address, connecting to his AP, that could match the time that the bank was hacked. If you say no, then how did he get your mac address? It's different for every person. "I saw this guy sitting outside my house on his laptop, so I decided to find out where he was going.. etc.etc.etc".

    If you say well, that's one scenario, yah it's one. So is someone trying to hack into something on purpose, but so is someone accidentally connecting into an AP. This is a 1/2 to 1/2 situation of ethics, not the 5/8 to 2/8 that you keep saying it is.

    Bottom line, we live in America.. well... I live in America, and we can say what we want about our law system, and what we agree and disagree with. And I disagree with this law because it is NOT a concrete law, and it CAN be used one way or another to screw an innocent victim, or to let a law breaker go. This is not what we need.

    I other words you disagree with the law because you don't understand it

  16. I know that it it obviously legal to enter someone's property if it is unsecured. and if someone's property is secured, you breech the security, then enter, it becomes illegal. so you might think that it would only be illegal if you crack their passkey, then use their network, or something along the lines of that. im not saying it is right to use someone's open network, but it would seem that there is nothing illegal, because if someone didn't want this to happen to them, they would secure their network.

    No it's not obviously legal to to enter someone's property if it's unsecured. It's called trespassing, however trash, such as dumpsters and trashcans are public domain.

    Try walking into someone's house in Detroit and see how far you can get.

    And about Open networks:

    s 16D-3. COMPUTER Tampering. (a) A person commits the offense of COMPUTER

    tampering when he knowingly and without the authorization of a COMPUTER'S

    owner, as defined in Section 15-2 of this Code, or in excess of the authority

    granted to him:

    (2) Accesses or causes to be accessed a COMPUTER or any part thereof, or a

    program or data, and obtains data or services;

    You are illegally obtaining services. Read the law sometime

  17. hey im in school and the computers are gay and everything is blocked how do i get around this without getting caught??? :P

    The fact that you began the sentence with "Hey I'm in school" and the utilization of the word "gay" as an adjective for an inanimate object tells me that you are in dire need of help and not in school. also there is the strong possibility that you are joking and posted the topic just to get attention indicated by the smiley face sticking it's tongue out at the end of the sentence.

    Do not pass go; do not collect $200

  18. the mail is sealed (protected), an open wireless ap is not (unprotected). Let's say the mailman delivered a postcard, i have every right to read it if its in my mailbox.. also, you are assuming that a piece of mail is the same as radio waves. it is not.

    i think you are confusing ethics and law. is it ethical to connect to an open ap you haven't had permission for? maybe. is it illegal, i don't know, I'm not a lawyer. should it be illegal, absolutely not.

    There you go again with the self entitlement by dancing around the issue. Network traffic is also delivered in packets just like mail and sometimes its sealed and needs a signature. Oh and by the way yes it is illegal.

    your acting like one of those kids when they are playing cops and robbers and one kid tells the other "Bang you're dead" and your the other kid saying "Nuhuh I have magic armor so bullets cant hurt me". Give it up you are trying to justify unlawful behavior.

    It also appears that you live in Illinois and I have their statutes right here:

    16D-3. COMPUTER tampering

    s 16D-3. COMPUTER Tampering. (a) A person commits the offense of COMPUTER

    tampering when he knowingly and without the authorization of a COMPUTER'S

    owner, as defined in Section 15-2 of this Code, or in excess of the authority

    granted to him:

    (1) Accesses or causes to be accessed a COMPUTER or any part thereof, or a

    program or data;

    (2) Accesses or causes to be accessed a COMPUTER or any part thereof, or a

    program or data, and obtains data or services;

    (3) Accesses or causes to be accessed a COMPUTER or any part thereof, or a

    program or data, and damages or destroys the COMPUTER or alters, deletes or

    removes a COMPUTER program or data;

    (4) Inserts or attempts to insert a "program" into a COMPUTER or COMPUTER

    program knowing or having reason to believe that such "program" contains

    information or commands that will or may damage or destroy that COMPUTER, or

    any other COMPUTER subsequently accessing or being accessed by that COMPUTER,

    or that will or may alter, delete or remove a COMPUTER program or data from

    that COMPUTER, or any other COMPUTER program or data in a COMPUTER

    subsequently accessing or being accessed by that COMPUTER, or that will or may

    cause loss to the users of that COMPUTER or the users of a COMPUTER which

    accesses or which is accessed by such "program".

    (B) Sentence.

    (1) A person who commits the offense of COMPUTER tampering as set forth in

    subsection (a)(1) of this Section shall be guilty of a Class B misdemeanor.

    (2) A person who commits the offense of COMPUTER tampering as set forth in

    subsection (a)(2) of this Section shall be guilty of a Class A misdemeanor and

    a Class 4 felony for the second or subsequent offense.

    (3) A person who commits the offense of COMPUTER tampering as set forth in

    subsection (a)(3) or subsection (a)(4) of this Section shall be guilty of a

    Class 4 felony and a Class 3 felony for the second or subsequent offense.

    © Whoever suffers loss by reason of a violation of subsection (a)(4) of this

    Section may, in a civil action against the violator, obtain appropriate

    relief. In a civil action under this Section, the court may award to the

    prevailing party reasonable attorney's fees and other litigation expenses.

    You can find more information here:

    http://nsi.org/Library/Compsec/computerlaw/Illinois.txt

    And here:

    http://law.findlaw.com/state-laws/computer-crimes/illinois/

    I am Majoring in Information Assurance and Forensics so I have to deal with Cyberlaw. If you have any more questions feel free to ask.

  19. Look at it this way. YOUR wireless access point is broadcasting into MY house without my permission. My computer is merely accepting and invitation by your AP. So really I'm not walking into to your house because the door is unlocked, I'm walking into your house because the door is unlocked and you invited me in.

    Also,let's say at my house I have a Linksys router set to factory defaults, ie now encryption, ssid is linksys. I decided to do some computing (paper writing) at the park down the street. While at the park, my computer automatically connects to the neighbors AP which is also a Linksys router with factory defaults. I am now a criminal because that person cannot secure an AP. Please.

    Yes you are because you have the technical competency to know better, also ignorance is not an excuse to break the law. Also, why do you feel entitled to do such things moreover why are you acting so egocentric?

    Let's apply your logic to a scenario:

    Ok, I know most of everyone can drive a car in this forum right? We know that cars can have many functions like delivering the mail to a mailbox. Let say that the mailman delivers you neighbors mail to you by mistake. Most of us would walk over put the mail in the neighbors mail box. However by your logic that mail is yours because it was delivered to your mailbox, but that still does not make it legal to open mail that is not yours.

    Also, by your same logic that mail truck parked outside in front of your house is yours for the taking because the mailman left his door unlocked so that gives you the right to take the mailtruck and drive it around town. Then when you are caught all you have to say is "I don't know how to drive" to get out of trouble. "Please".

  20. check with your local authorities.

    as long as you're not being a bandwidth hog or doing anything illegal, I'm sure the owners wouldn't mind

    Just because you can does not mean you should, like digininja said just because someone leaves their door unlocked does not give you permission to walk in to their house. Also, by your train of thought they wouldn't mind you borrowed their car without asking and drove it around as long as you were not using it in any hit and runs or bank heists. It does not work that way.

×
×
  • Create New...