Jump to content

Machstorm

Active Members
  • Posts

    247
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Machstorm

  1. Just to let you know some forums do record your IP . If this one does someone could Subpoena the forum to get your IP address. So be really careful on how you ask your questions. One thing to think about is, is the punishment for getting caught in some states it's a misdemeanor take Oklahoma for example: [ computer crimes - Oklahoma Computer Crimes Act - expanding jurisdictions – emergency ] BE IT ENACTED BY THE PEOPLE OF THE STATE OF OKLAHOMA: SECTION 1. AMENDATORY 21 O.S. 2001, Section 1957, as amended by Section 3, Chapter 97, O.S.L. 2002 (21 O.S. Supp. 2005, Section 1957), is amended to read as follows: Section 1957. For purposes of bringing a civil or a criminal action or for purposes of investigating any crime pursuant to the Oklahoma Computer Crimes Act or for any violation of law by use of a computer, a person who causes, by any means, the access of a computer, computer system or computer network in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system or computer network in each jurisdiction. The Oklahoma State Bureau of Investigation, the State Office of the Attorney General or any district attorney in this state is authorized to investigate and prosecute any computer crime originating from, networking with, or otherwise operating within any jurisdiction within the United States or any province, parish, district or country outside the United States in which a person unlawfully accessed any computer in this state or otherwise committed any crime in this state by use of a computer. SECTION 2. AMENDATORY Section 1, Chapter 98, O.S.L. 2003 (21 O.S. Supp. 2005, Section 1959), is amended to read as follows: Section 1959. A. When any person has engaged in, is engaged in, or is attempting or conspiring to engage in any conduct constituting a violation of any of the provisions of Section 1953 of Title 21 of the Oklahoma Statutes the Oklahoma Computer Crimes Act, or any other provision of law by use of a computer, the Oklahoma Attorney General or any district attorney in Oklahoma may conduct an investigation of the activity. On approval of the district judge, the Attorney General or district attorney, in accordance with the provisions of Section 258 of Title 22 of the Oklahoma Statutes and or pursuant to the provisions of the Oklahoma Computer Crimes Act or other provisions of law, is authorized before the commencement of any civil or criminal proceeding to subpoena witnesses, compel their attendance, examine them under oath, or require the production of any business papers or records by subpoena duces tecum. Evidence collected pursuant to this section shall not be admissible in any civil proceeding. B. Any business papers and records subpoenaed by the Attorney General or district attorney shall be available for examination by the person who produced the material or by any duly authorized representative of the person. Transcripts of oral testimony shall be available for examination by the person who produced such testimony and their counsel. Except as otherwise provided for in this section, no business papers, records, or transcripts or oral testimony, or copies of it, subpoenaed by the Attorney General or district attorney shall be available for examination by an individual other than another law enforcement official without the consent of the person who produced the business papers, records or transcript. C. All persons served with a subpoena by the Attorney General or district attorney pursuant to the provisions of the Oklahoma Computer Crimes Act shall be paid the same fees and mileage as paid witnesses in the courts of this state. D. No person shall, with intent to avoid, evade, prevent, or obstruct compliance in whole or in part by any person with any duly served subpoena of the Attorney General or district attorney pursuant to the provisions of this section, knowingly remove from any place, conceal, withhold, destroy, mutilate, alter, or by any other means falsify any business papers or records that are the subject of the subpoena duces tecum. E. Any person violating the provisions of this section shall be guilty, upon conviction, of a misdemeanor. SECTION 3. It being immediately necessary for the preservation of the public peace, health and safety, an emergency is hereby declared to exist, by reason whereof this act shall take effect and be in full force from and after its passage and approval. Passed the Senate the 14th day of February, 2006. Sorry about the long post, but you get the idea, also thats just the state think of federal laws you would be breaking. You could at least expect 5 years in prison and fines that can exceed $5,000
  2. If they could get it in color it would be awesome. For example the first episode of Firefly when Badger holds on up for Mal to so him the report from the Alliance (Working on a screenshot). Here is a link
  3. I got my ThinkPad T61 from IBM with Linux installed for $650 (Originally $1300)
  4. You might know this already but Mac Unix based. Although it's not Linux it's not all that different at the command line.
  5. About show 502. I know it's kinda easy to think of, but I posted it first :P , although I am not using a tank. I am still working on some parts, however, I will try to post a video of it working. "It's my duty, as a total and utter bastard" - Rimmer
  6. Well, I am majoring in information assurance and forensics at Oklahoma State University and Tulsa University. So far I have to be proficient in all the languages you described. One of my instructors put it to me this way she said that I would have to create my own IDS for example to show how proficient I was in programming. As for just Information Systems, the one that stands out the most (to me) is C. That keeps on getting that stressed a lot. Just to clear things up a little, what type of Career were you looking for? and Are there any companies that you had in mind?
  7. Especially, if you have a bumpy commute then depending on how they are made; those headphones will rub your ears raw
  8. I have tried most of those in-ear noise canceling headphones and they do not work near as well as a normal set of headphones, because there is little isolation with the in-ear. Not only that in-ear is harder on your ear drums. the Maxell HP/NC-II Noise Cancelling Headphones: http://www.maxell-usa.com/index.aspx?id=63...nfo&pid=138 Yes I know that they are not in-ear, but they are really good at noise canceling. Something that I use when i am walking around on campus are these. Sony MDR-G57G: http://www.amazon.com/Sony-MDR-G57G-Sports...3286&sr=8-1 I like them because of the punch bass that they deliver they also come in a clip on design: Sony MDR Q22LP http://www.amazon.com/Sony-MDR-Q22LP-Headp...3506&sr=1-7 The isolation these headphones provide are enough for me because being on campus there are alot of punks that like to do burn outs on a constant basis. Of course your mileage may vary
  9. If he (Eviltechie) has not already learned; when you crack a login/password thats cracking. When you do something, oh say, like flashing a Fon and installing Jasager then that is Hacking. Sure some might argue "you can hack this to crack that" but in the end you are cracking.
  10. A blue spark when you plugged it in or after? Did the spark come from the power supply or the wires or did it come from the mobo? If it is as bad as I think it is, you might (read again "might") have fried the mobo and/or the power supply. If the power supply surged and then the surge hit the mobo. However if the power supply just crapped out then you might need to return it if that's the case. Also What size is the power supply in Watts? And how many devices do you have connected (all of them including the type of cpu)? Also, sometimes the brand has a lot to do with it. I know that some Ultra power supply's (for example) are crappy and have a chance of burning out from shoddy construction.
  11. Because of the business I am in I have to use them all. And because of that I have grown to appreciate all three. Although Mac has not been used much.
  12. If you can get it booted. I recommend doing a sys C: at a command prompt. This is to make sure that the system files are repaired. If you don't then reboot you will get the same error message. After that's done you can be some what comfortable running CHKDSK (I recommend the /R option /F is implied when you run /R).
  13. I have the same issues with other GTA titles. GTA III still slows down even with my 8800 GTS 512 (G92). I may be wrong but it could be the game engine. One more thing Have you turned the viewing distance down? that ususally helps a little.
  14. If you know someone who has a floppy drive and the same version of Windows (XP? I take it). Copy these files to it and see if you can boot it that way: ntldr MSDOS.SYS IO.SYS CONFIG.SYS AUTOEXEC.BAT You might need these too NTDETECT.COM Boot.ini when you do, do a sys C:\ at the command prompt and that should fix it. If the system files are that only thing that is damaged. This only works if no other system files are damaged.
  15. Well, I was half right about the heat because thats what causes chip creep. That was also the problem with the early dipp chips used for the 8088 and old school memory. Hey anyone remember the Old ATI RAGE cards you could install more memory on via dipp chips?
  16. Yah, I have to be very proficient with programming when I go for my masters in Information Assurance and forensics at Tulsa University. I can't wait to get into Cyber corp.
  17. Yah, almost a year after they made the slot 1's Intel switched back to FCPGA for cooling issues I think. I am going to keep them and some day start a museum of PC history.
  18. Damn, it's been a battle, however this is as far as I have got. public class test { public static void main (String args []){ int num; num = 1000; System.out.print (num); System.out.println(" is the value of num "); } } Sleep took over last night. Sleep > caffeine
  19. It's a fake thats not the board inside notice where the cord comes in the box in the background. Its pushed under. Also notice that he does not take it out of the box so you can see the PCB he took out. I hate creeps like that. They make up cock and bull stories just to stir up the masses. Besides even if it were possible it would take years to go over all of the footage from everyones house. It's just not feasible.
  20. Oh, ok I will try that. Thanks (Edit) I got it to work finally. I had to tell Netbeans to create and store the Jar file so I could use it But I cannot acces it directly I have ti use this command to do it. java -jar "C:\Documents and Settings\Home_Directory\My Documents\NetBeansProjects\Example1\dist\Example1.jar" Otherwise, I get an error.
  21. Oops, I meant the class file. From the looks of it Netbeans micromanages all of the files created when I compile source code
  22. One problem that I am running into is that I cannot run complied source code from a command line when I create it from Netbeans 6.5. Netbeans shows the correct output for public class Example2 { public static void main (String args[]) { System.out.println("This is the first line"); System.out.println ("This is the secondline"); } } But when I go to the folder that holds the class file for Example2 and run it from the command line I get this: ld\classes\example2>java Example2 Exception in thread "main" java.lang.NoClassDefFoundError: Example2 (wrong name: example2/Example2) at java.lang.ClassLoader.defineClass1(Native Method) at java.lang.ClassLoader.defineClass(Unknown Source) at java.security.SecureClassLoader.defineClass(Unknown Source) at java.net.URLClassLoader.defineClass(Unknown Source) at java.net.URLClassLoader.access$000(Unknown Source) at java.net.URLClassLoader$1.run(Unknown Source) at java.security.AccessController.doPrivileged(Native Method) at java.net.URLClassLoader.findClass(Unknown Source) at java.lang.ClassLoader.loadClass(Unknown Source) at sun.misc.Launcher$AppClassLoader.loadClass(Unknown Source) at java.lang.ClassLoader.loadClass(Unknown Source) at java.lang.ClassLoader.loadClassInternal(Unknown Source) Could not find the main class: Example2. Program will exit. Is there something I missed?
  23. My major is network security or Information Assurance and Forensics to be more precise there are only 7 colleges that have this major and Oklahoma has 4 of them. :D
×
×
  • Create New...