Jump to content

HostRail

Active Members
  • Posts

    13
  • Joined

  • Last visited

About HostRail

  • Birthday 05/22/1982

Contact Methods

  • AIM
    HRailChat
  • Website URL
    http://HostRail.com
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Phoenix
  • Interests
    all things internet

Recent Profile Visitors

773 profile views

HostRail's Achievements

Newbie

Newbie (1/14)

  1. Iphone wifi disconnect app: Does anyone know how to send doff packets from an iphone?
  2. I see. Thats about what I had guessed. Maybe this could be harnessed as a folding at home project. ???
  3. Ive read and heard a little about the massive amount of computational power built into GPU's and how there are now api's out to process data with them. My question is what makes the GPU faster then the CPU. And can an OS or VM be loaded entirely into a GPU and effectively bypass the CPU?
  4. As far as cpu usage goes is one 3 head card more or less draining on a cpu then 3 single head cards? Do the GPU's tap into the cpu much? (running 3 lcd's 1680x1050)
  5. yeah even if I could decode the data. And actually i can with the old ioncube encoders. I can never get the php source code from it. Correct me if I'm wrong.
  6. after rereading some info ioncube may be an encoder and not an encrypter so I may be barking up the wrong tree.
  7. I have an ethical question. I bought a script from a programmer a few years ago. It is encrypted with ioncube php encryption. Ive upgraded to php5 and now the encryption is out of date. I cant find the programmer anywhere. Ive paid for the script. Is it wrong to try to decrypt the code so i can continue using it? Ive even contacted ioncube. They said it cant be decrypted even it they wanted to. Not sure if thats true...
  8. good point. TOR wasn't developed for illegal activities, not that it isn't used for it. I would like to know if there is a private exit node pool anywhere. Or if that's even possible. A group that could be trusted with anonymity. Perhaps that would defeat the purpose. But at least it would increase the speed I think. Is it possible to send an encrypted request through tor's relay nodes then to an exit node and then from there on to a trusted proxy server? So it would be encrypted the whole way though. That way tor would only act as a middle man. PS I have this setup running right now on a vps. http://howtoforge.com/ultimate-security-proxy-with-tor and it is really cool. I'm adding a webmin front end and monitoring system for tor squid and privoxy.
  9. I like hak5 a lot. Yes Darren is quaky, Shannon is awkward, Matt is blunt and mubix is 1337. But the show is free and has a lot of good information. And the community rocks, lan party's, trivia, giveaways, road trips, etc. I would like to see a repository or wish list that we could populate with ideas for the crew for future segments.
  10. For NON gaming purposes would you rather have a triple head video card or 3 mid quality single head vid cards to run 3 large lcd monitors on one computer?
  11. I'm curious what kind of people operate TOR exit nodes and why.
  12. I'm working on a similar issue. Just not on a mac. Yes vlc can be used to upload and encode your content. You can use streamcast on your vps (maybe). Then from there its like any steaming content. what are your vps specs?
×
×
  • Create New...