Jump to content

etftw

Active Members
  • Posts

    48
  • Joined

  • Last visited

Everything posted by etftw

  1. I'm going to be getting there on the 28th July and heading back to Britain on the 6th August; some how it ended up being cheaper for me to stay an extra few days so I decided to go for it.
  2. Is there usually a lot of people flying in from abroad for the conference?
  3. I used to, gave it up for a few years though and could never get back into the swing of it afterwards.
  4. I'm going this year, my first time :) I was supposed to take a trip to Vegas at Christmas but the flight got cancelled due to weather conditions in the UK, so I rebooked it for the end of summer so I can go to DefCon too :D
  5. There is no need to use the cd command, you can pass an absolute path to the command which will indicate exactly where it should be creating the new folder, like this: system("mkdir C:\\parent_folder\\new_folder"); You should probably try out requiem's method however, as if I am correct the method he has showed you will automatically create the directory if it doesn't exist when the file is created :) A lot less messy then messing around with system commands.
  6. For the GUI I will typically just grab a pen and paper and sketch out what I have in my mind at that specific moment in time, that way I can get what I am thinking onto paper ASAP and later clean it up in a software package; usually Photoshop, or using the built-in drawing tools with Word.
  7. etftw

    xbox 360 elite

    LOL! To the OP: I have a 360 elite too :)
  8. etftw

    Problem with NAT

    I have an update - I restored the router's factory settings, disabled uPNP and then put the Xbox into the DMZ and now it is not detecting any NAT problems, I tried forwarding the ports when it wasn't in the DMZ again but they still resulted in a NAT error. So I have an additional question that goes a bit off topic from the original purpose of this thread, which is: how safe is it to leave the Xbox in the DMZ? I imagine as the Xbox is not capable of much in terms of access to the rest of my networked machines and the execution of malicious software it shouldn't hold much of a threat to the security of my network, but if I am wrong please someone point it out so I can look for an alternative solution :)
  9. etftw

    Problem with NAT

    Yup, I have all of those ports forwarded using the appropriate protocols. Unfortunately I am still getting the problem after following this process, I will try to restore the router to factory settings and start fresh using this order and see if it works after that.
  10. etftw

    Mario VS Sonic

    I have to go with Mario, I think anyone who had a NES as a kid or used to play the original Donkey Kong will understand where I am coming from when I say that Mario brings back a lot of memories. I think both Nintendo and Sega brought out great material, I wouldn't say either of them copied off each other as such, as moonlit said Nintendo did come first, but Sega's style was pretty fresh when they released their first system in my opinion.
  11. Hey, Well kind of out of the blue I have been having some issues with my NAT setup, I have recently started gaming again via Xbox LIVE and noticed it was stating my NAT type is not classed as open, which I found odd as I had enabled uPNP not long ago, so I went into my router configuration and uPNP was still enabled but seeing as that wasn't working I forwarded the ports, unfortunately there was still no luck. I even went as far as to put the Xbox into the DMZ however the NAT type was still classed as strict. I have done these tests with my PC as well using the uTorrent port checker which used to connect to the ports I specify with no issues, however now it always fails regardless of whether my PC is in the DMZ, has the correct port forwarded etc. In addition to this I should probably mention that I have tried hooking straight up to my modem at which point there are no issues, so it is definitely not a case of my ISP blocking the ports. Does anyone have any recommendations as to what may be the problem? I have been trying to solve this one for hours and I have come to a dead end, hopefully there is a networking guru out there who can save me from throwing it out of the window! Cheers.
  12. Ah right, that clears things up a lot, I thought hashing was determined by it creating a fixed size of ciphered text regardless of the quantity of input. Thanks a lot for the replies, really helped :)
  13. So for an algorithm to fall under the category of hashing it MUST be one way?
  14. Hello, I have recently been looking into some cryptography related topics however I am still unsure about whether or not hashing falls under the category of asymmetric cryptography, it seems when people are discussing asymmetric cryptography hashing comes into the conversation, but no one seems to mention if hashing is actually considered an asymmetric method. If anyone knows please do tell as I can't seem to find the answer anywhere! Thanks :)
  15. Didn't check out the Nintendo one or much of the Sony one. I saw the new motion controller which I thought was pretty cool but I think the Natal (spell check?) announcement in Microsofts put it down a bit. I think this year Microsoft really did well and are bringing more to their console this time around than anyone else. Al though not really something of use to the gamers I thought that the Milo demo was really something else (providing it does work to the standard Peter Molyneux suggested), I'm not sure how developers would actually work an AI such as that into a game but it would be very cool to see it happen.
  16. At the moment I am looking forward to the following titles the most: Call of Duty: Modern Warfare 2 Ghostbusters Batman
  17. Alright cool, thanks for the replies :)
  18. Bit of a random question but does anyone know if you can have two Office distributions on one machine. A friend of mine wants to run Office 2007 alongside Office 2003 as he is quite baffled by the new 2007 interface and whats to move over to it slowly as he gets used to it but keep his 2003 installation for when he needs to get work done quickly etc.
  19. Agreed, that was very interesting :)
  20. That is a much more efficient idea, not sure why I didn't think of doing that in the first place
  21. Sorry I didn't understand that post? Did you mean even testing in a practical manor could still have different results depending on the algorithm the developer used? And in case anyone is wondering why I want to try to crack my own password it is because I am going to be carrying around a pen drive with me that has some very important documents, I have used TrueCrypt to encrypt the pen drive using AES and I am using a password that is over 20 characters and contains purely random characters so in theory it is a very practical password, but I just wanted to see for myself how secure it really is.
  22. Well that is why I wanted to test my password in a practical situation as I don't know what the creators of such password checkers consider to be safe or how they figure out such times
  23. I am not looking for a malicious program to brute force other peoples applications / websites, I want a program that brute forces against itself just for demonstration purposes of how long it would take to actually brute force a secure / unsecure password. Update I have found a solution which gives an estimate of how long it would take a password to be brute forced ( http://lifehacker.com/5072112/check-your-p...e-force-attacks ) According to that spreadsheet it would take a total of 23,375,644 days to brute force my password if 100,000 machines were employed It is rather comforting to know that fact :D
  24. Cheers, that is quite a handy website. I was looking more for an actual tool which will brute force against a string that I enter so I could see how long it would actually take someone to brute force my password. If no such tool exists I suppose I will just have to make it myself though, just thought I would save some time and see if anyone knew of one :)
  25. Edit: Just so no one else misunderstands, I am NOT asking for any malicious software that could actually be used to brute force actual systems Hello, I was just wondering if anyone knows of a tool which lets you enter a password which the program will then attempt to brute force against. Just fancied testing out the strength of some of my passwords against a brute force attack. Cheers :)
×
×
  • Create New...