Jump to content

3w`Sparky

Active Members
  • Posts

    142
  • Joined

  • Last visited

Posts posted by 3w`Sparky

  1. Hi All, ages since i posted,

    I have an idea running through my head and can only assume that because i'm not cutting edge someone has been here before me.

    I have been burgled (well attempted) and have since installed an IR sensor and alarm to my property but thought about something alittle extra.

    Bluetooth logging, most people have smart phones these days, criminals included, well if fingerprinting and foot prints are enough to send crimbo's to the slammer then bluetooth mac addresses have to be closley followed right ?

    I mean most bluetooth devices have the owners name on them like bob or jim (no offence to law abiding bob's & jims )

    but this gives you a name of who was snooping nearby and the unique ID of there phone.

    I know i could get something like thepineapple to capture wifi and maybe assiocate to an accesspoint but think bluetooth is of a lesser range and as a result wouldn't give so many false positives.

    ideally based on low power consumption as it will be 12 volts powered.

  2. I have downloaded and installed the GUI for metasploit, but on starting the .bat file it complains about a -y command on the rubyw line of the script, any ideas ?

  3. Private Sub Command1_click()

    Dim S As String

    S = RndCrypt(Text1.Text, "pass")

    Text2.Text = S

    End Sub

    Public Function RndCrypt(ByVal Str As String, ByVal Password As String) As String

    Dim SK As Long, K As Long

    Rnd -1

    Randomize Len(Password)

    For K = 1 To Len(Password)

    SK = SK + (((K Mod 256) Xor Asc(Mid$(Password, K, 1))) Xor Fix(256 * Rnd))

    Next K

    Rnd -1

    Randomize SK

    For K = 1 To Len(Str)

    Mid$(Str, K, 1) = Chr(Fix(256 * Rnd) Xor Asc(Mid$(Str, K, 1)))

    Next K

    RndCrypt = Str

    End Function

  4. while snoozing this morning i heard something on the TV about a hacking challenge to find the best security persons out there , they are setting up a website that is to be hacked and information gained in order to get to the next step, anyone heard about this, like i say i was snoozing so can't remember much about what i heard but i think this is right ?

  5. assuming you have an internal disk and a usb caddy setup, just run through mounting it via the web page the create a cron job todo it nightly or alike then just cp -R from dir A to dir B

    a being the data source and B the caddy

    if that isnt quick enough the its doing it through usb 1 or the server isnt upto spec for what u want

    course rsync is best no cp as that willcopy all not just newer files

  6. i have an old "well not that old" interflex usb receiver, i found that swiping my id card across input a sting of asci into notepad, it is at risk of a replay attack for sure, and the best bit is the id's between my card and others are just 3 numbers , this means that with pot luck you will be able to use anybody elses id.

    i will find the model as i have two and could post one in , with a blank card

  7. retain them for 12 months incase it breaks !

    but make sure it's in a cool dark place as they are normally thermal and react badly to heat light and moisture

  8. OK So the PGP Disk encryption is not breakable "currently" , but when you "REBUILD" you system then install pgp desktop which you can then turn your hdd into encrypted, what about all the leftover space that hasn't been written to yet

    eg 80 gig hdd

    4 gig xp install

    1 gig office install

    3 - 4 gig of other apps

    what about the remaining space, does pgp write across the whole disk ?

    eg can a disk that has been used already be securely erased if you just run a bare install then install pgp ontop of it ?

  9. I have been using HFS for ages it's a great easy way to get files onto a linux box with wget

    darren 7 min's 50 seconds "ish" did you trump ?

    jen i'm going to have a lookie at them ace cards as i have been meaning to buy a card for ages this was the push i needed.

    take care one and all

  10. In the episode Darren said that he uses cloud backups, but he didn't say what service that he uses. I do local backups now but I want to move to more of a cloud backup setup due to my travels. I have been concerned on the security of the files not only from someone cracking the backup site but also security that the backup site operator can't access my files. Anyone have any input on what sites you use and how well their security is.

    if it's in the internet you should assume that someone will view them at some point, i think you need to make the security as strong as you need it, if it's useful to others then your want to encrypt before backing up, it's that simple really.

  11. Well Darren, How is it you can walk around and airport with objects and cables all connected yet hanging off of other devices all looking like trigger devices without getting stopped by security,

    If i went to our airport "Gatwick" then i'm sure to be stopped and asked to explain exactly what i was doing, that would most lightly be while looking at the pointy end of a large gun !!!!!!!

    great idea but it would have to all be hiding inside a bag at our airport, gatwick also would capture at least 4 times that in an hour tho its always very busy.

    take care one and all

  12. nice ep, I would like more info on IDS and IPS setups and if possible some walk through's - the good /bad /ugly

    Darren, your game fly audio is a bit pants have you sold all your mic's already !

    and shannon, what are those things in the background foreign looking things with V H and S written on them

    that oldskool !

    love the show guys

  13. nice ep, I would like more info on IDS and IPS setups and if possible some walk through's - the good /bad /ugly

    Darren, your game fly audio is a bit pants have you sold all your mic's already !

    and shannon, what are those things in the background foreign looking things with V H and S written on them

    that oldskool !

    love the show guys

  14. Nice to see you brought a memento back from the cold cold UK "a nice cold"

    and haha simple things and all that amber lights hahahahaha

    really liked your sandbox example that was a very good analogy

×
×
  • Create New...