Jump to content

barry99705

Dedicated Members
  • Posts

    3,109
  • Joined

  • Last visited

  • Days Won

    104

Everything posted by barry99705

  1. Yea, but posting in the correct forum is pretty much universal with any forum, not just this one. It really helps with getting proper/timely answers.
  2. Hope it works! If not, these guys are the bomb! https://www.amazon.com/Ubiquiti-Bundle-NanoStation-Outdoor-airMAX/dp/B01EBBKVDE/ref=sr_1_14?ie=UTF8&qid=1489150388&sr=8-14&keywords=ubiquiti+nanostation
  3. I'd say 90% of my clients servers are all virtual machines. 0% of them run VMs on the desktops. You're right, most students won't think that. Then they get into the real world and find out different.
  4. https://www.wireless-driver.com/nokia/ First hit with a google search of Nokia C020.
  5. Probably, but then any wireless router could do this. Also, you really need to change those passwords.
  6. I take it you're still a student then. In the 25ish years I've been working in IT, I've only seen a couple networks where the user's didn't have local admin rights. Not every company has the money to pay someone to go around and update Adobe flash/reader every time it updates. The whole "don't allow software to run in the user's directory" bullshit causes tons of applications to shit itself. It's just not worth the headaches, vs the "maybe they will get a crypto virus". Sure you can set up a local admin account that the user's can use, but within a week, they'll just use that account for everything. At least this way when files on the server get encrypted, we can look at the user profiles and find the user, since it will be encrypted too. Server files get rolled back to before the trojan, and the desktop gets wiped and reimaged. Which my adversarial-question is, why is that an advantage? Because in this case, the host can't be compromised.
  7. Okay, which one of your assholes killed Amazon's E2 environment?
  8. Last time I was in a power plant, (few years, but probably not changed) the scada systems were all windows 98 machines.
  9. Windows apps are all run in the same user space. You get a virus from a "fedex" email, your whole system is most likely borked. The main gui in Qubes is just xfce on top of the xen(I think) hypervisor. No programs are actually run in this environment. Your email app is run in it's own vm, the cryptovirus can't do a damn thing to the dom0 hypervisor. Any malware that may get installed in any vm goes away when you shutdown the computer for the day, or if you know something happened, restart that vm. Nothing is persistent except your saved files in your home directory. It's almost like running a live os from a flash drive with persistence. Now you can have a personal, work, and fuck-all browser. Do your shopping and my-face-space in the personal vm. Work in the work vm, and your late night browsing in the fuck-all vm. You accidently click on one too many jigglies late at night and your work and personal stuff is still safe.
  10. Second post. http://security.stackexchange.com/questions/128305/is-qubes-os-more-secure-than-running-a-set-of-activity-related-vms Until there's a "hack" for Dom0, it's secure.
  11. Yea, they haven't had the mug in a while.
  12. It's a question that most likely won't(shouldn't) get answered here. I know for a fact TLA's browse the forums.
  13. Wait, he blocked Google and the internet still worked! Holy crap! We actually had a 6th grader set up a ssh tunnel from his school computer to his house! This was back in 05 or 06, not sure if he got the info from here though.
  14. Right, like I said, run the server at home, have the pineapple connect to that vpn connection, and share out over wifi. Though I'll let you know right now, we got pretty good at detecting vpn connections to bypass filters. We also actively looked for rogue access points running in the schools.
  15. If all you want is a secure connection to somewhere for logs and whatnot to go, run an openvpn server from home. You can use duckdns so you don't have to have a static ip address.
  16. For every question except which adapter, no. As for the adapter, you'll need a sdr for that.
  17. It shouldn't matter, but add 8.8.8.8 to the rpi's DNS. Also what happens if you do a traceroute to Kali.org?
  18. Depends on the cable. Those little ones on the inside of laptops are about the max you want to go, so maybe a foot or so.
  19. If you're running twin duck, you need to hit the caps lock button 4 times to fire off the script.
  20. Most modern operating systems will prefer a wired network connection over wifi, that's why the default route is being changed. If you disable network manager before connecting, this probably won't happen.
  21. The little usb device is a microsd reader. Not sure about the other stuff.
  22. Or just do it the way cell providers do it. Use a few sector antennas. Also, Y connectors don't work for microwave, unless they have some kind of circuitry inside. Normal splitters will bleed away most of the signal. So, you'd need one of these, and three of these. Plus whatever pigtails to connect the antennas to the splitter, then the splitter to your capture device. The antennas and splitter use N connectors, so say four of these. Now I'll assume your device uses rpsma, so one of these. $11.99 $79.99 $186.67 $186.67 $186.67 $20.99 $20.99 $20.99 ________ $714.96 plus tax and shipping. Not going to be cheap, and can't guarantee it will work.
×
×
  • Create New...