Jump to content

N1LL0

Active Members
  • Posts

    25
  • Joined

  • Last visited

Posts posted by N1LL0

  1. As far as the hardware is concerned I think you might be referring to the Arduino.

    If you are interested in hardware stuff, check out Make:. They have fun projects for arduino, POV, circuit bending for audio. It is not just for electronics though. They will tell you how to make a spud gun. :lol:

  2. but I draw the line where a hackers actions cause harm to the people of the country as opposed to just the regime. Helping to bypass internet filters, that is fine. Causing problems for their communications systems (just an example) would not be. Its just causing problems for the everyday person. How is that acceptable?

    I think keeping civilian casualties to a minimum, so to speak, is a fair limit. However as with any revolution you have to place to blame with the action. What I mean by this is that if the regime cracks down on the citizens of the country as a result of the actions of hackers the blame lies with the regime. It could be argued that the hackers caused problems for everyday people that would not have happened if they had not acted. This is sort of like a man who beats his wife saying "I wouldn't be forced to beat her if she would just learn to listen", which is obviously BS.

    Word from Iran is that they are asking people to not engage in dDOS attacks if they don't know what they are doing because it has caused some network problems.

  3. Hacking networks merely to cause damage and distress is just malicious though, and I don't see that as acceptable. Not to mention if people start hacking Iranian networks and meddling you just boost Ahmadenijad's power.

    You are absolutely right hacking networks to cause damage is malicious. So is shooting a bunch of protesters in a public square. Is it that you believe violent action is unacceptable under any circumstance, because this just sounds like white hat dogma under peaceful conditions? A revolution however wouldn't necessarily have the same proscriptions once you have chosen a side.

    The last argument is again another pragmatic argument that doesn't address the ethics of the question. Though it is valid.

    FWIW, I think you are all making good points.

  4. No, we do not have the right. I absolutely hate how recently we've been trying to force democracy on other countries... that's just about the most undemocratic thing we could do. If the people there really want it for themselves then they will revolt, they will take action, they will stand up for themselves.

    To continue on with the Iran example, the people (at least some) are revolting and taking action. They just need help because they don't have as much power as the state, revolutionaries rarely do. The American Revolution would never have succeeded without the help of the French, even if they were acting in their own self interest against a long-time rival. However, my question isn't about whether the US gov't has a right to blindly impose it's will on other nations. The question is whether it is ethical to come to the aid of foreign revolutionaries against an oppressive regime by performing "cyberattacks".

    Let's not get into the semantics of "hack" ;)

  5. If I were Iran and see hackers from other nations getting involved in my countries affairs I would be really angry. And I don't think we want to see Iran angry.

    I think this is a very valid, pragmatic argument. I think this also goes along with the argument that Western hackers helping the Iranian dissidents actually hurts the cause as it provides the regime with the argument, "This is not the will of the Iranian people but western elements sowing the seeds of insurrection." However, I don't think either of those arguments addresses the ethics of the situation even though I think they are very important arguments.

    Also, while I don't like the idea of an angry Iran (aren't they perennially angry with the US anyway). I don't think we should feel any obligation to make them happy either.

    There has been more information coming out about the different ways that people are lending assistance. Obviously, there is the dDOS that is linked above, but there are other more subtle ways that people have been helping. Some have set up proxy servers to help hide the activists' activities, while others are making the regime's job harder by setting their Twitter timezone to Iran thus dilluting an easy search field.

  6. The way you are putting it and the examples you are using are more to do with the way people want to change the running of their own country, not anyone elses. If this was a movement in Iran, you could compare it to the American Revolution, but since it is not...

    From the article...

    In both Iran and abroad, the cyberstrikes are being praised as a way to hit back against a regime that so blatantly engaged in voter fraud.
    emphasis mine.

    I am not fully versed in the politics of Iran, and we have to be skeptical about any information we hear from any closed state. This makes it sound as though the young Iranian activists are glad for the assistance. Have they specifically made calls for assistance? I don't know. But then I am not trying to be evangelical about running to their aid. I am only playing the devil's advocate to try to understand other people's position on this and like issues. It was asserted that it is wrong to hack another country's websites as it is none of our business. This leads us into interesting territory. If you saw a man beating a child to a bloody pulp on his own property, would you help the child even if he/she couldn't ask for your help? Why or why not? It could be argued that it is not your property and it is none of your business. This would then be countered with the argument that this is you community and as such you have a vested interest in what occurs in your community or you can't sit idly by while a person's human rights are violated, etc. If either of those are valid, then it will lead to a semantic argument over what constitutes "community". Does community mean your neighborhood, city, country, or can it be expanded to include the entire world?

    It seems as though this is a movement in Iran. They are physically in the streets. The Iranian government is actively trying to hunt down tweeters. I can see the argument that the crack call is from outside sources since it is cited as being from pro-democracy movements. That still isn't very specific though. The pro-democracy movement could be from Iran or outside Iran. The people making the calls could be Iranian expat activists who fled after the fall of the Shah. Maybe the Iranians are contacting the extra-Iranian pro-democracy groups because it is difficult for groups in Iran to get their message out because of government control of media. There is obviously something going on in Iran being backed by Iranians, so I don't think the American Revolution analogy was that far afield.

    disclaimer: Once upon a time I was a debater in high school. So I just really like to argue.

  7. I don't think is a good thing to hack a government website of any country. It's their election, and their country. Why do we have the right to interfere.

    That is a good point, but what if the revolutionaries ask you to participate as they apparently have in this case? Then you are not imposing your views on an unwilling populace. But then again, the American Revolution was started by a small minority against the popular will of the majority of English colonists, so I suppose that joining any minority revolution would be an imposition upon an unwilling populace. hmmm....

  8. do i change the bios and hdd password before or after re-formatting

    after

    also is there a way to save all my internet favourites because they are very important and i have a lot of them

    Backup your favorites folder in c:\documents and settings\"your user id"

  9. I just recently went back and dloaded the first 3 seasons. I have to say that although I enjoyed s1 they seemed really young and inexperienced. Some may call this raw, but I appreciate the fact that they have just become better onscreen personalities. Keep up the technical info guys.

  10. I agree with moonlit. Format, reinstall, and then change all your passwords to that sensitive info like bank accounts. When you change your online passwords, you might consider not doing it over wireless. Your friend may have a man in the middle. That reminds me, lock down your router and change the admin password for that as well.

    After you reinstall make a disk image so that you can easily format and reinstall again if necessary.

  11. From the intertubes....

    HOW THE WACOM CORDLESS, BATTERYLESS PEN WORKS. The Wacom stylus

    looks and feels like a pen yet contains no batteries or magnets. Instead it

    takes advantage of patented resonance technology developed by Wacom Co.

    Ltd. in which a tiny signal is sent to the stylus and returned for position

    analysis. In operation, a grid of wires below the screen alternates between

    transmit and receive modes about every 20 microseconds. In the transmit mode (1),

    the tablet's signal stimulates oscillation in the coil-and-capacitor resonant circuit in

    the pen. In receive mode (2), the energy of the resonant circuit oscillations in the

    pen is detected by the tablet's antenna grid. This is then analyzed to determine

    position and other information including pressure. Since the grid provides the power

    to the pen through resonant coupling, no batteries are required. Thus there are no

    consumables inside the pen that will run down and need to be replaced or that would

    make the pen top-heavy. A simple analogy for this patented technology is that of

    a piano tuner using a tuning fork to tune a piano. As the tuning fork is brought into

    proximity of the appropriate vibrating piano string (if the fork is of the same

    frequency) it will begin to borrow energy from the vibrating string and

    resonate, generating a tone. In much the same way, as the Wacom pen comes

    close to the tablet surface, it begins to resonate, generating its own

    frequency back to the tablet. When it hears the pen, it tracks the pen's

    location with unprecedented accuracy. The tablet then sends location,

    pressure and tilt information to the computer along with a

    signal indicating whether the pen point or the eraser tip is being used.

  12. Before putting them in. Plug your nose, close you mouth and breathe out. This will force your internal air pressure to equalize through you ears. It's an old swimmer/diver trick I learned. Works great on plans and as I kid I would do it when diving down into the deep end in the pool. That way you're ears don't hurt when you're down there.

    If you do this, breathe GENTLY until you feel the change. Don't force it like when you blow your nose.

  13. Your whites are too blown out. You have lost all of the detail in the highlights. This causes the large white space on the left to become too dominant. You want the eye to rest on the text not empty white space. This is then compounded by the cropping where there is a small dark space next to that white space creates visual tension giving the white space additional weight.

    I took your image and quickly cropped it and moved the text up to give you an idea of how I would change it. I can't add detail back to the whites however. Ignore the black box around the text, like I said I did this quickly.

    Other than that, it looks pretty good. Keep doing what you are doing.

    post-14201-1243548594_thumb.jpg

  14. Hmm... there was this one anime about hacking I saw a while ago... forget what it was called. Maybe someone can remember? A girl was hacking without even know it, in actual fact someone was hacking for her... a hacking group.

    I think this is the Lain series. It is pretty cool.

    Doh, I should have read the whole thread Lain was already mentioned.

    I want to add Ferris Bueller's Day Off. Not a cracker movie (although he does break into the school computer), but plenty of social engineering, sampling and even hacking the doorbell.

×
×
  • Create New...