Jump to content

Burncycle

Active Members
  • Posts

    41
  • Joined

  • Last visited

Everything posted by Burncycle

  1. I disagree. THIS is the best 404 page ever: http://www.homestarrunner.com/notarealpage
  2. I was unaware that companies like AT&T didn't have shoes! Do you think it's by choice or a forced custom?
  3. It's a mentality that is lost on what has become the "modern hacker", not the hacker as defined by rms and his peers.
  4. Being a hacker in the true sense of the word is being someone with an obsessive curiosity about how a system works, what makes it tick, how can I change it, etc. With that in mind, why don't you just start toying with your own system and see what you can figure out instead of falling back on someone else's research and knowledge? Someone mentioned backtrack earlier, boot up backtrack and start playing with the tools provided, there is EXTENSIVE documentation on these tools and how to use them.
  5. It's not "cool", it's Commie bullshit!
  6. Pseudocode! But seriously, simple as in easy to learn: Java Simple as in low-level, bare bones, brass tacks, screw-it-up-and-break-your-computer: Assembly, with C at a close second.
  7. This error typically occurs when there is an error in the query. What you can do is add the following immediately after you execute the query: if( mysql_errno() > 0 ) { print "'" . $sql . "' - "; print mysql_error(); exit; } If there is a problem, you will then see the actual mysql error and what the actual query you ran was.
  8. Security is not about being impervious to attack, it's about not being the low hanging fruit on the tree. In other words, you can't be totally secure (it's impossible and a pipe dream) but you can make yourself less attractive to attackers. If you make your system (or data) more difficult to get at than your neighbor, an attacker will go after your neighbor because there is less effort involved.
  9. Defcon is an amazing experience that will leave you dead tired at the end of the weekend. * If you want to meet people, you will. * The talks are good, but the great ones fill up quickly. * There are a lot of parties at night, but most card at the door. * Don't expect to be able to pay cash for your hotel room, the hotel will actually turn you away for this. * Check the receipt when you check into your hotel, its possible that there could be a mix up and if you don't take care of it quickly enough you could be out of a room. * In my experience, the wireless network isn't as hostile as everyone makes it out to be. Just (as a precaution) don't do anything sensitive in the clear on this network. * Don't eat at the Riv! There are plenty of off-the-strip restaurants nearby that are loads cheaper. IIRC, there is a grocery store not too far away either, from which you can get food to make your own meals in your room for even cheaper. * Do unto others... If you're nice to the goons, they'll be... not... terrible? to you :P Same goes for everyone else. I had a guy ask me once to jump in line ahead of me, b/c he was in a rush. I let him in and got my items paid for and an invite to a party out of it. I feel like Defcon is growing faster than its infrastructure, which is making things burst at the seams so to speak. I hope they can expand, allowing for more people because Defcon is an experience I never want to give up.
  10. Burncycle

    iPhone

    Prior to the upgrade, the iPhone disregarded the connection rules established by the Exchange server. For instance, the if the server demands the client use encryption, the iphone would disregard and still connect in the clear. In the upgrade, Apple finally made its ActiveSync abide by the rules established by the Exchange server. Therefore, since the iPhone can't do encrypted mail traffic, it can't connect to the Exchange server.
  11. I had to hit the job market in May looking for a new job. I sent out literally dozens of applications finally giving up any criteria I had for a job in hopes of finding ANYTHING. I was lucky enough to find a stable (albeit dreadful) job in Corporate America. Rkiver, I wish you luck in finding a new job before things get too bad for you.
  12. I have one, what do you want to know?
  13. I agree with VaKo, coding isn't that important. A hacker is someone with an obsessive curiosity of computers and has a skewed perspective to see through obstacles and problems. Of the hackers I know, I'd say the more lauded skill set is more in line with a system administrator. I'd suggest familiarizing yourself with the command-line (Windows, Unix, or otherwise) and picking up a scripting language. I fundamental knowledge of how networks and your computer work would also be beneficial. Aside from that, back your data up and keep an install disc for your OS nearby and just poke at your system until you understand it. Good luck!
  14. darknet.org.uk irongeek.com are both good
  15. My point was that it was not designed as a commercial ("Hey look at how awesome or product is, please buy it."), it was designed as a viral video. The purpose of a viral video is just to get an idea or product out there. This video achieved that in spades, being that its been posted all over the Internet and people are talking about it. Now the next step to be taken is for MSI to actually make real commercials for this laptop. Then you see the commercial and think "Oh yeah! I've seen this laptop before." Marketing Managed.
  16. It wasn't designed to be an ad, it was meant as a viral video solely for the Internet. Clearly its working, as this is the sixth or seventh time I've seen the link in roughly 24 hours.
  17. Have you thought of using key based authentication? http://www.linux.com/archive/feature/34958
  18. Unfortunately, to do what you want it to, there is no other way to do it. The other thing you could do is lock down the executable permissions on the file so that only people in a certain group (for instance, your login group) can execute the binary. To do that: chgrp yourgroup /path/to/file chmod a-x,g+x /path/to/file This way, even though the binary still executes as root, you will be the only one who can execute it (theoretically).
  19. I've had good jobs and bad jobs regarding Tech Support. What it comes down to is the culture developed in your office. If your attitude and thought process meld well, you can find your job fun, challenging, or at the very least that it doesn't suck the life out of you on a daily basis. On the other hand, you can end up in an environment that eats a bite of your soul everyday regardless of whether the actual work done should be exciting or not.
  20. You need it to be owned by root, world or group executable, and have the setuid bit set. To do this: chown root:group /path/to/file and then: chmod 4755 /path/to/file -or- chmod a+x,u+s /path/to/file ***WARNING:*** This is a dangerous practice to adopt, as it gives everyone who uses the machine a potential window to root access. I'm assuming you are the only one using this machine so it's _less_ dangerous, but just keep that in mind for the future.
  21. This is the way of security people. If something is too cost-prohibitive or functionally impossible to break into, the "bad guys" won't just give up. They'll come at it from a different angle and find a different way in. In this case, TrueCrypt is too good to just break into, and no one has legitimately broken it yet. So someone comes along and finds an easier way in. This doesn't necessarily mean that TrueCrypt is vulnerable, it just means that the end user needs to be aware that this might happen. My suggestion is to use a key file as well as a passphrase to protect your porn... I mean "important documents"
×
×
  • Create New...