Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

About ArkNinja

  • Birthday 09/16/1995

Contact Methods

  • AIM
  • MSN
  • Website URL
  • ICQ

Profile Information

  • Gender
  • Location
    Calgary, Alberta

Recent Profile Visitors

2,691 profile views

ArkNinja's Achievements


Newbie (1/14)

  1. Hello all, I was wondering if there was a way to make the BIOS interpret the USB Key as a USB CD/DVD-ROM drive, as I know that on a few of the computers I have poked around on have USB devices blocked from booting, but not USB external drives. I know there is U3, but as far as I know, that does not work for BIOS and only spoofs it for Windows itself. Thank you in advance.
  2. Just a question: How is score calculated? Because from those stats I can see they are not based on the number of units folded, so what are they based on?
  3. Really and Linux distro is secure, just make sure that it is fully updated, and make sure that you follow secure practices while configuring the system. Are you worried about remote or local attacks, because from what I can tell, you are more concerned about local, in which case I would put a BIOS password on (really only a speed bump), and use a different password for the system and the encrypted drive, and make sure that the passwords are secure.
  4. What you might be able to do (and this is purely speculation) is splice the USB cable into two different cables and plug both of them into the two computers and script it so that it backs up at whatever time, then removes it from the devices list and when its time to backup, add it back. This is purely speculation as I stated above, but who knows, it may work.
  5. Well my friend, what you want to do would be hacking MySpace, and I doubt it would be easy even if you tried. Unless the people who made MySpace are complete morons, the act of viewing a private profile is not handled by the client (you), but the server.
  6. Although you could use that to be a bit tricky by using the IP of a controlled machine then forwarding all traffic back to your IP, it would be the same as a proxy, but might be harder to detect.
  7. Wouldn't that be a moot point then? It wouldn't really be a connection, unless you were sending over an exploit maybe, then thats when I could see it being useful, but wouldn't a download require a two-way connection as well?
  8. I was wondering what your guys' perspective was on the best way to conceal your IP/identity. I'm talking about how in the movies you see the internet connection bouncing off many different points before finally connecting to the victim/attacker (depending on if it is from an attacker or victims point of view). I know there are programs (such as Tor) that do this already, but I am wondering about the effectiveness of this tactic. So here are my questions: 1. Can a person who is investigating an attack figure out who connected to the proxy machine without access to the machine logs, and if so how? 2. Does adding to the amount of proxy machines increase the probability of not being caught significantly if access to the logs are not available? 3. Are there ways to mask/spoof your external IP without the use of proxies? ~ArkNinja
  9. When you ACTUALLY think about it, doesn't water cooling seem like a horrible idea?
  10. I'm pretty sure it said on the site it was 6k, although I may be mistaken.
  11. Now, if only if I had the cash for one of those...
  12. ArkNinja

    CSS fatal error

    Did you activate the CD key on the account? Did you do it on a different account then switch?
  13. Im up in Canada, so the prices are a bit more, which sucks, I think I did pretty good here though. What do you guys think? Edit: Im using a different PSU than the one in the picture, added the wrong one to my cart.
  • Create New...