Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


About NegativeSpace

  • Rank
    F H3Z)

Profile Information

  • Gender
  • Location
    Eastern Tennessee
  • Interests
    I'm curious about almost everything.

Recent Profile Visitors

4,766 profile views
  1. This type of software is perfect for nefarious stealing of my data which I don't want, and I don't want to have to deal with auditing the software for data leaks. Is there anything out there for any OS that's known to be pretty trustworthy and works?
  2. I usually download HAK5 in iTunes. Nothing has showed up in a few weeks. What's going on?
  3. In case you don't know what it is, here is the wikipedia entry. http://en.wikipedia.org/wiki/Spectrum_auction. It was originally supposed to be done earlier but is now postponed to be finished by end of 2015. Relevant article here - http://en.wikipedia.org/wiki/Spectrum_auction What exactly does all of this mean?
  4. Good stuff. Any other info/opinions out there?
  5. Those things have already been done. It's also being recreated in over 100 alternate standards and currencies. That's my point. I am wondering if someone could have created or infiltrated BTC for breaking an encryption standard to the point that is it practically useless or for some other hidden purpose similar to that.
  6. The question might have already been answered but since Google drastically changed their search algorithm I don't find answers as easily as I used to. I've been reading about BitCoin and other crypto-currency standards lately and it has me wondering what else can be learned by exploting the major and ever increasing hashing power of the network. Does the BTC standard make it possible for some entity to use the hashing power of the network to decrease the strength of certain types of mathematical encryption? The network will probably reach 1 Peta hash per second in the next year or so and the e
  7. I've been thinking about a new netbook for a while and something recently occured to me about battery life and the nature of Linux on a netbook.. If you really want portability and great battery life and you plan to run Linux, imagine having an eeepc with a 6 cell battery and an e-ink/lcd combo display! With the newest Atom CPU running a stripped down OS with a CLI on an e-ink display, you could probably get 20 hours of battery life or maybe even more than that. The newest eeepcs can already get 11+ real world hours and that's on windows, on average power settings, with an LCD display, for an
  8. I do know the ip of my router. I would have no business attempting to learn the ins and outs of the SSH protocol if I didn't. My SSH client is running in Ubuntu 12.04. I have given my SSH server my public key and used ssh -l <my user name> -p <my SSH port> <my ip address> and connected to the server before. I had some WiFi module problems and had to take a break from learning SSH to fix that. Now the problem is that I don't remember exactly all of the correct steps to the procedure, and something has changed. When I try to SSH to my router over LAN I get a key fingerprint th
  9. I have read so many wiki pages and forum threads and tutorials and this and that but none of them are complete enough to actually teach me to do this stuff. Every one of them leaves one step or another out, or assumes who ever is reading it knows things that people who haven't done the procedure before won't know. Sometimes I feel like these resources were all made for fun or entertainment and not actually for education/instruction. It's not this way for just this case but for all kinds of other things computer related. If I want to learn to actually, in real life, do some non-standard non-ave
  10. Thanks for trying, but this doesn't really answer my questions.
  11. Question one -- I'm a little confused about your answer to question one. Or, that is, I am confused about the DDWRT SSH server. Why is it necessary to install an SSH server on DDWRT if it already supports remote management by SSH? What I've done so far is, under the DDWRT services tab I enable SSHd. I then use a terminal on a laptop to generate an SSH keypair. I copy that pairs public key into the DDWRT machines authorized keys. I change the port from default, and TCP forwarding and password login are disabled. When I try to SSH to DDWRT over LAN I get "permission denied (publickey)". I assum
  12. I guess ill be checking out this episode. Hopefully I can learn enough to figure it out.
  13. I've learned a lot in the past few years. Some if it is pretty useful but I don't usually learn for that purpose. In this case I want to learn to SSH to server on my DDWRT router and actually use it in the wild. I have been reading tutorial after tutorial on various websites but none have given me the whole story. My immediate desire is to SSH to my router over LAN as I figure that by accomplishing this I will understand the process pretty well or at least well enough to start trying it over the internet. Question One -- Where is a non theoretical, can actually teach a person to do the thing,
  14. I've just gone back to read some oldd stuff I forgot about so it's a little late. It's no bluff, because I don't do that, and it wasn't a hack or illegal. I renewed my license at the building of the DMV, but the licensing process is now handled by the DHS, by DHS agents/employees. In this particular DMV building there are two ipads with DHS software that are used for renewing drivers licenses. I didn't say I did it over the internet. I did it on an ipad that connected to the local network over unencrypted wifi. No one asked me a single question or asked for any documents, aside from the softwa
  • Create New...