Jump to content

Lord Necron

Active Members
  • Posts

    66
  • Joined

  • Last visited

Posts posted by Lord Necron

  1. Microsoft's not bothered about COFEE leak.

    Protect yourself from COFEE with some DECAF

    In response to Microsoft's Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password-protected or encrypted sources, two developers have created "Detect and Eliminate Computer Assisted Forensics" (DECAF), a counter intelligence tool designed to thwart the Microsoft forensic toolkit. DECAF monitors the computer it's running on for any signs that COFEE is operating on the machine and does everything it can to stop it.

    More specifically, the program deletes COFEE's temporary files, kills its processes, erases all COFEE logs, disables USB drives, and even contaminates or spoofs a variety of MAC addresses to muddy forensic tracks. It can be told to disable almost every piece of hardware on a machine and delete pre-defined files in the background. The 181KB DECAF program even has a 'Spill the cofee' mode in which it simulates COFEE's presence to give the user an opportunity to test his or her configuration before actually using it. Source code for DECAF has not been made available, since the authors fear it will be reverse engineered, making it unclear what else the tool might be doing and whether or not it is completely safe to use.

    DECAF's developers say future versions of the program will allow computer owners to remotely lock down their machine via text message and e-mail once they detect that it has fallen into law enforcement hands and even send out notifications to other parties in the case of an emergency. The plan is to make DECAF's next release more light-weight, possibly having it run in the form of a Windows service.

    COFEE, a suite of 150 bundled off-the-shelf forensic tools that run from a script, was created by Microsoft to help law enforcement officials gather volatile evidence that would otherwise be lost in traditional, offline forensic analysis. Officers can run the script in the field from a USB stick, before the computer is brought back to the lab, letting them grab data from password-protected or encrypted sources. The forensics tool works best with Windows XP, but Microsoft is working on a new version of COFEE for next year that fully supports Windows Vista and Windows 7.

    Microsoft first revealed the 15MB tool back in April 2008, and in April 2009, the company announced that it will aid global law enforcement in fighting cybercrime by providing COFEE free of charge to 187 countries, distributing it through Interpol. Microsoft managed to keep the existence of it quiet until November 2009, when pirates decided it was time to leak the tool so that people other than just government crime-fighters could use it. Weeks later, Microsoft started issuing takedown notices to multiple websites that hosted the tool. It's unclear whether Microsoft will react to the fact that there's now software that aims to render COFEE useless.

  2. From http://www.informationweek.com/

    The House of Representatives is finally about to get with the times and will soon install a Wi-Fi network, it announced late last week.

    The roll-out will take place over as long as three years, according to a statement of work posted on the Web site of the House's chief administrative officer and a synopsis of the effort posted on federal procurement Web site FedBizOpps. A House spokesman hinted the effort could be completed before then, but declined to give any firm timeline.

    Beginning as early as January, the House will create a number of wireless hotspots in cafeterias. Eventually, the 802.11n network will blanket the four House buildings and the U.S. Capitol building, including hearing rooms and members' offices.

    The only real wireless access points in the House today, as the statement of work makes clear, are disparate and often member-operated networks, which are unmonitored and may be unsecure. In hearing rooms and across Capitol Hill, visitors, members, and staffers typically rely on spotty 3G signals or suffer without any network access.

    Though the House has conducted several Wi-Fi pilots in the last few years, those efforts have never made it out of the pilot stage. In addition to engineering challenges stemming from having a 505,000 square foot, multi-building campus and thick marble walls, one key concern, according to the spokesman, is cybersecurity -- members of Congress and the Congressional IT infrastructure would clearly be prime targets for hackers.

    The House will also require the contractor who installs the network to include network management and security tools, provide training, and eventually maintain the network. In terms of security, the House wants the network to be able to locate rogue access points and users.

    In looking forward, the House also anticipates using the wireless network for things like voice over WLAN and location-based applications

    The wireless network is actually part of a larger trend in the House of Representatives toward centralization of historically decentralized IT resources. For example, server consolidation is another major effort currently underway in an effort to decrease the size and complexity of the House's data center.

  3. i found an old Linksys Router model number WRK54G im not sure what the version is or if it even matters. i searched google about this and really could find the answer i was looking for. is it possible to put open/wrt on this router and then put jasager on it? if so what is the best way. if its possible i aslo want to put a battery pack on it. i know where it goes i just dont know were to find how much power it actually needs. thanks a ton.

    Manufacturer/Model - Linksys WRK54G

    Supported - not possible

    Yet @ https://forum.openwrt.org/viewtopic.php?id=4428 we find:

    Per http://hardware.mcse.ms/message14506.html

    When dealing with the Linksys WRK54G you need to refer to it as a

    WPC54G. This is the part number of the kit that the WRK54G came in.

    This IS in the RMA model list. This is also the case when downloading

    firmware for it. It so happens that the firmware is the same as the

    WRT54G even though some people say it is different, when you download

    the f/w for the WRK54G you get the file for the WRT54G.

    So we already know it's a Marvell sub-produced chipset per that thread...Perhaps the MX Flash memory is via Co-Branding?

    I do not know much else. Google the hell out of it. If you are not using it, you may as well brick it. Linksys models have functional reset buttons under both Kamikaze and White Russian...

    So this lands us with a firm maybe. I would treat it like a WRT54G and see what happens. ;)

    Worry about the battery pack till after you see if the rest will work.

  4. To get close something like that all you can do is play something like Vampire: the Masquerade (Original Pen'N'Paper RPG, not the video game shit) ofc this thread is about movies not games, so...

    I have a copy of that. As well as the rest of the WoD "main" books. Started with Mage, though.

  5. Because I agree and was going to post this anyway, and I know some of you lazy f'ers won't click the link...

    How Twilight Works

    A few weeks ago I had the miserable experience of reading Twilight. A friend bought it for me and I took it with me to read on a long flight from Seattle to Houston. I knew it was going to be crappy, but I thought it would be a guilty pleasure kind of crappy - where you know it's bad but you still get enjoyment out of it. I actually managed to power through around 400 pages until I gave up and started reading Sky Mall. I've been seeing Twilight everywhere lately, especially with Vampire Teens II New Moon's release, so I thought I'd break down why chicks go apeshit for it.

    fans.png

    First off, the author creates a main character which is an empty shell. Her appearance isn't described in detail; that way, any female can slip into it and easily fantasize about being this person. I read 400 pages of that book and barely had any idea of what the main character looked like; as far as I was concerned she was a giant Lego brick. Appearance aside, her personality is portrayed as insecure, fumbling, and awkward - a combination anyone who ever went through puberty can relate to. By creating this "empty shell," the character becomes less of a person and more of something a female reader can put on and wear. Because I forgot her name (I think it was Barbara or Brando or something like that), I'm going to refer to her as "Pants" from here on out.

    pants.png

    So after a few chapters of listening to Pants whine about high school, sucking at volleyball, and being the center of attention, the second major character is introduced. Imagine everything women want in a man, then exaggerate it by ten thousand - and you've got Edward Cullen. The level of detail that the author goes into while describing Edward's appearance is remarkable. At one point while reading I started counting the number of times the author used the expression "Edward's perfect face," and it was far into the double digits. The author excruciatingly details his muscular pecs, clothing, hair, eye color - even his goddamn breath (I'm not joking).

    edward.png

    Edward intensely listens to everything Pants has to say, even if she's bitching about she had diarrhea on Christmas or her preferred method for cutting a sandwich in half. As far as the reader is concerned, Edward cares about nothing in the world more than Pants. What the author has done is created a perfect male figure - a pale Greek statue which the reader can worship and in turn be worshipped by.

    vampires.png

    So what about men that like Twilight?

    If you're male and you like Twilight, you're gay. I don't mean that in the derogatory sense, I mean it in the "you want to put your testicles against another man's testicles while gripping handfuls of chesthair" kind of way.

    And the movie?

    The movie is just the same uninspired crap shat out onto a film reel. If you like the taste of horse manure on your bologna sandwiches, you're probably gonna like it on your birthday cake as well. The same principle applies with Twilight.

    Beyond that, it's just a romance novel with the occasional vampire teen drama bullshit peppered here and there. It doesn't really break any new ground in the realm of vampire fiction, other than portraying vampires as a family of uncomfortable retards who prance around the woods eating deer and bunny rabbits. There's lots of nervous lip-biting, tender kisses between Pants and Edward, and lengthy descriptions of every feature of Edward's body. Pants is a static character who never really progresses beyond being an insecure vampire fangirl who obsesses over Edward. Whether her character grows beyond that is unknown to me, I'd stopped reading by then and shifted my attention to an electric butt-massaging chair in Sky Mall.

    formula.png
  6. My employer gives us free online access to all the training materials for most IT certifications avalable Microsoft, cisco, comptia etc. Just study yourself, and if you pass the test they pay for it.

    Absolutely. This should be considered beside any other benefits offered at a potential employer. My boss just started doing this, and believe me I am using it.

  7. What RAID levels would one like it to recover from if, for example, the RAID controller stopped working and it is impossible to get a new one and there are no recent backups.
    Obviously RAID 1 is not needed.

    In the past I needed something to rebuild a RAID 0. All the software I had couldn"t do it without information I didn"t have. The disks were out of a WD MyBook. WD was no help at all with this, of course.

  8. The certs you have will at least get you an interview. That's about all they're worth anymore, I know mcse's that can barely turn on a computer.

    In practice experience trumps certifications, however when applying for jobs or going for promotion they are very useful.

    This is so true. Certs get the attention, you have to do the rest. I have a tech below me that (for now) has one more cert than me, yet I am the one in charge because of experience.

  9. I know of this site, but can't access Vista or Windows 7 drivers. When I access the Downloads page, it tells me that I haven't got javascript enabled (Windows XP + IE7) but I have. Can someone try to access the Vista or Windows 7 drivers to see if they get the same response?

    Thanks

    Check the forums. They are there. Sorry for any confusion!

  10. Do you know if WinToFlash uses grub4dos? I know WinSetupFromUSB uses grub4dos as the bootloader, which would be good since I already use that. If WinToFlash also uses grub4dos too then I'm not sure which one to use, or which one is better.
    Doesn't look like it.

    Multiboot function for WinToFlash?

    Is it possible to use the application to setup a multboot usb flashdrive

    for example, using one 16GB key have multiple Win OS's (XP,VISTA,W7) on the one flashdrive?

    If not, could there be development in the future?

    Re: Multiboot function for WinToFlash?

    No, now WinToFlash can't do this.

    For this you need 3rd party boot loader, but WinToFlash use Microsoft Windows boot loader.

    Yes, we will try to develop this, but I don't know when.

    From here.

×
×
  • Create New...