Jump to content

psychoaliendog

Active Members
  • Posts

    165
  • Joined

  • Last visited

Posts posted by psychoaliendog

  1. Gentoo is really easy, assuming your hardware is supported. I spent an entire weekend trying to get Madwifi and WPA-supplicant to play nicely with each other, it still doesn't work. I'm going to try ndiswrapper once I have another weekend to fiddle with that stuff. But that was my only problem with installing Gentoo. The Portage system is amazing, it makes compiling any package, including the kernel, from scratch easy, time consuming, but easy. Try that with RPMs!

    The installer is crap, why do I have to boot the entire OS to install it?

    First off its a great way of checking if all your hardware works. Second, if anything needs configuring you can do it right there, in the installer, then copy the config files to a USB drive, boot in to the newly installed OS, copy the files back and voila, config is done, and you don't have to worry about screwing up the installed version on your hd just reboot and try again. Lastly, and most importantly, to play games while the OS is installing.

  2. relax with some yahoo pool or limewire or something else

    Limewire? Say it with me now:

    Winners don't do Warez! (or illegal mp3's, or drugs)

    Now that we've got that done with. You could try setting up a VPN or a SSL tunnel to somewhere that doesn't have such problematic restrictions.

  3. Painkiller, calm down. Common sense says that if you see someone hiding behind a bush you call the police. It's all a matter of the size and shape of the bush, and if you have uber-nijna ( :ninja: ) sealth skills. As far as can you be caught? Depends on how fast you run with a laptop in your hands. If you do hack the pentagon, they probably wouldn't take that well, in which you may need to be able to run even faster, maybe even get some running shoes.

    So, todays lesson, think about your question before asking, and if you don't prepare for really lame, bizarre, and useless replies. Like this one. :wink:

    Tomorrows lesson, why suicide is bad.

  4. I don't know what all commotion about spam, is for, I rather like it. On toasted wheat bread with lettuce, mmmm... thats some good food.

    As far as the unsolicited emails go, "I get no spam." I really don't mean to quote Dvorak, but I don't. I've only got 4 in the past month. I find, that most spam comes from those email that your mom/sisters/girlfriends sends you that are like:

    Subject:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:

    Fwd:RE:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:

    Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Re:Fwd:Fwd:Fwd:Fwd:Fwd:Fwd:Hey guys,

    From: katKat@s.com

    to: <A list of every boy that she sent it to>

    I don't know if you know this but little Jimmy has Cancer. He going to die unless you help me

    Please!!!111!!1 Help ME help Jimmy!!!11!!

    Microshaft has pledged that they will give us $1 for every name in this email

    Please!!!

    Put your name below and send it to every body you know including the person that sent it to you!

    Jessy Nooberson

    Maggie McNoob

    Katie Nooberton

    ...

    The catch is the "including the person who sent it to you." So that it will make it back to the spammer with everybodies names and emails. Using a little logic you could associate the two, and get really clever spam. :x

  5. I could see this working as a pickup line

    me: So, today is global orgasm day, where people are all around the world having sex for peace.

    girl: really? that's sexy and irresistible

    me: I know, but so am I! How about we go make some peace?8)

    girl: why, that sounds like a wonderful proposition.

    Thats how I see it going down, +/- a call for security guards, mace, and a black eye.

  6. I accidentally deleted the first upload, and re-uploaded it sometime between the time you read that post and then replied to it. So it works now. I'll be over there in the corner awaiting my flogging for being a n00b, and not being able to use rapidshare.

    Edit: I finished the tutorial it's here.

  7. The reason the &action=edit is there is because those articles don't exist yet, but... now they do so i guess its fixed.

    Paul check

    Ashley check

    Frank check

    EDIT: the wikipedia staff didn't find frank to be "notable" so they deleted the page.

    The article Frank Linhares has been or soon will be deleted from Wikipedia. This happened because the article seems to be about a subject but it does not indicate how or why the subject is notable. If you can indicate why the subject is really notable, you are free to re-create the article, making sure to cite any verifiable sources. Feel free to leave a note on my talk page if you have any questions about this. You might also want to read our criteria for speedy deletion, particularly item 7 under Articles. NawlinWiki 16:03, 21 November 2006 (UTC)

    EDIT again: They appearently took down paul's too. :(

  8. <rant>

    In other words you want us to do your home work for you? Isn't the point of homework to learn? It you're not doing your homework, how are you supposed to make in the real world writing real programs?

    </rant>

    Alright I know you're new to programming, and it can be confusing sometimes. However the most important skill needed by a programmer is problem solving. You should be able to figure out the algorithm, it may be buggy, it may not be efficient, but you're learning all the way. Try breaking it[the problem] down into smaller pieces.

    Wikipedia has a lot of programming resources, http://en.wikipedia.org/wiki/RPN_calculator should get you started.

  9. You could get your own router and unplug his from the modem/wall, and replace it. Set the SSID and the WEP/WPA Key to the same as the old router, then hide the new router. He won't notice anythings unusual until he tries to login and then you can, with a little social engineering, lead him to believe that you 0wn3d his router.

  10. Thats great K1u, Deleting the profile and reinstalling is the canned answer from the mozillazine forums. As it pretty much fixes any/all problems.

    As for the real problem, It could have been anything, broken extensions, broken profiles. Firefox is mostly xml, which was designed to robust against corruption. So if one or two bytes were bad the whole file wouldn't be broken.

    K1u be careful when reinstalling your extensions, make sure that Firefox still works after each install.

  11. Things I would like to learn in a c++ class are how the compiler intrprets code. For example what does this actually do, and why:

    int a = 2;
    
    int b = 3;
    
    int c = a+++b; // yes thats supposed to be three +'s

    or why this doesn't work:

    something&lt;somthingelse&lt;int&gt;&gt; d; // no space between the &gt;'s

    Other things like the Preprocessor, Unions, and Bitwise operators would also be useful to learn. Thats all stuff I didn't ever learn in any of my CS classes because they were deemed usless. However I use them all the time, and they are esential tools to any good c++ programmer.

    Oh, and Creativity, too. It's one thing to look up an ADT in a book some where and implement it, but when you are implementing something new and different, having a creative mind can be very helpful.

  12. yes, but real h4x0rZ use C++, C, and ASM... all at once. Once you've learned how to program I suggest using C++ because its similar to C#, Java, etc. but the executables are faster and its just a more powerful language.

  13. you could try

    $firsthash = "random stuff";
    
    $secondhash = "more random stuff";
    
    
    
    $page = &lt;&lt;&lt; XXX
    
    &lt;html&gt;
    
    &lt;head&gt;&lt;title&gt;&lt;/title&gt;&lt;/head&gt;
    
    &lt;body&gt;
    
    $firsthash and $secondhash
    
    &lt;/body&gt;
    
    &lt;/html&gt;
    
    XXX;

    you will have to change the code between the XXX's you can use any variable in there just as you would in the rest of the code (see http://us2.php.net/manual/en/language.type....syntax.heredoc).

    but your method has a couple of flaws. All the bot needs is to be aware of its public IP and it can hash it and spam all it wants. Secondly the could just look for the pattern in the fields of a form, eg. a post has a <input> for the subject and then is followed by a <textarea> for the body of the post.

×
×
  • Create New...