Jump to content

jool

Active Members
  • Posts

    277
  • Joined

  • Last visited

Everything posted by jool

  1. It would be great if they had one of those little icons you could put on your site advertising that they think you really suck. You know, like the "top rated download" things but in reverse.
  2. jool

    Replicator

    I use unison for something similar. With some appropriate command line switches it works fine from one drive to another without much hassle.
  3. Since it only uses a limited set of characters it has to be using more than one character in the encrypted text for each clear text character. If you didn't make a mistake while writing it down there is a problem though, you've got an uneven number of characters. I found this lump of Javascript I created a while back for a similar course, it's not automatic in any way but it does speed up simple frequency analysis. It lets you count characters or groups of character and also replace characters. The first field is for the crypto text, the second one is for the length of the character groups and the third one is for replace instructions ("AB=a C=b").
  4. If it is on the basic level and you really want to learn how it all works I would really recommend doing the analysis either by hand or using tools you write yourself. Not trying to be demeaning or anything, I just know that most learn better by doing things themselves and some damaged people (like me) actually find manual crypto analysis quite interesting/satisfying/fun. If you are interested and have the time I would recommend reading The Code Book by Simon Singh. But if you just want to get through the course without thinking there is always pages like this that one can find with some googling.
  5. Since it is Java someone could easily utilize the AES libraries and then everybody is screwed :) But it sounds like it's a beginners course in cryptography, which should mean that most will probably go for a simple substitution cipher which are easy to break. If someone goes a bit advanced they will probably at most do a polyalphabetic cipher with some form of rearrangement, but still the methods for breaking those are fairly well documented (you might need to find some app or write one to do the analysis since it's a pain to do by hand). Wikipedia has a wealth of knowledge about different classical cryptos and how to break them. Even if anyone uses binary operations to encrypt the same methods of breaking applies (frequency analysis and such) as long as they don't use advanced methods. If you get access to the encryption part of the others programs you can often figure things out about how it works by encrypting data with small changes in content and length.
  6. If you use 7zip (comes in a portable flavor as well) you can open single files without extracting and it detects changes made and updates the file. Won't let you run something like Firefox without unpacking it though. Wikipedia has some suggestions but the few I have tried haven't even come close to TrueCrypt.
  7. jool

    Joost

    One: The instructions are pretty clear I think, even though I didn't copy them over at least one was able to scroll up a few messages. Doing things like this via pm avoids the infinite "Me too" responses that no one else is interested in. Two: Your address is hidden.
  8. jool

    Joost

    Well, I've got at least five invites right now. From what I've heard they might be infinite but I'm not sure. Anyways, I will be giving away as many invites that I can. The instructions I gave the last time still apply. Edit: Just checked the invites status and apparently I now have 998 invites left :)
  9. Even though TrueCrypt is portable it still requires admin privileges to load the device driver and without that it just doesn't work. If your paranoia level is low then you could try just using a passworded zip file. It will keep the nosy out but if someone really wants to know it's relatively quickly broken.
  10. Is it just me or does this seem like a joke? Just in case it isn't: Without booting into something else or access to an account with higher privileges you won't be able to do anything. Windows is actually quite secure despite what some people say about it. Would you also like to explain why "stupid ppl" have admin access to your machine while you don't? (No they can't install anything from the guest account that you can't also remove from it) Are you sure you didn't just steal someones laptop and now you don't want them to track you by the IP-address used by the IM clients?
  11. I know it's an unimportant and fun thing but I do think it is suffering from the Digg mentality. That is, voting down everything you don't agree with whether or not it's a proper article or comment (they really should fix that problem over there where it's actually important). I think it's actually quite fun to see how people react to posts both positive and negative, but without being able to see what for it is a bit confusing. That confusion and that some will take the apparent "popularity contest" seriously may very likely cause some unnecessary problems. This is not a vote to remove it, it's just something for the benevolent forum overlords to think about.
  12. Answering my own question in case anyone else was interested as well: It's supposedly a processing key (better than a device key) that was found a while ago, it's getting attention now because of the DMCA notices.
  13. Interesting to see that either saying some truths about linux or joking about the admins gets your reputation voted down. ... Windows sucks? :)
  14. I'm wondering, what level of the encryption scheme is that key for? Is it a device key or is it even better than that?
  15. One of the best ways of increasing battery life is to pull down the brightness on the screen as much as you can while still being readable. Otherwise you can see if you have anything running in the background all the time, but if you get the same battery life on all OSs that probably isn't the problem. Finally, batteries do degrade over time and get worse performance until they stop working altogether.
  16. I actually haven't given anyone a vote in either direction yet. The first time is going to be special.
  17. Obviously user reputation is there to let you more easily suck up to the admins. The potential brownnoser no longer need to type anything out, all it requires is a simple click. The advantages for the admins is great as well since they don't have to read long posts to see how much they are loved, just one glance at their profile page is enough to validate their fragile egos. Leaving them a lot more time to get drunk and ban random users for fun.
  18. After some in depth research I'm convinced he is talking about the viking cat club.
  19. Bah! Script kiddies don't have l33t gr4mmar 5k1llz.
  20. The question about what payload to use got me thinking. I never really bothered to follow the switchblade development that much and the wiki is down so I can't look up if it already is done or not. I was thinking about a demo / auditing payload that just goes through and logs what it could have done if it was malicious without actually doing anything to the system. I would not want to have to potentially hose a system just to prove a point. Since I don't break into systems anymore proving the point would be the only capability I need and from the description rpk5000 gave the needs seems to be similar.
  21. It's pretty awesome if you are stuck using any spreadsheet application for an extended period of time as well, even under windows. There should be at least a couple apps that do this already (don't know any clean enough for my standards though), otherwise it's up to you to code your own app that adds a keyboard hook and listens for key presses. But that will most likely be in C/C++ at a fairly deep level. Edit: forgot putting in a link keyboard hook The scroll lock should be a regular button that registers normally unless I'm mistaken.
  22. From all the godaddy ads I hear on a variety of podcasts I gather that you should get some free hosting with that domain and if you do they probably also have a nice and simple step by step guide somewhere on their site. It's just a bit much to write a complete guide when there (probably) already is a pretty complete one available.
  23. It's the smell of victory, you know the napalm in the morning variety of victory. <snip content="Vako posted about that before I finished typing"/> the less locking the better. Even when threads go to the peanut butter and burning human flesh area. (mmmmmm peanut butter on a freshly roasted human....)
  24. I would suggest the "Mark ALL messages as read" button on the main forum page for marking everything as read, it's below all the categories. And yeah the blacklisted urls error when quoting someone is annoying, especially when you don't have any urls in it. Couldn't post anything when I had used the quote link to reply, even when I removed everything.
  25. This is not about any specific thread but rather more about something I feel I've seen more and more lately. I just wanted to address it and see what others think about it. Reading through the post before posting it I realize that it is influenced a bit by some other forums as well but I still think applies here. I feel that threads are being locked for no real reason and I think it should stop. Locking threads because they go off topic or because the thread starter requests it for some other reason is just excessive moderation. If someone is intentionally/repeatedly threadjacking just to be disruptive something should be done to reprimand that user instead of just locking the threads, if it is just a conversation that goes off topic by itself I see no reason to intervene. Locking duplicate threads after pointing in the right direction and flaming about the search is OK if it's caught early, but if it is already a page or two long that isn't the same it isn't really a duplicate thread anymore even if it started out the same and should not be locked. The only reasons to lock a thread should be when a thread becomes really hostile and people need to cool down, but do recognize that there is a difference between a heated debate and real hostility. I guess I just don't like the idea of someone being able to come in and basically say "conversation over, stfu!" without (what I see as) a valid reason. Thoughts? Am I just a crazy anarchist imagining things or does anyone agree?
×
×
  • Create New...