Alias
-
Posts
116 -
Joined
-
Last visited
Posts posted by Alias
-
-
How long have you been with Internode for?
Umm, probably around 4 - 5 years although I'm not sure exactly.
I've never had a problem with them at all and they have brilliant Customer Service and Broadband Service as well. They might not be the cheapest but they're certainly worth the money.
-
I'd just like to say........INTERNODE FOR THE FUCKING WIN.
-
So to an extend I would not trust someone remoting into my PC.
I completely agree, I normally fix all my and family/friends computer issues so having Telstra sniffing around my PC wouldn't be a problem, plus the likelyhood that Telstra would give Linux support is pretty slim.
I can just imagine now...
Telstra Employee: "So all I need you to do now is click on your Start Menu, go to Accessories and then click on Remote Assistance."
Me: "I don't have a Start Menu, I'm using Linux (puts on Sunglasses, backflips onto motorbike and rides off into the distance)"
-
When I was 15 I started playing with batch scripts at my school and found it utterly boring to say the least, then I found a way to access the network drives and run applications remotely however access them locally. Needless to say we installed Firefox and many other applications, in the process getting banned from the network for a few weeks. I started to play with batch files a lot more and found that while it was boring I was learning stuff.
I then moved onto hackthissite.org and started to learn HTML and Javascript. After I'd pretty much learnt them I started to learn PHP which at the time was extremely hard. From their moved onto Wi-Fi hacking which eventually made me convert to Linux. I use Metasploit regularly and know bits of C and such. I know Cryptography fairly well as well. I'm 17 now and I'm considering a career in Computer Science which a few years ago I would have never done.
Moral of the story is everyone is a skiddie for a while.
/stimulates ego.
-
How much are you guys willing to bet that all of these hex strings Darren keeps dropping will, when connected in the correct order, make a public AES key? How about that public AES key belonging to a WASTE server at a yet-to-be-disclosed IP?
AES is not an asymmetric cipher meaning their is no such thing as a public key. Even if it was an asymmetric cipher you still wouldn't have so many similarites like....
EEF5204D6A - Code the the episodeRRS5204Q6A - Darren's QR code image file name
Due to the Avalanche effect.
-
answer[strlen(answer) - 1] = 0;
For people that don't know that code above strips the NULL ('\0') away from the end of the string.
Otherwise the strcmp() wouldn't work.
Took me a while to realise that >.<"
-
Episode 8x09
in Hak5
All I can say is that was some of the funniest shit I've seen in a looooooong time.
-
Probably because he's in hospital.
-
Dual core phone :o
Now that would be very, very interesting to see. Anyone noticed how phones are already becoming more powerful than the iPad. Fail Apple Fail.
-
eeww fail. i cant believe they only put 600 MHz in the nokia. thats a big NO for me.
True but it has been successfully overclocked to 1150Mhz and don't forget you've got a DSP in there as well.
-
I reckon the counter increments when you enter information into the fields and press submit. Mine was 2050.
-
Mmm it's rather amazing and also relatively cheap (about $500) when comparing its power to price.
Interesting links here...
-
im not sure i never entered anything into it before. could be another clue.
It's just a counter D:
-
Reckon I'll set up an Untangle (or something very similar) server/router that drops packets once it reaches a certain speed.
-
I'd suggest Maemo on the N900, that thing is basically a Linux distro wrapped up in a touchscreen UI. They are powerful as hell. You can dual boot Android on it if you really wanted to and it has a fantastic open source user community.
-
wait doesn't that mean this is a bad thing, i should start browsing using a text browsing
Text browsing is the way of the future.
-
Beej's Guide to C Programming is a free book that is pretty good considering it's free. As for the non-free side of things I'd suggest 'Let us C' by Yashwant Kanetkar, it's how I got started learning C and I'm so glad I chose his book to help me.
-
You could probably use fdisk to kill the partition table and then reformat. You'd want to be careful with doing that though, as digip said if you choose the wrong device you could end up formatting your hardrive.
-
My school used Novell software as well, their was this really neat hack where you could make a few changes to the registry and that would enable the messaging software for the Novell network. We had soooo much fun randomly messaging people halfway across the school.
-
The psgroove exploit doesn't work anymore I don't think cause Sony released an update a few days ago which would probably disable this. Might want to check though.
Also my friend used his N900 to sploit his PS3 using the psgroove source code. Check out other machines that you can do it from.
-
True but I am basing it on the fact AES-256 is military grade and RSA is usually applied in transmissions rather then file encryption and as such could easily be implemented wrong and the method from the article i posted it was rather weak as they were crackable by a 1GHZ processor in 30 years. My PS3's Cell Processor could kill it in far less . As for security both are VERY secure (when implemented well) but hey screw it and pull a TC and go with AES-TWOFISH-Serpent :P now they are screwed!
Hahaha, AES-Twofish-Serpent. Now that is something I would love to see someone do :D
-
Wouldn't that be a lot more secure to just encrypt the data with RSA instead of blowfish, since the RSA keys can be a lot more lengthy than the blowfish keys.
But I do I understand where you are coming from. It was just my observation.
You are quite right it would be a lot more secure however very slooooooooow. That's why Blowfish or Twofish would be better in this case because both are faster than AES. Then when you encrypt the keyfile/password with RSA you get the security of RSA coupled with the speed of Blow/Twofish.
-
lol While it is funny you have to wonder how much these people made:http://www.net-security.org/malware_news.php?id=945 (although personally i would have used AES-256 bit over the less secure RSA they used ( I mean 30 years to crack it is nothing compared o AES-256bit. And also implemented NSA 7 pass wipe so the user couldn't just recover the "deleted" files. Maybe thats a little too evil of me to think of :P
Depending on the key length RSA can be a lot more secure than AES-256. Personally I would have encrypted in Blowfish or something like that and then encrypted the keyfile/password with RSA. This would sacrifice a tiny bit of security in exchange for speed.
Of course this depends on how much you're trying to encrypt.
-
Any malware author that uses Visual Basic to write malware, is not a real malware author.... just sayin.
Connecting To Irc.hak5.org
in Questions
Posted
Easy, install an IRC client like X-Chat, Pidgin, mIRC, irssi etc. and then run
Also you should probably have a look at IRC Help