Jump to content

Alias

Active Members
  • Posts

    116
  • Joined

  • Last visited

Posts posted by Alias

  1. How long have you been with Internode for?

    Umm, probably around 4 - 5 years although I'm not sure exactly.

    I've never had a problem with them at all and they have brilliant Customer Service and Broadband Service as well. They might not be the cheapest but they're certainly worth the money.

  2. So to an extend I would not trust someone remoting into my PC.

    I completely agree, I normally fix all my and family/friends computer issues so having Telstra sniffing around my PC wouldn't be a problem, plus the likelyhood that Telstra would give Linux support is pretty slim.

    I can just imagine now...

    Telstra Employee: "So all I need you to do now is click on your Start Menu, go to Accessories and then click on Remote Assistance."

    Me: "I don't have a Start Menu, I'm using Linux (puts on Sunglasses, backflips onto motorbike and rides off into the distance)"

  3. When I was 15 I started playing with batch scripts at my school and found it utterly boring to say the least, then I found a way to access the network drives and run applications remotely however access them locally. Needless to say we installed Firefox and many other applications, in the process getting banned from the network for a few weeks. I started to play with batch files a lot more and found that while it was boring I was learning stuff.

    I then moved onto hackthissite.org and started to learn HTML and Javascript. After I'd pretty much learnt them I started to learn PHP which at the time was extremely hard. From their moved onto Wi-Fi hacking which eventually made me convert to Linux. I use Metasploit regularly and know bits of C and such. I know Cryptography fairly well as well. I'm 17 now and I'm considering a career in Computer Science which a few years ago I would have never done.

    Moral of the story is everyone is a skiddie for a while.

    /stimulates ego.

  4. How much are you guys willing to bet that all of these hex strings Darren keeps dropping will, when connected in the correct order, make a public AES key? How about that public AES key belonging to a WASTE server at a yet-to-be-disclosed IP?

    AES is not an asymmetric cipher meaning their is no such thing as a public key. Even if it was an asymmetric cipher you still wouldn't have so many similarites like....

    EEF5204D6A - Code the the episode

    RRS5204Q6A - Darren's QR code image file name

    Due to the Avalanche effect.

  5. You could probably use fdisk to kill the partition table and then reformat. You'd want to be careful with doing that though, as digip said if you choose the wrong device you could end up formatting your hardrive.

  6. My school used Novell software as well, their was this really neat hack where you could make a few changes to the registry and that would enable the messaging software for the Novell network. We had soooo much fun randomly messaging people halfway across the school.

  7. The psgroove exploit doesn't work anymore I don't think cause Sony released an update a few days ago which would probably disable this. Might want to check though.

    Also my friend used his N900 to sploit his PS3 using the psgroove source code. Check out other machines that you can do it from.

  8. True but I am basing it on the fact AES-256 is military grade and RSA is usually applied in transmissions rather then file encryption and as such could easily be implemented wrong and the method from the article i posted it was rather weak as they were crackable by a 1GHZ processor in 30 years. My PS3's Cell Processor could kill it in far less . As for security both are VERY secure (when implemented well) but hey screw it and pull a TC and go with AES-TWOFISH-Serpent :P now they are screwed!

    Hahaha, AES-Twofish-Serpent. Now that is something I would love to see someone do :D

  9. Wouldn't that be a lot more secure to just encrypt the data with RSA instead of blowfish, since the RSA keys can be a lot more lengthy than the blowfish keys.

    But I do I understand where you are coming from. It was just my observation.

    You are quite right it would be a lot more secure however very slooooooooow. That's why Blowfish or Twofish would be better in this case because both are faster than AES. Then when you encrypt the keyfile/password with RSA you get the security of RSA coupled with the speed of Blow/Twofish.

  10. lol While it is funny you have to wonder how much these people made:http://www.net-security.org/malware_news.php?id=945 (although personally i would have used AES-256 bit over the less secure RSA they used ( I mean 30 years to crack it is nothing compared o AES-256bit. And also implemented NSA 7 pass wipe so the user couldn't just recover the "deleted" files. Maybe thats a little too evil of me to think of :P

    Depending on the key length RSA can be a lot more secure than AES-256. Personally I would have encrypted in Blowfish or something like that and then encrypted the keyfile/password with RSA. This would sacrifice a tiny bit of security in exchange for speed.

    Of course this depends on how much you're trying to encrypt.

×
×
  • Create New...