Jump to content

fsck

Active Members
  • Posts

    32
  • Joined

  • Last visited

Posts posted by fsck

  1. You would be surprised how many brute force attempts you can log just by turning on an FTP or SSH service for a day. There are billions of zombie computers that spend all their scripted lives scanning IP ranges and when they find something interesting, the try to log in. The humorous part is how many of these will try to log into *nix SSH using the username Administrator, Admin, God, Mary, etc.

    If you do not have any services running, the best thing to do would be to block/drop incoming connections that are not part of already established sessions (ie: requested connections, as in a webpage you want to view). Most standard firewalls have this capability, although the language used to describe it will vary.

  2. A nice thing about Ubuntu 10.04 is it is a Long Term Support release, which will receive updates for 2 years if I remember correctly. This is great on a desktop since you won't have to upgrade for a while. Although if you want newer software next year, you'll have to upgrade anyway.

    As far as which is better, they both have their own strengths and weaknesses. They are both similar systems and neither is inherently better than the other. Use whichever one you like better.

  3. Scytheon3, the problem is that the tutorial you are looking at is wrong. Main should not be declared as void, and doing so on modern compilers that adhere to C++ standards will cause the errors you encountered.

    In C++, main should be declared as an int function, not a void function. For reasons why, please read the following articles on C++ standards:

    http://faq.cprogramming.com/cgi-bin/smartf...p;id=1043284376

    http://users.aber.ac.uk/auj/voidmain.shtml

    For a better (correct) tutorial, check out: http://www.cplusplus.com/doc/tutorial/

  4. Do you offer any HTTP hosting? (I couldn't see any HTTP daemons running)

    Right now we do not. We also do not offer free mail access. These services will most likely be added in the future, but we do not want to offer more services than we can reliably manage.

  5. Three questions.

    What do you expect people to do with this service?

    How much local diskspace does a user get?

    Is a user allowed to provide (compile locally) his own programs?

    1) Its a remote shell, I expect a wide variety of uses. Learning, scripting/programming, IRC, remote storage (light), tunneling, etc.

    2) Roughly 100MB per user. This is a loose restriction and we will allow more space be used as long as its not abused.

    3) Yes, we provide several compilers as well as some script interpreters.

  6. Very Cool.

    One thing you could consider is writing a guide on how to set up a shell service (how you did it, what you learned, tips/tricks/caveats etc), having been looking around I could not find any.

    The reason I say this is that I have been looking for this such information of how to do it properly because I have a UltraSPARC Sun Workstation I would like to do a similar thing with.

    DarkBlueBox, I may be writing a guide based off of what I did to build this. That was one of the original ideas behind the project. :)

  7. I know this is not the correct thing to do, but one way or the other something has to be done in order to create some security awareness. These kind of people need to realize the importance of security. What would you suggest instead?

    Breaking into a system in order to prove that it isn't secure is not that different from the way the Mafia operated/operates. This is the wrong kind of mentality.

    The best course of action is to contact someone holding an appropriate position at the company/business and inform them of the problem. If they do not take any action to 'fix' the problem, then it is out of your hands and should be left alone.

  8. Break into someones computer/system and steal all their banking details and then make a large money transfer to somewhere overseas. That should definitely wake those fuckers up. Ohh where is all my money gone, or what should I do to make my self safe from getting attacked again.

    Or even better wipe off a system completely with viruses making them lose money so they will realize that security is vitally important and that it should never be disregarded no matter what.

    These kind of people need to be punished somehow so they can learn the hard way the importance of computer security.

    This is the stupidest thing I have ever read. This way of thinking is why the term "hacker" has evolved to mean "computer criminal."

  9. I would be interested in this. By actual list do you mean what is and isn't acceptable?

    Yes.

    Finals are over as of last week, so I have a bit of spare time now. I plan on setting up the initial site and server this week. I'll post back with more details once I have something up and running.

  10. I have one of the original EEE 702's. It came with an 8GB ssd, 1GB DDR2 ram, and a 900mhz celeron scaled to 600mhz. I have upgraded the ram to 2GB and added a mugen 6-cell battery for ~7hrs total real battery life.

    It has been a great machine and I still use it almost daily. I've done everything from taking notes to running presentations and even some light video editing. It is a stable machine and built like a tank (thanks mostly to its small size which eliminates a lot of case bending found in larger notebooks).

    I've taken two C++ courses at my university so far. Every assignment I turned in was written, debugged, and compiled using my EEE.

  11. Also can you clarify on how you mean "abused"?

    Alias: I wouldn't mind ssh tunneling or light downloading. Abuse would be anyone trying to hack one of the servers, downloading blatantly illegal material (child porn, etc), or anything of this nature. I plan on having an actual list available on the site as well as printed in the motd.

  12. I have recently acquired a decent amount of semi-old networking and server hardware. As a summer project, I am playing with the idea of setting up a free, remote Linux/BSD shell service using this hardware. The service would be as open as possible, allowing ssh tunneling, irc, etc, as long as it was not abused.

    So my question is, would the community be interested in such a service, or should I look for a different use for this equipment?

    *Edit:

    Service is now online. See http://theowned.net/ for more information.

  13. its more relevant to learn programming theory and object oriented programming than just learning the syntax of a new language.

    I completely agree with this. The syntax of each language is rather easy to pick up on once you have a good foundation in theory.

    Time is better spent mastering programming concepts that can be used in any language than mastering syntax differences between C++ and java.

  14. whats with you people and ubuntu *shudders

    ubuntu is a horrid distro, have you looked at thier community user base? its filled with "not very smart people"

    use something like gentoo, fbsd or arch linux

    You can't insult Ubuntu for having a "not very smart" community and then suggest Gentoo or Arch. :lol:

  15. My problem with anti-virus software is it is dependent on comparing software on your system against known "bad" software. Keeping anti-virus definition files up to date will help, but there will always be a percentage of malware in the wild that will be undetectable by anti-virus software.

    An infected system, even after a thorough cleaning, should never be trusted again. I believe preventing the files from getting on your machine in the first place is a better solution than scanning after-the-fact.

    "If you regularly have to clean dog shit off your shoes -- would you prefer to invest money in excellent detergents and shoe cleaner, or would you prefer to watch where you are walking?"

    dont use an AV, install linux

    Right. Linux is way more secure than other operating systems. (yes, sarcasm)

    Using a less-popular (and thus less-targeted) OS does not make you any more or less secure.

  16. omg have i got some funny tech support stories ! lol

    the password in one of our manuals said ....

    your default user name is AAAAA and your password is AAAAA.

    do u know how many calls we got saying "i've entered five A's and a full stop but it wont let me in."

    common sense says try AAAAA if the AAAAA. password didn't work ....

    this was a conflict of departments we were the developers yet the graphic designers and editors within our head office in london produced the manual.

    Periods get people every time. We had a certain manufacturing program at work that would only allow the admins to blank out a users password, not change it. This caused trouble because people simply do not understand, "Your password is blank, just type your username and press enter."

    I also ran across a user once that swore caps-lock was on because the lettering on his keyboard, yes the physical lettering, was in upper-case.

  17. Are you all using old builds of Kismet?

    The new interface is much easer to use, supports Bluetooth and other plugins.

    Kismet-2010-01-R1

    I'm running Debian 5 on my laptop; the "old" version of Kismet is the newest version in the repos. Haven't needed the new version, so I haven't compiled it.

×
×
  • Create New...